Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Kenneth G. Paterson
@article{DBLP:journals/ieeesp/BackendalHP24, author = {Matilda Backendal and Miro Haller and Kenny Paterson}, title = {End-to-End Encrypted Cloud Storage}, journal = {{IEEE} Secur. Priv.}, volume = {22}, number = {2}, pages = {69--74}, year = {2024}, url = {https://doi.org/10.1109/MSEC.2024.3352788}, doi = {10.1109/MSEC.2024.3352788}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/BackendalHP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/CamilleriMPG24, author = {Patrick Camilleri and Shahram Mossayebi and Kenneth G. Paterson and Charles Grover}, title = {Using Gate Tunneling in Bulk {CMOS} to Create a {PUF}}, journal = {{IEEE} Internet Things J.}, volume = {11}, number = {2}, pages = {2070--2081}, year = {2024}, url = {https://doi.org/10.1109/JIOT.2023.3291872}, doi = {10.1109/JIOT.2023.3291872}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/CamilleriMPG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/GuiPPW24, author = {Zichen Gui and Kenneth G. Paterson and Sikhar Patranabis and Bogdan Warinschi}, title = {SWiSSSE: System-Wide Security for Searchable Symmetric Encryption}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2024}, number = {1}, pages = {549--581}, year = {2024}, url = {https://doi.org/10.56553/popets-2024-0032}, doi = {10.56553/POPETS-2024-0032}, timestamp = {Wed, 29 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/popets/GuiPPW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuykxP24, author = {Atul Luykx and Kenneth G. Paterson}, title = {Limits on Authenticated Encryption Use in {TLS}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {51}, year = {2024}, url = {https://eprint.iacr.org/2024/051}, timestamp = {Fri, 16 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LuykxP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/OttPM23, author = {David Ott and Kenny Paterson and Dennis Moreau}, title = {Where Is the Research on Cryptographic Transition and Agility?}, journal = {Commun. {ACM}}, volume = {66}, number = {4}, pages = {29--32}, year = {2023}, url = {https://doi.org/10.1145/3567825}, doi = {10.1145/3567825}, timestamp = {Fri, 14 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cacm/OttPM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/ArxP23, author = {Theo von Arx and Kenneth G. Paterson}, editor = {Joseph K. Liu and Yang Xiang and Surya Nepal and Gene Tsudik}, title = {On the Cryptographic Fragility of the Telegram Ecosystem}, booktitle = {Proceedings of the 2023 {ACM} Asia Conference on Computer and Communications Security, {ASIA} {CCS} 2023, Melbourne, VIC, Australia, July 10-14, 2023}, pages = {328--341}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3579856.3582811}, doi = {10.1145/3579856.3582811}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/ArxP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AlbrechtHMP23, author = {Martin R. Albrecht and Miro Haller and Lenka Marekov{\'{a}} and Kenneth G. Paterson}, editor = {Carmit Hazay and Martijn Stam}, title = {Caveat Implementor! Key Recovery Attacks on {MEGA}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14008}, pages = {190--218}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30589-4\_7}, doi = {10.1007/978-3-031-30589-4\_7}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AlbrechtHMP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BackendalHP23, author = {Matilda Backendal and Miro Haller and Kenneth G. Paterson}, title = {{MEGA:} Malleable Encryption Goes Awry}, booktitle = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco, CA, USA, May 21-25, 2023}, pages = {146--163}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SP46215.2023.10179290}, doi = {10.1109/SP46215.2023.10179290}, timestamp = {Thu, 27 Jul 2023 08:17:10 +0200}, biburl = {https://dblp.org/rec/conf/sp/BackendalHP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/GuiPP23, author = {Zichen Gui and Kenneth G. Paterson and Sikhar Patranabis}, title = {Rethinking Searchable Symmetric Encryption}, booktitle = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco, CA, USA, May 21-25, 2023}, pages = {1401--1418}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SP46215.2023.10179460}, doi = {10.1109/SP46215.2023.10179460}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/GuiPP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/PatersonST23, author = {Kenneth G. Paterson and Matteo Scarlata and Kien T. Truong}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Three Lessons From Threema: Analysis of a Secure Messenger}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {1289--1306}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/paterson}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/PatersonST23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/TavernaP23, author = {Massimiliano Taverna and Kenneth G. Paterson}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Snapping Snap Sync: Practical Attacks on Go Ethereum Synchronising Nodes}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {3331--3348}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/taverna}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/TavernaP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/GuiPT23, author = {Zichen Gui and Kenneth G. Paterson and Tianxin Tang}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Security Analysis of MongoDB Queryable Encryption}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {7445--7462}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/gui}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/GuiPT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-09472, author = {Semira Einsele and Kenneth G. Paterson}, title = {Average Case Error Estimates of the Strong Lucas Test}, journal = {CoRR}, volume = {abs/2306.09472}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.09472}, doi = {10.48550/ARXIV.2306.09472}, eprinttype = {arXiv}, eprint = {2306.09472}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-09472.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DegabrieleGGP23, author = {Jean Paul Degabriele and J{\'{e}}r{\^{o}}me Govinden and Felix G{\"{u}}nther and Kenneth G. Paterson}, title = {The Security of ChaCha20-Poly1305 in the Multi-user Setting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {85}, year = {2023}, url = {https://eprint.iacr.org/2023/085}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DegabrieleGGP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlbrechtHMP23, author = {Martin R. Albrecht and Miro Haller and Lenka Marekov{\'{a}} and Kenneth G. Paterson}, title = {Caveat Implementor! Key Recovery Attacks on {MEGA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {329}, year = {2023}, url = {https://eprint.iacr.org/2023/329}, timestamp = {Fri, 31 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlbrechtHMP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlbrechtMPS23, author = {Martin R. Albrecht and Lenka Marekov{\'{a}} and Kenneth G. Paterson and Igors Stepanovs}, title = {Four Attacks and a Proof for Telegram}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {469}, year = {2023}, url = {https://eprint.iacr.org/2023/469}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlbrechtMPS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaleckasPA23, author = {Robertas Maleckas and Kenneth G. Paterson and Martin R. Albrecht}, title = {Practically-exploitable Vulnerabilities in the Jitsi Video Conferencing System}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1118}, year = {2023}, url = {https://eprint.iacr.org/2023/1118}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaleckasPA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BackendalGP22, author = {Matilda Backendal and Felix G{\"{u}}nther and Kenneth G. Paterson}, editor = {Shweta Agrawal and Dongdai Lin}, title = {Puncturable Key Wrapping and Its Applications}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13792}, pages = {651--681}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22966-4\_22}, doi = {10.1007/978-3-031-22966-4\_22}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/BackendalGP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BruseghiniHP22, author = {Lara Bruseghini and Daniel Huigens and Kenneth G. Paterson}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {Victory by {KO:} Attacking OpenPGP Using Key Overwriting}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {411--423}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3559363}, doi = {10.1145/3548606.3559363}, timestamp = {Sat, 17 Dec 2022 01:15:29 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BruseghiniHP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FilicPUV22, author = {Mia Filic and Kenneth G. Paterson and Anupama Unnikrishnan and Fernando Virdia}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {Adversarial Correctness and Privacy for Probabilistic Data Structures}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {1037--1050}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3560621}, doi = {10.1145/3548606.3560621}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/FilicPUV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/FalzonP22, author = {Francesca Falzon and Kenneth G. Paterson}, editor = {Vijayalakshmi Atluri and Roberto Di Pietro and Christian Damsgaard Jensen and Weizhi Meng}, title = {An Efficient Query Recovery Attack Against a Graph Encryption Scheme}, booktitle = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13554}, pages = {325--345}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17140-6\_16}, doi = {10.1007/978-3-031-17140-6\_16}, timestamp = {Tue, 27 Sep 2022 21:06:59 +0200}, biburl = {https://dblp.org/rec/conf/esorics/FalzonP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GrubbsMP22, author = {Paul Grubbs and Varun Maram and Kenneth G. Paterson}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Anonymous, Robust Post-quantum Public Key Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13277}, pages = {402--432}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07082-2\_15}, doi = {10.1007/978-3-031-07082-2\_15}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GrubbsMP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/PatersonR22, author = {Kenneth G. Paterson and Mathilde Raynal}, title = {HyperLogLog: Exponentially Bad in Adversarial Settings}, booktitle = {7th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2022, Genoa, Italy, June 6-10, 2022}, pages = {154--170}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/EuroSP53844.2022.00018}, doi = {10.1109/EUROSP53844.2022.00018}, timestamp = {Wed, 29 Jun 2022 16:03:24 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/PatersonR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/AlbrechtMPS22, author = {Martin R. Albrecht and Lenka Marekov{\'{a}} and Kenneth G. Paterson and Igors Stepanovs}, title = {Four Attacks and a Proof for Telegram}, booktitle = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco, CA, USA, May 22-26, 2022}, pages = {87--106}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SP46214.2022.9833666}, doi = {10.1109/SP46214.2022.9833666}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/AlbrechtMPS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AlbrechtEP22, author = {Martin R. Albrecht and Raphael Eikenberg and Kenneth G. Paterson}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {Breaking Bridgefy, again: Adopting libsignal is not enough}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {269--286}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/albrecht}, timestamp = {Tue, 18 Oct 2022 17:10:36 +0200}, biburl = {https://dblp.org/rec/conf/uss/AlbrechtEP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2209-06955, author = {Mia Filic and Kenneth G. Paterson and Anupama Unnikrishnan and Fernando Virdia}, title = {Adversarial Correctness and Privacy for Probabilistic Data Structures}, journal = {CoRR}, volume = {abs/2209.06955}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2209.06955}, doi = {10.48550/ARXIV.2209.06955}, eprinttype = {arXiv}, eprint = {2209.06955}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2209-06955.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AviramDKPRY22, author = {Nimrod Aviram and Benjamin Dowling and Ilan Komargodski and Kenneth G. Paterson and Eyal Ronen and Eylon Yogev}, title = {Practical (Post-Quantum) Key Combiners from One-Wayness and Applications to {TLS}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {65}, year = {2022}, url = {https://eprint.iacr.org/2022/065}, timestamp = {Fri, 18 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AviramDKPRY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArxP22, author = {Theo von Arx and Kenneth G. Paterson}, title = {On the Cryptographic Fragility of the Telegram Ecosystem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {595}, year = {2022}, url = {https://eprint.iacr.org/2022/595}, timestamp = {Mon, 20 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ArxP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FalzonP22, author = {Francesca Falzon and Kenneth G. Paterson}, title = {An Efficient Query Recovery Attack Against a Graph Encryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {838}, year = {2022}, url = {https://eprint.iacr.org/2022/838}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FalzonP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackendalHP22, author = {Matilda Backendal and Miro Haller and Kenneth G. Paterson}, title = {{MEGA:} Malleable Encryption Goes Awry}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {959}, year = {2022}, url = {https://eprint.iacr.org/2022/959}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackendalHP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FilicPUV22, author = {Mia Filic and Kenneth G. Paterson and Anupama Unnikrishnan and Fernando Virdia}, title = {Adversarial Correctness and Privacy for Probabilistic Data Structures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1186}, year = {2022}, url = {https://eprint.iacr.org/2022/1186}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FilicPUV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Backendal0P22, author = {Matilda Backendal and Felix G{\"{u}}nther and Kenneth G. Paterson}, title = {Puncturable Key Wrapping and Its Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1209}, year = {2022}, url = {https://eprint.iacr.org/2022/1209}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Backendal0P22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/LueksGVBSPT21, author = {Wouter Lueks and Seda F. G{\"{u}}rses and Michael Veale and Edouard Bugnion and Marcel Salath{\'{e}} and Kenneth G. Paterson and Carmela Troncoso}, title = {CrowdNotifier: Decentralized Privacy-Preserving Presence Tracing}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2021}, number = {4}, pages = {350--368}, year = {2021}, url = {https://doi.org/10.2478/popets-2021-0074}, doi = {10.2478/POPETS-2021-0074}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/LueksGVBSPT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DegabrieleG0P21, author = {Jean Paul Degabriele and J{\'{e}}r{\^{o}}me Govinden and Felix G{\"{u}}nther and Kenneth G. Paterson}, editor = {Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi}, title = {The Security of ChaCha20-Poly1305 in the Multi-User Setting}, booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}, pages = {1981--2003}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460120.3484814}, doi = {10.1145/3460120.3484814}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/DegabrieleG0P21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ctrsa/2021, editor = {Kenneth G. Paterson}, title = {Topics in Cryptology - {CT-RSA} 2021 - Cryptographers' Track at the {RSA} Conference 2021, Virtual Event, May 17-20, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12704}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75539-3}, doi = {10.1007/978-3-030-75539-3}, isbn = {978-3-030-75538-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrubbsMP21, author = {Paul Grubbs and Varun Maram and Kenneth G. Paterson}, title = {Anonymous, Robust Post-Quantum Public Key Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {708}, year = {2021}, url = {https://eprint.iacr.org/2021/708}, timestamp = {Mon, 07 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GrubbsMP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuiPP21, author = {Zichen Gui and Kenneth G. Paterson and Sikhar Patranabis}, title = {Leakage Perturbation is Not Enough: Breaking Structured Encryption Using Simulated Annealing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {879}, year = {2021}, url = {https://eprint.iacr.org/2021/879}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuiPP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatersonR21, author = {Kenneth G. Paterson and Mathilde Raynal}, title = {HyperLogLog: Exponentially Bad in Adversarial Settings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1139}, year = {2021}, url = {https://eprint.iacr.org/2021/1139}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatersonR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/debu/TroncosoPHSLLSP20, author = {Carmela Troncoso and Mathias Payer and Jean{-}Pierre Hubaux and Marcel Salath{\'{e}} and James R. Larus and Wouter Lueks and Theresa Stadler and Apostolos Pyrgelis and Daniele Antonioli and Ludovic Barman and Sylvain Chatel and Kenneth G. Paterson and Srdjan Capkun and David A. Basin and Jan Beutel and Dennis Jackson and Marc Roeschlin and Patrick Leu and Bart Preneel and Nigel P. Smart and Aysajan Abidin and Seda Gurses and Michael Veale and Cas Cremers and Michael Backes and Nils Ole Tippenhauer and Reuben Binns and Ciro Cattuto and Alain Barrat and Dario Fiore and Manuel Barbosa and Rui Oliveira and Jos{\'{e}} Pereira}, title = {Decentralized Privacy-Preserving Proximity Tracing}, journal = {{IEEE} Data Eng. Bull.}, volume = {43}, number = {2}, pages = {36--66}, year = {2020}, url = {http://sites.computer.org/debull/A20june/p36.pdf}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/debu/TroncosoPHSLLSP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/AlbrechtFHHLP20, author = {Martin R. Albrecht and Pooya Farshim and Shuai Han and Dennis Hofheinz and Enrique Larraia and Kenneth G. Paterson}, title = {Multilinear Maps from Obfuscation}, journal = {J. Cryptol.