Conference
and Journal Papers
Looking Back at a New
Hash Function
In ACISP’08.
(With O. Billet, M. Robshaw, and Y. Seurin).
Accelerating the Whirlpool Hash Function using
Parallel Table Lookup and Fast Cyclical Permutation.
In FSE’08.
(With Y. Hilewitz and
R.B. Lee).
Searching Monotone Multi-dimensional Arrays.
In Discrete Mathematics 308 (11): 2213-2221. 2008.
(With Y. Cheng and X.M. Sun).
On Searching a Table Consistent with Division Poset.
In Theoretical Computer Science 370 (1-3): 240-253. 2007.
(With Y. Cheng and X. Chen).
Forgery and partial key
recovery attacks on HMAC and NMAC using hash collisions.
In Asiacrypt’06. Shanghai, PR China,
December 2006. Extended version
Also appeared in the 2nd
NIST Hash Function Workshop. August 2006.
(With
Collision-resistant
usage of MD5 and SHA-1 via message pre-processing.
In the 15th Annual RSA Conference –
Cryptographer’s Track (CT-RSA’06).
Also appeared in the 1st NIST Hash Function
Workshop. October 2005.
(With M. Szydlo).
Finding
collisions in the full SHA-1.
In Crypto’05.
(With X. Wang and H. Yu).
Efficient collision
search attacks on SHA-0. Proceeding version
In Crypto’05.
(With X. Wang and H. Yu).
A traitor tracing
scheme based on RSA for fast decryption.
In the 3rd Conference on Applied Cryptography and
Network Security (ACNS’05).
(With R. Lee and P. McGregor).
Design
and analysis of password-based key derivation functions.
In the 14th Annual RSA Conference –
Cryptographer’s Track (CT-RSA’05).
(With F. Yao).
On
permutation operations in cipher design.
In ITCC 2004.
(With R. Lee, Z. Shi, R. Rivest, and M. Robshaw).
Fast
software-based attacks on SecurID.
In the 11th International Workshop on Fast Software
Encryption.
(With
A
practical-oriented treatment of pseudo-random number generators.
In Advances in Cryptology - Eurocrypt'02.
(With A. Desai and A. Hevia).
Efficient
software implementation for finite field multiplication in normal basis.
In the 3rd International Conference on Information and
Computer Security. Xi An,
(With P. Ning).
Security
and cryptography in mobile communication.
In the 4th International Symposium on Wireless Personal
Multimedia Communications.
(With T. Okamoto).
Efficient
methods for integrating traceability and broadcast encryption.
In Advances in Cryptology - Crypto'99.
(With
On
differential properties of data-dependent rotations and their use in MARS and
RC6.
In the 2nd Conference on Advanced Encryption Standard (AES).
February 1999.
(With
Improved
analysis of some simplified variants of RC6.
In the 6th International Workshop on Fast Software
Encryption.
(With
The RC6 block cipher.
In the First Conference on Advanced Encryption Standard
(AES).
(With R. Rivest, M. Robshaw, and R. Sidney). pdf
Storage-efficient
finite field basis conversion.
In the 5th Annual Workshop on Selected Areas in Cryptography.
(With B. Kaliski).
General
methods of enhancing security by multiple intractabilitiy assumptions
- Duality between encryption and signature.
In IEEE International Symposium on Information Theory and Its
Applications.
(With B. Blakley and L. Chen).
On
differential and linear cryptanalysis of the RC5 encryption algorithm.
In Advances in Cryptology -Crypto'95.
(With B. Kaliski).
Being taught can be
faster than asking questions.
In the 8th Annual ACM Conference on Computational Learning
Theory.
(With R. Rivest).
Reducing
the number of examples in self-directed learning.
In the 8th Annual ACM Conference on Computational Learning
Theory.
Optimal
constructions of hybrid algorithms.
In Journal of Algorithms, vol. 29, 1998.
Conference version appeared in the 5th Annual ACM-SIAM Symposium on Discrete
Algorithms, 1994.
(With M. Kao, Y. Ma, and M. Sipser).
Simulation results for
a new two-armed bandit heuristic.
In the 1st Conference on Computational Learning and Natural
Learning.
(With R. Rivest).
Granted
patents
Method
and system for generation of cryptographic keys and the like.
Patent No. 7,359,509. Issue date: April 15, 2008.
(With M. Campagna).
Enhanced
ANSI X9.17 pseudorandom number generators with forward security.
Patent No. 7,227,951. Issue date: June 5, 2007.
(With A. Desai and A. Hevia).
Efficient
finite field multiplication in normal basis.
Patent No. 6,389,442. Issue date: May 14, 2002.
(With B. Kaliski).
Enhanced block cipher
with data-dependent rotations.
Patent No: 6,269,163. Issue Data: July 31, 2001.
(With R. Rivest, M. Robshaw, and R. Sidney).
Secure user
identification based on constrained polynomials.
Patent No. 6,076,163. Issue date: June 13, 2000.
(With J. Hoffstein, B. Kaliski, D. Lieman, and M. Robshaw).
Methods
and apparatus for efficient finite field basis conversion.
Patent No. 5,854,759. Issue date: December 29, 1998.
(With P. Ning).
Technical
Notes
Securing MIPv6 binding
updates using address based keys (ABKs).
IETF Internet Draft, 2002.
(With J. Kempf, C. Gentry, A. Silverberg, A. Desai, and
Secure network access
using router discovery and AAA.
IETF Internet Draft, 2001.
(With A. Yegin, X. He,
C. Williams,
The
camellia cipher algorithm and its use with IPSEC.
IETF Internet Draft, 2001.
(With S. Moriai and
Potential
Flaws in the Conjectured Resistance of MARS to Linear Cryptanalysis.
Submitted to NIST as AES public comments. 2000.
(With M. Robshaw).
Cryptanalysis
of Twofish (II).
Technical Report, IEICE, ISEC2000-38, 2000.
(With
The security
of the RC6 block cipher.
RSA Laboratories Technical Report, 1998.
(With
On
the security of the RC5 encryption algorithm.
RSA Laboratories Technical Report, 1998.
(With B. Kaliski).
Elliptic
curve cryptosystems.
RSA Laboratories Technical Report, 1997.
(With M. Robshaw).
Survey
of technologies in electronic commerce.
RSA Laboratories Technical Report, 1997.
(With A. Juels).