dblp.uni-trier.dewww.uni-trier.de

Gregory G. Rose

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2007
14EEGregory G. Rose, Philip Hawkes, Michael Paddon, Cameron McDonald, Miriam Wiggers de Vries: Design and Primitive Specification for Shannon. Symmetric Cryptography 2007
2005
13 Gregory G. Rose: Security/Cryptography. LISA 2005
2004
12EEPhilip Hawkes, Gregory G. Rose: Rewriting Variables: The Complexity of Fast Algebraic Attacks on Stream Ciphers. CRYPTO 2004: 390-406
2003
11EEGregory G. Rose, Philip Hawkes: Turing: A Fast Stream Cipher. FSE 2003: 290-306
10 Gregory G. Rose: PKI/Cryptography. LISA 2003
2002
9EEPhilip Hawkes, Gregory G. Rose: Guess-and-Determine Attacks on SNOW. Selected Areas in Cryptography 2002: 37-46
2001
8 Gregory G. Rose: PKI/Cryptography. LISA 2001
7EEGregory G. Rose: Where Has All the Crypto Gone? Long Time Coming: A Speculative and Historical Talk. LISA 2001
6EEPhilip Hawkes, Frank Quick, Gregory G. Rose: A Practical Cryptanalysis of SSC2. Selected Areas in Cryptography 2001: 25-37
2000
5EEPhilip Hawkes, Gregory G. Rose: Exploiting Multiples of the Connection Polynomial in Word-Oriented Stream Ciphers. ASIACRYPT 2000: 303-316
1999
4EEDamian Bentley, Gregory G. Rose, Tara Whalen: ssmail: Opportunistic Encryption in sendmail. LISA 1999: 1-8
1998
3EEGregory G. Rose: A Stream Cipher Based on Linear Feedback over GF(28). ACISP 1998: 135-146
1996
2EEGregory G. Rose: The PGP Moose - Implementation and Experience. LISA 1996: 155-160
1978
1 Gregory G. Rose: Performance Evaluation under Unix and a Study of PDP-11 Instruction Usage. Operating Systems Review 12(3): 28-45 (1978)

Coauthor Index

1Damian Bentley [4]
2Philip Hawkes [5] [6] [9] [11] [12] [14]
3Cameron McDonald [14]
4Michael Paddon [14]
5Frank Quick [6]
6Miriam Wiggers de Vries [14]
7Tara Whalen [4]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)