}, volume = {33}, number = {3}, pages = {1080--1113}, year = {2020}, url = {https://doi.org/10.1007/s00145-019-09340-0}, doi = {10.1007/S00145-019-09340-0}, timestamp = {Wed, 25 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/AlbrechtFHHLP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MassimoP20, author = {Jake Massimo and Kenneth G. Paterson}, editor = {Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna}, title = {A Performant, Misuse-Resistant {API} for Primality Testing}, booktitle = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020}, pages = {195--210}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372297.3417264}, doi = {10.1145/3372297.3417264}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MassimoP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pqcrypto/DowlingHP20, author = {Benjamin Dowling and Torben Brandt Hansen and Kenneth G. Paterson}, editor = {Jintai Ding and Jean{-}Pierre Tillich}, title = {Many a Mickle Makes a Muckle: {A} Framework for Provably Quantum-Secure Hybrid Key Exchange}, booktitle = {Post-Quantum Cryptography - 11th International Conference, PQCrypto 2020, Paris, France, April 15-17, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12100}, pages = {483--502}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-44223-1\_26}, doi = {10.1007/978-3-030-44223-1\_26}, timestamp = {Wed, 15 Apr 2020 17:34:50 +0200}, biburl = {https://dblp.org/rec/conf/pqcrypto/DowlingHP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/LeuSRPC20, author = {Patrick Leu and Mridula Singh and Marc Roeschlin and Kenneth G. Paterson and Srdjan Capkun}, title = {Message Time of Arrival Codes: {A} Fundamental Primitive for Secure Distance Measurement}, booktitle = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco, CA, USA, May 18-21, 2020}, pages = {500--516}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SP40000.2020.00010}, doi = {10.1109/SP40000.2020.00010}, timestamp = {Thu, 21 Sep 2023 15:57:24 +0200}, biburl = {https://dblp.org/rec/conf/sp/LeuSRPC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/TramerBP20, author = {Florian Tram{\`{e}}r and Dan Boneh and Kenny Paterson}, editor = {Srdjan Capkun and Franziska Roesner}, title = {Remote Side-Channel Attacks on Anonymous Transactions}, booktitle = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14, 2020}, pages = {2739--2756}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/usenixsecurity20/presentation/tramer}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/TramerBP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sacrypt/2019, editor = {Kenneth G. Paterson and Douglas Stebila}, title = {Selected Areas in Cryptography - {SAC} 2019 - 26th International Conference, Waterloo, ON, Canada, August 12-16, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11959}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-38471-5}, doi = {10.1007/978-3-030-38471-5}, isbn = {978-3-030-38470-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-12273, author = {Carmela Troncoso and Mathias Payer and Jean{-}Pierre Hubaux and Marcel Salath{\'{e}} and James R. Larus and Edouard Bugnion and Wouter Lueks and Theresa Stadler and Apostolos Pyrgelis and Daniele Antonioli and Ludovic Barman and Sylvain Chatel and Kenneth G. Paterson and Srdjan Capkun and David A. Basin and Jan Beutel and Dennis Jackson and Marc Roeschlin and Patrick Leu and Bart Preneel and Nigel P. Smart and Aysajan Abidin and Seda F. G{\"{u}}rses and Michael Veale and Cas Cremers and Michael Backes and Nils Ole Tippenhauer and Reuben Binns and Ciro Cattuto and Alain Barrat and Dario Fiore and Manuel Barbosa and Rui Oliveira and Jos{\'{e}} Pereira}, title = {Decentralized Privacy-Preserving Proximity Tracing}, journal = {CoRR}, volume = {abs/2005.12273}, year = {2020}, url = {https://arxiv.org/abs/2005.12273}, eprinttype = {arXiv}, eprint = {2005.12273}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-12273.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MassimoP20, author = {Jake Massimo and Kenneth G. Paterson}, title = {A Performant, Misuse-Resistant {API} for Primality Testing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {65}, year = {2020}, url = {https://eprint.iacr.org/2020/065}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MassimoP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DowlingHP20, author = {Benjamin Dowling and Torben Brandt Hansen and Kenneth G. Paterson}, title = {Many a Mickle Makes a Muckle: {A} Framework for Provably Quantum-Secure Hybrid Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {99}, year = {2020}, url = {https://eprint.iacr.org/2020/099}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DowlingHP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TramerBP20, author = {Florian Tram{\`{e}}r and Dan Boneh and Kenneth G. Paterson}, title = {Remote Side-Channel Attacks on Anonymous Transactions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {220}, year = {2020}, url = {https://eprint.iacr.org/2020/220}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TramerBP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuiPPW20, author = {Zichen Gui and Kenneth G. Paterson and Sikhar Patranabis and Bogdan Warinschi}, title = {SWiSSSE: System-Wide Security for Searchable Symmetric Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1328}, year = {2020}, url = {https://eprint.iacr.org/2020/1328}, timestamp = {Fri, 30 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GuiPPW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/AlbrechtHP19, author = {Martin R. Albrecht and Torben Brandt Hansen and Kenneth G. Paterson}, title = {libInterMAC: Beyond Confidentiality and Integrity in Practice}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {1}, pages = {46--83}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i1.46-83}, doi = {10.13154/TOSC.V2019.I1.46-83}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/AlbrechtHP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GalbraithMP19, author = {Steven D. Galbraith and Jake Massimo and Kenneth G. Paterson}, editor = {Dongdai Lin and Kazue Sako}, title = {Safety in Numbers: On the Need for Robust Diffie-Hellman Parameter Validation}, booktitle = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11443}, pages = {379--407}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17259-6\_13}, doi = {10.1007/978-3-030-17259-6\_13}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/GalbraithMP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/GrubbsLMP19, author = {Paul Grubbs and Marie{-}Sarah Lacharit{\'{e}} and Brice Minaud and Kenneth G. Paterson}, title = {Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks}, booktitle = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco, CA, USA, May 19-23, 2019}, pages = {1067--1083}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SP.2019.00030}, doi = {10.1109/SP.2019.00030}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/sp/GrubbsLMP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1911-11052, author = {Patrick Leu and Mridula Singh and Marc Roeschlin and Kenneth G. Paterson and Srdjan Capkun}, title = {Message Time of Arrival Codes: {A} Fundamental Primitive for Secure Distance Measurement}, journal = {CoRR}, volume = {abs/1911.11052}, year = {2019}, url = {http://arxiv.org/abs/1911.11052}, eprinttype = {arXiv}, eprint = {1911.11052}, timestamp = {Tue, 03 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1911-11052.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1912-02520, author = {Simon Bell and Kenny Paterson and Lorenzo Cavallaro}, title = {Catch Me (On Time) If You Can: Understanding the Effectiveness of Twitter {URL} Blacklists}, journal = {CoRR}, volume = {abs/1912.02520}, year = {2019}, url = {http://arxiv.org/abs/1912.02520}, eprinttype = {arXiv}, eprint = {1912.02520}, timestamp = {Thu, 02 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1912-02520.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrubbsLMP19, author = {Paul Grubbs and Marie{-}Sarah Lacharit{\'{e}} and Brice Minaud and Kenneth G. Paterson}, title = {Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {11}, year = {2019}, url = {https://eprint.iacr.org/2019/011}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GrubbsLMP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalbraithMP19, author = {Steven D. Galbraith and Jake Massimo and Kenneth G. Paterson}, title = {Safety in Numbers: On the Need for Robust Diffie-Hellman Parameter Validation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {32}, year = {2019}, url = {https://eprint.iacr.org/2019/032}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalbraithMP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlbrechtHP19, author = {Martin R. Albrecht and Torben Brandt Hansen and Kenneth G. Paterson}, title = {libInterMAC: Beyond Confidentiality and Integrity in Practice}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {165}, year = {2019}, url = {https://eprint.iacr.org/2019/165}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlbrechtHP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeuSRPC19, author = {Patrick Leu and Mridula Singh and Marc Roeschlin and Kenneth G. Paterson and Srdjan Capkun}, title = {Message Time of Arrival Codes: {A} Fundamental Primitive for Secure Distance Measurement}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1350}, year = {2019}, url = {https://eprint.iacr.org/2019/1350}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeuSRPC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Paterson18, author = {Kenny Paterson}, title = {Technical perspective: On heartbleed: a hard beginnyng makth a good endyng}, journal = {Commun. {ACM}}, volume = {61}, number = {3}, pages = {108}, year = {2018}, url = {https://doi.org/10.1145/3176242}, doi = {10.1145/3176242}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Paterson18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/PatersonS18, author = {Kenneth G. Paterson and Jacob C. N. Schuldt}, title = {Statistical attacks on cookie masking for {RC4}}, journal = {Cryptogr. Commun.