BibTeX records: Kenneth G. Paterson

download as .bib file

@article{DBLP:journals/ieeesp/BackendalHP24,
  author       = {Matilda Backendal and
                  Miro Haller and
                  Kenny Paterson},
  title        = {End-to-End Encrypted Cloud Storage},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {22},
  number       = {2},
  pages        = {69--74},
  year         = {2024},
  url          = {https://doi.org/10.1109/MSEC.2024.3352788},
  doi          = {10.1109/MSEC.2024.3352788},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BackendalHP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/CamilleriMPG24,
  author       = {Patrick Camilleri and
                  Shahram Mossayebi and
                  Kenneth G. Paterson and
                  Charles Grover},
  title        = {Using Gate Tunneling in Bulk {CMOS} to Create a {PUF}},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {2},
  pages        = {2070--2081},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3291872},
  doi          = {10.1109/JIOT.2023.3291872},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/CamilleriMPG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/GuiPPW24,
  author       = {Zichen Gui and
                  Kenneth G. Paterson and
                  Sikhar Patranabis and
                  Bogdan Warinschi},
  title        = {SWiSSSE: System-Wide Security for Searchable Symmetric Encryption},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2024},
  number       = {1},
  pages        = {549--581},
  year         = {2024},
  url          = {https://doi.org/10.56553/popets-2024-0032},
  doi          = {10.56553/POPETS-2024-0032},
  timestamp    = {Wed, 29 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/popets/GuiPPW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuykxP24,
  author       = {Atul Luykx and
                  Kenneth G. Paterson},
  title        = {Limits on Authenticated Encryption Use in {TLS}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {51},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/051},
  timestamp    = {Fri, 16 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LuykxP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/OttPM23,
  author       = {David Ott and
                  Kenny Paterson and
                  Dennis Moreau},
  title        = {Where Is the Research on Cryptographic Transition and Agility?},
  journal      = {Commun. {ACM}},
  volume       = {66},
  number       = {4},
  pages        = {29--32},
  year         = {2023},
  url          = {https://doi.org/10.1145/3567825},
  doi          = {10.1145/3567825},
  timestamp    = {Fri, 14 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cacm/OttPM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/ArxP23,
  author       = {Theo von Arx and
                  Kenneth G. Paterson},
  editor       = {Joseph K. Liu and
                  Yang Xiang and
                  Surya Nepal and
                  Gene Tsudik},
  title        = {On the Cryptographic Fragility of the Telegram Ecosystem},
  booktitle    = {Proceedings of the 2023 {ACM} Asia Conference on Computer and Communications
                  Security, {ASIA} {CCS} 2023, Melbourne, VIC, Australia, July 10-14,
                  2023},
  pages        = {328--341},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3579856.3582811},
  doi          = {10.1145/3579856.3582811},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/ArxP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AlbrechtHMP23,
  author       = {Martin R. Albrecht and
                  Miro Haller and
                  Lenka Marekov{\'{a}} and
                  Kenneth G. Paterson},
  editor       = {Carmit Hazay and
                  Martijn Stam},
  title        = {Caveat Implementor! Key Recovery Attacks on {MEGA}},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Lyon, France, April 23-27, 2023, Proceedings, Part {V}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14008},
  pages        = {190--218},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-30589-4\_7},
  doi          = {10.1007/978-3-031-30589-4\_7},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/AlbrechtHMP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BackendalHP23,
  author       = {Matilda Backendal and
                  Miro Haller and
                  Kenneth G. Paterson},
  title        = {{MEGA:} Malleable Encryption Goes Awry},
  booktitle    = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco,
                  CA, USA, May 21-25, 2023},
  pages        = {146--163},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SP46215.2023.10179290},
  doi          = {10.1109/SP46215.2023.10179290},
  timestamp    = {Thu, 27 Jul 2023 08:17:10 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/BackendalHP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/GuiPP23,
  author       = {Zichen Gui and
                  Kenneth G. Paterson and
                  Sikhar Patranabis},
  title        = {Rethinking Searchable Symmetric Encryption},
  booktitle    = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco,
                  CA, USA, May 21-25, 2023},
  pages        = {1401--1418},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SP46215.2023.10179460},
  doi          = {10.1109/SP46215.2023.10179460},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/GuiPP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/PatersonST23,
  author       = {Kenneth G. Paterson and
                  Matteo Scarlata and
                  Kien T. Truong},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {Three Lessons From Threema: Analysis of a Secure Messenger},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {1289--1306},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/paterson},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/PatersonST23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/TavernaP23,
  author       = {Massimiliano Taverna and
                  Kenneth G. Paterson},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {Snapping Snap Sync: Practical Attacks on Go Ethereum Synchronising
                  Nodes},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {3331--3348},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/taverna},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/TavernaP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/GuiPT23,
  author       = {Zichen Gui and
                  Kenneth G. Paterson and
                  Tianxin Tang},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {Security Analysis of MongoDB Queryable Encryption},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {7445--7462},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/gui},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/GuiPT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-09472,
  author       = {Semira Einsele and
                  Kenneth G. Paterson},
  title        = {Average Case Error Estimates of the Strong Lucas Test},
  journal      = {CoRR},
  volume       = {abs/2306.09472},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.09472},
  doi          = {10.48550/ARXIV.2306.09472},
  eprinttype    = {arXiv},
  eprint       = {2306.09472},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-09472.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DegabrieleGGP23,
  author       = {Jean Paul Degabriele and
                  J{\'{e}}r{\^{o}}me Govinden and
                  Felix G{\"{u}}nther and
                  Kenneth G. Paterson},
  title        = {The Security of ChaCha20-Poly1305 in the Multi-user Setting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {85},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/085},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DegabrieleGGP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtHMP23,
  author       = {Martin R. Albrecht and
                  Miro Haller and
                  Lenka Marekov{\'{a}} and
                  Kenneth G. Paterson},
  title        = {Caveat Implementor! Key Recovery Attacks on {MEGA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {329},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/329},
  timestamp    = {Fri, 31 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlbrechtHMP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtMPS23,
  author       = {Martin R. Albrecht and
                  Lenka Marekov{\'{a}} and
                  Kenneth G. Paterson and
                  Igors Stepanovs},
  title        = {Four Attacks and a Proof for Telegram},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {469},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/469},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlbrechtMPS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaleckasPA23,
  author       = {Robertas Maleckas and
                  Kenneth G. Paterson and
                  Martin R. Albrecht},
  title        = {Practically-exploitable Vulnerabilities in the Jitsi Video Conferencing
                  System},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1118},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1118},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaleckasPA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BackendalGP22,
  author       = {Matilda Backendal and
                  Felix G{\"{u}}nther and
                  Kenneth G. Paterson},
  editor       = {Shweta Agrawal and
                  Dongdai Lin},
  title        = {Puncturable Key Wrapping and Its Applications},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13792},
  pages        = {651--681},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22966-4\_22},
  doi          = {10.1007/978-3-031-22966-4\_22},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BackendalGP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BruseghiniHP22,
  author       = {Lara Bruseghini and
                  Daniel Huigens and
                  Kenneth G. Paterson},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {Victory by {KO:} Attacking OpenPGP Using Key Overwriting},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {411--423},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3559363},
  doi          = {10.1145/3548606.3559363},
  timestamp    = {Sat, 17 Dec 2022 01:15:29 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BruseghiniHP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FilicPUV22,
  author       = {Mia Filic and
                  Kenneth G. Paterson and
                  Anupama Unnikrishnan and
                  Fernando Virdia},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {Adversarial Correctness and Privacy for Probabilistic Data Structures},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {1037--1050},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3560621},
  doi          = {10.1145/3548606.3560621},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/FilicPUV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/FalzonP22,
  author       = {Francesca Falzon and
                  Kenneth G. Paterson},
  editor       = {Vijayalakshmi Atluri and
                  Roberto Di Pietro and
                  Christian Damsgaard Jensen and
                  Weizhi Meng},
  title        = {An Efficient Query Recovery Attack Against a Graph Encryption Scheme},
  booktitle    = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research
                  in Computer Security, Copenhagen, Denmark, September 26-30, 2022,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13554},
  pages        = {325--345},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17140-6\_16},
  doi          = {10.1007/978-3-031-17140-6\_16},
  timestamp    = {Tue, 27 Sep 2022 21:06:59 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/FalzonP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GrubbsMP22,
  author       = {Paul Grubbs and
                  Varun Maram and
                  Kenneth G. Paterson},
  editor       = {Orr Dunkelman and
                  Stefan Dziembowski},
  title        = {Anonymous, Robust Post-quantum Public Key Encryption},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13277},
  pages        = {402--432},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-07082-2\_15},
  doi          = {10.1007/978-3-031-07082-2\_15},
  timestamp    = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GrubbsMP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/PatersonR22,
  author       = {Kenneth G. Paterson and
                  Mathilde Raynal},
  title        = {HyperLogLog: Exponentially Bad in Adversarial Settings},
  booktitle    = {7th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2022, Genoa, Italy, June 6-10, 2022},
  pages        = {154--170},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/EuroSP53844.2022.00018},
  doi          = {10.1109/EUROSP53844.2022.00018},
  timestamp    = {Wed, 29 Jun 2022 16:03:24 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/PatersonR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/AlbrechtMPS22,
  author       = {Martin R. Albrecht and
                  Lenka Marekov{\'{a}} and
                  Kenneth G. Paterson and
                  Igors Stepanovs},
  title        = {Four Attacks and a Proof for Telegram},
  booktitle    = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco,
                  CA, USA, May 22-26, 2022},
  pages        = {87--106},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SP46214.2022.9833666},
  doi          = {10.1109/SP46214.2022.9833666},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/AlbrechtMPS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AlbrechtEP22,
  author       = {Martin R. Albrecht and
                  Raphael Eikenberg and
                  Kenneth G. Paterson},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {Breaking Bridgefy, again: Adopting libsignal is not enough},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {269--286},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/albrecht},
  timestamp    = {Tue, 18 Oct 2022 17:10:36 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/AlbrechtEP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2209-06955,
  author       = {Mia Filic and
                  Kenneth G. Paterson and
                  Anupama Unnikrishnan and
                  Fernando Virdia},
  title        = {Adversarial Correctness and Privacy for Probabilistic Data Structures},
  journal      = {CoRR},
  volume       = {abs/2209.06955},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2209.06955},
  doi          = {10.48550/ARXIV.2209.06955},
  eprinttype    = {arXiv},
  eprint       = {2209.06955},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2209-06955.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AviramDKPRY22,
  author       = {Nimrod Aviram and
                  Benjamin Dowling and
                  Ilan Komargodski and
                  Kenneth G. Paterson and
                  Eyal Ronen and
                  Eylon Yogev},
  title        = {Practical (Post-Quantum) Key Combiners from One-Wayness and Applications
                  to {TLS}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {65},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/065},
  timestamp    = {Fri, 18 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AviramDKPRY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArxP22,
  author       = {Theo von Arx and
                  Kenneth G. Paterson},
  title        = {On the Cryptographic Fragility of the Telegram Ecosystem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {595},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/595},
  timestamp    = {Mon, 20 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ArxP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FalzonP22,
  author       = {Francesca Falzon and
                  Kenneth G. Paterson},
  title        = {An Efficient Query Recovery Attack Against a Graph Encryption Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {838},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/838},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FalzonP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackendalHP22,
  author       = {Matilda Backendal and
                  Miro Haller and
                  Kenneth G. Paterson},
  title        = {{MEGA:} Malleable Encryption Goes Awry},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {959},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/959},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackendalHP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FilicPUV22,
  author       = {Mia Filic and
                  Kenneth G. Paterson and
                  Anupama Unnikrishnan and
                  Fernando Virdia},
  title        = {Adversarial Correctness and Privacy for Probabilistic Data Structures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1186},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1186},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FilicPUV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Backendal0P22,
  author       = {Matilda Backendal and
                  Felix G{\"{u}}nther and
                  Kenneth G. Paterson},
  title        = {Puncturable Key Wrapping and Its Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1209},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1209},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Backendal0P22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/LueksGVBSPT21,
  author       = {Wouter Lueks and
                  Seda F. G{\"{u}}rses and
                  Michael Veale and
                  Edouard Bugnion and
                  Marcel Salath{\'{e}} and
                  Kenneth G. Paterson and
                  Carmela Troncoso},
  title        = {CrowdNotifier: Decentralized Privacy-Preserving Presence Tracing},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2021},
  number       = {4},
  pages        = {350--368},
  year         = {2021},
  url          = {https://doi.org/10.2478/popets-2021-0074},
  doi          = {10.2478/POPETS-2021-0074},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/LueksGVBSPT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DegabrieleG0P21,
  author       = {Jean Paul Degabriele and
                  J{\'{e}}r{\^{o}}me Govinden and
                  Felix G{\"{u}}nther and
                  Kenneth G. Paterson},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Giovanni Vigna and
                  Elaine Shi},
  title        = {The Security of ChaCha20-Poly1305 in the Multi-User Setting},
  booktitle    = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},
  pages        = {1981--2003},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460120.3484814},
  doi          = {10.1145/3460120.3484814},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/DegabrieleG0P21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ctrsa/2021,
  editor       = {Kenneth G. Paterson},
  title        = {Topics in Cryptology - {CT-RSA} 2021 - Cryptographers' Track at the
                  {RSA} Conference 2021, Virtual Event, May 17-20, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12704},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75539-3},
