• Publications
  • Influence
Synergistic gains from corporate acquisitions and their division between the stockholders of target and acquiring firms
This paper documents that a successful tender offer increases the combined value of the target and acquiring firms by an average of 7.4%. We also provide a theoretical analysis of the process ofExpand
  • 1,710
  • 118
Relations among Notions of Security for Public-Key Encryption Schemes
We compare the relative strengths of popular notions of security for public key encryption schemes under chosen plaintext attack and two kinds of chosen ciphertext attack. Expand
  • 1,107
  • 88
  • PDF
A concrete security treatment of symmetric encryption
We study notions and schemes for symmetric (ie. private key) encryption in a concrete security framework. Expand
  • 1,006
  • 75
Key-Privacy in Public-Key Encryption
We consider a novel security requirement of encryption schemes that we call "key-privacy" or "anonymity". Expand
  • 416
  • 39
  • PDF
This paper investigates the rationale behind interlirm tender offers by examining the returns realized by the stockholders of lirms that were the targets of unsuccessful tender offers and lirms thatExpand
  • 633
  • 32
A concrete security treatment of symmet-ric encryption: Analysis of the DES modes of operation
We study notions and schemes for symmetric (ie. private key) encryption in a concrete security framework. Expand
  • 157
  • 10
  • PDF
Determination of paths to vendor market efficiency using parallel coordinates representation: A negotiation tool for buyers
Abstract This study demonstrates the use of data envelopment analysis for measuring vendor performance and efficiency. An algorithm by Inselberg is employed for determining points of vendorExpand
  • 216
  • 8
The Security of All-or-Nothing Encryption: Protecting against Exhaustive Key Search
  • Anand Desai
  • Computer Science, Mathematics
  • 20 August 2000
We investigate the all-or-nothing encryption paradigm which was introduced by Rivest as a new mode of operation for block ciphers. Expand
  • 76
  • 8
  • PDF
Non-cooperative negotiation strategies for vendor selection
This paper describes non-cooperative vendor negotiation strategies where the selection of one vendor results in another being left out of the solution. Expand
  • 264
  • 6
A Practice-Oriented Treatment of Pseudorandom Number Generators
We study Pseudorandom Number Generators (PRNGs) as used in practice, including the ANSI X9.17 and FIPS 186 PRNG. Expand
  • 50
  • 5
  • PDF