Follow
Daniel V Bailey
Title
Cited by
Cited by
Year
Protected resource access control utilizing credentials based on message authentication codes and hash chain values
DV Bailey, WM Duane, A Katz
US Patent 8,984,602, 2015
3632015
Protected resource access control utilizing intermediate values of a hash chain
DV Bailey, WM Duane, E Young
US Patent 8,990,905, 2015
3622015
Optimal extension fields for fast arithmetic in public-key algorithms
DV Bailey, C Paar
Advances in Cryptology—CRYPTO'98: 18th Annual International Cryptology …, 1998
3211998
Efficient arithmetic in finite field extensions with application in elliptic curve cryptography
DV Bailey, C Paar
Journal of cryptology 14, 153-176, 2001
2352001
Wireless authentication methods and apparatus
DV Bailey, JG Brainard, A Juels, BS Kaliski Jr
US Patent 9,137,012, 2015
1822015
Agile OTP generation
DV Bailey, JG Brainard, WM Duane, MJ O'malley, RS Phipott
US Patent 8,312,519, 2012
1782012
Vulnerabilities in first-generation RFID-enabled credit cards
TS Heydt-Benjamin, DV Bailey, K Fu, A Juels, T O'Hare
Lecture Notes in Computer Science Volume: Financial Cryptography 2007 4888, 2007
1772007
Techniques for providing security using a mobile wireless communications device having data loss prevention circuitry
DV Bailey, RW Griffin
US Patent 8,726,405, 2014
1622014
AES-CCM Cipher Suites for Transport Layer Security (TLS)
D McGrew, D Bailey
RFC 6655, july, 2012
1472012
Agile OTP generation
DV Bailey, JG Brainard, WM Duane, MJ O'malley, RS Philpott
US Patent 9,306,942, 2016
1462016
Agile OTP generation
DV Bailey, JG Brainard, WM Duane, MJ O'malley, RS Philpott
US Patent 9,118,663, 2015
1452015
Authentication methods and apparatus using pairing protocols and other techniques
DV Bailey, JG Brainard, A Juels, BS Kaliski Jr
US Patent 8,495,372, 2013
1242013
Elliptic curve cryptography on smart cards without coprocessors
AD Woodbury, DV Bailey, C Paar
Smart Card Research and Advanced Applications: IFIP TC8/WG8. 8 Fourth …, 2000
1202000
NTRU in constrained devices
DV Bailey, D Coffin, A Elbirt, JH Silverman, AD Woodbury
International Workshop on Cryptographic Hardware and Embedded Systems, 262-272, 2001
1182001
Gaming systems with authentication token support
DV Bailey, BS Kaliski Jr, A Juels, RL Rivest
US Patent 9,280,871, 2016
952016
Proxy device for enhanced privacy in an RFID system
A Juels, DV Bailey, P Syverson
US Patent 7,920,050, 2011
952011
The MD6 hash function–a proposal to NIST for SHA-3
RL Rivest, B Agre, DV Bailey, C Crutchfield, Y Dodis, KE Fleming, A Khan, ...
Submission to NIST 2 (3), 1-234, 2008
892008
Breaking ecc2k-130
DV Bailey, L Batina, DJ Bernstein, P Birkner, JW Bos, HC Chen, ...
Cryptology EPrint Archive, 2009
762009
This pin can be easily guessed: Analyzing the security of smartphone unlock pins
P Markert, DV Bailey, M Golla, M Dürmuth, AJ Aviv
2020 IEEE Symposium on Security and Privacy (SP), 286-303, 2020
652020
Shoehorning security into the EPC tag standard
DV Bailey, A Juels
Security and Cryptography for Networks: 5th International Conference, SCN …, 2006
602006
The system can't perform the operation now. Try again later.
Articles 1–20