  doi          = {10.1007/978-3-030-75539-3},
  isbn         = {978-3-030-75538-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrubbsMP21,
  author       = {Paul Grubbs and
                  Varun Maram and
                  Kenneth G. Paterson},
  title        = {Anonymous, Robust Post-Quantum Public Key Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {708},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/708},
  timestamp    = {Mon, 07 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrubbsMP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuiPP21,
  author       = {Zichen Gui and
                  Kenneth G. Paterson and
                  Sikhar Patranabis},
  title        = {Leakage Perturbation is Not Enough: Breaking Structured Encryption
                  Using Simulated Annealing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {879},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/879},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuiPP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatersonR21,
  author       = {Kenneth G. Paterson and
                  Mathilde Raynal},
  title        = {HyperLogLog: Exponentially Bad in Adversarial Settings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1139},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1139},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatersonR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/debu/TroncosoPHSLLSP20,
  author       = {Carmela Troncoso and
                  Mathias Payer and
                  Jean{-}Pierre Hubaux and
                  Marcel Salath{\'{e}} and
                  James R. Larus and
                  Wouter Lueks and
                  Theresa Stadler and
                  Apostolos Pyrgelis and
                  Daniele Antonioli and
                  Ludovic Barman and
                  Sylvain Chatel and
                  Kenneth G. Paterson and
                  Srdjan Capkun and
                  David A. Basin and
                  Jan Beutel and
                  Dennis Jackson and
                  Marc Roeschlin and
                  Patrick Leu and
                  Bart Preneel and
                  Nigel P. Smart and
                  Aysajan Abidin and
                  Seda Gurses and
                  Michael Veale and
                  Cas Cremers and
                  Michael Backes and
                  Nils Ole Tippenhauer and
                  Reuben Binns and
                  Ciro Cattuto and
                  Alain Barrat and
                  Dario Fiore and
                  Manuel Barbosa and
                  Rui Oliveira and
                  Jos{\'{e}} Pereira},
  title        = {Decentralized Privacy-Preserving Proximity Tracing},
  journal      = {{IEEE} Data Eng. Bull.},
  volume       = {43},
  number       = {2},
  pages        = {36--66},
  year         = {2020},
  url          = {http://sites.computer.org/debull/A20june/p36.pdf},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/debu/TroncosoPHSLLSP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/AlbrechtFHHLP20,
  author       = {Martin R. Albrecht and
                  Pooya Farshim and
                  Shuai Han and
                  Dennis Hofheinz and
                  Enrique Larraia and
                  Kenneth G. Paterson},
  title        = {Multilinear Maps from Obfuscation},
  journal      = {J. Cryptol.},
  volume       = {33},
  number       = {3},
  pages        = {1080--1113},
  year         = {2020},
  url          = {https://doi.org/10.1007/s00145-019-09340-0},
  doi          = {10.1007/S00145-019-09340-0},
  timestamp    = {Wed, 25 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/AlbrechtFHHLP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MassimoP20,
  author       = {Jake Massimo and
                  Kenneth G. Paterson},
  editor       = {Jay Ligatti and
                  Xinming Ou and
                  Jonathan Katz and
                  Giovanni Vigna},
  title        = {A Performant, Misuse-Resistant {API} for Primality Testing},
  booktitle    = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, USA, November 9-13, 2020},
  pages        = {195--210},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372297.3417264},
  doi          = {10.1145/3372297.3417264},
  timestamp    = {Tue, 10 Nov 2020 19:56:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MassimoP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/DowlingHP20,
  author       = {Benjamin Dowling and
                  Torben Brandt Hansen and
                  Kenneth G. Paterson},
  editor       = {Jintai Ding and
                  Jean{-}Pierre Tillich},
  title        = {Many a Mickle Makes a Muckle: {A} Framework for Provably Quantum-Secure
                  Hybrid Key Exchange},
  booktitle    = {Post-Quantum Cryptography - 11th International Conference, PQCrypto
                  2020, Paris, France, April 15-17, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12100},
  pages        = {483--502},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-44223-1\_26},
  doi          = {10.1007/978-3-030-44223-1\_26},
  timestamp    = {Wed, 15 Apr 2020 17:34:50 +0200},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/DowlingHP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/LeuSRPC20,
  author       = {Patrick Leu and
                  Mridula Singh and
                  Marc Roeschlin and
                  Kenneth G. Paterson and
                  Srdjan Capkun},
  title        = {Message Time of Arrival Codes: {A} Fundamental Primitive for Secure
                  Distance Measurement},
  booktitle    = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco,
                  CA, USA, May 18-21, 2020},
  pages        = {500--516},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SP40000.2020.00010},
  doi          = {10.1109/SP40000.2020.00010},
  timestamp    = {Thu, 21 Sep 2023 15:57:24 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/LeuSRPC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/TramerBP20,
  author       = {Florian Tram{\`{e}}r and
                  Dan Boneh and
                  Kenny Paterson},
  editor       = {Srdjan Capkun and
                  Franziska Roesner},
  title        = {Remote Side-Channel Attacks on Anonymous Transactions},
  booktitle    = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14,
                  2020},
  pages        = {2739--2756},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/usenixsecurity20/presentation/tramer},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/TramerBP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacrypt/2019,
  editor       = {Kenneth G. Paterson and
                  Douglas Stebila},
  title        = {Selected Areas in Cryptography - {SAC} 2019 - 26th International Conference,
                  Waterloo, ON, Canada, August 12-16, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11959},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-38471-5},
  doi          = {10.1007/978-3-030-38471-5},
  isbn         = {978-3-030-38470-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-12273,
  author       = {Carmela Troncoso and
                  Mathias Payer and
                  Jean{-}Pierre Hubaux and
                  Marcel Salath{\'{e}} and
                  James R. Larus and
                  Edouard Bugnion and
                  Wouter Lueks and
                  Theresa Stadler and
                  Apostolos Pyrgelis and
                  Daniele Antonioli and
                  Ludovic Barman and
                  Sylvain Chatel and
                  Kenneth G. Paterson and
                  Srdjan Capkun and
                  David A. Basin and
                  Jan Beutel and
                  Dennis Jackson and
                  Marc Roeschlin and
                  Patrick Leu and
                  Bart Preneel and
                  Nigel P. Smart and
                  Aysajan Abidin and
                  Seda F. G{\"{u}}rses and
                  Michael Veale and
                  Cas Cremers and
                  Michael Backes and
                  Nils Ole Tippenhauer and
                  Reuben Binns and
                  Ciro Cattuto and
                  Alain Barrat and
                  Dario Fiore and
                  Manuel Barbosa and
                  Rui Oliveira and
                  Jos{\'{e}} Pereira},
  title        = {Decentralized Privacy-Preserving Proximity Tracing},
  journal      = {CoRR},
  volume       = {abs/2005.12273},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.12273},
  eprinttype    = {arXiv},
  eprint       = {2005.12273},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-12273.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MassimoP20,
  author       = {Jake Massimo and
                  Kenneth G. Paterson},
  title        = {A Performant, Misuse-Resistant {API} for Primality Testing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {65},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/065},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MassimoP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DowlingHP20,
  author       = {Benjamin Dowling and
                  Torben Brandt Hansen and
                  Kenneth G. Paterson},
  title        = {Many a Mickle Makes a Muckle: {A} Framework for Provably Quantum-Secure
                  Hybrid Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {99},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/099},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DowlingHP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TramerBP20,
  author       = {Florian Tram{\`{e}}r and
                  Dan Boneh and
                  Kenneth G. Paterson},
  title        = {Remote Side-Channel Attacks on Anonymous Transactions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {220},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/220},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TramerBP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuiPPW20,
  author       = {Zichen Gui and
                  Kenneth G. Paterson and
                  Sikhar Patranabis and
                  Bogdan Warinschi},
  title        = {SWiSSSE: System-Wide Security for Searchable Symmetric Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1328},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1328},
  timestamp    = {Fri, 30 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GuiPPW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/AlbrechtHP19,
  author       = {Martin R. Albrecht and
                  Torben Brandt Hansen and
                  Kenneth G. Paterson},
  title        = {libInterMAC: Beyond Confidentiality and Integrity in Practice},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {1},
  pages        = {46--83},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i1.46-83},
  doi          = {10.13154/TOSC.V2019.I1.46-83},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/AlbrechtHP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GalbraithMP19,
  author       = {Steven D. Galbraith and
                  Jake Massimo and
                  Kenneth G. Paterson},
  editor       = {Dongdai Lin and
                  Kazue Sako},
  title        = {Safety in Numbers: On the Need for Robust Diffie-Hellman Parameter
                  Validation},
  booktitle    = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Beijing, China,
                  April 14-17, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11443},
  pages        = {379--407},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17259-6\_13},
  doi          = {10.1007/978-3-030-17259-6\_13},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/GalbraithMP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/GrubbsLMP19,
  author       = {Paul Grubbs and
                  Marie{-}Sarah Lacharit{\'{e}} and
                  Brice Minaud and
                  Kenneth G. Paterson},
  title        = {Learning to Reconstruct: Statistical Learning Theory and Encrypted
                  Database Attacks},
  booktitle    = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco,
                  CA, USA, May 19-23, 2019},
  pages        = {1067--1083},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SP.2019.00030},
  doi          = {10.1109/SP.2019.00030},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/GrubbsLMP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1911-11052,
  author       = {Patrick Leu and
                  Mridula Singh and
                  Marc Roeschlin and
                  Kenneth G. Paterson and
                  Srdjan Capkun},
  title        = {Message Time of Arrival Codes: {A} Fundamental Primitive for Secure
                  Distance Measurement},
  journal      = {CoRR},
  volume       = {abs/1911.11052},
  year         = {2019},
  url          = {http://arxiv.org/abs/1911.11052},
  eprinttype    = {arXiv},
  eprint       = {1911.11052},
  timestamp    = {Tue, 03 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1911-11052.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1912-02520,
  author       = {Simon Bell and
                  Kenny Paterson and
                  Lorenzo Cavallaro},
  title        = {Catch Me (On Time) If You Can: Understanding the Effectiveness of
                  Twitter {URL} Blacklists},
  journal      = {CoRR},
  volume       = {abs/1912.02520},
  year         = {2019},
  url          = {http://arxiv.org/abs/1912.02520},
  eprinttype    = {arXiv},
  eprint       = {1912.02520},
  timestamp    = {Thu, 02 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1912-02520.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrubbsLMP19,
  author       = {Paul Grubbs and
                  Marie{-}Sarah Lacharit{\'{e}} and
                  Brice Minaud and
                  Kenneth G. Paterson},
  title        = {Learning to Reconstruct: Statistical Learning Theory and Encrypted
                  Database Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {11},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/011},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrubbsLMP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithMP19,
  author       = {Steven D. Galbraith and
                  Jake Massimo and
                  Kenneth G. Paterson},
  title        = {Safety in Numbers: On the Need for Robust Diffie-Hellman Parameter
                  Validation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {32},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/032},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithMP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtHP19,
  author       = {Martin R. Albrecht and
                  Torben Brandt Hansen and
                  Kenneth G. Paterson},
  title        = {libInterMAC: Beyond Confidentiality and Integrity in Practice},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {165},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/165},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlbrechtHP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeuSRPC19,
  author       = {Patrick Leu and
                  Mridula Singh and
                  Marc Roeschlin and
                  Kenneth G. Paterson and
                  Srdjan Capkun},
  title        = {Message Time of Arrival Codes: {A} Fundamental Primitive for Secure
                  Distance Measurement},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1350},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1350},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeuSRPC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/Paterson18,
  author       = {Kenny Paterson},
  title        = {Technical perspective: On heartbleed: a hard beginnyng makth a good
                  endyng},
  journal      = {Commun. {ACM}},
  volume       = {61},
  number       = {3},
  pages        = {108},
  year         = {2018},
  url          = {https://doi.org/10.1145/3176242},
  doi          = {10.1145/3176242},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/Paterson18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/PatersonS18,
  author       = {Kenneth G. Paterson and
                  Jacob C. N. Schuldt},
  title        = {Statistical attacks on cookie masking for {RC4}},
  journal      = {Cryptogr. Commun.},
  volume       = {10},
  number       = {5},
  pages        = {777--801},
  year         = {2018},
  url          = {https://doi.org/10.1007/s12095-018-0280-y},
  doi          = {10.1007/S12095-018-0280-Y},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/PatersonS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csm/ZhouLGSMPDCGRMK18,
  author       = {Xutao Zhou and
                  Diego R. L{\'{o}}pez and
                  Vijay K. Gurbani and
                  Jan Seedorf and
                  Alexey Melnikov and
                  Kenny Paterson and
                  Avri Doria and
                  Laurent Ciavaglia and
                  Lisandro Zambenedetti Granville and
                  Vincent Roca and
                  Marie{-}Jos{\'{e}} Montpetit and
                  Ari Ker{\"{a}}nen and
                  Carsten Bormann and
                  Marco Carugi and
                  Gyu Myoung Lee and
                  Okan Geray},
  title        = {Standards News},
  journal      = {{IEEE} Commun. Stand. Mag.},
  volume       = {2},
  number       = {1},
  pages        = {12--18},
  year         = {2018},
  url          = {https://doi.org/10.1109/MCOMSTD.2018.8334913},
  doi          = {10.1109/MCOMSTD.2018.8334913},
  timestamp    = {Tue, 27 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csm/ZhouLGSMPDCGRMK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BricoutMPM18,
  author       = {R{\'{e}}mi Bricout and
                  Sean Murphy and
                  Kenneth G. Paterson and
                  Thyla van der Merwe},
  title        = {Analysing and exploiting the Mantin biases in {RC4}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {4},
  pages        = {743--770},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0355-3},
  doi          = {10.1007/S10623-017-0355-3},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BricoutMPM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/AbdallaBPP18,
  author       = {Michel Abdalla and
                  Fabrice Benhamouda and
                  Alain Passel{\`{e}}gue and
                  Kenneth G. Paterson},
  title        = {Related-Key Security for Pseudorandom Functions Beyond the Linear
                  Barrier},
  journal      = {J. Cryptol.},
  volume       = {31},
  number       = {4},
  pages        = {917--964},
  year         = {2018},
  url          = {https://doi.org/10.1007/s00145-017-9274-8},
  doi          = {10.1007/S00145-017-9274-8},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/AbdallaBPP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/AlbrechtDP18,
  author       = {Martin R. Albrecht and
                  Amit Deo and
                  Kenneth G. Paterson},
  title        = {Cold Boot Attacks on Ring and Module {LWE} Keys Under the {NTT}},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2018},
