2009 |
25 | EE | John Black,
Martin Cochran,
Thomas Shrimpton:
On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions.
J. Cryptology 22(3): 311-329 (2009) |
2007 |
24 | EE | John Black,
Christine Draper,
Tom Lococo,
Fouad Matar,
Christopher Ward:
An integration model for organizing IT service management.
IBM Systems Journal 46(3): 405-422 (2007) |
2006 |
23 | EE | John Black,
Martin Cochran,
Trevor Highland:
A Study of the MD5 Attacks: Insights and Improvements.
FSE 2006: 262-277 |
22 | EE | John Black:
The Ideal-Cipher Model, Revisited: An Uninstantiable Blockcipher-Based Hash Function.
FSE 2006: 328-340 |
21 | EE | Sreekar Krishna,
John Black,
Sethuraman Panchanathan:
Using Genetic Algorithms to Find Person-Specific Gabor Feature Detectors for Face Indexing and Recognition.
ICB 2006: 182-191 |
20 | EE | P. Kakumanu,
Nikolaos G. Bourbakis,
John Black,
Sethuraman Panchanathan:
Document Image Dewarping Based on Line Estimation for Visually Impaired.
ICTAI 2006: 625-631 |
19 | EE | John Black:
Compare-by-Hash: A Reasoned Analysis.
USENIX Annual Technical Conference, General Track 2006: 85-90 |
18 | EE | John Black,
Martin Cochran,
Martin Ryan Gardner:
A Security Analysis of the Internet Chess Club.
IEEE Security & Privacy 4(1): 46-52 (2006) |
2005 |
17 | EE | John Black,
Martin Cochran,
Martin Ryan Gardner:
Lessons Learned: A Security Analysis of the Internet Chess Club.
ACSAC 2005: 245-253 |
16 | EE | Sreekar Krishna,
Greg Little,
John Black,
Sethuraman Panchanathan:
A wearable face recognition system for individuals with visual impairments.
ASSETS 2005: 106-113 |
15 | EE | Sreekar Krishna,
Greg Little,
John Black,
Sethuraman Panchanathan:
iCARE interaction assistant: a wearable face recognition system for individuals with visual impairments.
ASSETS 2005: 216-217 |
14 | EE | John Black,
Martin Cochran,
Thomas Shrimpton:
On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions.
EUROCRYPT 2005: 526-541 |
13 | EE | John Black:
Authenticated encryption.
Encyclopedia of Cryptography and Security 2005 |
12 | EE | John Black,
Phillip Rogaway:
CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions.
J. Cryptology 18(2): 111-131 (2005) |
2004 |
11 | EE | John Voiklis,
John Black,
Daniel Kaplan:
SKRAPPLE: Enabling Media-Based Study Schools, Apprentice Schools, and Samba Schools.
C5 2004: 34-41 |
2003 |
10 | EE | Phillip Rogaway,
Mihir Bellare,
John Black:
OCB: A block-cipher mode of operation for efficient authenticated encryption.
ACM Trans. Inf. Syst. Secur. 6(3): 365-403 (2003) |
2002 |
9 | EE | John Black,
Phillip Rogaway,
Thomas Shrimpton:
Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV.
CRYPTO 2002: 320-335 |
8 | EE | John Black,
Phillip Rogaway:
Ciphers with Arbitrary Finite Domains.
CT-RSA 2002: 114-130 |
7 | EE | John Black,
Phillip Rogaway:
A Block-Cipher Mode of Operation for Parallelizable Message Authentication.
EUROCRYPT 2002: 384-397 |
6 | EE | John Black,
Phillip Rogaway,
Thomas Shrimpton:
Encryption-Scheme Security in the Presence of Key-Dependent Messages.
Selected Areas in Cryptography 2002: 62-75 |
5 | EE | John Black,
Hector Urtubia:
Side-Channel Attacks on Symmetric Encryption Schemes: The Case for Authenticated Encryption.
USENIX Security Symposium 2002: 327-338 |
2001 |
4 | EE | Phillip Rogaway,
Mihir Bellare,
John Black,
Ted Krovetz:
OCB: a block-cipher mode of operation for efficient authenticated encryption.
ACM Conference on Computer and Communications Security 2001: 196-205 |
2000 |
3 | EE | John Black,
Phillip Rogaway:
CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions.
CRYPTO 2000: 197-215 |
1999 |
2 | EE | John Black,
Shai Halevi,
Hugo Krawczyk,
Ted Krovetz,
Phillip Rogaway:
UMAC: Fast and Secure Message Authentication.
CRYPTO 1999: 216-233 |
1993 |
1 | | John Black:
Keynote Address: A Management View of Systems Administration.
LISA 1993 |