Share This Author
Handbook of Applied Cryptography
- A. Menezes, P. V. Oorschot, S. Vanstone
- Computer Science, Mathematics
- 7 December 2018
From the Publisher:
A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of…
Graphical passwords: Learning from the first twelve years
- R. Biddle, S. Chiasson, P. V. Oorschot
- Computer ScienceCSUR
- 1 August 2012
TLDR
Authentication and authenticated key exchanges
- W. Diffie, P. V. Oorschot, M. Wiener
- Computer Science, MathematicsDes. Codes Cryptogr.
- 1 June 1992
TLDR
White-Box Cryptography and an AES Implementation
- S. Chow, Philip A. Eisen, H. Johnson, P. V. Oorschot
- Computer Science, MathematicsSelected Areas in Cryptography
- 15 August 2002
TLDR
The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes
- Joseph Bonneau, Cormac Herley, P. V. Oorschot, F. Stajano
- Computer ScienceIEEE Symposium on Security and Privacy
- 20 May 2012
TLDR
A White-Box DES Implementation for DRM Applications
- S. Chow, Philip A. Eisen, H. Johnson, P. V. Oorschot
- Computer Science, MathematicsDigital Rights Management Workshop
- 18 November 2002
TLDR
Parallel Collision Search with Cryptanalytic Applications
- P. V. Oorschot, M. Wiener
- Computer Science, MathematicsJournal of Cryptology
- 2013
TLDR
A methodology for empirical analysis of permission-based security models and its application to android
- David Barrera, H. G. Kayacik, P. V. Oorschot, Anil Somayaji
- Computer ScienceCCS '10
- 4 October 2010
TLDR
Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords
- Julie Thorpe, P. V. Oorschot
- Computer ScienceUSENIX Security Symposium
- 6 August 2007
TLDR
MDx-MAC and Building Fast MACs from Hash Functions
- B. Preneel, P. V. Oorschot
- Computer Science, MathematicsCRYPTO
- 27 August 1995
TLDR
...
...