Stephen M. Matyas

According to our database1, Stephen M. Matyas authored at least 38 papers between 1978 and 2001.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2001
Alternative Method for Unique RSA Primes Generation.
Comput. Secur., 2001

2000
Key Recovery Alliance (KRA) Technology Papers, Special Issue Introduction.
Comput. Secur., 2000

Ticket and Challenge-Based Protocols for Timestamping.
Comput. Secur., 2000

Multiparty Biometric-Based Authentication.
Comput. Secur., 2000

Generation of RSA Keys That Are Guaranteed to be Unique for Each User.
Comput. Secur., 2000

Additional Key Recovery Function.
Comput. Secur., 2000

A Biometric Standard for Information Management and Security.
Comput. Secur., 2000

Organization Implementation Guidelines for Recovery of Encrypted Information.
Comput. Secur., 2000

Key Recovery Functional Model.
Comput. Secur., 2000

Public Key Infrastructure: Analysis of Existing and Needed Protocols and Object Formats for Key Recovery.
Comput. Secur., 2000

IBM Comments.
Proceedings of the Third Advanced Encryption Standard Candidate Conference, 2000

1999
Generating user-based cryptographic keys and random numbers.
Comput. Secur., 1999

Decentralized group key management for secure multicast communications.
Comput. Commun., 1999

An Effective Defense Against First Party Attacks in Public-Key Algorithms.
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999

1997
ATM cell encryption and key update synchronization.
Telecommun. Syst., 1997

The data encryption standard.
Inf. Secur. Tech. Rep., 1997

Two-phase cryptographic key recovery system.
Comput. Secur., 1997

1996
A proposed mode for triple-DES encryption.
IBM J. Res. Dev., 1996

1994
The Commercial Data Masking Facility (CDMF) data privacy algorithm.
IBM J. Res. Dev., 1994

1993
Complementarity Attacks and Control Vectors.
IBM Syst. J., 1993

A Public Key Extension to the Common Cryptographic Architecture.
IBM Syst. J., 1993

Design of the Commercial Data Masking Facility Data Privacy Algorithm.
Proceedings of the CCS '93, 1993

1991
Key Processing with Control Vectors.
J. Cryptol., 1991

A Key-Management Scheme Based on Control Vectors.
IBM Syst. J., 1991

Key Handling with Control Vectors.
IBM Syst. J., 1991

Common Cryptographic Architecture Cryptographic Application Programming Interface.
IBM Syst. J., 1991

1986
Public-Key Registration.
Proceedings of the Advances in Cryptology, 1986

1984
The History of Book Ciphers.
Proceedings of the Advances in Cryptology, 1984

1983
The Search for the Key Book to Nicholas Trist's Book Ciphers.
Cryptologia, 1983

Message Authentication with Manipulation Detection Code.
Proceedings of the 1983 IEEE Symposium on Security and Privacy, 1983

Cryptographic Key Verification.
Proceedings of the Proceedings IEEE INFOCOM 83, San Diego, CA, USA, April 18-21, 1983, 1983

1981
Correction to the Special Section on Computer Network Security of the June 1981 Issue.
IEEE Trans. Commun., 1981

Cryptographic Authentication of Time-Invariant Quantities.
IEEE Trans. Commun., 1981

Required Cryptographic Authentication Criteria for Electronic Funds Transfer Systems.
Proceedings of the 1981 IEEE Symposium on Security and Privacy, 1981

Some cryptographic principles of authentication in electronic funds transfer systems.
Proceedings of the seventh symposium on Data communications, 1981

1979
Digital Signatures - An Overview.
Comput. Networks, 1979

1978
Generation, Distribution, and Installation of Cryptographic Keys.
IBM Syst. J., 1978

A Cryptographic Key Management Scheme for Implementing the Data Encryption Standard.
IBM Syst. J., 1978


  Loading...