  number       = {3},
  pages        = {173--213},
  year         = {2018},
  url          = {https://doi.org/10.13154/tches.v2018.i3.173-213},
  doi          = {10.13154/TCHES.V2018.I3.173-213},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/AlbrechtDP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/LachariteP18,
  author       = {Marie{-}Sarah Lacharit{\'{e}} and
                  Kenneth G. Paterson},
  title        = {Frequency-smoothing encryption: preventing snapshot attacks on deterministically
                  encrypted data},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {1},
  pages        = {277--313},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i1.277-313},
  doi          = {10.13154/TOSC.V2018.I1.277-313},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/LachariteP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/DowlingP18,
  author       = {Benjamin Dowling and
                  Kenneth G. Paterson},
  editor       = {Bart Preneel and
                  Frederik Vercauteren},
  title        = {A Cryptographic Analysis of the WireGuard Protocol},
  booktitle    = {Applied Cryptography and Network Security - 16th International Conference,
                  {ACNS} 2018, Leuven, Belgium, July 2-4, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10892},
  pages        = {3--21},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93387-0\_1},
  doi          = {10.1007/978-3-319-93387-0\_1},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/DowlingP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AlbrechtMPS18,
  author       = {Martin R. Albrecht and
                  Jake Massimo and
                  Kenneth G. Paterson and
                  Juraj Somorovsky},
  editor       = {David Lie and
                  Mohammad Mannan and
                  Michael Backes and
                  XiaoFeng Wang},
  title        = {Prime and Prejudice: Primality Testing Under Adversarial Conditions},
  booktitle    = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2018, Toronto, ON, Canada, October
                  15-19, 2018},
  pages        = {281--298},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3243734.3243787},
  doi          = {10.1145/3243734.3243787},
  timestamp    = {Tue, 10 Nov 2020 20:00:51 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AlbrechtMPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GrubbsLMP18,
  author       = {Paul Grubbs and
                  Marie{-}Sarah Lacharit{\'{e}} and
                  Brice Minaud and
                  Kenneth G. Paterson},
  editor       = {David Lie and
                  Mohammad Mannan and
                  Michael Backes and
                  XiaoFeng Wang},
  title        = {Pump up the Volume: Practical Database Reconstruction from Volume
                  Leakage on Range Queries},
  booktitle    = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2018, Toronto, ON, Canada, October
                  15-19, 2018},
  pages        = {315--331},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3243734.3243864},
  doi          = {10.1145/3243734.3243864},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GrubbsLMP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RonenPS18,
  author       = {Eyal Ronen and
                  Kenneth G. Paterson and
                  Adi Shamir},
  editor       = {David Lie and
                  Mohammad Mannan and
                  Michael Backes and
                  XiaoFeng Wang},
  title        = {Pseudo Constant Time Implementations of {TLS} Are Only Pseudo Secure},
  booktitle    = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2018, Toronto, ON, Canada, October
                  15-19, 2018},
  pages        = {1397--1414},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3243734.3243775},
  doi          = {10.1145/3243734.3243775},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/RonenPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/KotziasRAPVC18,
  author       = {Platon Kotzias and
                  Abbas Razaghpanah and
                  Johanna Amann and
                  Kenneth G. Paterson and
                  Narseo Vallina{-}Rodriguez and
                  Juan Caballero},
  title        = {Coming of Age: {A} Longitudinal Study of {TLS} Deployment},
  booktitle    = {Proceedings of the Internet Measurement Conference 2018, {IMC} 2018,
                  Boston, MA, USA, October 31 - November 02, 2018},
  pages        = {415--428},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://dl.acm.org/citation.cfm?id=3278568},
  timestamp    = {Fri, 25 Oct 2019 09:51:49 +0200},
  biburl       = {https://dblp.org/rec/conf/imc/KotziasRAPVC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/LachariteMP18,
  author       = {Marie{-}Sarah Lacharit{\'{e}} and
                  Brice Minaud and
                  Kenneth G. Paterson},
  title        = {Improved Reconstruction Attacks on Encrypted Data Using Range Query
                  Leakage},
  booktitle    = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings,
                  21-23 May 2018, San Francisco, California, {USA}},
  pages        = {297--314},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SP.2018.00002},
  doi          = {10.1109/SP.2018.00002},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/LachariteMP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DowlingP18,
  author       = {Benjamin Dowling and
                  Kenneth G. Paterson},
  title        = {A Cryptographic Analysis of the WireGuard Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {80},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/080},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DowlingP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatersonS18,
  author       = {Kenneth G. Paterson and
                  Jacob C. N. Schuldt},
  title        = {Statistical Attacks on Cookie Masking for {RC4}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {93},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/093},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatersonS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtDP18,
  author       = {Martin R. Albrecht and
                  Amit Deo and
                  Kenneth G. Paterson},
  title        = {Cold Boot Attacks on Ring and Module {LWE} Keys Under the {NTT}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {672},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/672},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlbrechtDP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RonenPS18,
  author       = {Eyal Ronen and
                  Kenneth G. Paterson and
                  Adi Shamir},
  title        = {Pseudo Constant Time Implementations of {TLS} Are Only Pseudo Secure},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {747},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/747},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RonenPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtMPS18,
  author       = {Martin R. Albrecht and
                  Jake Massimo and
                  Kenneth G. Paterson and
                  Juraj Somorovsky},
  title        = {Prime and Prejudice: Primality Testing Under Adversarial Conditions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {749},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/749},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlbrechtMPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrubbsLMP18,
  author       = {Paul Grubbs and
                  Marie{-}Sarah Lacharit{\'{e}} and
                  Brice Minaud and
                  Kenny Paterson},
  title        = {Pump up the Volume: Practical Database Reconstruction from Volume
                  Leakage on Range Queries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {965},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/965},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrubbsLMP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BoydCFPPS17,
  author       = {Colin Boyd and
                  Cas Cremers and
                  Mich{\`{e}}le Feltz and
                  Kenneth G. Paterson and
                  Bertram Poettering and
                  Douglas Stebila},
  title        = {{ASICS:} authenticated key exchange security incorporating certification
                  systems},
  journal      = {Int. J. Inf. Sec.},
  volume       = {16},
  number       = {2},
  pages        = {151--171},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10207-015-0312-y},
  doi          = {10.1007/S10207-015-0312-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/BoydCFPPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/LuykxMP17,
  author       = {Atul Luykx and
                  Bart Mennink and
                  Kenneth G. Paterson},
  editor       = {Tsuyoshi Takagi and
                  Thomas Peyrin},
  title        = {Analyzing Multi-key Security Degradation},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Hong Kong, China, December 3-7, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10625},
  pages        = {575--605},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70697-9\_20},
  doi          = {10.1007/978-3-319-70697-9\_20},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/LuykxMP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/EverspaughPRS17,
  author       = {Adam Everspaugh and
                  Kenneth G. Paterson and
                  Thomas Ristenpart and
                  Samuel Scott},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Key Rotation for Authenticated Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10403},
  pages        = {98--129},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63697-9\_4},
  doi          = {10.1007/978-3-319-63697-9\_4},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/EverspaughPRS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AlbrechtOPPS17,
  author       = {Martin R. Albrecht and
                  Emmanuela Orsini and
                  Kenneth G. Paterson and
                  Guy Peer and
                  Nigel P. Smart},
  editor       = {Simon N. Foley and
                  Dieter Gollmann and
                  Einar Snekkenes},
  title        = {Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts},
  booktitle    = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research
                  in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10492},
  pages        = {29--46},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66402-6\_4},
  doi          = {10.1007/978-3-319-66402-6\_4},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/AlbrechtOPPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/PatersonV17,
  author       = {Kenneth G. Paterson and
                  Ricardo Villanueva{-}Polanco},
  editor       = {Arpita Patra and
                  Nigel P. Smart},
  title        = {Cold Boot Attacks on {NTRU}},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2017 - 18th International Conference
                  on Cryptology in India, Chennai, India, December 10-13, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10698},
  pages        = {107--125},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-71667-1\_6},
  doi          = {10.1007/978-3-319-71667-1\_6},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/PatersonV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtOPPS17,
  author       = {Martin R. Albrecht and
                  Emmanuela Orsini and
                  Kenneth G. Paterson and
                  Guy Peer and
                  Nigel P. Smart},
  title        = {Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {354},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/354},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlbrechtOPPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuykxMP17,
  author       = {Atul Luykx and
                  Bart Mennink and
                  Kenneth G. Paterson},
  title        = {Analyzing Multi-Key Security Degradation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {435},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/435},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuykxMP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EverspaughPRS17,
  author       = {Adam Everspaugh and
                  Kenneth G. Paterson and
                  Thomas Ristenpart and
                  Samuel Scott},
  title        = {Key Rotation for Authenticated Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {527},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/527},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EverspaughPRS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LachariteMP17,
  author       = {Marie{-}Sarah Lacharit{\'{e}} and
                  Brice Minaud and
                  Kenneth G. Paterson},
  title        = {Improved Reconstruction Attacks on Encrypted Data Using Range Query
                  Leakage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {701},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/701},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LachariteMP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LachariteP17,
  author       = {Marie{-}Sarah Lacharit{\'{e}} and
                  Kenneth G. Paterson},
  title        = {Frequency-smoothing encryption: preventing snapshot attacks on deterministically
                  encrypted data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1068},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1068},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LachariteP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FischlinGMP17,
  author       = {Marc Fischlin and
                  Felix G{\"{u}}nther and
                  Giorgia Azzurra Marson and
                  Kenneth G. Paterson},
  title        = {Data Is a Stream: Security of Stream-Based Channels},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1191},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1191},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FischlinGMP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BonehPS16,
  author       = {Dan Boneh and
                  Kenny Paterson and
                  Nigel P. Smart},
  title        = {Building a Community of Real-World Cryptographers},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {14},
  number       = {6},
  pages        = {7--9},
  year         = {2016},
  url          = {https://doi.org/10.1109/MSP.2016.127},
  doi          = {10.1109/MSP.2016.127},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BonehPS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/DegabrieleFFGGM16,
  author       = {Jean Paul Degabriele and
                  Victoria Fehr and
                  Marc Fischlin and
                  Tommaso Gagliardoni and
                  Felix G{\"{u}}nther and
                  Giorgia Azzurra Marson and
                  Arno Mittelbach and
                  Kenneth G. Paterson},
  title        = {Unpicking {PLAID:} a cryptographic analysis of an ISO-standards-track
                  authentication protocol},
  journal      = {Int. J. Inf. Sec.},
  volume       = {15},
  number       = {6},
  pages        = {637--657},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10207-015-0309-6},
  doi          = {10.1007/S10207-015-0309-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/DegabrieleFFGGM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AlbrechtDHP16,
  author       = {Martin R. Albrecht and
                  Jean Paul Degabriele and
                  Torben Brandt Hansen and
                  Kenneth G. Paterson},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {A Surfeit of {SSH} Cipher Suites},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {1480--1491},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2978364},
  doi          = {10.1145/2976749.2978364},
  timestamp    = {Tue, 10 Nov 2020 20:00:49 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AlbrechtDHP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DegabrielePSW16,
  author       = {Jean Paul Degabriele and
                  Kenneth G. Paterson and
                  Jacob C. N. Schuldt and
                  Joanne Woodage},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Backdoors in Pseudorandom Number Generators: Possibility and Impossibility
                  Results},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9814},
  pages        = {403--432},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53018-4\_15},
  doi          = {10.1007/978-3-662-53018-4\_15},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DegabrielePSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AlbrechtP16,
  author       = {Martin R. Albrecht and
                  Kenneth G. Paterson},
  editor       = {Marc Fischlin and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Lucky Microseconds: {A} Timing Attack on Amazon's s2n Implementation
                  of {TLS}},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9665},
  pages        = {622--643},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49890-3\_24},
  doi          = {10.1007/978-3-662-49890-3\_24},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/AlbrechtP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/PatersonM16,
  author       = {Kenneth G. Paterson and
                  Thyla van der Merwe},
  editor       = {Lidong Chen and
                  David A. McGrew and
                  Chris J. Mitchell},
  title        = {Reactive and Proactive Standardisation of {TLS}},
  booktitle    = {Security Standardisation Research - Third International Conference,
                  {SSR} 2016, Gaithersburg, MD, USA, December 5-6, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10074},
  pages        = {160--186},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49100-4\_7},
  doi          = {10.1007/978-3-319-49100-4\_7},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/PatersonM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/AlbrechtFHLP16,
  author       = {Martin R. Albrecht and
                  Pooya Farshim and
                  Dennis Hofheinz and
                  Enrique Larraia and
                  Kenneth G. Paterson},
  editor       = {Eyal Kushilevitz and
                  Tal Malkin},
  title        = {Multilinear Maps from Obfuscation},
  booktitle    = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A,
                  Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9562},
  pages        = {446--473},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49096-9\_19},
  doi          = {10.1007/978-3-662-49096-9\_19},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/AlbrechtFHLP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BricoutMPM16,
  author       = {R{\'{e}}mi Bricout and
                  Sean Murphy and
                  Kenneth G. Paterson and
                  Thyla van der Merwe},
  title        = {Analysing and Exploiting the Mantin Biases in {RC4}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {63},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/063},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BricoutMPM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DegabrielePSW16,
