2001 |
32 | | Mohammad Peyravian,
Stephen M. Matyas,
Allen Roginsky,
Nevenko Zunic:
Alternative Method for Unique RSA Primes Generation.
Computers & Security 20(2): 173-179 (2001) |
2000 |
31 | | Don Coppersmith,
Rosario Gennaro,
Shai Halevi,
Charanjit S. Jutla,
Stephen M. Matyas,
Mohammad Peyravian,
David Safford,
Nevenko Zunic:
IBM Comments.
AES Candidate Conference 2000: 333-336 |
30 | | Chuck Williams,
Nevenko Zunic,
Stephen M. Matyas,
Sarbari Gupta,
Michael Willett:
Key Recovery Alliance (KRA) Technology Papers, Special Issue Introduction.
Computers & Security 19(1): 18-20 (2000) |
29 | | John Kennedy,
Stephen M. Matyas,
Nevenko Zunic:
Key Recovery Functional Model.
Computers & Security 19(1): 31-36 (2000) |
28 | | Stephen M. Matyas,
Nevenko Zunic:
Additional Key Recovery Function.
Computers & Security 19(1): 37-40 (2000) |
27 | | Sarbari Gupta,
Stephen M. Matyas:
Public Key Infrastructure: Analysis of Existing and Needed Protocols and Object Formats for Key Recovery.
Computers & Security 19(1): 56-68 (2000) |
26 | | Abby Maclean,
Stephen M. Matyas,
Nevenko Zunic:
Organization Implementation Guidelines for Recovery of Encrypted Information.
Computers & Security 19(1): 69-81 (2000) |
25 | | Mohammad Peyravian,
Stephen M. Matyas,
Allen Roginsky,
Nevenko Zunic:
Generation of RSA Keys That Are Guaranteed to be Unique for Each User.
Computers & Security 19(3): 282-288 (2000) |
24 | | Mohammad Peyravian,
Stephen M. Matyas,
Allen Roginsky,
Nevenko Zunic:
Multiparty Biometric-Based Authentication.
Computers & Security 19(4): 369-374 (2000) |
23 | | Stephen M. Matyas,
Jeff Stapleto:
A Biometric Standard for Information Management and Security.
Computers & Security 19(5): 428-441 (2000) |
22 | | Mohammad Peyravian,
Stephen M. Matyas,
Allen Roginsky,
Nevenko Zunic:
Ticket and Challenge-Based Protocols for Timestamping.
Computers & Security 19(6): 551-558 (2000) |
1999 |
21 | EE | Stephen M. Matyas,
Allen Roginsky:
An Effective Defense Against First Party Attacks in Public-Key Algorithms.
ACSAC 1999: 155-160 |
20 | EE | Mohammad Peyravian,
Stephen M. Matyas,
Nevenko Zunic:
Decentralized group key management for secure multicast communications.
Computer Communications 22(13): 1183-1187 (1999) |
19 | EE | Mohammad Peyravian,
Stephen M. Matyas,
Allen Roginsky,
Nevenko Zunic:
Generating user-based cryptographic keys and random numbers.
Computers & Security 18(7): 619-626 (1999) |
1997 |
18 | EE | Rosario Gennaro,
Paul A. Karger,
Stephen M. Matyas,
Mohammad Peyravian,
Allen Roginsky,
David Safford,
Michael Willett,
Nevenko Zunic:
Two-phase cryptographic key recovery system.
Computers & Security 16(6): 481-506 (1997) |
17 | | James P. Gray,
Ajay D. Kshemkalyani,
Stephen M. Matyas,
Mohammad Peyravian,
Gene Tsudik:
ATM cell encryption and key update synchronization.
Telecommunication Systems 7(4): 391-408 (1997) |
1996 |
16 | | Don Coppersmith,
Donald Byron Johnson,
Stephen M. Matyas:
A proposed mode for triple-DES encryption.
IBM Journal of Research and Development 40(2): 253-262 (1996) |
1994 |
15 | | Donald Byron Johnson,
Stephen M. Matyas,
An V. Le,
John D. Wilkins:
The Commercial Data Masking Facility (CDMF) data privacy algorithm.
IBM Journal of Research and Development 38(2): 217-226 (1994) |
1993 |
14 | EE | Donald Byron Johnson,
Stephen M. Matyas,
An V. Le,
John D. Wilkins:
Design of the Commercial Data Masking Facility Data Privacy Algorithm.
ACM Conference on Computer and Communications Security 1993: 93-96 |
13 | | Dennis Longley,
Stephen M. Matyas:
Complementarity Attacks and Control Vectors.
IBM Systems Journal 32(2): 321-325 (1993) |
12 | | An V. Le,
Stephen M. Matyas,
Donald Byron Johnson,
John D. Wilkins:
A Public Key Extension to the Common Cryptographic Architecture.
IBM Systems Journal 32(3): 461-485 (1993) |
1991 |
11 | | Donald Byron Johnson,
George M. Dolan,
Michael J. Kelly,
An V. Le,
Stephen M. Matyas:
Common Cryptographic Architecture Cryptographic Application Programming Interface.
IBM Systems Journal 30(2): 130-150 (1991) |
10 | | Stephen M. Matyas:
Key Handling with Control Vectors.
IBM Systems Journal 30(2): 151-174 (1991) |
9 | | Stephen M. Matyas,
An V. Le,
Dennis G. Abraham:
A Key-Management Scheme Based on Control Vectors.
IBM Systems Journal 30(2): 175-191 (1991) |
8 | | Stephen M. Matyas:
Key Processing with Control Vectors.
J. Cryptology 3(2): 113-136 (1991) |
1986 |
7 | EE | Stephen M. Matyas:
Public-Key Registration.
CRYPTO 1986: 451-458 |
1984 |
6 | EE | Albert C. Leighton,
Stephen M. Matyas:
The History of Book Ciphers.
CRYPTO 1984: 101-113 |
1983 |
5 | | Robert R. Jueneman,
Stephen M. Matyas,
Carl H. Meyer:
Message Authentication with Manipulation Detection Code.
IEEE Symposium on Security and Privacy 1983: 33-54 |
4 | | Richard E. Lennon,
Stephen M. Matyas:
Cryptographic Key Verification.
INFOCOM 1983: 265-269 |
1979 |
3 | | Stephen M. Matyas:
Digital Signatures - An Overview.
Computer Networks 3: 87-94 (1979) |
1978 |
2 | | William R. Ehrsam,
Stephen M. Matyas,
Carl H. Meyer,
Walter L. Tuchman:
A Cryptographic Key Management Scheme for Implementing the Data Encryption Standard.
IBM Systems Journal 17(2): 106-125 (1978) |
1 | | Stephen M. Matyas,
Carl H. Meyer:
Generation, Distribution, and Installation of Cryptographic Keys.
IBM Systems Journal 17(2): 126-137 (1978) |