Debra L. Cook, Ph.D. - Publications

Affiliations: 
2006 Columbia University, New York, NY 
Area:
Computer Science

11 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2009 Cook DL, Yung M, Keromytis AD. Elastic block ciphers: Method, security and instantiations International Journal of Information Security. 8: 211-231. DOI: 10.1007/S10207-008-0075-9  0.633
2009 Cook DL, Yung M, Keromytis A. Constructing variable-Length PRPs and SPRPs from fixed-length PRPs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5487: 157-180. DOI: 10.1007/978-3-642-01440-6_14  0.496
2009 Cook DL, Yung M, Keromytis AD. Elastic block ciphers in practice: Constructions and modes of encryption Lecture Notes in Electrical Engineering. 30: 69-91. DOI: 10.1007/978-0-387-85555-4_5  0.553
2008 Cook DL, Yung M, Keromytis AD. Methods for linear and differential cryptanalysis of elastic block ciphers Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5107: 187-202. DOI: 10.1007/978-3-540-70500-0-14  0.594
2007 Cook DL, Yung M, Keromytis AD. The security of elastic block ciphers against key-recovery attacks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4779: 89-103.  0.614
2006 Cook DL, Keromytis AD. CryptoGraphics: Exploiting graphics cards for security Advances in Information Security. 20: 1-136.  0.551
2005 Stavrou A, Cook DL, Morein WG, Keromytis AD, Misra V, Rubenstein D. WebSOS: An overlay-based system for protecting web servers from denial of service attacks Computer Networks. 48: 781-807. DOI: 10.1016/J.Comnet.2005.01.005  0.567
2005 Cook DL, Keromytis AD. Conversion and proxy functions for symmetric key ciphers International Conference On Information Technology: Coding and Computing, Itcc. 1: 662-667.  0.564
2005 Cook DL, Baratto R, Keromytis AD. Remotely keyed cryptographics secure remote display access using (mostly) untrusted hardware Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3783: 363-375.  0.584
2005 Cook DL, Ioannidis J, Keromytis AD, Luck J. CryptoGraphics: Secret key cryptography using graphics cards Lecture Notes in Computer Science. 3376: 334-350.  0.551
2003 Cook DL, Morein WG, Keromytis AD, Misra V, Rubenstein D. WebSOS: Protecting web servers from DDoS attacks Ieee International Conference On Networks, Icon. 461-466.  0.56
Show low-probability matches.