Stephen M. Matyas

According to our database1, Stephen M. Matyas authored at least 38 papers between 1978 and 2001.

Collaborative distances:



In proceedings 
PhD thesis 




Alternative Method for Unique RSA Primes Generation.
Comput. Secur., 2001

Key Recovery Alliance (KRA) Technology Papers, Special Issue Introduction.
Comput. Secur., 2000

Ticket and Challenge-Based Protocols for Timestamping.
Comput. Secur., 2000

Multiparty Biometric-Based Authentication.
Comput. Secur., 2000

Generation of RSA Keys That Are Guaranteed to be Unique for Each User.
Comput. Secur., 2000

Additional Key Recovery Function.
Comput. Secur., 2000

A Biometric Standard for Information Management and Security.
Comput. Secur., 2000

Organization Implementation Guidelines for Recovery of Encrypted Information.
Comput. Secur., 2000

Key Recovery Functional Model.
Comput. Secur., 2000

Public Key Infrastructure: Analysis of Existing and Needed Protocols and Object Formats for Key Recovery.
Comput. Secur., 2000

IBM Comments.
Proceedings of the Third Advanced Encryption Standard Candidate Conference, 2000

Generating user-based cryptographic keys and random numbers.
Comput. Secur., 1999

Decentralized group key management for secure multicast communications.
Comput. Commun., 1999

An Effective Defense Against First Party Attacks in Public-Key Algorithms.
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999

ATM cell encryption and key update synchronization.
Telecommun. Syst., 1997

The data encryption standard.
Inf. Secur. Tech. Rep., 1997

Two-phase cryptographic key recovery system.
Comput. Secur., 1997

A proposed mode for triple-DES encryption.
IBM J. Res. Dev., 1996

The Commercial Data Masking Facility (CDMF) data privacy algorithm.
IBM J. Res. Dev., 1994

Complementarity Attacks and Control Vectors.
IBM Syst. J., 1993

A Public Key Extension to the Common Cryptographic Architecture.
IBM Syst. J., 1993

Design of the Commercial Data Masking Facility Data Privacy Algorithm.
Proceedings of the CCS '93, 1993

Key Processing with Control Vectors.
J. Cryptol., 1991

A Key-Management Scheme Based on Control Vectors.
IBM Syst. J., 1991

Key Handling with Control Vectors.
IBM Syst. J., 1991

Common Cryptographic Architecture Cryptographic Application Programming Interface.
IBM Syst. J., 1991

Public-Key Registration.
Proceedings of the Advances in Cryptology, 1986

The History of Book Ciphers.
Proceedings of the Advances in Cryptology, 1984

The Search for the Key Book to Nicholas Trist's Book Ciphers.
Cryptologia, 1983

Message Authentication with Manipulation Detection Code.
Proceedings of the 1983 IEEE Symposium on Security and Privacy, 1983

Cryptographic Key Verification.
Proceedings of the Proceedings IEEE INFOCOM 83, San Diego, CA, USA, April 18-21, 1983, 1983

Correction to the Special Section on Computer Network Security of the June 1981 Issue.
IEEE Trans. Commun., 1981

Cryptographic Authentication of Time-Invariant Quantities.
IEEE Trans. Commun., 1981

Required Cryptographic Authentication Criteria for Electronic Funds Transfer Systems.
Proceedings of the 1981 IEEE Symposium on Security and Privacy, 1981

Some cryptographic principles of authentication in electronic funds transfer systems.
Proceedings of the seventh symposium on Data communications, 1981

Digital Signatures - An Overview.
Comput. Networks, 1979

Generation, Distribution, and Installation of Cryptographic Keys.
IBM Syst. J., 1978

A Cryptographic Key Management Scheme for Implementing the Data Encryption Standard.
IBM Syst. J., 1978