Easy come—easy go divisible cash A Chan, Y Frankel, Y Tsiounis Advances in Cryptology—EUROCRYPT'98: International Conference on the Theory …, 1998 | 320 | 1998 |
A fast algorithm for determining the complexity of a binary sequence with period(Corresp.) R Games, A Chan IEEE Transactions on Information Theory 29 (1), 144-146, 1983 | 275 | 1983 |
On the complexities of de Bruijn sequences AH Chan, RA Games, EL Key Journal of Combinatorial Theory, Series A 33 (3), 233-246, 1982 | 167 | 1982 |
Broadcast control channel jamming: Resilience and identification of traitors A Chan, X Liu, G Noubir, B Thapa 2007 IEEE International Symposium on Information Theory, 2496-2500, 2007 | 147 | 2007 |
Efficient and mutually authenticated key exchange for low power computing devices DS Wong, AH Chan International Conference on the Theory and Application of Cryptology and …, 2001 | 129 | 2001 |
Efficient private file retrieval by combining ORAM and PIR T Mayberry, EO Blass, AH Chan Cryptology ePrint Archive, 2013 | 115 | 2013 |
Threshold schemes with disenrollment B Blakley, GR Blakley, AH Chan, JL Massey Advances in Cryptology—CRYPTO’92: 12th Annual International Cryptology …, 1993 | 107 | 1993 |
Cascaded GMW sequences A Klapper, AH Chan, M Goresky IEEE Transactions on Information Theory 39 (1), 177-183, 1993 | 102 | 1993 |
Mutual authentication and key exchange for low power wireless communications DS Wong, AH Chan 2001 MILCOM Proceedings Communications for Network-Centric Operations …, 2001 | 100 | 2001 |
The performance measurement of cryptographic primitives on palm devices DS Wong, HH Fuentes, AH Chan Seventeenth Annual Computer Security Applications Conference, 92-101, 2001 | 95 | 2001 |
PRG4 exchange between the articular cartilage surface and synovial fluid GE Nugent‐Derfus, AH Chan, BL Schumacher, RL Sah Journal of Orthopaedic Research 25 (10), 1269-1276, 2007 | 76 | 2007 |
Password authenticated key exchange based on RSA for imbalanced wireless networks F Zhu, DS Wong, AH Chan, R Ye Information Security: 5th International Conference, ISC 2002 Sao Paulo …, 2002 | 75 | 2002 |
A million-cycle CMOS 256 K EEPROM D Cioaca, T Lin, A Chan, L Chen, A Mihnea IEEE journal of solid-state circuits 22 (5), 684-692, 1987 | 69 | 1987 |
On the linear span of binary sequences obtained from finite geometries AH Chan, RA Games Conference on the Theory and Application of Cryptographic Techniques, 405-417, 1986 | 62 | 1986 |
PIRMAP: Efficient private information retrieval for MapReduce T Mayberry, EO Blass, AH Chan Financial Cryptography and Data Security: 17th International Conference, FC …, 2013 | 58 | 2013 |
On the quadratic spans of DeBruijn sequences AH Chan, RA Games IEEE Transactions on Information Theory 36 (4), 822-829, 1990 | 56* | 1990 |
Stream-cipher method and apparatus CP Carroll, M Zhang, A Chan US Patent 6,879,689, 2005 | 47 | 2005 |
Maximum correlation analysis of nonlinear S-boxes in stream ciphers M Zhang, A Chan Annual International Cryptology Conference, 501-514, 2000 | 45 | 2000 |
Cross-correlations of linearly and quadratically related geometric sequences and GMW sequences A Klapper, AH Chan, M Goresky Discrete Applied Mathematics 46 (1), 1-20, 1993 | 45 | 1993 |
Optimal tree structure for key management of simultaneous join/leave in secure multicast F Zhu, A Chan, G Noubir IEEE Military Communications Conference, 2003. MILCOM 2003. 2, 773-778, 2003 | 41 | 2003 |