  author       = {Jean Paul Degabriele and
                  Kenneth G. Paterson and
                  Jacob C. N. Schuldt and
                  Joanne Woodage},
  title        = {Backdoors in Pseudorandom Number Generators: Possibility and Impossibility
                  Results},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {577},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/577},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DegabrielePSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PatersonS15,
  author       = {Kenneth G. Paterson and
                  Mario Strefler},
  editor       = {Feng Bao and
                  Steven Miller and
                  Jianying Zhou and
                  Gail{-}Joon Ahn},
  title        = {A Practical Attack Against the Use of {RC4} in the {HIVE} Hidden Volume
                  Encryption System},
  booktitle    = {Proceedings of the 10th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17,
                  2015},
  pages        = {475--482},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2714576.2714596},
  doi          = {10.1145/2714576.2714596},
  timestamp    = {Thu, 20 Oct 2022 10:45:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/PatersonS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FischlinGMP15,
  author       = {Marc Fischlin and
                  Felix G{\"{u}}nther and
                  Giorgia Azzurra Marson and
                  Kenneth G. Paterson},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Data Is a Stream: Security of Stream-Based Channels},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  pages        = {545--564},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7\_27},
  doi          = {10.1007/978-3-662-48000-7\_27},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/FischlinGMP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/PatersonSSW15,
  author       = {Kenneth G. Paterson and
                  Jacob C. N. Schuldt and
                  Dale L. Sibborn and
                  Hoeteck Wee},
  editor       = {Jens Groth},
  title        = {Security Against Related Randomness Attacks via Reconstructive Extractors},
  booktitle    = {Cryptography and Coding - 15th {IMA} International Conference, {IMACC}
                  2015, Oxford, UK, December 15-17, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9496},
  pages        = {23--40},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27239-9\_2},
  doi          = {10.1007/978-3-319-27239-9\_2},
  timestamp    = {Wed, 18 Mar 2020 16:00:58 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/PatersonSSW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LiuP15,
  author       = {Shengli Liu and
                  Kenneth G. Paterson},
  editor       = {Jonathan Katz},
  title        = {Simulation-Based Selective Opening {CCA} Security for {PKE} from Key
                  Encapsulation Mechanisms},
  booktitle    = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
                  USA, March 30 - April 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9020},
  pages        = {3--26},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46447-2\_1},
  doi          = {10.1007/978-3-662-46447-2\_1},
  timestamp    = {Sun, 26 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/LiuP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/GarmanPM15,
  author       = {Christina Garman and
                  Kenneth G. Paterson and
                  Thyla van der Merwe},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {Attacks Only Get Better: Password Recovery Attacks Against {RC4} in
                  {TLS}},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {113--128},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/garman},
  timestamp    = {Mon, 01 Feb 2021 08:42:57 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/GarmanPM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuP15,
  author       = {Shengli Liu and
                  Kenneth G. Paterson},
  title        = {Simulation-based Selective Opening {CCA} Security for {PKE} from Key
                  Encapsulation Mechanisms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {10},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/010},
  timestamp    = {Sun, 26 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoldyrevaDPS15,
  author       = {Alexandra Boldyreva and
                  Jean Paul Degabriele and
                  Kenneth G. Paterson and
                  Martijn Stam},
  title        = {Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {59},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/059},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoldyrevaDPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtFHLP15,
  author       = {Martin R. Albrecht and
                  Pooya Farshim and
                  Dennis Hofheinz and
                  Enrique Larraia and
                  Kenneth G. Paterson},
  title        = {Multilinear Maps from Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {780},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/780},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlbrechtFHLP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatersonSSW15,
  author       = {Kenneth G. Paterson and
                  Jacob C. N. Schuldt and
                  Dale L. Sibborn and
                  Hoeteck Wee},
  title        = {Security Against Related Randomness Attacks via Reconstructive Extractors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {892},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/892},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatersonSSW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtP15,
  author       = {Martin R. Albrecht and
                  Kenneth G. Paterson},
  title        = {Lucky Microseconds: {A} Timing Attack on Amazon's s2n Implementation
                  of {TLS}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1129},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1129},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlbrechtP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LachariteP15,
  author       = {Marie{-}Sarah Lacharit{\'{e}} and
                  Kenneth G. Paterson},
  title        = {A note on the optimality of frequency analysis vs. {\(\mathscr{l}\)}\({}_{\mbox{p}}\)-optimization},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1158},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1158},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LachariteP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/PatersonPS14,
  author       = {Kenneth G. Paterson and
                  Bertram Poettering and
                  Jacob C. N. Schuldt},
  editor       = {Palash Sarkar and
                  Tetsu Iwata},
  title        = {Big Bias Hunting in Amazonia: Large-Scale Computation and Exploitation
                  of {RC4} Biases (Invited Paper)},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8873},
  pages        = {398--419},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45611-8\_21},
  doi          = {10.1007/978-3-662-45611-8\_21},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/PatersonPS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BellarePR14,
  author       = {Mihir Bellare and
                  Kenneth G. Paterson and
                  Phillip Rogaway},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Security of Symmetric Encryption against Mass Surveillance},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8616},
  pages        = {1--19},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44371-2\_1},
  doi          = {10.1007/978-3-662-44371-2\_1},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BellarePR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AbdallaBPP14,
  author       = {Michel Abdalla and
                  Fabrice Benhamouda and
                  Alain Passel{\`{e}}gue and
                  Kenneth G. Paterson},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Related-Key Security for Pseudorandom Functions Beyond the Linear
                  Barrier},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8616},
  pages        = {77--94},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44371-2\_5},
  doi          = {10.1007/978-3-662-44371-2\_5},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/AbdallaBPP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/PatersonPS14,
  author       = {Kenneth G. Paterson and
                  Bertram Poettering and
                  Jacob C. N. Schuldt},
  editor       = {Carlos Cid and
                  Christian Rechberger},
  title        = {Plaintext Recovery Attacks Against {WPA/TKIP}},
  booktitle    = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
                  London, UK, March 3-5, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8540},
  pages        = {325--349},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-46706-0\_17},
  doi          = {10.1007/978-3-662-46706-0\_17},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/PatersonPS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/PatersonSS14,
  author       = {Kenneth G. Paterson and
                  Jacob C. N. Schuldt and
                  Dale L. Sibborn},
  editor       = {Hugo Krawczyk},
  title        = {Related Randomness Attacks for Public Key Encryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {465--482},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_27},
  doi          = {10.1007/978-3-642-54631-0\_27},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/PatersonSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/DegabrieleFFGGM14,
  author       = {Jean Paul Degabriele and
                  Victoria Fehr and
                  Marc Fischlin and
                  Tommaso Gagliardoni and
                  Felix G{\"{u}}nther and
                  Giorgia Azzurra Marson and
                  Arno Mittelbach and
                  Kenneth G. Paterson},
  editor       = {Liqun Chen and
                  Chris J. Mitchell},
  title        = {Unpicking {PLAID} - {A} Cryptographic Analysis of an ISO-Standards-Track
                  Authentication Protocol},
  booktitle    = {Security Standardisation Research - First International Conference,
                  {SSR} 2014, London, UK, December 16-17, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8893},
  pages        = {1--25},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-14054-4\_1},
  doi          = {10.1007/978-3-319-14054-4\_1},
  timestamp    = {Sat, 09 Apr 2022 12:41:37 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/DegabrieleFFGGM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatersonSS14,
  author       = {Kenneth G. Paterson and
                  Jacob C. N. Schuldt and
                  Dale L. Sibborn},
  title        = {Related Randomness Attacks for Public Key Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {337},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/337},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatersonSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellarePR14,
  author       = {Mihir Bellare and
                  Kenneth G. Paterson and
                  Phillip Rogaway},
  title        = {Security of Symmetric Encryption against Mass Surveillance},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {438},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/438},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellarePR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaBPP14,
  author       = {Michel Abdalla and
                  Fabrice Benhamouda and
                  Alain Passel{\`{e}}gue and
                  Kenneth G. Paterson},
  title        = {Related-Key Security for Pseudorandom Functions Beyond the Linear
                  Barrier},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {488},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/488},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaBPP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DegabrieleFFGGMMP14,
  author       = {Jean Paul Degabriele and
                  Victoria Fehr and
                  Marc Fischlin and
                  Tommaso Gagliardoni and
                  Felix G{\"{u}}nther and
                  Giorgia Azzurra Marson and
                  Arno Mittelbach and
                  Kenneth G. Paterson},
  title        = {Unpicking {PLAID} - {A} Cryptographic Analysis of an ISO-standards-track
                  Authentication Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {728},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/728},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DegabrieleFFGGMMP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatersonS14a,
  author       = {Kenneth G. Paterson and
                  Mario Strefler},
  title        = {A Practical Attack Against the {HIVE} Hidden Volume Encryption System},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {901},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/901},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatersonS14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/CaparGPQTZ13,
  author       = {Cagatay Capar and
                  Dennis Goeckel and
                  Kenneth G. Paterson and
                  Elizabeth A. Quaglia and
                  Don Towsley and
                  Murtaza Zafer},
  title        = {Signal-flow-based analysis of wireless security protocols},
  journal      = {Inf. Comput.},
  volume       = {226},
  pages        = {37--56},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.ic.2013.03.004},
  doi          = {10.1016/J.IC.2013.03.004},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iandc/CaparGPQTZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KrawczykPW13,
  author       = {Hugo Krawczyk and
                  Kenneth G. Paterson and
                  Hoeteck Wee},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {On the Security of the {TLS} Protocol: {A} Systematic Analysis},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8042},
  pages        = {429--448},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40041-4\_24},
  doi          = {10.1007/978-3-642-40041-4\_24},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KrawczykPW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FreireHPS13,
  author       = {Eduarda S. V. Freire and
                  Dennis Hofheinz and
                  Kenneth G. Paterson and
                  Christoph Striecks},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Programmable Hash Functions in the Multilinear Setting},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8042},
  pages        = {513--530},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40041-4\_28},
  doi          = {10.1007/978-3-642-40041-4\_28},
  timestamp    = {Wed, 22 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/FreireHPS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/FreirePP13,
  author       = {Eduarda S. V. Freire and
                  Kenneth G. Paterson and
                  Bertram Poettering},
  editor       = {Ed Dawson},
  title        = {Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment
                  Schemes},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2013 - The Cryptographers' Track at
                  the {RSA} Conference 2013, San Francisco,CA, USA, February 25-March
                  1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7779},
  pages        = {101--114},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36095-4\_7},
  doi          = {10.1007/978-3-642-36095-4\_7},
  timestamp    = {Wed, 22 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/FreirePP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BoydCFPPS13,
  author       = {Colin Boyd and
                  Cas Cremers and
                  Mich{\`{e}}le Feltz and
                  Kenneth G. Paterson and
                  Bertram Poettering and
                  Douglas Stebila},
  editor       = {Jason Crampton and
                  Sushil Jajodia and
                  Keith Mayes},
  title        = {{ASICS:} Authenticated Key Exchange Security Incorporating Certification
                  Systems},
  booktitle    = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research
                  in Computer Security, Egham, UK, September 9-13, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8134},
  pages        = {381--399},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40203-6\_22},
  doi          = {10.1007/978-3-642-40203-6\_22},
  timestamp    = {Wed, 25 Sep 2019 18:03:15 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BoydCFPPS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BoldyrevaDPS13,
  author       = {Alexandra Boldyreva and
                  Jean Paul Degabriele and
                  Kenneth G. Paterson and
                  Martijn Stam},
  editor       = {Shiho Moriai},
  title        = {On Symmetric Encryption with Distinguishable Decryption Failures},
  booktitle    = {Fast Software Encryption - 20th International Workshop, {FSE} 2013,
                  Singapore, March 11-13, 2013. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8424},
  pages        = {367--390},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43933-3\_19},
  doi          = {10.1007/978-3-662-43933-3\_19},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BoldyrevaDPS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/JagerPS13,
  author       = {Tibor Jager and
                  Kenneth G. Paterson and
                  Juraj Somorovsky},
  title        = {One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art
                  Cryptography},
  booktitle    = {20th Annual Network and Distributed System Security Symposium, {NDSS}
                  2013, San Diego, California, USA, February 24-27, 2013},
  publisher    = {The Internet Society},
  year         = {2013},
  url          = {https://www.ndss-symposium.org/ndss2013/one-bad-apple-backwards-compatibility-attacks-state-art-cryptography},
  timestamp    = {Mon, 01 Feb 2021 08:42:13 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/JagerPS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FreireHKP13,
  author       = {Eduarda S. V. Freire and
                  Dennis Hofheinz and
                  Eike Kiltz and
                  Kenneth G. Paterson},
  editor       = {Kaoru Kurosawa and
                  Goichiro Hanaoka},
  title        = {Non-Interactive Key Exchange},
  booktitle    = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference
                  on Practice and Theory in Public-Key Cryptography, Nara, Japan, February
                  26 - March 1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7778},
  pages        = {254--271},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36362-7\_17},
  doi          = {10.1007/978-3-642-36362-7\_17},
  timestamp    = {Wed, 22 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/FreireHKP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FarshimLPQ13,
  author       = {Pooya Farshim and