}, volume = {10}, number = {5}, pages = {777--801}, year = {2018}, url = {https://doi.org/10.1007/s12095-018-0280-y}, doi = {10.1007/S12095-018-0280-Y}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/PatersonS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csm/ZhouLGSMPDCGRMK18, author = {Xutao Zhou and Diego R. L{\'{o}}pez and Vijay K. Gurbani and Jan Seedorf and Alexey Melnikov and Kenny Paterson and Avri Doria and Laurent Ciavaglia and Lisandro Zambenedetti Granville and Vincent Roca and Marie{-}Jos{\'{e}} Montpetit and Ari Ker{\"{a}}nen and Carsten Bormann and Marco Carugi and Gyu Myoung Lee and Okan Geray}, title = {Standards News}, journal = {{IEEE} Commun. Stand. Mag.}, volume = {2}, number = {1}, pages = {12--18}, year = {2018}, url = {https://doi.org/10.1109/MCOMSTD.2018.8334913}, doi = {10.1109/MCOMSTD.2018.8334913}, timestamp = {Tue, 27 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csm/ZhouLGSMPDCGRMK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BricoutMPM18, author = {R{\'{e}}mi Bricout and Sean Murphy and Kenneth G. Paterson and Thyla van der Merwe}, title = {Analysing and exploiting the Mantin biases in {RC4}}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {4}, pages = {743--770}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0355-3}, doi = {10.1007/S10623-017-0355-3}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BricoutMPM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/AbdallaBPP18, author = {Michel Abdalla and Fabrice Benhamouda and Alain Passel{\`{e}}gue and Kenneth G. Paterson}, title = {Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier}, journal = {J. Cryptol.}, volume = {31}, number = {4}, pages = {917--964}, year = {2018}, url = {https://doi.org/10.1007/s00145-017-9274-8}, doi = {10.1007/S00145-017-9274-8}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/AbdallaBPP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/AlbrechtDP18, author = {Martin R. Albrecht and Amit Deo and Kenneth G. Paterson}, title = {Cold Boot Attacks on Ring and Module {LWE} Keys Under the {NTT}}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {3}, pages = {173--213}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i3.173-213}, doi = {10.13154/TCHES.V2018.I3.173-213}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/AlbrechtDP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/LachariteP18, author = {Marie{-}Sarah Lacharit{\'{e}} and Kenneth G. Paterson}, title = {Frequency-smoothing encryption: preventing snapshot attacks on deterministically encrypted data}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {1}, pages = {277--313}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i1.277-313}, doi = {10.13154/TOSC.V2018.I1.277-313}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/LachariteP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/DowlingP18, author = {Benjamin Dowling and Kenneth G. Paterson}, editor = {Bart Preneel and Frederik Vercauteren}, title = {A Cryptographic Analysis of the WireGuard Protocol}, booktitle = {Applied Cryptography and Network Security - 16th International Conference, {ACNS} 2018, Leuven, Belgium, July 2-4, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10892}, pages = {3--21}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93387-0\_1}, doi = {10.1007/978-3-319-93387-0\_1}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/acns/DowlingP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AlbrechtMPS18, author = {Martin R. Albrecht and Jake Massimo and Kenneth G. Paterson and Juraj Somorovsky}, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {Prime and Prejudice: Primality Testing Under Adversarial Conditions}, booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {281--298}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3243734.3243787}, doi = {10.1145/3243734.3243787}, timestamp = {Tue, 10 Nov 2020 20:00:51 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AlbrechtMPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GrubbsLMP18, author = {Paul Grubbs and Marie{-}Sarah Lacharit{\'{e}} and Brice Minaud and Kenneth G. Paterson}, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {Pump up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries}, booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {315--331}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3243734.3243864}, doi = {10.1145/3243734.3243864}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GrubbsLMP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RonenPS18, author = {Eyal Ronen and Kenneth G. Paterson and Adi Shamir}, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {Pseudo Constant Time Implementations of {TLS} Are Only Pseudo Secure}, booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {1397--1414}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3243734.3243775}, doi = {10.1145/3243734.3243775}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/RonenPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/KotziasRAPVC18, author = {Platon Kotzias and Abbas Razaghpanah and Johanna Amann and Kenneth G. Paterson and Narseo Vallina{-}Rodriguez and Juan Caballero}, title = {Coming of Age: {A} Longitudinal Study of {TLS} Deployment}, booktitle = {Proceedings of the Internet Measurement Conference 2018, {IMC} 2018, Boston, MA, USA, October 31 - November 02, 2018}, pages = {415--428}, publisher = {{ACM}}, year = {2018}, url = {https://dl.acm.org/citation.cfm?id=3278568}, timestamp = {Fri, 25 Oct 2019 09:51:49 +0200}, biburl = {https://dblp.org/rec/conf/imc/KotziasRAPVC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/LachariteMP18, author = {Marie{-}Sarah Lacharit{\'{e}} and Brice Minaud and Kenneth G. Paterson}, title = {Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage}, booktitle = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings, 21-23 May 2018, San Francisco, California, {USA}}, pages = {297--314}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SP.2018.00002}, doi = {10.1109/SP.2018.00002}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/LachariteMP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DowlingP18, author = {Benjamin Dowling and Kenneth G. Paterson}, title = {A Cryptographic Analysis of the WireGuard Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {80}, year = {2018}, url = {http://eprint.iacr.org/2018/080}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DowlingP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatersonS18, author = {Kenneth G. Paterson and Jacob C. N. Schuldt}, title = {Statistical Attacks on Cookie Masking for {RC4}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {93}, year = {2018}, url = {http://eprint.iacr.org/2018/093}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatersonS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlbrechtDP18, author = {Martin R. Albrecht and Amit Deo and Kenneth G. Paterson}, title = {Cold Boot Attacks on Ring and Module {LWE} Keys Under the {NTT}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {672}, year = {2018}, url = {https://eprint.iacr.org/2018/672}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlbrechtDP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RonenPS18, author = {Eyal Ronen and Kenneth G. Paterson and Adi Shamir}, title = {Pseudo Constant Time Implementations of {TLS} Are Only Pseudo Secure}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {747}, year = {2018}, url = {https://eprint.iacr.org/2018/747}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RonenPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlbrechtMPS18, author = {Martin R. Albrecht and Jake Massimo and Kenneth G. Paterson and Juraj Somorovsky}, title = {Prime and Prejudice: Primality Testing Under Adversarial Conditions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {749}, year = {2018}, url = {https://eprint.iacr.org/2018/749}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlbrechtMPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrubbsLMP18, author = {Paul Grubbs and Marie{-}Sarah Lacharit{\'{e}} and Brice Minaud and Kenny Paterson}, title = {Pump up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {965}, year = {2018}, url = {https://eprint.iacr.org/2018/965}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GrubbsLMP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BoydCFPPS17, author = {Colin Boyd and Cas Cremers and Mich{\`{e}}le Feltz and Kenneth G. Paterson and Bertram Poettering and Douglas Stebila}, title = {{ASICS:} authenticated key exchange security incorporating certification systems}, journal = {Int. J. Inf. Sec.