Daniel V. Bailey
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2010 – today
- 2017
- [c12]Maximilian Golla, Daniel V. Bailey, Markus Dürmuth:
"I want my money back!" Limiting Online Password-Guessing Financially. SOUPS 2017 - 2014
- [c11]Daniel V. Bailey, Markus Dürmuth, Christof Paar:
Statistics on Password Re-use and Adaptive Strength for Financial Accounts. SCN 2014: 218-235 - [i4]David A. McGrew, Daniel V. Bailey, Matthew J. Campagna, Robert Dugal:
AES-CCM Elliptic Curve Cryptography (ECC) Cipher Suites for TLS. RFC 7251: 1-10 (2014) - 2012
- [i3]David A. McGrew, Daniel V. Bailey:
AES-CCM Cipher Suites for Transport Layer Security (TLS). RFC 6655: 1-8 (2012) - 2010
- [c10]Junfeng Fan, Daniel V. Bailey, Lejla Batina, Tim Güneysu, Christof Paar, Ingrid Verbauwhede:
Breaking Elliptic Curve Cryptosystems Using Reconfigurable Hardware. FPL 2010: 133-138
2000 – 2009
- 2009
- [c9]Daniel V. Bailey, John G. Brainard, Sebastian Rohde, Christof Paar:
Wireless Authentication and Transaction-Confirmation Token. ICETE (Selected Papers) 2009: 186-198 - [c8]Daniel V. Bailey, John G. Brainard, Sebastian Rohde, Christof Paar:
One-touch Financial Transaction Authentication. SECRYPT 2009: 5-12 - [i2]Daniel V. Bailey, Brian Baldwin, Lejla Batina, Daniel J. Bernstein, Peter Birkner, Joppe W. Bos, Gauthier Van Damme, Giacomo de Meulenaer, Junfeng Fan, Tim Güneysu, Frank K. Gürkaynak, Thorsten Kleinjung, Tanja Lange, Nele Mentens, Christof Paar, Francesco Regazzoni, Peter Schwabe, Leif Uhsadel:
The Certicom Challenges ECC2-X. IACR Cryptology ePrint Archive 2009: 466 (2009) - [i1]Daniel V. Bailey, Lejla Batina, Daniel J. Bernstein, Peter Birkner, Joppe W. Bos, Hsieh-Chung Chen, Chen-Mou Cheng, Gauthier Van Damme, Giacomo de Meulenaer, Luis J. Dominguez Perez, Junfeng Fan, Tim Güneysu, Frank K. Gürkaynak, Thorsten Kleinjung, Tanja Lange, Nele Mentens, Ruben Niederhagen, Christof Paar, Francesco Regazzoni, Peter Schwabe, Leif Uhsadel, Anthony Van Herrewege, Bo-Yin Yang:
Breaking ECC2K-130. IACR Cryptology ePrint Archive 2009: 541 (2009) - 2007
- [c7]Daniel V. Bailey, Dan Boneh, Eu-Jin Goh, Ari Juels:
Covert channels in privacy-preserving identification systems. ACM Conference on Computer and Communications Security 2007: 297-306 - [c6]Thomas S. Heydt-Benjamin, Daniel V. Bailey, Kevin Fu, Ari Juels, Tom O'Hare:
Vulnerabilities in First-Generation RFID-enabled Credit Cards. Financial Cryptography 2007: 2-14 - 2006
- [c5]
- 2005
- [c4]Ari Juels, Paul F. Syverson, Daniel V. Bailey:
High-Power Proxies for Enhancing RFID Privacy and Utility. Privacy Enhancing Technologies 2005: 210-226 - 2001
- [j1]Daniel V. Bailey, Christof Paar:
Efficient Arithmetic in Finite Field Extensions with Application in Elliptic Curve Cryptography. J. Cryptology 14(3): 153-176 (2001) - [c3]Daniel V. Bailey, Daniel Coffin, Adam J. Elbirt, Joseph H. Silverman, Adam D. Woodbury:
NTRU in Constrained Devices. CHES 2001: 262-272 - 2000
- [c2]Adam D. Woodbury, Daniel V. Bailey, Christof Paar:
Elliptic Curve Cryptography on Smart Cards without Coprocessors. CARDIS 2000: 71-92
1990 – 1999
- 1998
- [c1]Daniel V. Bailey, Christof Paar:
Optimal Extension Fields for Fast Arithmetic in Public-Key Algorithms. CRYPTO 1998: 472-485
Coauthor Index
last updated on 2019-02-08 22:52 CET by the dblp team
data released under the ODC-BY 1.0 license
see also: Terms of Use | Privacy Policy | Imprint