                  Beno{\^{\i}}t Libert and
                  Kenneth G. Paterson and
                  Elizabeth A. Quaglia},
  editor       = {Kaoru Kurosawa and
                  Goichiro Hanaoka},
  title        = {Robust Encryption, Revisited},
  booktitle    = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference
                  on Practice and Theory in Public-Key Cryptography, Nara, Japan, February
                  26 - March 1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7778},
  pages        = {352--368},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36362-7\_22},
  doi          = {10.1007/978-3-642-36362-7\_22},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/FarshimLPQ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/AlFardanP13,
  author       = {Nadhem J. AlFardan and
                  Kenneth G. Paterson},
  title        = {Lucky Thirteen: Breaking the {TLS} and {DTLS} Record Protocols},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  pages        = {526--540},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SP.2013.42},
  doi          = {10.1109/SP.2013.42},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/AlFardanP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AlFardanBPPS13,
  author       = {Nadhem J. AlFardan and
                  Daniel J. Bernstein and
                  Kenneth G. Paterson and
                  Bertram Poettering and
                  Jacob C. N. Schuldt},
  editor       = {Samuel T. King},
  title        = {On the Security of {RC4} in {TLS}},
  booktitle    = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC,
                  USA, August 14-16, 2013},
  pages        = {305--320},
  publisher    = {{USENIX} Association},
  year         = {2013},
  url          = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/paper/alFardan},
  timestamp    = {Mon, 01 Feb 2021 08:42:56 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/AlFardanBPPS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KrawczykPW13,
  author       = {Hugo Krawczyk and
                  Kenneth G. Paterson and
                  Hoeteck Wee},
  title        = {On the Security of the {TLS} Protocol: {A} Systematic Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {339},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/339},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KrawczykPW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FreireHPS13,
  author       = {Eduarda S. V. Freire and
                  Dennis Hofheinz and
                  Kenneth G. Paterson and
                  Christoph Striecks},
  title        = {Programmable Hash Functions in the Multilinear Setting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {354},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/354},
  timestamp    = {Wed, 22 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FreireHPS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoydCFPPS13,
  author       = {Colin Boyd and
                  Cas Cremers and
                  Mich{\`{e}}le Feltz and
                  Kenneth G. Paterson and
                  Bertram Poettering and
                  Douglas Stebila},
  title        = {{ASICS:} Authenticated Key Exchange Security Incorporating Certification
                  Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {398},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/398},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoydCFPPS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoldyrevaDPS13,
  author       = {Alexandra Boldyreva and
                  Jean Paul Degabriele and
                  Kenneth G. Paterson and
                  Martijn Stam},
  title        = {On Symmetric Encryption with Distinguishable Decryption Failures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {433},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/433},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoldyrevaDPS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatersonPS13,
  author       = {Kenneth G. Paterson and
                  Bertram Poettering and
                  Jacob C. N. Schuldt},
  title        = {Plaintext Recovery Attacks Against {WPA/TKIP}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {748},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/748},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatersonPS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BellarePT12,
  author       = {Mihir Bellare and
                  Kenneth G. Paterson and
                  Susan Thomson},
  editor       = {Xiaoyun Wang and
                  Kazue Sako},
  title        = {{RKA} Security beyond the Linear Barrier: IBE, Encryption and Signatures},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Beijing, China, December 2-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7658},
  pages        = {331--348},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34961-4\_21},
  doi          = {10.1007/978-3-642-34961-4\_21},
  timestamp    = {Mon, 25 Nov 2019 15:32:14 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BellarePT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/PatersonPS12,
  author       = {Kenneth G. Paterson and
                  Antigoni Polychroniadou and
                  Dale L. Sibborn},
  editor       = {Xiaoyun Wang and
                  Kazue Sako},
  title        = {A Coding-Theoretic Approach to Recovering Noisy {RSA} Keys},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Beijing, China, December 2-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7658},
  pages        = {386--403},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34961-4\_24},
  doi          = {10.1007/978-3-642-34961-4\_24},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/PatersonPS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/PatersonW12,
  author       = {Kenneth G. Paterson and
                  Gaven J. Watson},
  editor       = {David Naccache},
  title        = {Authenticated-Encryption with Padding: {A} Formal Security Treatment},
  booktitle    = {Cryptography and Security: From Theory to Applications - Essays Dedicated
                  to Jean-Jacques Quisquater on the Occasion of His 65th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {6805},
  pages        = {83--107},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28368-0\_9},
  doi          = {10.1007/978-3-642-28368-0\_9},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/PatersonW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/DegabrieleLPSS12,
  author       = {Jean Paul Degabriele and
                  Anja Lehmann and
                  Kenneth G. Paterson and
                  Nigel P. Smart and
                  Mario Strefler},
  editor       = {Orr Dunkelman},
  title        = {On the Joint Security of Encryption and Signature in {EMV}},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2012 - The Cryptographers' Track at
                  the {RSA} Conference 2012, San Francisco, CA, USA, February 27 - March
                  2, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7178},
  pages        = {116--135},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-27954-6\_8},
  doi          = {10.1007/978-3-642-27954-6\_8},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/DegabrieleLPSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BoldyrevaDPS12,
  author       = {Alexandra Boldyreva and
                  Jean Paul Degabriele and
                  Kenneth G. Paterson and
                  Martijn Stam},
  editor       = {David Pointcheval and
                  Thomas Johansson},
  title        = {Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Cambridge, UK, April 15-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7237},
  pages        = {682--699},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29011-4\_40},
  doi          = {10.1007/978-3-642-29011-4\_40},
  timestamp    = {Sun, 12 Nov 2023 02:15:08 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BoldyrevaDPS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/PatersonA12,
  author       = {Kenneth G. Paterson and
                  Nadhem J. AlFardan},
  title        = {Plaintext-Recovery Attacks Against Datagram {TLS}},
  booktitle    = {19th Annual Network and Distributed System Security Symposium, {NDSS}
                  2012, San Diego, California, USA, February 5-8, 2012},
  publisher    = {The Internet Society},
  year         = {2012},
  url          = {https://www.ndss-symposium.org/ndss2012/plain-text-recovery-attacks-against-datagram-tls},
  timestamp    = {Mon, 01 Feb 2021 08:42:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/PatersonA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LibertPQ12,
  author       = {Beno{\^{\i}}t Libert and
                  Kenneth G. Paterson and
                  Elizabeth A. Quaglia},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions
                  in the Standard Model},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {206--224},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_13},
  doi          = {10.1007/978-3-642-30057-8\_13},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LibertPQ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellarePT12,
  author       = {Mihir Bellare and
                  Kenneth G. Paterson and
                  Susan Thomson},
  title        = {{RKA} Security beyond the Linear Barrier: IBE, Encryption and Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {514},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/514},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellarePT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FreirePP12,
  author       = {Eduarda S. V. Freire and
                  Kenneth G. Paterson and
                  Bertram Poettering},
  title        = {Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment
                  Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {645},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/645},
  timestamp    = {Wed, 22 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FreirePP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FarshimLPQ12,
  author       = {Pooya Farshim and
                  Beno{\^{\i}}t Libert and
                  Kenneth G. Paterson and
                  Elizabeth A. Quaglia},
  title        = {Robust Encryption, Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {673},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/673},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FarshimLPQ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatersonPS12,
  author       = {Kenneth G. Paterson and
                  Antigoni Polychroniadou and
                  Dale L. Sibborn},
  title        = {A Coding-Theoretic Approach to Recovering Noisy {RSA} Keys},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {724},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/724},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatersonPS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FreireHKP12,
  author       = {Eduarda S. V. Freire and
                  Dennis Hofheinz and
                  Eike Kiltz and
                  Kenneth G. Paterson},
  title        = {Non-Interactive Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {732},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/732},
  timestamp    = {Wed, 22 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FreireHKP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/DegabrielePW11,
  author       = {Jean Paul Degabriele and
                  Kenneth G. Paterson and
                  Gaven J. Watson},
  title        = {Provable Security in the Real World},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {9},
  number       = {3},
  pages        = {33--41},
  year         = {2011},
  url          = {https://doi.org/10.1109/MSP.2010.200},
  doi          = {10.1109/MSP.2010.200},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/DegabrielePW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/LimP11,
  author       = {Hoon Wei Lim and
                  Kenneth G. Paterson},
  title        = {Identity-based cryptography for grid security},
  journal      = {Int. J. Inf. Sec.},
  volume       = {10},
  number       = {1},
  pages        = {15--32},
  year         = {2011},
  url          = {https://doi.org/10.1007/s10207-010-0116-z},
  doi          = {10.1007/S10207-010-0116-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/LimP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/CramptonLPP11,
  author       = {Jason Crampton and
                  Hoon Wei Lim and
                  Kenneth G. Paterson and
                  Geraint Price},
  title        = {User-friendly and certificate-free grid security infrastructure},
  journal      = {Int. J. Inf. Sec.},
  volume       = {10},
  number       = {3},
  pages        = {137--153},
  year         = {2011},
  url          = {https://doi.org/10.1007/s10207-011-0123-8},
  doi          = {10.1007/S10207-011-0123-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/CramptonLPP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/FreireP11,
  author       = {Eduarda S. V. Freire and
                  Kenneth G. Paterson},
  editor       = {Udaya Parampalli and
                  Philip Hawkes},
  title        = {Provably Secure Key Assignment Schemes from Factoring},
  booktitle    = {Information Security and Privacy - 16th Australasian Conference, {ACISP}
                  2011, Melbourne, Australia, July 11-13, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6812},
  pages        = {292--309},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22497-3\_19},
  doi          = {10.1007/978-3-642-22497-3\_19},
  timestamp    = {Wed, 22 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/FreireP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/PatersonSST11,
  author       = {Kenneth G. Paterson and
                  Jacob C. N. Schuldt and
                  Martijn Stam and
                  Susan Thomson},
  editor       = {Dong Hoon Lee and
                  Xiaoyun Wang},
  title        = {On the Joint Security of Encryption and Signature, Revisited},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Seoul, South Korea, December 4-8, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7073},
  pages        = {161--178},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25385-0\_9},
  doi          = {10.1007/978-3-642-25385-0\_9},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/PatersonSST11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/PatersonRS11,
  author       = {Kenneth G. Paterson and
                  Thomas Ristenpart and
                  Thomas Shrimpton},
  editor       = {Dong Hoon Lee and
                  Xiaoyun Wang},
  title        = {Tag Size Does Matter: Attacks and Proofs for the {TLS} Record Protocol},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Seoul, South Korea, December 4-8, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7073},
  pages        = {372--389},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25385-0\_20},
  doi          = {10.1007/978-3-642-25385-0\_20},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/PatersonRS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/AlbrechtFPW11,
  author       = {Martin R. Albrecht and
                  Pooya Farshim and
                  Kenneth G. Paterson and
                  Gaven J. Watson},
  editor       = {Antoine Joux},
  title        = {On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model},
  booktitle    = {Fast Software Encryption - 18th International Workshop, {FSE} 2011,
                  Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6733},
  pages        = {128--145},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21702-9\_8},
  doi          = {10.1007/978-3-642-21702-9\_8},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/AlbrechtFPW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/AlbrechtP11,
  author       = {Martin R. Albrecht and
                  Kenneth G. Paterson},
  editor       = {Liqun Chen},
  title        = {Breaking an Identity-Based Encryption Scheme Based on {DHIES}},
  booktitle    = {Cryptography and Coding - 13th {IMA} International Conference, {IMACC}
                  2011, Oxford, UK, December 12-15, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7089},
  pages        = {344--355},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25516-8\_21},
  doi          = {10.1007/978-3-642-25516-8\_21},
  timestamp    = {Wed, 18 Mar 2020 16:00:56 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/AlbrechtP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2011,
  editor       = {Kenneth G. Paterson},
  title        = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tallinn, Estonia, May 15-19, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6632},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20465-4},
  doi          = {10.1007/978-3-642-20465-4},
  isbn         = {978-3-642-20464-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtFPW11,
  author       = {Martin R. Albrecht and
                  Pooya Farshim and
                  Kenneth G. Paterson and
                  Gaven J. Watson},
  title        = {On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {213},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/213},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlbrechtFPW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LibertPQ11,
  author       = {Beno{\^{\i}}t Libert and
                  Kenneth G. Paterson and
                  Elizabeth A. Quaglia},
  title        = {Anonymous Broadcast Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {476},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/476},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LibertPQ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatersonSST11,
  author       = {Kenneth G. Paterson and
                  Jacob C. N. Schuldt and
                  Martijn Stam and
                  Susan Thomson},
  title        = {On the Joint Security of Encryption and Signature, Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {486},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/486},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatersonSST11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DegabrieleLPSS11,
  author       = {Jean Paul Degabriele and
                  Anja Lehmann and
                  Kenneth G. Paterson and
                  Nigel P. Smart and
                  Mario Strefler},
  title        = {On the Joint Security of Encryption and Signature in {EMV}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {615},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/615},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DegabrieleLPSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/BalfeYP10,
  author       = {Shane Balfe and
                  Po{-}Wah Yau and
                  Kenneth G. Paterson},
  title        = {A guide to trust in mobile ad hoc networks},
  journal      = {Secur. Commun. Networks},
  volume       = {3},
  number       = {6},
  pages        = {503--516},
  year         = {2010},
  url          = {https://doi.org/10.1002/sec.147},
