Name
Papers
Collaborators
PHILIP D. MACKENZIE
40
30
Citations 
PageRank 
Referers 
1171
74.21
1604
Referees 
References 
498
713
Search Limit
1001000
Title
Citations
PageRank
Year
Password-Authenticated Key Exchange Based on RSA834.372010
Threshold Password-Authenticated Key Exchange853.022006
Universally composable password-based key exchange1223.392005
Two-party generation of DSA signatures424.062004
Efficient and Universally Composable Committed Oblivious Transfer and Applications.191.212004
Alternatives to Non-malleability: Definitions, Constructions, and Applications (Extended Abstract)150.842004
On Simulation-Sound Trapdoor Commitments.512.542004
An Efficient Two-Party Public Key Cryptosystem Secure against Adaptive Chosen Ciphertext Attack80.862003
Delegation of cryptographic servers for capture-resilient devices222.452003
Automatic generation of two-party computations241.372003
Adaptively secure distributed public-key systems231.112002
Adaptive Security for the Additive-Sharing Based Proactive RSA170.722001
An Improved Stability Bound for Binary Exponential Backoff.201.922001
More Efficient Password-Authenticated Key Exchange292.452001
Networked Cryptographic Devices Resilient to Capture523.602001
Efficient and Fresh Cerification332.602000
Efficient Zero-Knowledge Proofs of Knowledge Without Intractability Assumptions702.182000
Binary Exponential Backoff Is Stable for High Arrival Rates101.542000
"Psyeudorandom Intermixing": A Tool for Shared Cryptography20.402000
Contention resolution with constant expected delay361.122000
Abuse-Free Multi-party Contract Signing321.501999
Secure and lightweight advertising on the Web221.501999
Adaptively-Secure Optimal-Resilience Proactive RSA220.911999
Anonymous Investing: Hiding the Identities of Stockholders50.551999
Abuse-Free Optimistic Contract Signing1405.791999
Adaptively-secure distributed public-key systems20.361999
Computational bounds for fundamental problems on general-purpose parallel models60.441998
An $\Omega(\sqrt{\,\log\log n}\,)$ Lower Bound for Routing in Optical Networks20.371998
Contention resolution with guaranteed constant expected delay70.671997
The Random Adversary: A Lower-Bound Technique for Randomized Parallel Algorithms10.361997
Proactive RSA.799.721997
Mis-representation of Identities in E-cash Schemes and how to Prevent it121.301996
Analysis of practical backoff protocols for contention resolution with multiple servers293.551996
ERCW PRAMs and optical communication70.481996
Lower bounds for randomized exclusive write PRAMs100.871995
An W(log log n) Lower Bound for Routing in Optical Networks.00.341994
Optimal parallel construction of Hamiltonian cycles and spanning trees in random graphs50.531993
A Lower Bound For Order-Preserving Broadcast In The Postal Model11.491993
Load balancing requires &OHgr;(log*n) expected time60.531992
Ultra-fast expected time parallel algorithms201.161991