Vesselin Petkov

Introduction

Short CV

insert short SV here

Full profile

This is the longer CV, presenting education, work experience, etc.

Publications
Shih, Hsi-Chang. Cryptanalysis on Two Password Authentication Schemes In Laboratory of Cryptography and Information Security. Vol. Master's Thesis. Taiwan: National Central University, 2008.
Xie, Ji-Lin Wang Qi, De-Ren Chen, and Xiu-Yuan Yu. A novel user authentication scheme using smart cards In 2008 International Conference on Computer Science and Software Engineering 3., 2008.
Passing, Martin, and Falko Dressler. Experimental Performance Evaluation of Cryptographic Algorithms on Sensor Nodes In 3rd International Conference on Mobile Adhoc and Sensor Systems., 2006.
Yoon, Eun-Jun, Ein-Jung Lee, and Kee-Young Yoo. Cryptanalysis of Wang et al.’s Remote User Authentication Scheme Using Smart Cards In 5th International Conference on Information Technology: New Generations., 2008.
Sacco, Dorothy E. Denning. "Timestamps in Key Distribution System." Communications of the ACM 24, no. 8 (1981).
Wang, Xiaofeng, and Michael K. Reiter. Defending Against Denial-of-Service Attacks with Puzzle Auctions In 2003 IEEE Symposium on Security and Privacy., 2003.
Buchmann, Johannes. Introduction to Cryptography. Berlin: Springer-Verlag, 2001.
Stinson, Douglas. Cryptography(link is external). Boca Raton: FL: CRC Press, 2006.
Joux, Antoine. A One Round Protocol for Tripartite Diffie-Hellman In Algorithmic Number Theory Symposium, Lecture Notes in Computer Science. Vol. 1838., 2000.
Boneh, Dan, and Matthew Franklin. Identity Based Encryption from the Weil Pairing In Lecture Notes in Computer Science ., 2001.
Kim, Myungsun, and Kwangjo Kim. A New Identification Scheme Based on the Bilinear Diffie-Hellman Problem In 7th Australian Conference on Information Security and Privacy, ACISP. Vol. 02., 2002.
Fiat, Amos, and Adi Shamir. How to Prove Yourself: Practical Solutions of Identification and Signature Problems In Advances in Cryptology – Proceedings of CRYPTO’86, Lecture Notes in Computer Science. Vol. 263., 1987.
Feige, Uriel, Amos Fiat, and Adi Shamir. "Zero-Knowledge Proofs of Identity." Journal of Cryptology 1 (1988).
Boneh, Dan, and Xavier Boyen. "Short Signatures without Random Oracles." In Cryptology – Eurocrypt 04, Lecture Notes in Computer Science., 2004.
Yao, Gang, Guilin Wang, and Yong Wang. An Improved Identification Scheme In Progress in Computer Science and Applied Logic., 2003.
Dehkordi, Massoud Hadian, and Reza Alimoradi. "A New Batch Identification Scheme." Discrete Mathematics, Algorithms and Applications 1, no. 3 (2009).

Pages

Last updated: Monday, 01 December 2014