D-Index & Metrics Best Publications
Paul C. van Oorschot

Paul C. van Oorschot

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 45 Citations 30,527 161 World Ranking 4469 National Ranking 193

Research.com Recognitions

Awards & Achievements

2016 - ACM Fellow For contributions to applied cryptography, authentication and computer security.

2011 - Fellow of the Royal Society of Canada Academy of Science

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • The Internet
  • Computer network

Paul C. van Oorschot mainly focuses on Computer security, Cryptography, Computer network, Encryption and World Wide Web. His Computer security model, Public key certificate, Password and Authentication study in the realm of Computer security connects with subjects such as Imperfect. His Computer security model research is multidisciplinary, relying on both Android, Permission system, Access control, Visualization and Software engineering.

His work deals with themes such as Table, Key and Malware, which intersect with Cryptography. His World Wide Web research is multidisciplinary, incorporating perspectives in Authorization, Certificate authority, Enterprise private network, Communications system and Secure communication. As a part of the same scientific study, Paul C. van Oorschot usually deals with the Range, concentrating on Discrete logarithm and frequently concerns with RIPEMD, Meet-in-the-middle attack, Multiple encryption, MDC-2 and Diffie–Hellman key exchange.

His most cited work include:

  • Handbook of Applied Cryptography (11359 citations)
  • Authentication and authenticated key exchanges (1053 citations)
  • Parallel Collision Search with Cryptanalytic Applications (482 citations)

What are the main themes of his work throughout his whole career to date?

His scientific interests lie mostly in Computer security, The Internet, Cryptography, World Wide Web and Authentication. He works mostly in the field of Computer security, limiting it down to concerns involving Internet privacy and, occasionally, Web service. As a part of the same scientific family, he mostly works in the field of The Internet, focusing on Protocol and, on occasion, Key exchange and Threat model.

Paul C. van Oorschot interconnects Hash function and Theoretical computer science in the investigation of issues within Cryptography. His World Wide Web study frequently draws connections between adjacent fields such as Certificate. His study in Authentication is interdisciplinary in nature, drawing from both Identity and Public-key cryptography.

He most often published in these fields:

  • Computer security (49.69%)
  • The Internet (18.87%)
  • Cryptography (16.35%)

What were the highlights of his more recent work (between 2017-2021)?

  • Computer security (49.69%)
  • The Internet (18.87%)
  • Authentication (11.95%)

In recent papers he was focusing on the following fields of study:

Paul C. van Oorschot focuses on Computer security, The Internet, Authentication, Identity and Focus. Encryption, Cryptography, Access control, Public key infrastructure and Exploit are among the areas of Computer security where Paul C. van Oorschot concentrates his study. Cryptography and Onboarding are two areas of study in which Paul C. van Oorschot engages in interdisciplinary work.

His studies in The Internet integrate themes in fields like Interaction design, Multimedia, Geolocation and Subject. His Authentication research is multidisciplinary, incorporating elements of Web service, Login, Password, Information retrieval and Internet privacy. His research in Identity focuses on subjects like Password management, which are connected to Taxonomy, World Wide Web and Data science.

Between 2017 and 2021, his most popular works were:

  • Comparative Analysis of Control Plane Security of SDN and Conventional Networks (21 citations)
  • Key Management Techniques (14 citations)
  • Computer Security and the Internet: Tools and Jewels (5 citations)

In his most recent research, the most cited papers focused on:

  • The Internet
  • Operating system
  • Computer network

His primary areas of study are Computer security, The Internet, Key management, Network security and Exploit. His Computer security study frequently links to related topics such as Host. His The Internet research includes themes of Information privacy, Protocol, Focus and Cyber-physical system.