  doi          = {10.1002/SEC.147},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/BalfeYP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/BalfeMPP10,
  author       = {Shane Balfe and
                  Andrew D. McDonald and
                  Kenneth G. Paterson and
                  Helen Phillips},
  title        = {Identity crisis: on the problem of namespace design for {ID-PKC} and
                  MANETs},
  journal      = {Secur. Commun. Networks},
  volume       = {3},
  number       = {6},
  pages        = {535--545},
  year         = {2010},
  url          = {https://doi.org/10.1002/sec.145},
  doi          = {10.1002/SEC.145},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/BalfeMPP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PatersonS10,
  author       = {Kenneth G. Paterson and
                  Douglas Stebila},
  editor       = {Ron Steinfeld and
                  Philip Hawkes},
  title        = {One-Time-Password-Authenticated Key Exchange},
  booktitle    = {Information Security and Privacy - 15th Australasian Conference, {ACISP}
                  2010, Sydney, Australia, July 5-7, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6168},
  pages        = {264--281},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14081-5\_17},
  doi          = {10.1007/978-3-642-14081-5\_17},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PatersonS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DegabrieleP10,
  author       = {Jean Paul Degabriele and
                  Kenneth G. Paterson},
  editor       = {Ehab Al{-}Shaer and
                  Angelos D. Keromytis and
                  Vitaly Shmatikov},
  title        = {On the (in)security of IPsec in MAC-then-encrypt configurations},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010},
  pages        = {493--504},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866307.1866363},
  doi          = {10.1145/1866307.1866363},
  timestamp    = {Tue, 10 Nov 2020 20:00:21 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DegabrieleP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/PatersonW10,
  author       = {Kenneth G. Paterson and
                  Gaven J. Watson},
  editor       = {Henri Gilbert},
  title        = {Plaintext-Dependent Decryption: {A} Formal Security Treatment of {SSH-CTR}},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Monaco / French Riviera, May 30 - June 3, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6110},
  pages        = {345--361},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13190-5\_18},
  doi          = {10.1007/978-3-642-13190-5\_18},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/PatersonW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/AlFardanP10,
  author       = {Nadhem J. AlFardan and
                  Kenneth G. Paterson},
  editor       = {Mike Burmester and
                  Gene Tsudik and
                  Spyros S. Magliveras and
                  Ivana Ilic},
  title        = {An Analysis of DepenDNS},
  booktitle    = {Information Security - 13th International Conference, {ISC} 2010,
                  Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6531},
  pages        = {31--38},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-18178-8\_4},
  doi          = {10.1007/978-3-642-18178-8\_4},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/AlFardanP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/PatersonQ10,
  author       = {Kenneth G. Paterson and
                  Elizabeth A. Quaglia},
  editor       = {Juan A. Garay and
                  Roberto De Prisco},
  title        = {Time-Specific Encryption},
  booktitle    = {Security and Cryptography for Networks, 7th International Conference,
                  {SCN} 2010, Amalfi, Italy, September 13-15, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6280},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15317-4\_1},
  doi          = {10.1007/978-3-642-15317-4\_1},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/PatersonQ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatersonW10,
  author       = {Kenneth G. Paterson and
                  Gaven J. Watson},
  title        = {Plaintext-Dependent Decryption: {A} Formal Security Treatment of {SSH-CTR}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {95},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/095},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatersonW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatersonQ10,
  author       = {Kenneth G. Paterson and
                  Elizabeth A. Quaglia},
  title        = {Time-Specific Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {347},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/347},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatersonQ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtP10,
  author       = {Martin R. Albrecht and
                  Kenneth G. Paterson},
  title        = {Breaking An Identity-Based Encryption Scheme based on {DHIES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {637},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/637},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlbrechtP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/PatersonS09,
  author       = {Kenneth G. Paterson and
                  Sriramkrishnan Srinivasan},
  title        = {On the relations between non-interactive key distribution, identity-based
                  encryption and trapdoor discrete log groups},
  journal      = {Des. Codes Cryptogr.},
  volume       = {52},
  number       = {2},
  pages        = {219--241},
  year         = {2009},
  url          = {https://doi.org/10.1007/s10623-009-9278-y},
  doi          = {10.1007/S10623-009-9278-Y},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/PatersonS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/BoydCNP09,
  author       = {Colin Boyd and
                  Yvonne Cliff and
                  Juan Manuel Gonz{\'{a}}lez Nieto and
                  Kenneth G. Paterson},
  title        = {One-round key exchange in the standard model},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {1},
  number       = {3},
  pages        = {181--199},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJACT.2009.023466},
  doi          = {10.1504/IJACT.2009.023466},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/BoydCNP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/EtzionKKLP09,
  author       = {Tuvi Etzion and
                  Nicholas Kalouptsidis and
                  Nicholas Kolokotronis and
                  Konstantinos Limniotis and
                  Kenneth G. Paterson},
  title        = {Properties of the error linear complexity spectrum},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {55},
  number       = {10},
  pages        = {4681--4686},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIT.2009.2027495},
  doi          = {10.1109/TIT.2009.2027495},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/EtzionKKLP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PatersonS09,
  author       = {Kenneth G. Paterson and
                  Sriramkrishnan Srinivasan},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Building Key-Private Public-Key Encryption Schemes},
  booktitle    = {Information Security and Privacy, 14th Australasian Conference, {ACISP}
                  2009, Brisbane, Australia, July 1-3, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5594},
  pages        = {276--292},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02620-1\_20},
  doi          = {10.1007/978-3-642-02620-1\_20},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PatersonS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/AlbrechtPW09,
  author       = {Martin R. Albrecht and
                  Kenneth G. Paterson and
                  Gaven J. Watson},
  title        = {Plaintext Recovery Attacks against {SSH}},
  booktitle    = {30th {IEEE} Symposium on Security and Privacy {(SP} 2009), 17-20 May
                  2009, Oakland, California, {USA}},
  pages        = {16--26},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SP.2009.5},
  doi          = {10.1109/SP.2009.5},
  timestamp    = {Thu, 21 Sep 2023 16:14:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/AlbrechtPW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dagstuhl/2009P9311,
  editor       = {Samuel L. Braunstein and
                  Hoi{-}Kwong Lo and
                  Kenny Paterson and
                  Peter Y. A. Ryan},
  title        = {Classical and Quantum Information Assurance Foundations and Practice,
                  26.07. - 31.07.2009},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {09311},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany},
  year         = {2009},
  url          = {http://drops.dagstuhl.de/portals/09311/},
  timestamp    = {Thu, 10 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/2009P9311.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/BraunsteinLPR09,
  author       = {Samuel L. Braunstein and
                  Hoi{-}Kwong Lo and
                  Kenny Paterson and
                  Peter Y. A. Ryan},
  editor       = {Samuel L. Braunstein and
                  Hoi{-}Kwong Lo and
                  Kenny Paterson and
                  Peter Y. A. Ryan},
  title        = {09311 Abstracts Collection - Classical and Quantum Information Assurance
                  Foundations and Practice},
  booktitle    = {Classical and Quantum Information Assurance Foundations and Practice,
                  26.07. - 31.07.2009},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {09311},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany},
  year         = {2009},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2010/2365/},
  timestamp    = {Thu, 10 Jun 2021 13:02:05 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/BraunsteinLPR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatersonS09,
  author       = {Kenneth G. Paterson and
                  Douglas Stebila},
  title        = {One-time-password-authenticated key exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {430},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/430},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatersonS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dam/GalbraithPS08,
  author       = {Steven D. Galbraith and
                  Kenneth G. Paterson and
                  Nigel P. Smart},
  title        = {Pairings for cryptographers},
  journal      = {Discret. Appl. Math.},
  volume       = {156},
  number       = {16},
  pages        = {3113--3121},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.dam.2007.12.010},
  doi          = {10.1016/J.DAM.2007.12.010},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dam/GalbraithPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BalfeGMP08,
  author       = {Shane Balfe and
                  Eimear Gallery and
                  Chris J. Mitchell and
                  Kenneth G. Paterson},
  title        = {Challenges for Trusted Computing},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {6},
  number       = {6},
  pages        = {60--66},
  year         = {2008},
  url          = {https://doi.org/10.1109/MSP.2008.138},
  doi          = {10.1109/MSP.2008.138},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BalfeGMP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BoydCNP08,
  author       = {Colin Boyd and
                  Yvonne Cliff and
                  Juan Manuel Gonz{\'{a}}lez Nieto and
                  Kenneth G. Paterson},
  editor       = {Yi Mu and
                  Willy Susilo and
                  Jennifer Seberry},
  title        = {Efficient One-Round Key Exchange in the Standard Model},
  booktitle    = {Information Security and Privacy, 13th Australasian Conference, {ACISP}
                  2008, Wollongong, Australia, July 7-9, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5107},
  pages        = {69--83},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70500-0\_6},
  doi          = {10.1007/978-3-540-70500-0\_6},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BoydCNP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BalfeP08,
  author       = {Shane Balfe and
                  Kenneth G. Paterson},
  editor       = {Shouhuai Xu and
                  Cristina Nita{-}Rotaru and
                  Jean{-}Pierre Seifert},
  title        = {e-EMV: emulating {EMV} for internet payments with trusted computing
                  technologies},
  booktitle    = {Proceedings of the 3rd {ACM} Workshop on Scalable Trusted Computing,
                  {STC} 2008, Alexandria, VA, USA, October 31, 2008},
  pages        = {81--92},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456455.1456468},
  doi          = {10.1145/1456455.1456468},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BalfeP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SrivatsaBPR08,
  author       = {Mudhakar Srivatsa and
                  Shane Balfe and
                  Kenneth G. Paterson and
                  Pankaj Rohatgi},
  editor       = {Peng Ning and
                  Paul F. Syverson and
                  Somesh Jha},
  title        = {Trust management for secure information flows},
  booktitle    = {Proceedings of the 2008 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2008, Alexandria, Virginia, USA, October 27-31, 2008},
  pages        = {175--188},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1455770.1455794},
  doi          = {10.1145/1455770.1455794},
  timestamp    = {Tue, 10 Nov 2020 19:59:27 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SrivatsaBPR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/BalfeP08,
  author       = {Shane Balfe and
                  Kenneth G. Paterson},
  editor       = {Gene Tsudik},
  title        = {Augmenting Internet-Based Card Not Present Transactions with Trusted
                  Computing (Extended Abstract)},
  booktitle    = {Financial Cryptography and Data Security, 12th International Conference,
                  {FC} 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5143},
  pages        = {171--175},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85230-8\_13},
  doi          = {10.1007/978-3-540-85230-8\_13},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/BalfeP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/EtzionKKLP08,
  author       = {Tuvi Etzion and
                  Nicholas Kalouptsidis and
                  Nicholas Kolokotronis and
                  Konstantinos Limniotis and
                  Kenneth G. Paterson},
  editor       = {Frank R. Kschischang and
                  En{-}Hui Yang},
  title        = {On the error linear complexity profiles of binary sequences of period
                  2\({}^{\mbox{n}}\)},
  booktitle    = {2008 {IEEE} International Symposium on Information Theory, {ISIT}
                  2008, Toronto, ON, Canada, July 6-11, 2008},
  pages        = {2400--2404},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISIT.2008.4595421},
  doi          = {10.1109/ISIT.2008.4595421},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isit/EtzionKKLP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pairing/PatersonS08,
  author       = {Kenneth G. Paterson and
                  Sriramkrishnan Srinivasan},
  editor       = {Steven D. Galbraith and
                  Kenneth G. Paterson},
  title        = {Security and Anonymity of Identity-Based Encryption with Multiple
                  Trusted Authorities},
  booktitle    = {Pairing-Based Cryptography - Pairing 2008, Second International Conference,
                  Egham, UK, September 1-3, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5209},
  pages        = {354--375},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85538-5\_23},
  doi          = {10.1007/978-3-540-85538-5\_23},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/pairing/PatersonS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/SchuldtMP08,
  author       = {Jacob C. N. Schuldt and
                  Kanta Matsuura and
                  Kenneth G. Paterson},
  editor       = {Ronald Cramer},
  title        = {Proxy Signatures Secure Against Proxy Key Exposure},
  booktitle    = {Public Key Cryptography - {PKC} 2008, 11th International Workshop
                  on Practice and Theory in Public-Key Cryptography, Barcelona, Spain,
                  March 9-12, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4939},
  pages        = {141--161},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78440-1\_9},
  doi          = {10.1007/978-3-540-78440-1\_9},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/SchuldtMP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DentLP08,
  author       = {Alexander W. Dent and
                  Beno{\^{\i}}t Libert and
                  Kenneth G. Paterson},
  editor       = {Ronald Cramer},
  title        = {Certificateless Encryption Schemes Strongly Secure in the Standard
                  Model},
  booktitle    = {Public Key Cryptography - {PKC} 2008, 11th International Workshop
                  on Practice and Theory in Public-Key Cryptography, Barcelona, Spain,
                  March 9-12, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4939},
  pages        = {344--359},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78440-1\_20},
  doi          = {10.1007/978-3-540-78440-1\_20},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DentLP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/PatersonW08,
  author       = {Kenneth G. Paterson and
                  Gaven J. Watson},
  editor       = {Rafail Ostrovsky and
                  Roberto De Prisco and
                  Ivan Visconti},
  title        = {Immunising {CBC} Mode Against Padding Oracle Attacks: {A} Formal Security
                  Treatment},
  booktitle    = {Security and Cryptography for Networks, 6th International Conference,
                  {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5229},
  pages        = {340--357},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85855-3\_23},
  doi          = {10.1007/978-3-540-85855-3\_23},
  timestamp    = {Tue, 25 Feb 2020 11:33:46 +0100},
  biburl       = {https://dblp.org/rec/conf/scn/PatersonW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pairing/2008,
  editor       = {Steven D. Galbraith and
                  Kenneth G. Paterson},
  title        = {Pairing-Based Cryptography - Pairing 2008, Second International Conference,
                  Egham, UK, September 1-3, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5209},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85538-5},
  doi          = {10.1007/978-3-540-85538-5},
  isbn         = {978-3-540-85503-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pairing/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoydCNP08,
  author       = {Colin Boyd and
                  Yvonne Cliff and
                  Juan Manuel Gonz{\'{a}}lez Nieto and
                  Kenneth G. Paterson},
  title        = {Efficient One-round Key Exchange in the Standard Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {7},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/007},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoydCNP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/LimP07,
