Follow
Agnes Chan
Agnes Chan
Unknown affiliation
No verified email
Title
Cited by
Cited by
Year
Easy come—easy go divisible cash
A Chan, Y Frankel, Y Tsiounis
Advances in Cryptology—EUROCRYPT'98: International Conference on the Theory …, 1998
3201998
A fast algorithm for determining the complexity of a binary sequence with period(Corresp.)
R Games, A Chan
IEEE Transactions on Information Theory 29 (1), 144-146, 1983
2751983
On the complexities of de Bruijn sequences
AH Chan, RA Games, EL Key
Journal of Combinatorial Theory, Series A 33 (3), 233-246, 1982
1671982
Broadcast control channel jamming: Resilience and identification of traitors
A Chan, X Liu, G Noubir, B Thapa
2007 IEEE International Symposium on Information Theory, 2496-2500, 2007
1472007
Efficient and mutually authenticated key exchange for low power computing devices
DS Wong, AH Chan
International Conference on the Theory and Application of Cryptology and …, 2001
1292001
Efficient private file retrieval by combining ORAM and PIR
T Mayberry, EO Blass, AH Chan
Cryptology ePrint Archive, 2013
1152013
Threshold schemes with disenrollment
B Blakley, GR Blakley, AH Chan, JL Massey
Advances in Cryptology—CRYPTO’92: 12th Annual International Cryptology …, 1993
1071993
Cascaded GMW sequences
A Klapper, AH Chan, M Goresky
IEEE Transactions on Information Theory 39 (1), 177-183, 1993
1021993
Mutual authentication and key exchange for low power wireless communications
DS Wong, AH Chan
2001 MILCOM Proceedings Communications for Network-Centric Operations …, 2001
1002001
The performance measurement of cryptographic primitives on palm devices
DS Wong, HH Fuentes, AH Chan
Seventeenth Annual Computer Security Applications Conference, 92-101, 2001
952001
PRG4 exchange between the articular cartilage surface and synovial fluid
GE Nugent‐Derfus, AH Chan, BL Schumacher, RL Sah
Journal of Orthopaedic Research 25 (10), 1269-1276, 2007
762007
Password authenticated key exchange based on RSA for imbalanced wireless networks
F Zhu, DS Wong, AH Chan, R Ye
Information Security: 5th International Conference, ISC 2002 Sao Paulo …, 2002
752002
A million-cycle CMOS 256 K EEPROM
D Cioaca, T Lin, A Chan, L Chen, A Mihnea
IEEE journal of solid-state circuits 22 (5), 684-692, 1987
691987
On the linear span of binary sequences obtained from finite geometries
AH Chan, RA Games
Conference on the Theory and Application of Cryptographic Techniques, 405-417, 1986
621986
PIRMAP: Efficient private information retrieval for MapReduce
T Mayberry, EO Blass, AH Chan
Financial Cryptography and Data Security: 17th International Conference, FC …, 2013
582013
On the quadratic spans of DeBruijn sequences
AH Chan, RA Games
IEEE Transactions on Information Theory 36 (4), 822-829, 1990
56*1990
Stream-cipher method and apparatus
CP Carroll, M Zhang, A Chan
US Patent 6,879,689, 2005
472005
Maximum correlation analysis of nonlinear S-boxes in stream ciphers
M Zhang, A Chan
Annual International Cryptology Conference, 501-514, 2000
452000
Cross-correlations of linearly and quadratically related geometric sequences and GMW sequences
A Klapper, AH Chan, M Goresky
Discrete Applied Mathematics 46 (1), 1-20, 1993
451993
Optimal tree structure for key management of simultaneous join/leave in secure multicast
F Zhu, A Chan, G Noubir
IEEE Military Communications Conference, 2003. MILCOM 2003. 2, 773-778, 2003
412003
The system can't perform the operation now. Try again later.
Articles 1–20