#### Filter Results:

- Full text PDF available (2)

#### Publication Year

1980

2000

- This year (0)
- Last 5 years (0)
- Last 10 years (0)

#### Publication Type

#### Co-author

#### Journals and Conferences

#### Key Phrases

Learn More

- David Paul Maher
- Commun. ACM
- 1996

cryptographic keys. Using these mechanisms provides several benefits, including protection of corporate assets. The techniques are also applicable beyond the corporate equity problem to the problem of key escrow in which backup keys can serve the purposes of law enforcement. The recommended system has a threshold property designed so a user can choose among… (More)

- David Paul Maher
- Financial Cryptography
- 1997

- David Paul Maher
- Financial Cryptography
- 1998

- David Paul Maher, Robert J. Rance
- CHES
- 1999

The strength of a cryptographic function depends on the amount of entropy in the cryptovariables that are used as keys. Using a large key length with a strong algorithm is false comfort if the amount of entropy in the key is small. Unfortunately the amount of entropy driving a cryptographic function is usually overestimated, as entropy is confused with much… (More)

- James M. Burger, Christopher J. Cookson, Darko Kirovski, David Paul Maher, Miodrag Potkonjak, Jeremy Welt
- ACM Multimedia
- 2000

Pand Statement. Technology has made it simple and economical to reproduce, distribute, and publish digital information. While enabling increased legitimate uses of digital media, the potential for misuse is multiplied many fold. Increasing Interact piracy is already producing a billion dollar loss in revenues per year to the music industry. As Internet… (More)

- David Paul Maher
- IEEE Trans. Computers
- 1980

A divisibility criterion is given for the existence of a Fourier transform over algebraic extensions of the ring of integers mod M which is generally easy to apply. We also present examples of how such transforms may be used to compute two-dimensional convolutions.

- ‹
- 1
- ›