  author       = {Hoon Wei Lim and
                  Kenneth G. Paterson},
  editor       = {Steven D. Galbraith},
  title        = {Multi-key Hierarchical Identity-Based Signatures},
  booktitle    = {Cryptography and Coding, 11th {IMA} International Conference, Cirencester,
                  UK, December 18-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4887},
  pages        = {384--402},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77272-9\_23},
  doi          = {10.1007/978-3-540-77272-9\_23},
  timestamp    = {Wed, 18 Mar 2020 16:00:59 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/LimP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/DegabrieleP07,
  author       = {Jean Paul Degabriele and
                  Kenneth G. Paterson},
  title        = {Attacking the IPsec Standards in Encryption-only Configurations},
  booktitle    = {2007 {IEEE} Symposium on Security and Privacy (S{\&}P 2007), 20-23
                  May 2007, Oakland, California, {USA}},
  pages        = {335--349},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/SP.2007.8},
  doi          = {10.1109/SP.2007.8},
  timestamp    = {Thu, 21 Sep 2023 15:57:31 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/DegabrieleP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sws/CramptonLP07,
  author       = {Jason Crampton and
                  Hoon Wei Lim and
                  Kenneth G. Paterson},
  editor       = {Peng Ning and
                  Ernesto Damiani and
                  Seth Proctor},
  title        = {What can identity-based cryptography offer to web services?},
  booktitle    = {Proceedings of the 4th {ACM} Workshop On Secure Web Services, {SWS}
                  2007, Fairfax, VA, USA, November 2, 2007},
  pages        = {26--36},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1314418.1314424},
  doi          = {10.1145/1314418.1314424},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sws/CramptonLP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DentLP07,
  author       = {Alexander W. Dent and
                  Beno{\^{\i}}t Libert and
                  Kenneth G. Paterson},
  title        = {Certificateless Encryption Schemes Strongly Secure in the Standard
                  Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {121},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/121},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DentLP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DegabrieleP07,
  author       = {Jean Paul Degabriele and
                  Kenneth G. Paterson},
  title        = {Attacking the IPsec Standards in Encryption-only Configurations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {125},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/125},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DegabrieleP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatersonS07,
  author       = {Kenneth G. Paterson and
                  Sriramkrishnan Srinivasan},
  title        = {On the Relations Between Non-Interactive Key Distribution, Identity-Based
                  Encryption and Trapdoor Discrete Log Groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {453},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/453},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatersonS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/PatersonY06,
  author       = {Kenneth G. Paterson and
                  Arnold K. L. Yau},
  title        = {Lost in translation: theory and practice in cryptography},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {4},
  number       = {3},
  pages        = {69--72},
  year         = {2006},
  url          = {https://doi.org/10.1109/MSP.2006.74},
  doi          = {10.1109/MSP.2006.74},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/PatersonY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Paterson06,
  author       = {Kenneth G. Paterson},
  title        = {A cryptographic tour of the IPsec standards},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {11},
  number       = {2},
  pages        = {72--81},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.istr.2006.03.004},
  doi          = {10.1016/J.ISTR.2006.03.004},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Paterson06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PatersonS06,
  author       = {Kenneth G. Paterson and
                  Jacob C. N. Schuldt},
  editor       = {Lynn Margaret Batten and
                  Reihaneh Safavi{-}Naini},
  title        = {Efficient Identity-Based Signatures Secure in the Standard Model},
  booktitle    = {Information Security and Privacy, 11th Australasian Conference, {ACISP}
                  2006, Melbourne, Australia, July 3-5, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4058},
  pages        = {207--222},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11780656\_18},
  doi          = {10.1007/11780656\_18},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PatersonS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/PatersonY06,
  author       = {Kenneth G. Paterson and
                  Arnold K. L. Yau},
  editor       = {Serge Vaudenay},
  title        = {Cryptography in Theory and Practice: The Case of Encryption in IPsec},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4004},
  pages        = {12--29},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11761679\_2},
  doi          = {10.1007/11761679\_2},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/PatersonY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/LimP06,
  author       = {Hoon Wei Lim and
                  Kenneth G. Paterson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Secret Public Key Protocols Revisited},
  booktitle    = {Security Protocols, 14th International Workshop, Cambridge, UK, March
                  27-29, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5087},
  pages        = {237--256},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-642-04904-0\_32},
  doi          = {10.1007/978-3-642-04904-0\_32},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/LimP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatersonS06,
  author       = {Kenneth G. Paterson and
                  Jacob C. N. Schuldt},
  title        = {Efficient Identity-based Signatures Secure in the Standard Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {80},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/080},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatersonS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Paterson06,
  author       = {Kenneth G. Paterson},
  title        = {A Cryptographic Tour of the IPsec Standards},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {97},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/097},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Paterson06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithPS06,
  author       = {Steven D. Galbraith and
                  Kenneth G. Paterson and
                  Nigel P. Smart},
  title        = {Pairings for Cryptographers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {165},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/165},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithPS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CaoPK06,
  author       = {Xuefei Cao and
                  Kenneth G. Paterson and
                  Weidong Kou},
  title        = {An Attack on a Certificateless Signature Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {367},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/367},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CaoPK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/EtzionP05,
  author       = {Tuvi Etzion and
                  Kenneth G. Paterson},
  title        = {Zero/Positive Capacities of Two-Dimensional Runlength-Constrained
                  Arrays},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {51},
  number       = {9},
  pages        = {3186--3199},
  year         = {2005},
  url          = {https://doi.org/10.1109/TIT.2005.853316},
  doi          = {10.1109/TIT.2005.853316},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/EtzionP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KudlaP05,
  author       = {Caroline Kudla and
                  Kenneth G. Paterson},
  editor       = {Bimal K. Roy},
  title        = {Modular Security Proofs for Key Agreement Protocols},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2005, 11th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Chennai, India, December 4-8, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3788},
  pages        = {549--565},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11593447\_30},
  doi          = {10.1007/11593447\_30},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/KudlaP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eScience/LimP05,
  author       = {Hoon Wei Lim and
                  Kenneth G. Paterson},
  title        = {Identity-Based Cryptography for Grid Security},
  booktitle    = {First International Conference on e-Science and Grid Technologies
                  (e-Science 2005), 5-8 December 2005, Melbourne, Australia},
  pages        = {395--404},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/E-SCIENCE.2005.52},
  doi          = {10.1109/E-SCIENCE.2005.52},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eScience/LimP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/YauPM05,
  author       = {Arnold K. L. Yau and
                  Kenneth G. Paterson and
                  Chris J. Mitchell},
  editor       = {Henri Gilbert and
                  Helena Handschuh},
  title        = {Padding Oracle Attacks on CBC-Mode Encryption with Secret and Random
                  IVs},
  booktitle    = {Fast Software Encryption: 12th International Workshop, {FSE} 2005,
                  Paris, France, February 21-23, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3557},
  pages        = {299--319},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11502760\_20},
  doi          = {10.1007/11502760\_20},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/YauPM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/KudlaP05,
  author       = {Caroline Kudla and
                  Kenneth G. Paterson},
  editor       = {Nigel P. Smart},
  title        = {Non-interactive Designated Verifier Proofs and Undeniable Signatures},
  booktitle    = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester,
                  UK, December 19-21, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3796},
  pages        = {136--154},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11586821\_10},
  doi          = {10.1007/11586821\_10},
  timestamp    = {Wed, 18 Mar 2020 16:00:57 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/KudlaP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/p2p/BalfeLP05,
  author       = {Shane Balfe and
                  Amit D. Lakhani and
                  Kenneth G. Paterson},
  editor       = {Germano Caronni and
                  Nathalie Weiler and
                  Marcel Waldvogel and
                  Nahid Shahmehri},
  title        = {Trusted Computing: Providing Security for Peer-to-Peer Networks},
  booktitle    = {Fifth {IEEE} International Conference on Peer-to-Peer Computing {(P2P}
                  2005), 31 August - 2 September 2005, Konstanz, Germany},
  pages        = {117--124},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/P2P.2005.40},
  doi          = {10.1109/P2P.2005.40},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/p2p/BalfeLP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Al-RiyamiP05,
  author       = {Sattam S. Al{-}Riyami and
                  Kenneth G. Paterson},
  editor       = {Serge Vaudenay},
  title        = {{CBE} from {CL-PKE:} {A} Generic Construction and Efficient Schemes},
  booktitle    = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on
                  Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland,
                  January 23-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3386},
  pages        = {398--415},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30580-4\_27},
  doi          = {10.1007/978-3-540-30580-4\_27},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Al-RiyamiP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatersonY05,
  author       = {Kenneth G. Paterson and
                  Arnold K. L. Yau},
  title        = {Cryptography in Theory and Practice: The Case of Encryption in IPsec},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {416},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/416},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatersonY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/Paterson04,
  author       = {Kenneth G. Paterson},
  title        = {On codes with low peak-to-average power ratio for multicode {CDMA}},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {50},
  number       = {3},
  pages        = {550--559},
  year         = {2004},
  url          = {https://doi.org/10.1109/TIT.2004.825505},
  doi          = {10.1109/TIT.2004.825505},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/Paterson04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BoydMP04,
  author       = {Colin Boyd and
                  Wenbo Mao and
                  Kenneth G. Paterson},
  editor       = {Markus Jakobsson and
                  Moti Yung and
                  Jianying Zhou},
  title        = {Key Agreement Using Statically Keyed Authenticators},
  booktitle    = {Applied Cryptography and Network Security, Second International Conference,
                  {ACNS} 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3089},
  pages        = {248--262},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24852-1\_18},
  doi          = {10.1007/978-3-540-24852-1\_18},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/BoydMP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/PatersonY04,
  author       = {Kenneth G. Paterson and
                  Arnold K. L. Yau},
  editor       = {Tatsuaki Okamoto},
  title        = {Padding Oracle Attacks on the {ISO} {CBC} Mode Encryption Standard},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2004, The Cryptographers' Track at
                  the {RSA} Conference 2004, San Francisco, CA, USA, February 23-27,
                  2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2964},
  pages        = {305--323},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24660-2\_24},
  doi          = {10.1007/978-3-540-24660-2\_24},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/PatersonY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/ChenKP04,
  author       = {Liqun Chen and
                  Caroline Kudla and
                  Kenneth G. Paterson},
  editor       = {Christian Cachin and
                  Jan Camenisch},
  title        = {Concurrent Signatures},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Interlaken,
                  Switzerland, May 2-6, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3027},
  pages        = {287--305},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24676-3\_18},
  doi          = {10.1007/978-3-540-24676-3\_18},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/ChenKP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BlackburnP04,
  author       = {Simon R. Blackburn and
                  Kenneth G. Paterson},
  editor       = {Bimal K. Roy and
                  Willi Meier},
  title        = {Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan},
  booktitle    = {Fast Software Encryption, 11th International Workshop, {FSE} 2004,
                  Delhi, India, February 5-7, 2004, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3017},
  pages        = {446--453},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25937-4\_28},
  doi          = {10.1007/978-3-540-25937-4\_28},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BlackburnP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/WunderP04,
  author       = {Gerhard Wunder and
                  Kenneth G. Paterson},
  title        = {Crest-factor analysis of carrier interferometry {MC-CDMA} and {OFDM}
                  systems},
  booktitle    = {Proceedings of the 2004 {IEEE} International Symposium on Information
                  Theory, {ISIT} 2004, Chicago Downtown Marriott, Chicago, Illinois,
                  USA, June 27 - July 2, 2004},
  pages        = {426},
  publisher    = {{IEEE}},
  year         = {2004},
  url          = {https://doi.org/10.1109/ISIT.2004.1365463},
  doi          = {10.1109/ISIT.2004.1365463},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/WunderP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatersonPS04,
  author       = {Kenneth G. Paterson and
                  Fred Piper and
                  R{\"{u}}diger Schack},
  title        = {Quantum cryptography: a practical information security perspective},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {156},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/156},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatersonPS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/PiperPP03,
  author       = {Fred Piper and
                  Geraint Price and
                  Kenny Paterson},
  title        = {Introduction},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {8},
  number       = {3},
  pages        = {5},
  year         = {2003},
  url          = {https://doi.org/10.1016/S1363-4127(03)00301-7},
  doi          = {10.1016/S1363-4127(03)00301-7},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/PiperPP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/PatersonP03,
  author       = {Kenneth G. Paterson and
                  Geraint Price},
  title        = {A comparison between traditional public key infrastructures and identity-based
                  cryptography},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {8},
  number       = {3},
  pages        = {57--72},
  year         = {2003},
  url          = {https://doi.org/10.1016/S1363-4127(03)00308-X},
  doi          = {10.1016/S1363-4127(03)00308-X},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/PatersonP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/LauderP03,
  author       = {Alan G. B. Lauder and
                  Kenneth G. Paterson},
  title        = {Computing the error linear complexity spectrum of a binary sequence
                  of period 2\({}^{\mbox{n}}\)},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {49},
  number       = {1},
  pages        = {273--280},
  year         = {2003},
  url          = {https://doi.org/10.1109/TIT.2002.806136},
  doi          = {10.1109/TIT.2002.806136},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/LauderP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Al-RiyamiP03,
  author       = {Sattam S. Al{-}Riyami and
                  Kenneth G. Paterson},
  editor       = {Chi{-}Sung Laih},
