Daniel V Bailey
Title
Cited by
Cited by
Year
Optimal extension fields for fast arithmetic in public-key algorithms
DV Bailey, C Paar
Annual International Cryptology Conference, 472-485, 1998
3091998
Efficient arithmetic in finite field extensions with application in elliptic curve cryptography
DV Bailey, C Paar
Journal of cryptology 14 (3), 153-176, 2001
2192001
Vulnerabilities in first-generation RFID-enabled credit cards
TS Heydt-Benjamin, DV Bailey, K Fu, A Juels, T O'Hare
Lecture Notes in Computer Science Volume: Financial Cryptography 2007 4888, 2007
1702007
Protected resource access control utilizing intermediate values of a hash chain
DV Bailey, WM Duane, E Young
US Patent 8,990,905, 2015
1502015
Protected resource access control utilizing credentials based on message authentication codes and hash chain values
DV Bailey, WM Duane, A Katz
US Patent 8,984,602, 2015
1472015
Wireless authentication methods and apparatus
DV Bailey, JG Brainard, A Juels, BS Kaliski Jr
US Patent 9,137,012, 2015
1422015
AES-CCM Cipher Suites for Transport Layer Security (TLS)
D McGrew, D Bailey
RFC 6655, july, 2012
1232012
Elliptic curve cryptography on smart cards without coprocessors
AD Woodbury, DV Bailey, C Paar
Smart Card Research and Advanced Applications, 71-92, 2000
1162000
Authentication methods and apparatus using pairing protocols and other techniques
DV Bailey, JG Brainard, A Juels, BS Kaliski Jr
US Patent 8,495,372, 2013
1072013
NTRU in constrained devices
DV Bailey, D Coffin, A Elbirt, JH Silverman, AD Woodbury
International Workshop on Cryptographic Hardware and Embedded Systems, 262-272, 2001
1022001
Agile OTP generation
DV Bailey, JG Brainard, WM Duane, MJ O'malley, RS Phipott
US Patent 8,312,519, 2012
1012012
Proxy device for enhanced privacy in an RFID system
A Juels, DV Bailey, P Syverson
US Patent 7,920,050, 2011
902011
Techniques for providing security using a mobile wireless communications device having data loss prevention circuitry
DV Bailey, RW Griffin
US Patent 8,726,405, 2014
892014
The MD6 hash function–a proposal to NIST for SHA-3
RL Rivest, B Agre, DV Bailey, C Crutchfield, Y Dodis, KE Fleming, A Khan, ...
Submission to NIST 2 (3), 1-234, 2008
842008
Gaming systems with authentication token support
DV Bailey, BS Kaliski Jr, A Juels, RL Rivest
US Patent 9,280,871, 2016
762016
Agile OTP generation
DV Bailey, JG Brainard, WM Duane, MJ O'malley, RS Philpott
US Patent 9,306,942, 2016
722016
Agile OTP generation
DV Bailey, JG Brainard, WM Duane, MJ O'malley, RS Philpott
US Patent 9,118,663, 2015
722015
Breaking ECC2K-130.
DV Bailey, L Batina, DJ Bernstein, P Birkner, JW Bos, HC Chen, ...
IACR Cryptol. ePrint Arch. 2009, 541, 2009
662009
Shoehorning security into the EPC tag standard
DV Bailey, A Juels
International Conference on Security and Cryptography for Networks, 303-320, 2006
592006
Tokencode exchanges for peripheral authentication
DV Bailey, JG Brainard, BS Kaliski Jr, M Szydlo
US Patent 8,607,045, 2013
452013
The system can't perform the operation now. Try again later.
Articles 1–20