2008 |
9 | EE | David Chaum,
Richard Carback,
Jeremy Clark,
Aleksander Essex,
Stefan Popoveniuc,
Ronald L. Rivest,
Peter Y. A. Ryan,
Emily Shen,
Alan T. Sherman:
Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes.
EVT 2008 |
2003 |
8 | EE | Alan T. Sherman,
David A. McGrew:
Key Establishment in Large Dynamic Groups Using One-Way Function Trees.
IEEE Trans. Software Eng. 29(5): 444-458 (2003) |
1997 |
7 | EE | Muhammad Rabi,
Alan T. Sherman:
An Observation on Associative One-Way Functions in Complexity Theory.
Inf. Process. Lett. 64(5): 239-244 (1997) |
1994 |
6 | EE | Thomas R. Cain,
Alan T. Sherman:
How to Break Gifford's Cipher (extended abstract).
ACM Conference on Computer and Communications Security 1994: 198-209 |
1990 |
5 | | Robert Y. Levin,
Alan T. Sherman:
A Note on Bennett's Time-Space Tradeoff for Reversible Computation.
SIAM J. Comput. 19(4): 673-677 (1990) |
1988 |
4 | | Burton S. Kaliski Jr.,
Ronald L. Rivest,
Alan T. Sherman:
Is the Data Encryption Standard a Group? (Results of Cycling Experiments on DES).
J. Cryptology 1(1): 3-36 (1988) |
1985 |
3 | EE | Burton S. Kaliski Jr.,
Ronald L. Rivest,
Alan T. Sherman:
Is DES a Pure Cipher? (Results of More Cycling Experiments on DES).
CRYPTO 1985: 212-226 |
2 | EE | Burton S. Kaliski Jr.,
Ronald L. Rivest,
Alan T. Sherman:
Is the Data Encryption Standard a Group? (Preliminary Abstract).
EUROCRYPT 1985: 81-95 |
1982 |
1 | | Ronald L. Rivest,
Alan T. Sherman:
Randomized Encryption Techniques.
CRYPTO 1982: 145-163 |