scispace - formally typeset
M

Mohammad Peyravian

Researcher at IBM

Publications -  92
Citations -  3666

Mohammad Peyravian is an academic researcher from IBM. The author has contributed to research in topics: Key (cryptography) & Encryption. The author has an hindex of 32, co-authored 92 publications receiving 3645 citations. Previous affiliations of Mohammad Peyravian include Research Triangle Park.

Papers
More filters
Journal ArticleDOI

Special feature: Two-phase cryptographic key recovery system

TL;DR: A two-phase method of key recovery which will be referred to as Secure Key Recovery (SKR) is presented, which permits a portion of the key recovery information to be generated once and then used for multiple encrypted data communications sessions and encrypted file applications.

MARS - a candidate cipher for AES

TL;DR: MARS is designed to take advantage of the powerful operations supported in today’s computers, resulting in a much improved security/performance tradeoff over existing ciphers, and offers better security than triple DES while running significantly faster than single DES.
Patent

Secure data storage and retrieval with key management and user authentication

TL;DR: In this article, the authors present a system and computer program products which provide for controlling access to digital data in a file by encrypting the data with a first key, encrypting a second personal key generated from a password/passphrase associated with the file and further encrypting encrypted first key with a control key which is managed by the system.
Patent

Method of responding to a truncated secure session attack

TL;DR: In this article, a method of progressive response for invoking and suspending blocking measures that defend against network anomalies such as malicious network traffic so that false positives and false negatives are minimized is presented.
Patent

Biometric based multi-party authentication

TL;DR: In this article, a plurality of biometric authentication messages from a corresponding plurality of users are sent to the same user, and it is determined if each of the plurality of received messages is a valid message based on the biometric data contained in the messages.