Debra L. Cook, Ph.D.

Affiliations: 
2006 Columbia University, New York, NY 
Area:
Computer Science
Google:
"Debra Cook"

Parents

Sign in to add mentor
Angelos D. Keromytis grad student 2006 Columbia
 (Elastic block ciphers.)
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Cook DL, Yung M, Keromytis AD. (2009) Elastic block ciphers: Method, security and instantiations International Journal of Information Security. 8: 211-231
Cook DL, Yung M, Keromytis A. (2009) Constructing variable-Length PRPs and SPRPs from fixed-length PRPs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5487: 157-180
Cook DL, Yung M, Keromytis AD. (2009) Elastic block ciphers in practice: Constructions and modes of encryption Lecture Notes in Electrical Engineering. 30: 69-91
Cook DL, Yung M, Keromytis AD. (2008) Methods for linear and differential cryptanalysis of elastic block ciphers Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5107: 187-202
Cook DL, Yung M, Keromytis AD. (2007) The security of elastic block ciphers against key-recovery attacks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4779: 89-103
Cook DL, Keromytis AD. (2006) CryptoGraphics: Exploiting graphics cards for security Advances in Information Security. 20: 1-136
Stavrou A, Cook DL, Morein WG, et al. (2005) WebSOS: An overlay-based system for protecting web servers from denial of service attacks Computer Networks. 48: 781-807
Cook DL, Keromytis AD. (2005) Conversion and proxy functions for symmetric key ciphers International Conference On Information Technology: Coding and Computing, Itcc. 1: 662-667
Cook DL, Baratto R, Keromytis AD. (2005) Remotely keyed cryptographics secure remote display access using (mostly) untrusted hardware Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3783: 363-375
Cook DL, Ioannidis J, Keromytis AD, et al. (2005) CryptoGraphics: Secret key cryptography using graphics cards Lecture Notes in Computer Science. 3376: 334-350
See more...