The concepts of his Key management study are interwoven with issues in Wireless, Domain, Baseline and Process management. His Network security study necessitates a more in-depth grasp of Computer network. His Exploit study combines topics from a wide range of disciplines, such as Ethernet, Network monitoring, Curve25519, Software and Firmware.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Handbook of Applied Cryptography

Alfred J. Menezes;Scott A. Vanstone;Paul C. Van Oorschot.
(1996)

19840 Citations

Authentication and authenticated key exchanges

Whitfield Diffie;Paul C. Van Oorschot;Michael J. Wiener.
Designs, Codes and Cryptography (1992)

1634 Citations

Parallel Collision Search with Cryptanalytic Applications

Paul C. Oorschot;Michael J. Wiener.
Journal of Cryptology (1999)

814 Citations

A methodology for empirical analysis of permission-based security models and its application to android

David Barrera;H. Güneş Kayacik;Paul C. van Oorschot;Anil Somayaji.
computer and communications security (2010)

709 Citations

White-Box Cryptography and an AES Implementation

Stanley Chow;Philip A. Eisen;Harold Johnson;Paul C. van Oorschot.
selected areas in cryptography (2002)

555 Citations

White-Box Cryptography and an AES Implementation

Stanley Chow;Philip Eisen;Harold Johnson;Paul C. Van Oorschot.
selected areas in cryptography (2002)

511 Citations

A White-Box DES Implementation for DRM Applications

Stanley Chow;Philip A. Eisen;Harold Johnson;Paul C. van Oorschot.
digital rights management (2002)

424 Citations

A white-box DES implementation for DRM applications

Stanley Chow;Phil Eisen;Harold Johnson;Paul C. Van Oorschot.
computer and communications security (2003)

421 Citations

MDx-MAC and Building Fast MACs from Hash Functions

Bart Prenel;Paul C. van Oorschot.
international cryptology conference (1995)

374 Citations

Computer network security system and method having unilateral enforceable security policy provision

Michael Brownlie;Stephen Hillier;Paul C. Van Oorschot.
(2000)

303 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Paul C. van Oorschot

Bart Preneel

Bart Preneel

KU Leuven

Publications: 126

Christof Paar

Christof Paar

Max Planck Institute for Security and Privacy

Publications: 68

Chris Mitchell

Chris Mitchell

Royal Holloway University of London

Publications: 58

Igor E. Shparlinski

Igor E. Shparlinski

University of New South Wales

Publications: 57

Gene Tsudik

Gene Tsudik

University of California, Irvine

Publications: 53

Ingrid Verbauwhede

Ingrid Verbauwhede

KU Leuven

Publications: 51

Alfred Menezes

Alfred Menezes

University of Waterloo

Publications: 49

Dan Boneh

Dan Boneh

Stanford University

Publications: 43

Colin Boyd

Colin Boyd

Norwegian University of Science and Technology

Publications: 40

Dongho Won

Dongho Won

Sungkyunkwan University

Publications: 39

Gilbert Neiger

Gilbert Neiger

Intel (United States)

Publications: 39

Paul C. van Oorschot

Paul C. van Oorschot

Carleton University

Publications: 36

Ed Dawson

Ed Dawson

Queensland University of Technology

Publications: 36

Lejla Batina

Lejla Batina

Radboud University Nijmegen

Publications: 33

Hugo Krawczyk

Hugo Krawczyk

Algorand Foundation

Publications: 33

Ramarathnam Venkatesan

Ramarathnam Venkatesan

Microsoft (United States)

Publications: 32

Trending Scientists

Ramesh Sharda

Ramesh Sharda

Oklahoma State University

Simon Donaldson

Simon Donaldson

Imperial College London

Kenneth I. Joy

Kenneth I. Joy

University of California, Davis

Gregory Shakhnarovich

Gregory Shakhnarovich

Toyota Technological Institute at Chicago

Dieter Rehder

Dieter Rehder

Universität Hamburg

Jean F. Normant

Jean F. Normant

Centre national de la recherche scientifique, CNRS

Loïc J. Blum

Loïc J. Blum

Claude Bernard University Lyon 1

Emanuele Albano

Emanuele Albano

University of Eastern Piedmont Amadeo Avogadro

Luis F. Parada

Luis F. Parada

Memorial Sloan Kettering Cancer Center

Elizabeth A. Canuel

Elizabeth A. Canuel

Virginia Institute of Marine Science

Frenk Peeters

Frenk Peeters

Maastricht University

Joseph M. Currier

Joseph M. Currier

University of South Alabama

Graham J. Hitch

Graham J. Hitch

University of York

Andreas Hochhaus

Andreas Hochhaus

Friedrich Schiller University Jena

David Amiel

David Amiel

University of California, San Diego

Raghunathan Srianand

Raghunathan Srianand

Revista de Chimie SRL

Something went wrong. Please try again later.