dblp.uni-trier.dewww.uni-trier.de

Gustavus J. Simmons

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2002
36 Gustavus J. Simmons: Parity Encoding of Binary Sequences. Des. Codes Cryptography 27(1-2): 157-164 (2002)
1996
35 Gustavus J. Simmons: The History of Subliminal Channels. Information Hiding 1996: 237-256
1995
34 Gustavus J. Simmons, Catherine Meadows: The Role of Trust in Information Integrity Protocols. Journal of Computer Security 3(1): 71-84 (1995)
1994
33EEThomas Beth, Hans-Joachim Knobloch, Marcus Otten, Gustavus J. Simmons, Peer Wichmann: Towards Acceptable Key Escrow Systems. ACM Conference on Computer and Communications Security 1994: 51-58
32 Gustavus J. Simmons: Cryptoanalysis and Protocol Failures. Commun. ACM 37(11): 56-65 (1994)
31 Gustavus J. Simmons: Proof of Soundness (Integrity) of Cryptographic Protocols. J. Cryptology 7(2): 69-77 (1994)
1993
30EEGustavus J. Simmons: Cryptanalysis and Protocol Failures (abstract). ACM Conference on Computer and Communications Security 1993: 213-214
29 Gustavus J. Simmons: Invited talk: An Introductions to the Mathematics of Trust in Security Protocols. CSFW 1993: 121-127
28EEGustavus J. Simmons: Subliminal Communication is Easy Using the DSA. EUROCRYPT 1993: 218-232
27EEGustavus J. Simmons: The Consequences of Trust in Shared Secret Schemes. EUROCRYPT 1993: 448-452
1992
26 Thomas Beth, Markus Frisch, Gustavus J. Simmons: Public-Key Cryptography: State of the Art and Future Directions, E.I.S.S. Workshop, Oberwolfach, Germany, July 3-6, 1991, Final Report Springer 1992
1990
25EEGustavus J. Simmons: Geometric Shared Secret and/or Shared Control Schemes. CRYPTO 1990: 216-241
24EEIngemar Ingemarsson, Gustavus J. Simmons: A Protocol to Set Up Shared Secret Schemes Without the Assistance of a Mutualy Trusted Party. EUROCRYPT 1990: 266-282
23 Gustavus J. Simmons: A Cartesian Product Construction for Unconditionally Secure Authentication Codes that Permit Arbitration. J. Cryptology 2(2): 77-104 (1990)
1989
22EEGustavus J. Simmons: Prepositioned Shared Secret and/or Shared Control Schemes. EUROCRYPT 1989: 436-467
1988
21EEGustavus J. Simmons: How to (Really) Share a Secret. CRYPTO 1988: 390-448
20EEGustavus J. Simmons, George B. Purdy: Zero-Knowledge Proofs of Identity And Veracity of Transaction Receipts. EUROCRYPT 1988: 35-49
1987
19EEGustavus J. Simmons: An Impersonation-Proof Identity Verfication Scheme. CRYPTO 1987: 211-215
18EEGustavus J. Simmons: A Natural Taxonomy for Digital Information Authentication Schemes. CRYPTO 1987: 269-288
17EEGustavus J. Simmons: Message Authentication with Arbitration of Transmitter/Receiver Disputes. EUROCRYPT 1987: 151-165
16 Judy H. Moore, Gustavus J. Simmons: Cycle Structure of the DES for Keys Having Palindromic (or Antipalindromic) Sequences of Round Keys. IEEE Trans. Software Eng. 13(2): 262-273 (1987)
1986
15EEJudy H. Moore, Gustavus J. Simmons: Cycle Structures of the DES with Weak and Semi-Weak Keys. CRYPTO 1986: 9-32
14 Judy H. Moore, Gustavus J. Simmons: Cycle Structure of the Weak and Semi-Weak DES Keys. EUROCRYPT 1986: 16
1985
13EEGustavus J. Simmons: A Secure Subliminal Channel (?). CRYPTO 1985: 33-41
12EEGustavus J. Simmons: The Practice of Authentication. EUROCRYPT 1985: 261-272
1984
11EEGustavus J. Simmons: Authentication Theory/Coding Theory. CRYPTO 1984: 411-431
10EEJames A. Davis, Diane B. Holdridge, Gustavus J. Simmons: Status Report on Factoring (At the Sandia National Laboratories). EUROCRYPT 1984: 183-215
9EEGustavus J. Simmons: The Subliminal Channel and Digital Signature. EUROCRYPT 1984: 364-378
1983
8 Gustavus J. Simmons: The Prisoners' Problem and the Subliminal Channel. CRYPTO 1983: 51-67
7 Gustavus J. Simmons: Verification of Treaty Compliance Revisited. IEEE Symposium on Security and Privacy 1983: 61-66
1982
6 Ernest F. Brickell, James A. Davis, Gustavus J. Simmons: A Preliminary Report on the Cryptanalysis of Merkle-Hellman Knapsack Cryptosystems. CRYPTO 1982: 289-301
1981
5 Gustavus J. Simmons: A System for Point-of-Sale or Access User Authentication and Identification. CRYPTO 1981: 31-37
4 George B. Purdy, Gustavus J. Simmons, James Studier: Software Protection Using ``Communal Key Cryptosystems''. CRYPTO 1981: 79
1980
3 Gustavus J. Simmons: Secure Communications in the Presence of Pervasive Deceit. IEEE Symposium on Security and Privacy 1980: 84-93
1979
2 Gustavus J. Simmons: Symmetric and Asymmetric Encryption. ACM Comput. Surv. 11(4): 305-330 (1979)
1972
1 Gustavus J. Simmons: An Extremal Problem in the Uniform Covering of Finite Sets. J. Comb. Theory, Ser. A 13(2): 183-197 (1972)

Coauthor Index

1Thomas Beth [26] [33]
2Ernest F. Brickell [6]
3James A. Davis [6] [10]
4Markus Frisch [26]
5Diane B. Holdridge [10]
6Ingemar Ingemarsson [24]
7Hans-Joachim Knobloch [33]
8Catherine Meadows [34]
9Judy H. Moore [14] [15] [16]
10Marcus Otten [33]
11George B. Purdy [4] [20]
12James Studier [4]
13Peer Wichmann [33]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)