dblp.uni-trier.dewww.uni-trier.de

Stephen M. Matyas

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2001
32 Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic: Alternative Method for Unique RSA Primes Generation. Computers & Security 20(2): 173-179 (2001)
2000
31 Don Coppersmith, Rosario Gennaro, Shai Halevi, Charanjit S. Jutla, Stephen M. Matyas, Mohammad Peyravian, David Safford, Nevenko Zunic: IBM Comments. AES Candidate Conference 2000: 333-336
30 Chuck Williams, Nevenko Zunic, Stephen M. Matyas, Sarbari Gupta, Michael Willett: Key Recovery Alliance (KRA) Technology Papers, Special Issue Introduction. Computers & Security 19(1): 18-20 (2000)
29 John Kennedy, Stephen M. Matyas, Nevenko Zunic: Key Recovery Functional Model. Computers & Security 19(1): 31-36 (2000)
28 Stephen M. Matyas, Nevenko Zunic: Additional Key Recovery Function. Computers & Security 19(1): 37-40 (2000)
27 Sarbari Gupta, Stephen M. Matyas: Public Key Infrastructure: Analysis of Existing and Needed Protocols and Object Formats for Key Recovery. Computers & Security 19(1): 56-68 (2000)
26 Abby Maclean, Stephen M. Matyas, Nevenko Zunic: Organization Implementation Guidelines for Recovery of Encrypted Information. Computers & Security 19(1): 69-81 (2000)
25 Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic: Generation of RSA Keys That Are Guaranteed to be Unique for Each User. Computers & Security 19(3): 282-288 (2000)
24 Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic: Multiparty Biometric-Based Authentication. Computers & Security 19(4): 369-374 (2000)
23 Stephen M. Matyas, Jeff Stapleto: A Biometric Standard for Information Management and Security. Computers & Security 19(5): 428-441 (2000)
22 Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic: Ticket and Challenge-Based Protocols for Timestamping. Computers & Security 19(6): 551-558 (2000)
1999
21EEStephen M. Matyas, Allen Roginsky: An Effective Defense Against First Party Attacks in Public-Key Algorithms. ACSAC 1999: 155-160
20EEMohammad Peyravian, Stephen M. Matyas, Nevenko Zunic: Decentralized group key management for secure multicast communications. Computer Communications 22(13): 1183-1187 (1999)
19EEMohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic: Generating user-based cryptographic keys and random numbers. Computers & Security 18(7): 619-626 (1999)
1997
18EERosario Gennaro, Paul A. Karger, Stephen M. Matyas, Mohammad Peyravian, Allen Roginsky, David Safford, Michael Willett, Nevenko Zunic: Two-phase cryptographic key recovery system. Computers & Security 16(6): 481-506 (1997)
17 James P. Gray, Ajay D. Kshemkalyani, Stephen M. Matyas, Mohammad Peyravian, Gene Tsudik: ATM cell encryption and key update synchronization. Telecommunication Systems 7(4): 391-408 (1997)
1996
16 Don Coppersmith, Donald Byron Johnson, Stephen M. Matyas: A proposed mode for triple-DES encryption. IBM Journal of Research and Development 40(2): 253-262 (1996)
1994
15 Donald Byron Johnson, Stephen M. Matyas, An V. Le, John D. Wilkins: The Commercial Data Masking Facility (CDMF) data privacy algorithm. IBM Journal of Research and Development 38(2): 217-226 (1994)
1993
14EEDonald Byron Johnson, Stephen M. Matyas, An V. Le, John D. Wilkins: Design of the Commercial Data Masking Facility Data Privacy Algorithm. ACM Conference on Computer and Communications Security 1993: 93-96
13 Dennis Longley, Stephen M. Matyas: Complementarity Attacks and Control Vectors. IBM Systems Journal 32(2): 321-325 (1993)
12 An V. Le, Stephen M. Matyas, Donald Byron Johnson, John D. Wilkins: A Public Key Extension to the Common Cryptographic Architecture. IBM Systems Journal 32(3): 461-485 (1993)
1991
11 Donald Byron Johnson, George M. Dolan, Michael J. Kelly, An V. Le, Stephen M. Matyas: Common Cryptographic Architecture Cryptographic Application Programming Interface. IBM Systems Journal 30(2): 130-150 (1991)
10 Stephen M. Matyas: Key Handling with Control Vectors. IBM Systems Journal 30(2): 151-174 (1991)
9 Stephen M. Matyas, An V. Le, Dennis G. Abraham: A Key-Management Scheme Based on Control Vectors. IBM Systems Journal 30(2): 175-191 (1991)
8 Stephen M. Matyas: Key Processing with Control Vectors. J. Cryptology 3(2): 113-136 (1991)
1986
7EEStephen M. Matyas: Public-Key Registration. CRYPTO 1986: 451-458
1984
6EEAlbert C. Leighton, Stephen M. Matyas: The History of Book Ciphers. CRYPTO 1984: 101-113
1983
5 Robert R. Jueneman, Stephen M. Matyas, Carl H. Meyer: Message Authentication with Manipulation Detection Code. IEEE Symposium on Security and Privacy 1983: 33-54
4 Richard E. Lennon, Stephen M. Matyas: Cryptographic Key Verification. INFOCOM 1983: 265-269
1979
3 Stephen M. Matyas: Digital Signatures - An Overview. Computer Networks 3: 87-94 (1979)
1978
2 William R. Ehrsam, Stephen M. Matyas, Carl H. Meyer, Walter L. Tuchman: A Cryptographic Key Management Scheme for Implementing the Data Encryption Standard. IBM Systems Journal 17(2): 106-125 (1978)
1 Stephen M. Matyas, Carl H. Meyer: Generation, Distribution, and Installation of Cryptographic Keys. IBM Systems Journal 17(2): 126-137 (1978)

Coauthor Index

1Dennis G. Abraham [9]
2Don Coppersmith [16] [31]
3George M. Dolan [11]
4William R. Ehrsam [2]
5Rosario Gennaro [18] [31]
6James P. Gray [17]
7Sarbari Gupta [27] [30]
8Shai Halevi [31]
9Donald Byron Johnson [11] [12] [14] [15] [16]
10Robert R. Jueneman [5]
11Charanjit S. Jutla [31]
12Paul A. Karger [18]
13Michael J. Kelly [11]
14John Kennedy [29]
15Ajay D. Kshemkalyani [17]
16An V. Le [9] [11] [12] [14] [15]
17Albert C. Leighton [6]
18Richard E. Lennon [4]
19Dennis Longley [13]
20Abby Maclean [26]
21Carl H. Meyer [1] [2] [5]
22Mohammad Peyravian [17] [18] [19] [20] [22] [24] [25] [31] [32]
23Allen Roginsky [18] [19] [21] [22] [24] [25] [32]
24David Safford [18] [31]
25Jeff Stapleto [23]
26Gene Tsudik [17]
27Walter L. Tuchman [2]
28John D. Wilkins [12] [14] [15]
29Michael Willett [18] [30]
30Chuck Williams [30]
31Nevenko Zunic [18] [19] [20] [22] [24] [25] [26] [28] [29] [30] [31] [32]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)