}, volume = {16}, number = {2}, pages = {151--171}, year = {2017}, url = {https://doi.org/10.1007/s10207-015-0312-y}, doi = {10.1007/S10207-015-0312-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/BoydCFPPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/LuykxMP17, author = {Atul Luykx and Bart Mennink and Kenneth G. Paterson}, editor = {Tsuyoshi Takagi and Thomas Peyrin}, title = {Analyzing Multi-key Security Degradation}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10625}, pages = {575--605}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70697-9\_20}, doi = {10.1007/978-3-319-70697-9\_20}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/LuykxMP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/EverspaughPRS17, author = {Adam Everspaugh and Kenneth G. Paterson and Thomas Ristenpart and Samuel Scott}, editor = {Jonathan Katz and Hovav Shacham}, title = {Key Rotation for Authenticated Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10403}, pages = {98--129}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63697-9\_4}, doi = {10.1007/978-3-319-63697-9\_4}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/EverspaughPRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/AlbrechtOPPS17, author = {Martin R. Albrecht and Emmanuela Orsini and Kenneth G. Paterson and Guy Peer and Nigel P. Smart}, editor = {Simon N. Foley and Dieter Gollmann and Einar Snekkenes}, title = {Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts}, booktitle = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10492}, pages = {29--46}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66402-6\_4}, doi = {10.1007/978-3-319-66402-6\_4}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/AlbrechtOPPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/PatersonV17, author = {Kenneth G. Paterson and Ricardo Villanueva{-}Polanco}, editor = {Arpita Patra and Nigel P. Smart}, title = {Cold Boot Attacks on {NTRU}}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2017 - 18th International Conference on Cryptology in India, Chennai, India, December 10-13, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10698}, pages = {107--125}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-71667-1\_6}, doi = {10.1007/978-3-319-71667-1\_6}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/PatersonV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlbrechtOPPS17, author = {Martin R. Albrecht and Emmanuela Orsini and Kenneth G. Paterson and Guy Peer and Nigel P. Smart}, title = {Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {354}, year = {2017}, url = {http://eprint.iacr.org/2017/354}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlbrechtOPPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuykxMP17, author = {Atul Luykx and Bart Mennink and Kenneth G. Paterson}, title = {Analyzing Multi-Key Security Degradation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {435}, year = {2017}, url = {http://eprint.iacr.org/2017/435}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuykxMP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EverspaughPRS17, author = {Adam Everspaugh and Kenneth G. Paterson and Thomas Ristenpart and Samuel Scott}, title = {Key Rotation for Authenticated Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {527}, year = {2017}, url = {http://eprint.iacr.org/2017/527}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EverspaughPRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LachariteMP17, author = {Marie{-}Sarah Lacharit{\'{e}} and Brice Minaud and Kenneth G. Paterson}, title = {Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {701}, year = {2017}, url = {http://eprint.iacr.org/2017/701}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LachariteMP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LachariteP17, author = {Marie{-}Sarah Lacharit{\'{e}} and Kenneth G. Paterson}, title = {Frequency-smoothing encryption: preventing snapshot attacks on deterministically encrypted data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1068}, year = {2017}, url = {http://eprint.iacr.org/2017/1068}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LachariteP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FischlinGMP17, author = {Marc Fischlin and Felix G{\"{u}}nther and Giorgia Azzurra Marson and Kenneth G. Paterson}, title = {Data Is a Stream: Security of Stream-Based Channels}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1191}, year = {2017}, url = {http://eprint.iacr.org/2017/1191}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FischlinGMP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BonehPS16, author = {Dan Boneh and Kenny Paterson and Nigel P. Smart}, title = {Building a Community of Real-World Cryptographers}, journal = {{IEEE} Secur. Priv.}, volume = {14}, number = {6}, pages = {7--9}, year = {2016}, url = {https://doi.org/10.1109/MSP.2016.127}, doi = {10.1109/MSP.2016.127}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/BonehPS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/DegabrieleFFGGM16, author = {Jean Paul Degabriele and Victoria Fehr and Marc Fischlin and Tommaso Gagliardoni and Felix G{\"{u}}nther and Giorgia Azzurra Marson and Arno Mittelbach and Kenneth G. Paterson}, title = {Unpicking {PLAID:} a cryptographic analysis of an ISO-standards-track authentication protocol}, journal = {Int. J. Inf. Sec.}, volume = {15}, number = {6}, pages = {637--657}, year = {2016}, url = {https://doi.org/10.1007/s10207-015-0309-6}, doi = {10.1007/S10207-015-0309-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/DegabrieleFFGGM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AlbrechtDHP16, author = {Martin R. Albrecht and Jean Paul Degabriele and Torben Brandt Hansen and Kenneth G. Paterson}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {A Surfeit of {SSH} Cipher Suites}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {1480--1491}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978364}, doi = {10.1145/2976749.2978364}, timestamp = {Tue, 10 Nov 2020 20:00:49 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AlbrechtDHP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DegabrielePSW16, author = {Jean Paul Degabriele and Kenneth G. Paterson and Jacob C. N. Schuldt and Joanne Woodage}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9814}, pages = {403--432}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53018-4\_15}, doi = {10.1007/978-3-662-53018-4\_15}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DegabrielePSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AlbrechtP16, author = {Martin R. Albrecht and Kenneth G. Paterson}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Lucky Microseconds: {A} Timing Attack on Amazon's s2n Implementation of {TLS}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9665}, pages = {622--643}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49890-3\_24}, doi = {10.1007/978-3-662-49890-3\_24}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AlbrechtP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secsr/PatersonM16, author = {Kenneth G. Paterson and Thyla van der Merwe}, editor = {Lidong Chen and David A. McGrew and Chris J. Mitchell}, title = {Reactive and Proactive Standardisation of {TLS}}, booktitle = {Security Standardisation Research - Third International Conference, {SSR} 2016, Gaithersburg, MD, USA, December 5-6, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10074}, pages = {160--186}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49100-4\_7}, doi = {10.1007/978-3-319-49100-4\_7}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/secsr/PatersonM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/AlbrechtFHLP16, author = {Martin R. Albrecht and Pooya Farshim and Dennis Hofheinz and Enrique Larraia and Kenneth G. Paterson}, editor = {Eyal Kushilevitz and Tal Malkin}, title = {Multilinear Maps from Obfuscation}, booktitle = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9562}, pages = {446--473}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49096-9\_19}, doi = {10.1007/978-3-662-49096-9\_19}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/AlbrechtFHLP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BricoutMPM16, author = {R{\'{e}}mi Bricout and Sean Murphy and Kenneth G. Paterson and Thyla van der Merwe}, title = {Analysing and Exploiting the Mantin Biases in {RC4}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {63}, year = {2016}, url = {http://eprint.iacr.org/2016/063}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BricoutMPM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DegabrielePSW16, author = {Jean Paul Degabriele and Kenneth G. Paterson and Jacob C. N. Schuldt and Joanne Woodage}, title = {Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {577}, year = {2016}, url = {http://eprint.iacr.org/2016/577}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DegabrielePSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PatersonS15, author = {Kenneth G. Paterson and Mario Strefler}, editor = {Feng Bao and Steven Miller and Jianying Zhou and Gail{-}Joon Ahn}, title = {A Practical Attack Against the Use of {RC4} in the {HIVE} Hidden Volume Encryption System}, booktitle = {Proceedings of the 10th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17, 2015}, pages = {475--482}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2714576.2714596}, doi = {10.1145/2714576.2714596}, timestamp = {Thu, 20 Oct 2022 10:45:07 +0200}, biburl = {https://dblp.org/rec/conf/ccs/PatersonS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FischlinGMP15, author = {Marc Fischlin and Felix G{\"{u}}nther and Giorgia Azzurra Marson and Kenneth G. Paterson}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Data Is a Stream: Security of Stream-Based Channels}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {545--564}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_27}, doi = {10.1007/978-3-662-48000-7\_27}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/FischlinGMP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/PatersonSSW15, author = {Kenneth G. Paterson and Jacob C. N. Schuldt and Dale L. Sibborn and Hoeteck Wee}, editor = {Jens Groth}, title = {Security Against Related Randomness Attacks via Reconstructive Extractors}, booktitle = {Cryptography and Coding - 15th {IMA} International Conference, {IMACC} 2015, Oxford, UK, December 15-17, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9496}, pages = {23--40}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27239-9\_2}, doi = {10.1007/978-3-319-27239-9\_2}, timestamp = {Wed, 18 Mar 2020 16:00:58 +0100}, biburl = {https://dblp.org/rec/conf/ima/PatersonSSW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LiuP15, author = {Shengli Liu and Kenneth G. Paterson}, editor = {Jonathan Katz}, title = {Simulation-Based Selective Opening {CCA} Security for {PKE} from Key Encapsulation Mechanisms}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {3--26}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_1}, doi = {10.1007/978-3-662-46447-2\_1}, timestamp = {Sun, 26 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/LiuP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/GarmanPM15, author = {Christina Garman and Kenneth G. Paterson and Thyla van der Merwe}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {Attacks Only Get Better: Password Recovery Attacks Against {RC4} in {TLS}}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {113--128}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/garman}, timestamp = {Mon, 01 Feb 2021 08:42:57 +0100}, biburl = {https://dblp.org/rec/conf/uss/GarmanPM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuP15, author = {Shengli Liu and Kenneth G. Paterson}, title = {Simulation-based Selective Opening {CCA} Security for {PKE} from Key Encapsulation Mechanisms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {10}, year = {2015}, url = {http://eprint.iacr.org/2015/010}, timestamp = {Sun, 26 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LiuP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoldyrevaDPS15, author = {Alexandra Boldyreva and Jean Paul Degabriele and Kenneth G. Paterson and Martijn Stam}, title = {Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {59}, year = {2015}, url = {http://eprint.iacr.org/2015/059}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoldyrevaDPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlbrechtFHLP15, author = {Martin R. Albrecht and Pooya Farshim and Dennis Hofheinz and Enrique Larraia and Kenneth G. Paterson}, title = {Multilinear Maps from Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {780}, year = {2015}, url = {http://eprint.iacr.org/2015/780}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlbrechtFHLP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatersonSSW15, author = {Kenneth G. Paterson and Jacob C. N. Schuldt and Dale L. Sibborn and Hoeteck Wee}, title = {Security Against Related Randomness Attacks via Reconstructive Extractors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {892}, year = {2015}, url = {http://eprint.iacr.org/2015/892}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatersonSSW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlbrechtP15, author = {Martin R. Albrecht and Kenneth G. Paterson}, title = {Lucky Microseconds: {A} Timing Attack on Amazon's s2n Implementation of {TLS}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1129}, year = {2015}, url = {http://eprint.iacr.org/2015/1129}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlbrechtP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LachariteP15, author = {Marie{-}Sarah Lacharit{\'{e}} and Kenneth G. Paterson}, title = {A note on the optimality of frequency analysis vs. {\(\mathscr{l}\)}\({}_{\mbox{p}}\)-optimization}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1158}, year = {2015}, url = {http://eprint.iacr.org/2015/1158}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LachariteP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/PatersonPS14, author = {Kenneth G. Paterson and Bertram Poettering and Jacob C. N. Schuldt}, editor = {Palash Sarkar and Tetsu Iwata}, title = {Big Bias Hunting in Amazonia: Large-Scale Computation and Exploitation of {RC4} Biases (Invited Paper)}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8873}, pages = {398--419}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45611-8\_21}, doi = {10.1007/978-3-662-45611-8\_21}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/PatersonPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BellarePR14, author = {Mihir Bellare and Kenneth G. Paterson and Phillip Rogaway}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Security of Symmetric Encryption against Mass Surveillance}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8616}, pages = {1--19}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44371-2\_1}, doi = {10.1007/978-3-662-44371-2\_1}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BellarePR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AbdallaBPP14, author = {Michel Abdalla and Fabrice Benhamouda and Alain Passel{\`{e}}gue and Kenneth G. Paterson}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8616}, pages = {77--94}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44371-2\_5}, doi = {10.1007/978-3-662-44371-2\_5}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/AbdallaBPP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/PatersonPS14, author = {Kenneth G. Paterson and Bertram Poettering and Jacob C. N. Schuldt}, editor = {Carlos Cid and Christian Rechberger}, title = {Plaintext Recovery Attacks Against {WPA/TKIP}}, booktitle = {Fast Software Encryption - 21st International Workshop, {FSE} 2014, London, UK, March 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8540}, pages = {325--349}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-46706-0\_17}, doi = {10.1007/978-3-662-46706-0\_17}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/PatersonPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/PatersonSS14, author = {Kenneth G. Paterson and Jacob C. N. Schuldt and Dale L. Sibborn}, editor = {Hugo Krawczyk}, title = {Related Randomness Attacks for Public Key Encryption}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {465--482}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_27}, doi = {10.1007/978-3-642-54631-0\_27}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/PatersonSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secsr/DegabrieleFFGGM14, author = {Jean Paul Degabriele and Victoria Fehr and Marc Fischlin and Tommaso Gagliardoni and Felix G{\"{u}}nther and Giorgia Azzurra Marson and Arno Mittelbach and Kenneth G. Paterson}, editor = {Liqun Chen and Chris J. Mitchell}, title = {Unpicking {PLAID} - {A} Cryptographic Analysis of an ISO-Standards-Track Authentication Protocol}, booktitle = {Security Standardisation Research - First International Conference, {SSR} 2014, London, UK, December 16-17, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8893}, pages = {1--25}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-14054-4\_1}, doi = {10.1007/978-3-319-14054-4\_1}, timestamp = {Sat, 09 Apr 2022 12:41:37 +0200}, biburl = {https://dblp.org/rec/conf/secsr/DegabrieleFFGGM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatersonSS14, author = {Kenneth G. Paterson and Jacob C. N. Schuldt and Dale L. Sibborn}, title = {Related Randomness Attacks for Public Key Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {337}, year = {2014}, url = {http://eprint.iacr.org/2014/337}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatersonSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellarePR14, author = {Mihir Bellare and Kenneth G. Paterson and Phillip Rogaway}, title = {Security of Symmetric Encryption against Mass Surveillance}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {438}, year = {2014}, url = {http://eprint.iacr.org/2014/438}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellarePR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaBPP14, author = {Michel Abdalla and Fabrice Benhamouda and Alain Passel{\`{e}}gue and Kenneth G. Paterson}, title = {Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {488}, year = {2014}, url = {http://eprint.iacr.org/2014/488}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaBPP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DegabrieleFFGGMMP14, author = {Jean Paul Degabriele and Victoria Fehr and Marc Fischlin and Tommaso Gagliardoni and Felix G{\"{u}}nther and Giorgia Azzurra Marson and Arno Mittelbach and Kenneth G. Paterson}, title = {Unpicking {PLAID} - {A} Cryptographic Analysis of an ISO-standards-track Authentication Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {728}, year = {2014}, url = {http://eprint.iacr.org/2014/728}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DegabrieleFFGGMMP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatersonS14a, author = {Kenneth G. Paterson and Mario Strefler}, title = {A Practical Attack Against the {HIVE} Hidden Volume Encryption System}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {901}, year = {2014}, url = {http://eprint.iacr.org/2014/901}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatersonS14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/CaparGPQTZ13, author = {Cagatay Capar and Dennis Goeckel and Kenneth G. Paterson and Elizabeth A. Quaglia and Don Towsley and Murtaza Zafer}, title = {Signal-flow-based analysis of wireless security protocols}, journal = {Inf. Comput.