Peter Gutmann
New Zealand computer scientist
Peter Gutmann 's AcademicInfluence.com Rankings
Download Badge
Computer Science
Peter Gutmann 's Degrees
- PhD Computer Science University of Auckland
- Bachelors Computer Science University of Auckland
Similar Degrees You Can Earn
Why Is Peter Gutmann Influential?
(Suggest an Edit or Addition)According to Wikipedia, Peter Claus Gutmann is a computer scientist in the Department of Computer Science at the University of Auckland, Auckland, New Zealand. He has a Ph.D. in computer science from the University of Auckland. His Ph.D. thesis and a book based on the thesis were about a cryptographic security architecture. He is interested in computer security issues, including security architecture, security usability , and hardware security; he has discovered several flaws in publicly released cryptosystems and protocolss. He is the developer of the cryptlib open source software security library and contributed to PGP version 2. In 1994 he developed the Secure FileSystem . He is also known for his analysis of data deletion on electronic memory media, magnetic and otherwise, and devised the Gutmann method for erasing data from a hard drive more or less securely. Having lived in New Zealand for some time, he has written on such subjects as weta , and the Auckland power crisis of 1998, during which the electrical power system failed completely in the central city for five weeks, which he has blogged about. He has also written on his career as an "arms courier" for New Zealand, detailing the difficulties faced in complying with customs control regulations with respect to cryptographic products, which were once classed as "munitions" by various jurisdictions including the United States.
Peter Gutmann 's Published Works
Published Works
- Secure deletion of data from magnetic and solid-state memory (1996) (480)
- PKI: It's Not Dead, Just Resting (2002) (232)
- Data Remanence in Semiconductor Devices (2001) (204)
- Software Generation of Practically Strong Random Numbers (1998) (74)
- Security Usability (2005) (73)
- Plug-and-Play PKI: A PKI Your Mother Can Use (2003) (68)
- Lessons Learned in Implementing and Deploying Crypto Software (2002) (48)
- An Open-Source Cryptographic Coprocessor (2000) (45)
- What Is Cryptography (2006) (42)
- Encrypt-then-MAC for Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) (2014) (32)
- Randomness in Cryptography (2006) (30)
- The Design of a Cryptographic Security Architecture (1999) (30)
- Cryptographic Security Architecture: Design and Verification (2003) (27)
- Everything you Never Wanted to Know about PKI but were Forced to Find Out (2002) (20)
- Compressed Data Content Type for Cryptographic Message Syntax (CMS) (2002) (18)
- Simplifying public key management (2004) (17)
- When Hashes Collide (2005) (17)
- A hybrid approach to text compression (1994) (14)
- Internet X.509 Public Key Infrastructure Operational Protocols: Certificate Store Access via HTTP (2006) (13)
- Do Users Verify SSH Keys? (2011) (12)
- The design and verification of a cryptographic security architecture (2000) (11)
- A reliable, scalable general-purpose certificate store (2000) (11)
- Use of Shared Keys in the TLS Protocol (2003) (9)
- PKI design for the real world (2006) (9)
- Government, Cryptography, and the Right to Privacy (1996) (8)
- Testing Issues with OS-based Entropy Sources (2004) (8)
- Key Management through Key Continuity (KCM) (2008) (7)
- Simple Certificate Enrolment Protocol (2020) (7)
- The Curse of Cryptographic Numerology (2011) (7)
- Password-based Encryption for CMS (2001) (7)
- Encrypt-then-MAC for TLS and DTLS (2013) (6)
- Performance Characteristics of Application-level Security Protocols (5)
- Cryptographic Security Architecture (2004) (5)
- Fuzzing Code with AFL (2016) (4)
- Using Message Authentication Code (MAC) Encryption in the Cryptographic Message Syntax (CMS) (2012) (2)
- Applying problem-structuring methods to problems in computer security (2011) (2)
- A Flexible Authentication Framework for the Transport Layer Security (TLS) Protocol using the Extensible Authentication Protocol (EAP) (2011) (1)
- Secure Internet-based Electronic Commerce : The View from Outside the US Peter Gutmann (1998) (1)
- Securing E-passports with Elliptic Curves (2011) (0)
- BOOK REVIEWS (2000) (0)
- Description of the Blowfish Cipher (1999) (0)
- Bugs in the wetware: the psychology of computer insecurity (2014) (0)
- Real-time Certificate Status Facility for OCSP - (RTCS) (2003) (0)
- s ide Channel a ttacks on Cryptographic s oftware (2009) (0)
- Side-ChannelAttackson CryptographicSoftware (2009) (0)
- PKI : It ’ s Not Dead , Just Resting Peter Gutmann (2004) (0)
- TLS 1.2 Update for Long-term Support (2019) (0)
- Why do people discard scientific rigor in favor of someone's opinion? (2015) (0)
- e-Passportt hreats (2007) (0)
- ElGamal Profile for X.509 Certificates (1997) (0)
- From revenue assurance to assurance: the importance of measurementin computer security (2012) (0)
- Standardised ECC Cipher Suites for TLS (2014) (0)
- An Open-source Cryptographic Coprocessor Peter Gutmann (2000) (0)
- Special-Purpose in Cryptanalysis (2007) (0)
- XTS:AModeofAES forEncryptingHardDisks (2010) (0)
- Opportunitiesin White-BoxCryptography (2010) (0)
- PKI as Part of an Integrated Risk Management Strategy for Web Security (2011) (0)
- 1 PKI Technology Survey and Blueprint (2003) (0)
- Pki: It's Not Dead, Just Resting Pki's Evolution (2001) (0)
- t hev irtuesofm ature andm inimalistCryptography (2008) (0)
- Room at the Bottom (2011) (0)
- An IBE-based Signcryption Scheme for Group Key Management (2016) (0)
- Code Testing through Fault Injection (2014) (0)
This paper list is powered by the following services:
Other Resources About Peter Gutmann
What Schools Are Affiliated With Peter Gutmann ?
Peter Gutmann is affiliated with the following schools: