-
1Academic Journal
المؤلفون: John Brainard, Michael Szydlo, Ari Juels, Moti Yung, Ronald L. Rivest
المساهمون: The Pennsylvania State University CiteSeerX Archives
وصف الملف: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.93.2471; http://www.rsa.com/rsalabs/staff/bios/ajuels/publications/fourth-factor/ccs084-juels.pdf
-
2Academic Journal
المؤلفون: Michael Szydlo, Burton Kaliski
المساهمون: The Pennsylvania State University CiteSeerX Archives
المصدر: http://www.szydlo.com/szydlo2partypass.pdf.
وصف الملف: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.87.479; http://www.szydlo.com/szydlo2partypass.pdf
الاتاحة: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.87.479
http://www.szydlo.com/szydlo2partypass.pdf -
3Academic Journal
المؤلفون: Michael Szydlo, Yiqun Lisa Yin
المساهمون: The Pennsylvania State University CiteSeerX Archives
المصدر: http://eprint.iacr.org/2005/248.pdf.
وصف الملف: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.79.2694; http://eprint.iacr.org/2005/248.pdf
-
4Academic Journal
المؤلفون: Michael Szydlo
المساهمون: The Pennsylvania State University CiteSeerX Archives
المصدر: http://www.ifca.ai/fc05/p13.pdf.
وصف الملف: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.59.8817; http://www.ifca.ai/fc05/p13.pdf
-
5Academic Journal
المؤلفون: Steve Bono, Matthew Green, Adam Stubblefield, Ari Juels, Avi Rubin, Michael Szydlo
المساهمون: The Pennsylvania State University CiteSeerX Archives
وصف الملف: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.58.7555; http://www.rfidanalysis.org/DSTbreak.pdf
-
6Academic Journal
المؤلفون: Michael Szydlo
المساهمون: The Pennsylvania State University CiteSeerX Archives
المصدر: http://www.szydlo.com/szydlo-loglog.pdf.
مصطلحات موضوعية: amortization, authentication path, Merkle tree, tail zipping, binary tree
وصف الملف: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.85.7666; http://www.szydlo.com/szydlo-loglog.pdf
الاتاحة: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.85.7666
http://www.szydlo.com/szydlo-loglog.pdf -
7Academic Journal
المؤلفون: Michael Szydlo
المساهمون: The Pennsylvania State University CiteSeerX Archives
المصدر: http://www.szydlo.com/imperfect92803.pdf.
مصطلحات موضوعية: discrete valuation
وصف الملف: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.177.2578; http://www.szydlo.com/imperfect92803.pdf
الاتاحة: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.177.2578
http://www.szydlo.com/imperfect92803.pdf -
8Academic Journal
المؤلفون: Ari Juels, Ronald L. Rivest, Michael Szydlo
المساهمون: The Pennsylvania State University CiteSeerX Archives
وصف الملف: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.7036; http://www.rsasecurity.com/rsalabs/staff/bios/ajuels/publications/blocker/blocker.pdf
-
9Academic Journal
المؤلفون: Michael Szydlo
المساهمون: The Pennsylvania State University CiteSeerX Archives
مصطلحات موضوعية: Lattice Isomorphism, Lattice Distinguishing Oracle, Distributed Lattice Reduction, Decisional Lattice Problem, Gram Matrix Factorization, Integral Lattice Embedding Orthogonal Lattice, GGH Cryptanalysis, NTRUSign
وصف الملف: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.329.4754; http://www.iacr.org/archive/eurocrypt2003/26560433/26560433.pdf
-
10Academic Journal
المؤلفون: John Brainard, Ari Juels, Burt Kaliski, Michael Szydlo
المساهمون: The Pennsylvania State University CiteSeerX Archives
وصف الملف: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.83.5822; http://www.rsa.com/rsalabs/nightingale/Nightingale.pdf
-
11Academic Journal
المؤلفون: Markus Jakobsson, Tom Leighton, Silvio Micali, Michael Szydlo
المساهمون: The Pennsylvania State University CiteSeerX Archives
مصطلحات موضوعية: amortization, authentication, fractal, Merkle tree
وصف الملف: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.65.6133; http://www.informatics.indiana.edu/markus//papers/merkle.pdf
-
12Academic Journal
المؤلفون: Emmanuel Bresson, Jacques Stern, Michael Szydlo
المساهمون: The Pennsylvania State University CiteSeerX Archives
وصف الملف: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.107.8201; http://www.iacr.org/archive/crypto2002/24420467/24420467.pdf
-
13Academic Journal
المؤلفون: Ari Juels, Michael Szydlo
المساهمون: The Pennsylvania State University CiteSeerX Archives
المصدر: http://www.szydlo.com/vpot-fc02.pdf.
وصف الملف: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.93.8599; http://www.szydlo.com/vpot-fc02.pdf
الاتاحة: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.93.8599
http://www.szydlo.com/vpot-fc02.pdf -
14Academic Journal
المؤلفون: E. Bresson, Jacques Stern, Michael Szydlo
المساهمون: The Pennsylvania State University CiteSeerX Archives
وصف الملف: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.5.9590; http://www.di.ens.fr/~bresson/././papers/BreSteSzy02_full.pdf
-
15Academic Journal
المؤلفون: Emmanuel Bresson, Jacques Stern, Michael Szydlo
المساهمون: The Pennsylvania State University CiteSeerX Archives
وصف الملف: application/postscript
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.1768; http://www.di.ens.fr/~stern/data/St102.ps
-
16Academic Journal
المؤلفون: Michael Szydlo
المساهمون: The Pennsylvania State University CiteSeerX Archives
المصدر: http://www.szydlo.com/mixchar.pdf.
وصف الملف: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.177.1671; http://www.szydlo.com/mixchar.pdf
الاتاحة: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.177.1671
http://www.szydlo.com/mixchar.pdf -
17
المؤلفون: Michael Szydlo
المصدر: Chapman & Hall/CRC Cryptography and Network Security Series ISBN: 9781420059816
-
18
المؤلفون: Moti Yung, Ronald L. Rivest, John G. Brainard, Ari Juels, Michael Szydlo
المصدر: ACM Conference on Computer and Communications Security
مصطلحات موضوعية: Challenge-Handshake Authentication Protocol, Computer access control, Computer science, media_common.quotation_subject, Internet privacy, Access control, Cryptography, Security token, Computer security, computer.software_genre, Generic Bootstrapping Architecture, Lightweight Extensible Authentication Protocol, media_common, Password, Password policy, Authentication, Delegation, business.industry, Software token, Multi-factor authentication, Chip Authentication Program, Network Access Control, Authentication protocol, Challenge–response authentication, business, computer
-
19
المؤلفون: Yiqun Lisa Yin, Michael Szydlo
المصدر: Topics in Cryptology – CT-RSA 2006 ISBN: 9783540310334
CT-RSAمصطلحات موضوعية: Collision resistance, Schedule, MD5, Upgrade, Computer science, Hash function, SHA-1, Collision, Computer security, computer.software_genre, Protocol (object-oriented programming), computer
-
20
المؤلفون: Michael Szydlo
المصدر: Financial Cryptography and Data Security ISBN: 9783540462552
Financial Cryptographyمصطلحات موضوعية: TheoryofComputation_MISCELLANEOUS, Password, Authentication, Computer science, business.industry, Diffie–Hellman problem, Cryptography, Adversary, Computer security, computer.software_genre, Diffie–Hellman key exchange, Software security assurance, Financial cryptography, business, Mathematical economics, computer