scispace - formally typeset
G

Gene Tsudik

Researcher at University of California, Irvine

Publications -  465
Citations -  32121

Gene Tsudik is an academic researcher from University of California, Irvine. The author has contributed to research in topics: Authentication & The Internet. The author has an hindex of 90, co-authored 448 publications receiving 30539 citations. Previous affiliations of Gene Tsudik include University of California & University of Southern California.

Papers
More filters
Book ChapterDOI

Aggregation queries in the database-as-a-service model

TL;DR: This paper proposes a simple alternative for handling encrypted aggregation queries and describes its implementation, and considers a different flavor of the DAS model which involves mixed databases, where some attributes are encrypted and some are left in the clear.
Book ChapterDOI

KryptoKnight Authentication and Key Distribution System

TL;DR: KryptoKnight was designed with the goal of providing network security services with a high degree of compactness and flexibility, which allows it to secure communication protocols at any layer, without requiring any major protocol augmentations in order to accommodate security-related information.
Book

Security and privacy in ad-hoc and sensor networks : Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005 : revised selected papers

TL;DR: This paper presents SKiMPy, a Simple Key Management Protocol for MANETs in Emergency and Rescue Operations, and an Advanced Method for Joint Scalar Multiplications on Memory Constraint Devices to Mitigate Side Channel Attacks on Message Authentication Codes.
Book ChapterDOI

Simple identity-based cryptography with mediated RSA

TL;DR: This paper examines nested Substitution-Permutation Networks and Feistel networks with round functions composed of S-boxes and MDS mappings and provides a meaningful mechanism for seeking efficient ciphers through a wide comparison of performance, complexity, and security.
Proceedings ArticleDOI

DSAC: integrity for outsourced databases with signature aggregation and chaining

TL;DR: New techniques in support of efficient authenticity and completeness guarantees of query replies to outsourced database queries are suggested.