default search action
Peter Gutmann
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [i8]Peter Gutmann, Corey Bonnell:
Standard Public Key Cryptography (PKC) Test Keys. RFC 9500: 1-28 (2023) - 2020
- [i7]Peter Gutmann:
Simple Certificate Enrolment Protocol. RFC 8894: 1-42 (2020)
2010 – 2019
- 2016
- [j11]Peter Gutmann:
Fuzzing Code with AFL. login Usenix Mag. 41(2) (2016) - [j10]Mark Lamourine, Peter Gutmann, Rik Farrow:
Book Reviews. login Usenix Mag. 41(2) (2016) - [i6]Peter Gutmann, Steven M. Bellovin, Matt Blaze, Ronald L. Rivest, Nigel P. Smart:
An IBE-based Signcryption Scheme for Group Key Management. CoRR abs/1603.09526 (2016) - 2014
- [j9]Peter Gutmann:
Code Testing through Fault Injection. login Usenix Mag. 39(6) (2014) - [i5]Peter Gutmann:
Encrypt-then-MAC for Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS). RFC 7366: 1-7 (2014) - 2012
- [j8]Elizabeth Zwicky, Peter Gutmann, Sam Stover, Mark Lamourine:
Book Reviews. login Usenix Mag. 37(4) (2012) - [i4]Peter Gutmann:
Using Message Authentication Code (MAC) Encryption in the Cryptographic Message Syntax (CMS). RFC 6476: 1-15 (2012) - 2011
- [j7]Ian Grigg, Peter Gutmann:
The Curse of Cryptographic Numerology. IEEE Secur. Priv. 9(3): 70-72 (2011) - [j6]Peter Gutmann:
Do Users Verify SSH Keys? login Usenix Mag. 36(4) (2011) - [c10]Peter Gutmann:
PKI as Part of an Integrated Risk Management Strategy for Web Security. EuroPKI 2011: 128-146 - [c9]Peter Gutmann:
Applying problem-structuring methods to problems in computer security. NSPW 2011: 37-44
2000 – 2009
- 2006
- [c8]Peter Gutmann:
PKI design for the real world. NSPW 2006: 109-116 - [i3]Peter Gutmann:
Internet X.509 Public Key Infrastructure Operational Protocols: Certificate Store Access via HTTP. RFC 4387: 1-25 (2006) - 2005
- [j5]Peter Gutmann, David Naccache, Charles C. Palmer:
When Hashes Collide. IEEE Secur. Priv. 3(3): 68-71 (2005) - [j4]Peter Gutmann, Ian Grigg:
Security Usability. IEEE Secur. Priv. 3(4): 56-58 (2005) - 2004
- [j3]Peter Gutmann:
Simplifying Public Key Management. Computer 37(2): 101-103 (2004) - 2003
- [c7]Peter Gutmann:
Plug-and-Play PKI: A PKI Your Mother Can Use. USENIX Security Symposium 2003 - 2002
- [j2]Peter Gutmann:
PKI: It's Not Dead, Just Resting. Computer 35(8): 41-49 (2002) - [c6]Peter Gutmann:
Lessons Learned in Implementing and Deploying Crypto Software. USENIX Security Symposium 2002: 315-325 - [i2]Peter Gutmann:
Compressed Data Content Type for Cryptographic Message Syntax (CMS). RFC 3274: 1-6 (2002) - 2001
- [c5]Peter Gutmann:
Data Remanence in Semiconductor Devices. USENIX Security Symposium 2001 - [i1]Peter Gutmann:
Password-based Encryption for CMS. RFC 3211: 1-17 (2001) - 2000
- [c4]Peter Gutmann:
A Reliable, Scalable General-Purpose Certificate Store. ACSAC 2000: 278-287 - [c3]Peter Gutmann:
An Open-Source Cryptographic Coprocessor. USENIX Security Symposium 2000
1990 – 1999
- 1999
- [c2]Peter Gutmann:
The Design of a Cryptographic Security Architecture. USENIX Security Symposium 1999 - 1998
- [c1]Peter Gutmann:
Software Generation of Practically Strong Random Numbers. USENIX Security Symposium 1998 - 1996
- [j1]Jenny Shearer, Peter Gutmann:
Government, Cryptography, and the Right to Privacy. J. Univers. Comput. Sci. 2(3): 113-146 (1996)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-29 01:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint