2002 |
36 | | Gustavus J. Simmons:
Parity Encoding of Binary Sequences.
Des. Codes Cryptography 27(1-2): 157-164 (2002) |
1996 |
35 | | Gustavus J. Simmons:
The History of Subliminal Channels.
Information Hiding 1996: 237-256 |
1995 |
34 | | Gustavus J. Simmons,
Catherine Meadows:
The Role of Trust in Information Integrity Protocols.
Journal of Computer Security 3(1): 71-84 (1995) |
1994 |
33 | EE | Thomas Beth,
Hans-Joachim Knobloch,
Marcus Otten,
Gustavus J. Simmons,
Peer Wichmann:
Towards Acceptable Key Escrow Systems.
ACM Conference on Computer and Communications Security 1994: 51-58 |
32 | | Gustavus J. Simmons:
Cryptoanalysis and Protocol Failures.
Commun. ACM 37(11): 56-65 (1994) |
31 | | Gustavus J. Simmons:
Proof of Soundness (Integrity) of Cryptographic Protocols.
J. Cryptology 7(2): 69-77 (1994) |
1993 |
30 | EE | Gustavus J. Simmons:
Cryptanalysis and Protocol Failures (abstract).
ACM Conference on Computer and Communications Security 1993: 213-214 |
29 | | Gustavus J. Simmons:
Invited talk: An Introductions to the Mathematics of Trust in Security Protocols.
CSFW 1993: 121-127 |
28 | EE | Gustavus J. Simmons:
Subliminal Communication is Easy Using the DSA.
EUROCRYPT 1993: 218-232 |
27 | EE | Gustavus J. Simmons:
The Consequences of Trust in Shared Secret Schemes.
EUROCRYPT 1993: 448-452 |
1992 |
26 | | Thomas Beth,
Markus Frisch,
Gustavus J. Simmons:
Public-Key Cryptography: State of the Art and Future Directions, E.I.S.S. Workshop, Oberwolfach, Germany, July 3-6, 1991, Final Report
Springer 1992 |
1990 |
25 | EE | Gustavus J. Simmons:
Geometric Shared Secret and/or Shared Control Schemes.
CRYPTO 1990: 216-241 |
24 | EE | Ingemar Ingemarsson,
Gustavus J. Simmons:
A Protocol to Set Up Shared Secret Schemes Without the Assistance of a Mutualy Trusted Party.
EUROCRYPT 1990: 266-282 |
23 | | Gustavus J. Simmons:
A Cartesian Product Construction for Unconditionally Secure Authentication Codes that Permit Arbitration.
J. Cryptology 2(2): 77-104 (1990) |
1989 |
22 | EE | Gustavus J. Simmons:
Prepositioned Shared Secret and/or Shared Control Schemes.
EUROCRYPT 1989: 436-467 |
1988 |
21 | EE | Gustavus J. Simmons:
How to (Really) Share a Secret.
CRYPTO 1988: 390-448 |
20 | EE | Gustavus J. Simmons,
George B. Purdy:
Zero-Knowledge Proofs of Identity And Veracity of Transaction Receipts.
EUROCRYPT 1988: 35-49 |
1987 |
19 | EE | Gustavus J. Simmons:
An Impersonation-Proof Identity Verfication Scheme.
CRYPTO 1987: 211-215 |
18 | EE | Gustavus J. Simmons:
A Natural Taxonomy for Digital Information Authentication Schemes.
CRYPTO 1987: 269-288 |
17 | EE | Gustavus J. Simmons:
Message Authentication with Arbitration of Transmitter/Receiver Disputes.
EUROCRYPT 1987: 151-165 |
16 | | Judy H. Moore,
Gustavus J. Simmons:
Cycle Structure of the DES for Keys Having Palindromic (or Antipalindromic) Sequences of Round Keys.
IEEE Trans. Software Eng. 13(2): 262-273 (1987) |
1986 |
15 | EE | Judy H. Moore,
Gustavus J. Simmons:
Cycle Structures of the DES with Weak and Semi-Weak Keys.
CRYPTO 1986: 9-32 |
14 | | Judy H. Moore,
Gustavus J. Simmons:
Cycle Structure of the Weak and Semi-Weak DES Keys.
EUROCRYPT 1986: 16 |
1985 |
13 | EE | Gustavus J. Simmons:
A Secure Subliminal Channel (?).
CRYPTO 1985: 33-41 |
12 | EE | Gustavus J. Simmons:
The Practice of Authentication.
EUROCRYPT 1985: 261-272 |
1984 |
11 | EE | Gustavus J. Simmons:
Authentication Theory/Coding Theory.
CRYPTO 1984: 411-431 |
10 | EE | James A. Davis,
Diane B. Holdridge,
Gustavus J. Simmons:
Status Report on Factoring (At the Sandia National Laboratories).
EUROCRYPT 1984: 183-215 |
9 | EE | Gustavus J. Simmons:
The Subliminal Channel and Digital Signature.
EUROCRYPT 1984: 364-378 |
1983 |
8 | | Gustavus J. Simmons:
The Prisoners' Problem and the Subliminal Channel.
CRYPTO 1983: 51-67 |
7 | | Gustavus J. Simmons:
Verification of Treaty Compliance Revisited.
IEEE Symposium on Security and Privacy 1983: 61-66 |
1982 |
6 | | Ernest F. Brickell,
James A. Davis,
Gustavus J. Simmons:
A Preliminary Report on the Cryptanalysis of Merkle-Hellman Knapsack Cryptosystems.
CRYPTO 1982: 289-301 |
1981 |
5 | | Gustavus J. Simmons:
A System for Point-of-Sale or Access User Authentication and Identification.
CRYPTO 1981: 31-37 |
4 | | George B. Purdy,
Gustavus J. Simmons,
James Studier:
Software Protection Using ``Communal Key Cryptosystems''.
CRYPTO 1981: 79 |
1980 |
3 | | Gustavus J. Simmons:
Secure Communications in the Presence of Pervasive Deceit.
IEEE Symposium on Security and Privacy 1980: 84-93 |
1979 |
2 | | Gustavus J. Simmons:
Symmetric and Asymmetric Encryption.
ACM Comput. Surv. 11(4): 305-330 (1979) |
1972 |
1 | | Gustavus J. Simmons:
An Extremal Problem in the Uniform Covering of Finite Sets.
J. Comb. Theory, Ser. A 13(2): 183-197 (1972) |