Year |
Citation |
Score |
2009 |
Cook DL, Yung M, Keromytis AD. Elastic block ciphers: Method, security and instantiations International Journal of Information Security. 8: 211-231. DOI: 10.1007/S10207-008-0075-9 |
0.633 |
|
2009 |
Cook DL, Yung M, Keromytis A. Constructing variable-Length PRPs and SPRPs from fixed-length PRPs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5487: 157-180. DOI: 10.1007/978-3-642-01440-6_14 |
0.496 |
|
2009 |
Cook DL, Yung M, Keromytis AD. Elastic block ciphers in practice: Constructions and modes of encryption Lecture Notes in Electrical Engineering. 30: 69-91. DOI: 10.1007/978-0-387-85555-4_5 |
0.553 |
|
2008 |
Cook DL, Yung M, Keromytis AD. Methods for linear and differential cryptanalysis of elastic block ciphers Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5107: 187-202. DOI: 10.1007/978-3-540-70500-0-14 |
0.594 |
|
2007 |
Cook DL, Yung M, Keromytis AD. The security of elastic block ciphers against key-recovery attacks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4779: 89-103. |
0.614 |
|
2006 |
Cook DL, Keromytis AD. CryptoGraphics: Exploiting graphics cards for security Advances in Information Security. 20: 1-136. |
0.551 |
|
2005 |
Stavrou A, Cook DL, Morein WG, Keromytis AD, Misra V, Rubenstein D. WebSOS: An overlay-based system for protecting web servers from denial of service attacks Computer Networks. 48: 781-807. DOI: 10.1016/J.Comnet.2005.01.005 |
0.567 |
|
2005 |
Cook DL, Keromytis AD. Conversion and proxy functions for symmetric key ciphers International Conference On Information Technology: Coding and Computing, Itcc. 1: 662-667. |
0.564 |
|
2005 |
Cook DL, Baratto R, Keromytis AD. Remotely keyed cryptographics secure remote display access using (mostly) untrusted hardware Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3783: 363-375. |
0.584 |
|
2005 |
Cook DL, Ioannidis J, Keromytis AD, Luck J. CryptoGraphics: Secret key cryptography using graphics cards Lecture Notes in Computer Science. 3376: 334-350. |
0.551 |
|
2003 |
Cook DL, Morein WG, Keromytis AD, Misra V, Rubenstein D. WebSOS: Protecting web servers from DDoS attacks Ieee International Conference On Networks, Icon. 461-466. |
0.56 |
|
Show low-probability matches. |