2008 |
44 | EE | Peter Landrock:
New PKI Protocols Using Tamper Resistant Hardware.
EuroPKI 2008: 1-16 |
2005 |
43 | EE | Peter Landrock:
ABA digital signature guidelines.
Encyclopedia of Cryptography and Security 2005 |
42 | EE | Peter Landrock:
Acquirer.
Encyclopedia of Cryptography and Security 2005 |
41 | EE | Peter Landrock:
Attribute certificate.
Encyclopedia of Cryptography and Security 2005 |
40 | EE | Peter Landrock:
Bolero.net.
Encyclopedia of Cryptography and Security 2005 |
39 | EE | Peter Landrock:
CEPS Standard.
Encyclopedia of Cryptography and Security 2005 |
38 | EE | Peter Landrock:
Clip Scheme.
Encyclopedia of Cryptography and Security 2005 |
37 | EE | Peter Landrock:
Control Vectors.
Encyclopedia of Cryptography and Security 2005 |
36 | EE | Peter Landrock:
Derived key.
Encyclopedia of Cryptography and Security 2005 |
35 | EE | Peter Landrock:
Electronic Cheque.
Encyclopedia of Cryptography and Security 2005 |
34 | EE | Peter Landrock:
Electronic Negotiable Instruments.
Encyclopedia of Cryptography and Security 2005 |
33 | EE | Peter Landrock:
Issuer.
Encyclopedia of Cryptography and Security 2005 |
32 | EE | Peter Landrock:
Key Encryption Key.
Encyclopedia of Cryptography and Security 2005 |
31 | EE | Peter Landrock:
Mondex.
Encyclopedia of Cryptography and Security 2005 |
30 | EE | Peter Landrock:
PKCS.
Encyclopedia of Cryptography and Security 2005 |
29 | EE | Peter Landrock:
Payment card.
Encyclopedia of Cryptography and Security 2005 |
28 | EE | Peter Landrock:
Proton.
Encyclopedia of Cryptography and Security 2005 |
27 | EE | Peter Landrock:
Public Key Infrastructure.
Encyclopedia of Cryptography and Security 2005 |
26 | EE | Peter Landrock:
Registration Authority.
Encyclopedia of Cryptography and Security 2005 |
25 | EE | Peter Landrock:
S/MIME.
Encyclopedia of Cryptography and Security 2005 |
24 | EE | Peter Landrock:
SET.
Encyclopedia of Cryptography and Security 2005 |
23 | EE | Peter Landrock:
SSH.
Encyclopedia of Cryptography and Security 2005 |
22 | EE | Peter Landrock:
Security Architecture.
Encyclopedia of Cryptography and Security 2005 |
21 | EE | Peter Landrock:
Token.
Encyclopedia of Cryptography and Security 2005 |
20 | EE | Peter Landrock:
Two-Factor Authentication.
Encyclopedia of Cryptography and Security 2005 |
19 | EE | Peter Landrock:
X.509.
Encyclopedia of Cryptography and Security 2005 |
2000 |
18 | EE | Peter Landrock:
Interactive Identification Protocols (Transcript of Discussion).
Security Protocols Workshop 2000: 43-48 |
17 | EE | Bruno Crispo,
Peter Landrock,
Václav Matyás Jr.:
WWW security and trusted third party services.
Future Generation Comp. Syst. 16(4): 331-341 (2000) |
1998 |
16 | EE | Peter Landrock:
Primality Tests and Use of Primes in Public-Key Systems.
Lectures on Data Security 1998: 127-133 |
15 | EE | Peter Landrock:
A New Concept in Protocols: Verifiable Computational Delegation (Position Paper).
Security Protocols Workshop 1998: 137-145 |
14 | EE | Peter Landrock:
A New Concept in Protocols: Verifiable Computational Delegation (Transcript of Discussion).
Security Protocols Workshop 1998: 146-153 |
13 | EE | Virgil D. Gligor,
Peter Landrock,
T. Mark A. Lomas,
Raphael Yahalom,
John P. Warne:
Discussion Session: Differences Between Academic and Commercial Security.
Security Protocols Workshop 1998: 177-192 |
12 | EE | Jørgen Brandt,
Ivan Damgård,
Peter Landrock,
Torben P. Pedersen:
Zero-Knowledge Authentication Scheme with Secret Key Exchange.
J. Cryptology 11(3): 147-159 (1998) |
1997 |
11 | EE | Peter Landrock:
TTPs Overview - Concepts and Review of the State of Art from a Technical Point of View.
State of the Art in Applied Cryptography 1997: 241-263 |
1993 |
10 | | Walter Fumy,
Peter Landrock:
Principles of Key Management.
IEEE Journal on Selected Areas in Communications 11(5): 785-793 (1993) |
1992 |
9 | EE | Yvo Desmedt,
Peter Landrock,
Arjen K. Lenstra,
Kevin S. McCurley,
Andrew M. Odlyzko,
Rainer A. Rueppel,
Miles E. Smid:
The Eurocrypt '92 Controversial Issue: Trapdoor Primes and Moduli (Panel).
EUROCRYPT 1992: 194-199 |
8 | | Peter Landrock,
Olaf Manz:
Classical Codes as Ideals in Group Algebras.
Des. Codes Cryptography 2(3): 273-285 (1992) |
1991 |
7 | | Jørgen Brandt,
Ivan Damgård,
Peter Landrock:
Speeding up Prime Number Generation.
ASIACRYPT 1991: 440-449 |
6 | EE | Bart Preneel,
David Chaum,
Walter Fumy,
Cees J. A. Jansen,
Peter Landrock,
Gert Roelofsen:
Race Integrity Primitives Evaluation (RIPE): A Status Report.
EUROCRYPT 1991: 547-551 |
1990 |
5 | EE | Louis C. Guillou,
Jean-Jacques Quisquater,
Michael Walker,
Peter Landrock,
Caroline Shafer:
Precautions Taken Against Various Potential Attacks in ISO/IEC DIS 9796 "Digital Signature Scheme Giving Message Recovery".
EUROCRYPT 1990: 465-473 |
4 | EE | Frank Bernhardt,
Peter Landrock,
Olaf Manz:
The extended golay codes considered as ideals.
J. Comb. Theory, Ser. A 55(2): 235-246 (1990) |
1989 |
3 | EE | Joos Vandewalle,
David Chaum,
Walter Fumy,
Cees J. A. Jansen,
Peter Landrock,
Gert Roelofsen:
A European Call For Cryptographic Algorithms: Ripe; Race Integrity Primitives Evaluation.
EUROCRYPT 1989: 267-271 |
1988 |
2 | EE | Jørgen Brandt,
Ivan Damgård,
Peter Landrock,
Torben P. Pedersen:
Zero-Knowledge Authentication Scheme with Secret Key Exchange (Extended Abstract).
CRYPTO 1988: 583-588 |
1 | EE | Jørgen Brandt,
Ivan Damgård,
Peter Landrock:
Anonymous and Verifiable Registration in Databases.
EUROCRYPT 1988: 167-176 |