Protected resource access control utilizing credentials based on message authentication codes and hash chain values DV Bailey, WM Duane, A Katz US Patent 8,984,602, 2015 | 417 | 2015 |
Protected resource access control utilizing intermediate values of a hash chain DV Bailey, WM Duane, E Young US Patent 8,990,905, 2015 | 416 | 2015 |
Optimal extension fields for fast arithmetic in public-key algorithms DV Bailey, C Paar Advances in Cryptology—CRYPTO'98: 18th Annual International Cryptology …, 1998 | 318 | 1998 |
Efficient arithmetic in finite field extensions with application in elliptic curve cryptography DV Bailey, C Paar Journal of cryptology 14, 153-176, 2001 | 241 | 2001 |
Agile OTP generation DV Bailey, JG Brainard, WM Duane, MJ O'malley, RS Phipott US Patent 8,312,519, 2012 | 199 | 2012 |
Wireless authentication methods and apparatus DV Bailey, JG Brainard, A Juels, BS Kaliski Jr US Patent 9,137,012, 2015 | 198 | 2015 |
Techniques for providing security using a mobile wireless communications device having data loss prevention circuitry DV Bailey, RW Griffin US Patent 8,726,405, 2014 | 182 | 2014 |
Vulnerabilities in first-generation RFID-enabled credit cards TS Heydt-Benjamin, DV Bailey, K Fu, A Juels, T O'Hare Lecture Notes in Computer Science Volume: Financial Cryptography 2007 4888, 2007 | 181 | 2007 |
Agile OTP generation DV Bailey, JG Brainard, WM Duane, MJ O'malley, RS Philpott US Patent 9,306,942, 2016 | 166 | 2016 |
Agile OTP generation DV Bailey, JG Brainard, WM Duane, MJ O'malley, RS Philpott US Patent 9,118,663, 2015 | 165 | 2015 |
AES-CCM Cipher Suites for Transport Layer Security (TLS) D McGrew, D Bailey RFC 6655, july, 2012 | 151 | 2012 |
Authentication methods and apparatus using pairing protocols and other techniques DV Bailey, JG Brainard, A Juels, BS Kaliski Jr US Patent 8,495,372, 2013 | 127 | 2013 |
NTRU in constrained devices DV Bailey, D Coffin, A Elbirt, JH Silverman, AD Woodbury International Workshop on Cryptographic Hardware and Embedded Systems, 262-272, 2001 | 119 | 2001 |
Elliptic curve cryptography on smart cards without coprocessors AD Woodbury, DV Bailey, C Paar Smart Card Research and Advanced Applications: IFIP TC8/WG8. 8 Fourth …, 2000 | 117 | 2000 |
Gaming systems with authentication token support DV Bailey, BS Kaliski Jr, A Juels, RL Rivest US Patent 9,280,871, 2016 | 96 | 2016 |
Proxy device for enhanced privacy in an RFID system A Juels, DV Bailey, P Syverson US Patent 7,920,050, 2011 | 95 | 2011 |
The MD6 hash function–a proposal to NIST for SHA-3 RL Rivest, B Agre, DV Bailey, C Crutchfield, Y Dodis, KE Fleming, A Khan, ... Submission to NIST 2 (3), 1-234, 2008 | 90 | 2008 |
This pin can be easily guessed: Analyzing the security of smartphone unlock pins P Markert, DV Bailey, M Golla, M Dürmuth, AJ Aviv 2020 IEEE Symposium on Security and Privacy (SP), 286-303, 2020 | 77 | 2020 |
Breaking ecc2k-130 DV Bailey, L Batina, DJ Bernstein, P Birkner, JW Bos, HC Chen, ... Cryptology EPrint Archive, 2009 | 76 | 2009 |
Shoehorning security into the EPC tag standard DV Bailey, A Juels Security and Cryptography for Networks: 5th International Conference, SCN …, 2006 | 59 | 2006 |