  title        = {Certificateless Public Key Cryptography},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2003, 9th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, November 30 - December 4, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2894},
  pages        = {452--473},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40061-5\_29},
  doi          = {10.1007/978-3-540-40061-5\_29},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Al-RiyamiP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/Al-RiyamiP03,
  author       = {Sattam S. Al{-}Riyami and
                  Kenneth G. Paterson},
  editor       = {Kenneth G. Paterson},
  title        = {Tripartite Authenticated Key Agreement Protocols from Pairings},
  booktitle    = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester,
                  UK, December 16-18, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2898},
  pages        = {332--359},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40974-8\_27},
  doi          = {10.1007/978-3-540-40974-8\_27},
  timestamp    = {Wed, 18 Mar 2020 16:01:02 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/Al-RiyamiP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BoydMP03,
  author       = {Colin Boyd and
                  Wenbo Mao and
                  Kenneth G. Paterson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Deniable Authenticated Key Establishment for Internet Protocols},
  booktitle    = {Security Protocols, 11th International Workshop, Cambridge, UK, April
                  2-4, 2003, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3364},
  pages        = {255--271},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/11542322\_31},
  doi          = {10.1007/11542322\_31},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BoydMP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ima/2003,
  editor       = {Kenneth G. Paterson},
  title        = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester,
                  UK, December 16-18, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2898},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/b93924},
  doi          = {10.1007/B93924},
  isbn         = {3-540-20663-9},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/2003.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Al-RiyamiP03,
  author       = {Sattam S. Al{-}Riyami and
                  Kenneth G. Paterson},
  title        = {Certificateless Public Key Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {126},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/126},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Al-RiyamiP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlackburnP03,
  author       = {Simon R. Blackburn and
                  Kenneth G. Paterson},
  title        = {Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {199},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/199},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlackburnP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/GalbraithMP02,
  author       = {Steven D. Galbraith and
                  Wenbo Mao and
                  Kenneth G. Paterson},
  editor       = {Bart Preneel},
  title        = {RSA-Based Undeniable Signatures for General Moduli},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2002, The Cryptographer's Track at
                  the {RSA} Conference, 2002, San Jose, CA, USA, February 18-22, 2002,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2271},
  pages        = {200--217},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45760-7\_14},
  doi          = {10.1007/3-540-45760-7\_14},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/GalbraithMP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Paterson02,
  author       = {Kenneth G. Paterson},
  title        = {ID-based Signatures from Pairings on Elliptic Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {4},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/004},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Paterson02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Al-RiyamiP02,
  author       = {Sattam S. Al{-}Riyami and
                  Kenneth G. Paterson},
  title        = {Tripartite Authenticated Key Agreement Protocols from Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {35},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/035},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Al-RiyamiP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/HiltgenP01,
  author       = {Alain P. Hiltgen and
                  Kenneth G. Paterson},
  title        = {Single-track circuit codes},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {47},
  number       = {6},
  pages        = {2587--2595},
  year         = {2001},
  url          = {https://doi.org/10.1109/18.945274},
  doi          = {10.1109/18.945274},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/HiltgenP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/seta/Paterson01,
  author       = {Kenneth G. Paterson},
  editor       = {Tor Helleseth and
                  P. Vijay Kumar and
                  Kyeongcheol Yang},
  title        = {Sequences for {OFDM} and Multi-Code {CDMA:} Two Problems in Algebraic
                  Coding Theory},
  booktitle    = {Sequences and their Applications - Proceedings of {SETA} 2001, Bergen,
                  Norway, May 13-17, 2001},
  series       = {Discrete Mathematics and Theoretical Computer Science},
  pages        = {46--71},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/978-1-4471-0673-9\_4},
  doi          = {10.1007/978-1-4471-0673-9\_4},
  timestamp    = {Tue, 25 Jun 2019 15:57:55 +0200},
  biburl       = {https://dblp.org/rec/conf/seta/Paterson01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcom/PatersonJ00,
  author       = {Kenneth G. Paterson and
                  Alan E. Jones},
  title        = {Efficient decoding algorithms for generalized Reed-Muller codes},
  journal      = {{IEEE} Trans. Commun.},
  volume       = {48},
  number       = {8},
  pages        = {1272--1285},
  year         = {2000},
  url          = {https://doi.org/10.1109/26.864165},
  doi          = {10.1109/26.864165},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcom/PatersonJ00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/Paterson00,
  author       = {Kenneth G. Paterson},
  title        = {Generalized Reed-Muller codes and power control in {OFDM} modulation},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {46},
  number       = {1},
  pages        = {104--120},
  year         = {2000},
  url          = {https://doi.org/10.1109/18.817512},
  doi          = {10.1109/18.817512},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/Paterson00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/PatersonT00,
  author       = {Kenneth G. Paterson and
                  Vahid Tarokh},
  title        = {On the existence and construction of good codes with low peak-to-average
                  power ratios},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {46},
  number       = {6},
  pages        = {1974--1987},
  year         = {2000},
  url          = {https://doi.org/10.1109/18.868473},
  doi          = {10.1109/18.868473},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/PatersonT00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Paterson99,
  author       = {Kenneth G. Paterson},
  editor       = {Lars R. Knudsen},
  title        = {Imprimitive Permutation Groups and Trapdoors in Iterated Block Ciphers},
  booktitle    = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome,
                  Italy, March 24-26, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1636},
  pages        = {201--214},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48519-8\_15},
  doi          = {10.1007/3-540-48519-8\_15},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Paterson99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/Paterson99,
  author       = {Kenneth G. Paterson},
  editor       = {Michael Walker},
  title        = {Applications of Exponential Sums in Communications Theory},
  booktitle    = {Cryptography and Coding, 7th {IMA} International Conference, Cirencester,
                  UK, December 20-22, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1746},
  pages        = {1--24},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-46665-7\_1},
  doi          = {10.1007/3-540-46665-7\_1},
  timestamp    = {Wed, 18 Mar 2020 16:00:59 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/Paterson99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Paterson98,
  author       = {Kenneth G. Paterson},
  title        = {Root Counting, the {DFT} and the Linear Complexity of Nonlinear Filtering},
  journal      = {Des. Codes Cryptogr.},
  volume       = {14},
  number       = {3},
  pages        = {247--259},
  year         = {1998},
  url          = {https://doi.org/10.1023/A:1008256920596},
  doi          = {10.1023/A:1008256920596},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Paterson98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamdm/MitchellP98,
  author       = {Chris J. Mitchell and
                  Kenneth G. Paterson},
  title        = {Perfect Factors from Cyclic Codes and Interleaving},
  journal      = {{SIAM} J. Discret. Math.},
  volume       = {11},
  number       = {2},
  pages        = {241--264},
  year         = {1998},
  url          = {https://doi.org/10.1137/S089548019630649X},
  doi          = {10.1137/S089548019630649X},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamdm/MitchellP98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/Paterson98,
  author       = {Kenneth G. Paterson},
  title        = {Binary Sequence Sets with Favorable Correlations from Difference Sets
                  and {MDS} Codes},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {44},
  number       = {1},
  pages        = {172--180},
  year         = {1998},
  url          = {https://doi.org/10.1109/18.651014},
  doi          = {10.1109/18.651014},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/Paterson98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/PatersonL98,
  author       = {Kenneth G. Paterson and
                  Paul J. G. Lothian},
  title        = {Bounds on Partial Correlations of Sequences},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {44},
  number       = {3},
  pages        = {1164--1175},
  year         = {1998},
  url          = {https://doi.org/10.1109/18.669265},
  doi          = {10.1109/18.669265},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/PatersonL98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/PatersonT98,
  author       = {Kenneth G. Paterson and
                  Jonathan Tuliani},
  title        = {Some New Circuit Codes},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {44},
  number       = {3},
  pages        = {1305--1309},
  year         = {1998},
  url          = {https://doi.org/10.1109/18.669420},
  doi          = {10.1109/18.669420},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/PatersonT98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pimrc/Paterson98,
  author       = {Kenneth G. Paterson},
  title        = {Coding techniques for power controlled {OFDM}},
  booktitle    = {The 9th {IEEE} International Symposium on Personal, Indoor and Mobile
                  Radio Communications, {PIMRC} 1998, Boston, MA, USA, September 8-11,
                  1998},
  pages        = {801--805},
  publisher    = {{IEEE}},
  year         = {1998},
  url          = {https://doi.org/10.1109/PIMRC.1998.734673},
  doi          = {10.1109/PIMRC.1998.734673},
  timestamp    = {Tue, 19 May 2020 15:57:12 +0200},
  biburl       = {https://dblp.org/rec/conf/pimrc/Paterson98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/BlackburnMP97,
  author       = {Simon R. Blackburn and
                  Sean Murphy and
                  Kenneth G. Paterson},
  title        = {Comments on "Theory and Applications of Cellular Automata in
                  Cryptography"},
  journal      = {{IEEE} Trans. Computers},
  volume       = {46},
  number       = {5},
  pages        = {637--638},
  year         = {1997},
  url          = {https://doi.org/10.1109/12.589245},
  doi          = {10.1109/12.589245},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/BlackburnMP97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jct/Paterson96,
  author       = {Kenneth G. Paterson},
  title        = {New Classes of Perfect Maps {I}},
  journal      = {J. Comb. Theory, Ser. {A}},
  volume       = {73},
  number       = {2},
  pages        = {302--334},
  year         = {1996},
  url          = {https://doi.org/10.1006/jcta.1996.0024},
  doi          = {10.1006/JCTA.1996.0024},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jct/Paterson96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jct/Paterson96a,
  author       = {Kenneth G. Paterson},
  title        = {New Classes of Perfect Maps {II}},
  journal      = {J. Comb. Theory, Ser. {A}},
  volume       = {73},
  number       = {2},
  pages        = {335--345},
  year         = {1996},
  url          = {https://doi.org/10.1006/jcta.1996.0025},
  doi          = {10.1006/JCTA.1996.0025},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jct/Paterson96a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jct/BlackburnEP96,
  author       = {Simon R. Blackburn and
                  Tuvi Etzion and
                  Kenneth G. Paterson},
  title        = {Permutation Polynomials, de Bruijn Sequences, and Linear Complexity},
  journal      = {J. Comb. Theory, Ser. {A}},
  volume       = {76},
  number       = {1},
  pages        = {55--82},
  year         = {1996},
  url          = {https://doi.org/10.1006/jcta.1996.0088},
  doi          = {10.1006/JCTA.1996.0088},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jct/BlackburnEP96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jct/HurlbertMP96,
  author       = {Glenn Hurlbert and
                  Chris J. Mitchell and
                  Kenneth G. Paterson},
  title        = {On the Existence of de Bruijn Tori with Two by Two Windows},
  journal      = {J. Comb. Theory, Ser. {A}},
  volume       = {76},
  number       = {2},
  pages        = {213--230},
  year         = {1996},
  url          = {https://doi.org/10.1006/jcta.1996.0102},
  doi          = {10.1006/JCTA.1996.0102},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jct/HurlbertMP96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/EtzionP96,
  author       = {Tuvi Etzion and
                  Kenneth G. Paterson},
  title        = {Near optimal single-track Gray codes},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {42},
  number       = {3},
  pages        = {779--789},
  year         = {1996},
  url          = {https://doi.org/10.1109/18.490544},
  doi          = {10.1109/18.490544},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/EtzionP96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/MitchellEP96,
  author       = {Chris J. Mitchell and
                  Tuvi Etzion and
                  Kenneth G. Paterson},
  title        = {A method for constructing decodable de Bruijn sequences},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {42},
  number       = {5},
  pages        = {1472--1478},
  year         = {1996},
  url          = {https://doi.org/10.1109/18.532887},
  doi          = {10.1109/18.532887},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/MitchellEP96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/HiltgenPB96,
  author       = {Alain P. Hiltgen and
                  Kenneth G. Paterson and
                  M. Brandestini},
  title        = {Single-track Gray codes},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {42},
  number       = {5},
  pages        = {1555--1561},
  year         = {1996},
  url          = {https://doi.org/10.1109/18.532900},
  doi          = {10.1109/18.532900},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/HiltgenPB96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Paterson95,
  author       = {Kenneth G. Paterson},
  title        = {Perfect Factors in the de Bruijn Graph},
  journal      = {Des. Codes Cryptogr.},
  volume       = {5},
  number       = {2},
  pages        = {115--138},
  year         = {1995},
  url          = {https://doi.org/10.1007/BF01397666},
  doi          = {10.1007/BF01397666},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Paterson95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dm/PatersonR95,
  author       = {Kenneth G. Paterson and
                  Matthew J. B. Robshaw},
  title        = {Storage efficient decoding for a class of binary be Bruijn sequences},
  journal      = {Discret. Math.},
  volume       = {138},
  number       = {1-3},
  pages        = {327--341},
  year         = {1995},
  url          = {https://doi.org/10.1016/0012-365X(94)00215-5},
  doi          = {10.1016/0012-365X(94)00215-5},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dm/PatersonR95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cpa/FuchsbergerGLPS95,
  author       = {Andreas Fuchsberger and
                  Dieter Gollmann and
                  Paul J. G. Lothian and
                  Kenneth G. Paterson and
                  Abraham Sidiropoulos},
  editor       = {Ed Dawson and
                  Jovan Dj. Golic},
  title        = {Public-key Cryptography on Smart Cards},
  booktitle    = {Cryptography: Policy and Algorithms, International Conference, Brisbane,
                  Queensland, Australia, July 3-5, 1995, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1029},
  pages        = {250--269},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/BFb0032364},
  doi          = {10.1007/BFB0032364},
  timestamp    = {Sat, 19 Oct 2019 20:36:44 +0200},
  biburl       = {https://dblp.org/rec/conf/cpa/FuchsbergerGLPS95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MitchellP94,
  author       = {Chris J. Mitchell and
                  Kenneth G. Paterson},
  title        = {Decoding Perfect Maps},
  journal      = {Des. Codes Cryptogr.},
  volume       = {4},
  number       = {1},
  pages        = {11--30},
  year         = {1994},
  url          = {https://doi.org/10.1007/BF01388557},
  doi          = {10.1007/BF01388557},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/MitchellP94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/MurphyPW94,
  author       = {Sean Murphy and
                  Kenneth G. Paterson and
                  Peter R. Wild},
  title        = {A Weak Cipher that Generates the Symmetric Group},
  journal      = {J. Cryptol.},
  volume       = {7},
  number       = {1},
  pages        = {61--65},
  year         = {1994},
  url          = {https://doi.org/10.1007/BF00195210},
  doi          = {10.1007/BF00195210},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/MurphyPW94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/Paterson94,
  author       = {Kenneth G. Paterson},
  title        = {Perfect maps},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {40},
  number       = {3},
  pages        = {743--753},
  year         = {1994},
  url          = {https://doi.org/10.1109/18.335886},
  doi          = {10.1109/18.335886},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/Paterson94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics