Debra L. Cook, Ph.D.
Affiliations: | 2006 | Columbia University, New York, NY |
Area:
Computer ScienceGoogle:
"Debra Cook"Parents
Sign in to add mentorAngelos D. Keromytis | grad student | 2006 | Columbia | |
(Elastic block ciphers.) |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Cook DL, Yung M, Keromytis AD. (2009) Elastic block ciphers: Method, security and instantiations International Journal of Information Security. 8: 211-231 |
Cook DL, Yung M, Keromytis A. (2009) Constructing variable-Length PRPs and SPRPs from fixed-length PRPs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5487: 157-180 |
Cook DL, Yung M, Keromytis AD. (2009) Elastic block ciphers in practice: Constructions and modes of encryption Lecture Notes in Electrical Engineering. 30: 69-91 |
Cook DL, Yung M, Keromytis AD. (2008) Methods for linear and differential cryptanalysis of elastic block ciphers Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5107: 187-202 |
Cook DL, Yung M, Keromytis AD. (2007) The security of elastic block ciphers against key-recovery attacks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4779: 89-103 |
Cook DL, Keromytis AD. (2006) CryptoGraphics: Exploiting graphics cards for security Advances in Information Security. 20: 1-136 |
Stavrou A, Cook DL, Morein WG, et al. (2005) WebSOS: An overlay-based system for protecting web servers from denial of service attacks Computer Networks. 48: 781-807 |
Cook DL, Keromytis AD. (2005) Conversion and proxy functions for symmetric key ciphers International Conference On Information Technology: Coding and Computing, Itcc. 1: 662-667 |
Cook DL, Baratto R, Keromytis AD. (2005) Remotely keyed cryptographics secure remote display access using (mostly) untrusted hardware Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3783: 363-375 |
Cook DL, Ioannidis J, Keromytis AD, et al. (2005) CryptoGraphics: Secret key cryptography using graphics cards Lecture Notes in Computer Science. 3376: 334-350 |