}, volume = {226}, pages = {37--56}, year = {2013}, url = {https://doi.org/10.1016/j.ic.2013.03.004}, doi = {10.1016/J.IC.2013.03.004}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iandc/CaparGPQTZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KrawczykPW13, author = {Hugo Krawczyk and Kenneth G. Paterson and Hoeteck Wee}, editor = {Ran Canetti and Juan A. Garay}, title = {On the Security of the {TLS} Protocol: {A} Systematic Analysis}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8042}, pages = {429--448}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40041-4\_24}, doi = {10.1007/978-3-642-40041-4\_24}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KrawczykPW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FreireHPS13, author = {Eduarda S. V. Freire and Dennis Hofheinz and Kenneth G. Paterson and Christoph Striecks}, editor = {Ran Canetti and Juan A. Garay}, title = {Programmable Hash Functions in the Multilinear Setting}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8042}, pages = {513--530}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40041-4\_28}, doi = {10.1007/978-3-642-40041-4\_28}, timestamp = {Wed, 22 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/FreireHPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/FreirePP13, author = {Eduarda S. V. Freire and Kenneth G. Paterson and Bertram Poettering}, editor = {Ed Dawson}, title = {Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes}, booktitle = {Topics in Cryptology - {CT-RSA} 2013 - The Cryptographers' Track at the {RSA} Conference 2013, San Francisco,CA, USA, February 25-March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7779}, pages = {101--114}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36095-4\_7}, doi = {10.1007/978-3-642-36095-4\_7}, timestamp = {Wed, 22 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/FreirePP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BoydCFPPS13, author = {Colin Boyd and Cas Cremers and Mich{\`{e}}le Feltz and Kenneth G. Paterson and Bertram Poettering and Douglas Stebila}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {{ASICS:} Authenticated Key Exchange Security Incorporating Certification Systems}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {381--399}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_22}, doi = {10.1007/978-3-642-40203-6\_22}, timestamp = {Wed, 25 Sep 2019 18:03:15 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BoydCFPPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BoldyrevaDPS13, author = {Alexandra Boldyreva and Jean Paul Degabriele and Kenneth G. Paterson and Martijn Stam}, editor = {Shiho Moriai}, title = {On Symmetric Encryption with Distinguishable Decryption Failures}, booktitle = {Fast Software Encryption - 20th International Workshop, {FSE} 2013, Singapore, March 11-13, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8424}, pages = {367--390}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43933-3\_19}, doi = {10.1007/978-3-662-43933-3\_19}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/BoldyrevaDPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/JagerPS13, author = {Tibor Jager and Kenneth G. Paterson and Juraj Somorovsky}, title = {One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography}, booktitle = {20th Annual Network and Distributed System Security Symposium, {NDSS} 2013, San Diego, California, USA, February 24-27, 2013}, publisher = {The Internet Society}, year = {2013}, url = {https://www.ndss-symposium.org/ndss2013/one-bad-apple-backwards-compatibility-attacks-state-art-cryptography}, timestamp = {Mon, 01 Feb 2021 08:42:13 +0100}, biburl = {https://dblp.org/rec/conf/ndss/JagerPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FreireHKP13, author = {Eduarda S. V. Freire and Dennis Hofheinz and Eike Kiltz and Kenneth G. Paterson}, editor = {Kaoru Kurosawa and Goichiro Hanaoka}, title = {Non-Interactive Key Exchange}, booktitle = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7778}, pages = {254--271}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36362-7\_17}, doi = {10.1007/978-3-642-36362-7\_17}, timestamp = {Wed, 22 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/FreireHKP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FarshimLPQ13, author = {Pooya Farshim and Beno{\^{\i}}t Libert and Kenneth G. Paterson and Elizabeth A. Quaglia}, editor = {Kaoru Kurosawa and Goichiro Hanaoka}, title = {Robust Encryption, Revisited}, booktitle = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7778}, pages = {352--368}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36362-7\_22}, doi = {10.1007/978-3-642-36362-7\_22}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/FarshimLPQ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/AlFardanP13, author = {Nadhem J. AlFardan and Kenneth G. Paterson}, title = {Lucky Thirteen: Breaking the {TLS} and {DTLS} Record Protocols}, booktitle = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley, CA, USA, May 19-22, 2013}, pages = {526--540}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SP.2013.42}, doi = {10.1109/SP.2013.42}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/AlFardanP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AlFardanBPPS13, author = {Nadhem J. AlFardan and Daniel J. Bernstein and Kenneth G. Paterson and Bertram Poettering and Jacob C. N. Schuldt}, editor = {Samuel T. King}, title = {On the Security of {RC4} in {TLS}}, booktitle = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC, USA, August 14-16, 2013}, pages = {305--320}, publisher = {{USENIX} Association}, year = {2013}, url = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/paper/alFardan}, timestamp = {Mon, 01 Feb 2021 08:42:56 +0100}, biburl = {https://dblp.org/rec/conf/uss/AlFardanBPPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KrawczykPW13, author = {Hugo Krawczyk and Kenneth G. Paterson and Hoeteck Wee}, title = {On the Security of the {TLS} Protocol: {A} Systematic Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {339}, year = {2013}, url = {http://eprint.iacr.org/2013/339}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KrawczykPW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FreireHPS13, author = {Eduarda S. V. Freire and Dennis Hofheinz and Kenneth G. Paterson and Christoph Striecks}, title = {Programmable Hash Functions in the Multilinear Setting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {354}, year = {2013}, url = {http://eprint.iacr.org/2013/354}, timestamp = {Wed, 22 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FreireHPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoydCFPPS13, author = {Colin Boyd and Cas Cremers and Mich{\`{e}}le Feltz and Kenneth G. Paterson and Bertram Poettering and Douglas Stebila}, title = {{ASICS:} Authenticated Key Exchange Security Incorporating Certification Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {398}, year = {2013}, url = {http://eprint.iacr.org/2013/398}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoydCFPPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoldyrevaDPS13, author = {Alexandra Boldyreva and Jean Paul Degabriele and Kenneth G. Paterson and Martijn Stam}, title = {On Symmetric Encryption with Distinguishable Decryption Failures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {433}, year = {2013}, url = {http://eprint.iacr.org/2013/433}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoldyrevaDPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatersonPS13, author = {Kenneth G. Paterson and Bertram Poettering and Jacob C. N. Schuldt}, title = {Plaintext Recovery Attacks Against {WPA/TKIP}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {748}, year = {2013}, url = {http://eprint.iacr.org/2013/748}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatersonPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BellarePT12, author = {Mihir Bellare and Kenneth G. Paterson and Susan Thomson}, editor = {Xiaoyun Wang and Kazue Sako}, title = {{RKA} Security beyond the Linear Barrier: IBE, Encryption and Signatures}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7658}, pages = {331--348}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34961-4\_21}, doi = {10.1007/978-3-642-34961-4\_21}, timestamp = {Mon, 25 Nov 2019 15:32:14 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/BellarePT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/PatersonPS12, author = {Kenneth G. Paterson and Antigoni Polychroniadou and Dale L. Sibborn}, editor = {Xiaoyun Wang and Kazue Sako}, title = {A Coding-Theoretic Approach to Recovering Noisy {RSA} Keys}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7658}, pages = {386--403}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34961-4\_24}, doi = {10.1007/978-3-642-34961-4\_24}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/PatersonPS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/PatersonW12, author = {Kenneth G. Paterson and Gaven J. Watson}, editor = {David Naccache}, title = {Authenticated-Encryption with Padding: {A} Formal Security Treatment}, booktitle = {Cryptography and Security: From Theory to Applications - Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday}, series = {Lecture Notes in Computer Science}, volume = {6805}, pages = {83--107}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28368-0\_9}, doi = {10.1007/978-3-642-28368-0\_9}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/birthday/PatersonW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/DegabrieleLPSS12, author = {Jean Paul Degabriele and Anja Lehmann and Kenneth G. Paterson and Nigel P. Smart and Mario Strefler}, editor = {Orr Dunkelman}, title = {On the Joint Security of Encryption and Signature in {EMV}}, booktitle = {Topics in Cryptology - {CT-RSA} 2012 - The Cryptographers' Track at the {RSA} Conference 2012, San Francisco, CA, USA, February 27 - March 2, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7178}, pages = {116--135}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-27954-6\_8}, doi = {10.1007/978-3-642-27954-6\_8}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/DegabrieleLPSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BoldyrevaDPS12, author = {Alexandra Boldyreva and Jean Paul Degabriele and Kenneth G. Paterson and Martijn Stam}, editor = {David Pointcheval and Thomas Johansson}, title = {Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {682--699}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_40}, doi = {10.1007/978-3-642-29011-4\_40}, timestamp = {Sun, 12 Nov 2023 02:15:08 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/BoldyrevaDPS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/PatersonA12, author = {Kenneth G. Paterson and Nadhem J. AlFardan}, title = {Plaintext-Recovery Attacks Against Datagram {TLS}}, booktitle = {19th Annual Network and Distributed System Security Symposium, {NDSS} 2012, San Diego, California, USA, February 5-8, 2012}, publisher = {The Internet Society}, year = {2012}, url = {https://www.ndss-symposium.org/ndss2012/plain-text-recovery-attacks-against-datagram-tls}, timestamp = {Mon, 01 Feb 2021 08:42:14 +0100}, biburl = {https://dblp.org/rec/conf/ndss/PatersonA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LibertPQ12, author = {Beno{\^{\i}}t Libert and Kenneth G. Paterson and Elizabeth A. Quaglia}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {206--224}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_13}, doi = {10.1007/978-3-642-30057-8\_13}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LibertPQ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellarePT12, author = {Mihir Bellare and Kenneth G. Paterson and Susan Thomson}, title = {{RKA} Security beyond the Linear Barrier: IBE, Encryption and Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {514}, year = {2012}, url = {http://eprint.iacr.org/2012/514}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellarePT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FreirePP12, author = {Eduarda S. V. Freire and Kenneth G. Paterson and Bertram Poettering}, title = {Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {645}, year = {2012}, url = {http://eprint.iacr.org/2012/645}, timestamp = {Wed, 22 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FreirePP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FarshimLPQ12, author = {Pooya Farshim and Beno{\^{\i}}t Libert and Kenneth G. Paterson and Elizabeth A. Quaglia}, title = {Robust Encryption, Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {673}, year = {2012}, url = {http://eprint.iacr.org/2012/673}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FarshimLPQ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatersonPS12, author = {Kenneth G. Paterson and Antigoni Polychroniadou and Dale L. Sibborn}, title = {A Coding-Theoretic Approach to Recovering Noisy {RSA} Keys}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {724}, year = {2012}, url = {http://eprint.iacr.org/2012/724}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatersonPS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FreireHKP12, author = {Eduarda S. V. Freire and Dennis Hofheinz and Eike Kiltz and Kenneth G. Paterson}, title = {Non-Interactive Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {732}, year = {2012}, url = {http://eprint.iacr.org/2012/732}, timestamp = {Wed, 22 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FreireHKP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/DegabrielePW11, author = {Jean Paul Degabriele and Kenneth G. Paterson and Gaven J. Watson}, title = {Provable Security in the Real World}, journal = {{IEEE} Secur. Priv.}, volume = {9}, number = {3}, pages = {33--41}, year = {2011}, url = {https://doi.org/10.1109/MSP.2010.200}, doi = {10.1109/MSP.2010.200}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/DegabrielePW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/LimP11, author = {Hoon Wei Lim and Kenneth G. Paterson}, title = {Identity-based cryptography for grid security}, journal = {Int. J. Inf. Sec.}, volume = {10}, number = {1}, pages = {15--32}, year = {2011}, url = {https://doi.org/10.1007/s10207-010-0116-z}, doi = {10.1007/S10207-010-0116-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/LimP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/CramptonLPP11, author = {Jason Crampton and Hoon Wei Lim and Kenneth G. Paterson and Geraint Price}, title = {User-friendly and certificate-free grid security infrastructure}, journal = {Int. J. Inf. Sec.}, volume = {10}, number = {3}, pages = {137--153}, year = {2011}, url = {https://doi.org/10.1007/s10207-011-0123-8}, doi = {10.1007/S10207-011-0123-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/CramptonLPP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/FreireP11, author = {Eduarda S. V. Freire and Kenneth G. Paterson}, editor = {Udaya Parampalli and Philip Hawkes}, title = {Provably Secure Key Assignment Schemes from Factoring}, booktitle = {Information Security and Privacy - 16th Australasian Conference, {ACISP} 2011, Melbourne, Australia, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6812}, pages = {292--309}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22497-3\_19}, doi = {10.1007/978-3-642-22497-3\_19}, timestamp = {Wed, 22 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/FreireP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/PatersonSST11, author = {Kenneth G. Paterson and Jacob C. N. Schuldt and Martijn Stam and Susan Thomson}, editor = {Dong Hoon Lee and Xiaoyun Wang}, title = {On the Joint Security of Encryption and Signature, Revisited}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7073}, pages = {161--178}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25385-0\_9}, doi = {10.1007/978-3-642-25385-0\_9}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/PatersonSST11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/PatersonRS11, author = {Kenneth G. Paterson and Thomas Ristenpart and Thomas Shrimpton}, editor = {Dong Hoon Lee and Xiaoyun Wang}, title = {Tag Size Does Matter: Attacks and Proofs for the {TLS} Record Protocol}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7073}, pages = {372--389}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25385-0\_20}, doi = {10.1007/978-3-642-25385-0\_20}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/PatersonRS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/AlbrechtFPW11, author = {Martin R. Albrecht and Pooya Farshim and Kenneth G. Paterson and Gaven J. Watson}, editor = {Antoine Joux}, title = {On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model}, booktitle = {Fast Software Encryption - 18th International Workshop, {FSE} 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6733}, pages = {128--145}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21702-9\_8}, doi = {10.1007/978-3-642-21702-9\_8}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/AlbrechtFPW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/AlbrechtP11, author = {Martin R. Albrecht and Kenneth G. Paterson}, editor = {Liqun Chen}, title = {Breaking an Identity-Based Encryption Scheme Based on {DHIES}}, booktitle = {Cryptography and Coding - 13th {IMA} International Conference, {IMACC} 2011, Oxford, UK, December 12-15, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7089}, pages = {344--355}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25516-8\_21}, doi = {10.1007/978-3-642-25516-8\_21}, timestamp = {Wed, 18 Mar 2020 16:00:56 +0100}, biburl = {https://dblp.org/rec/conf/ima/AlbrechtP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2011, editor = {Kenneth G. Paterson}, title = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4}, doi = {10.1007/978-3-642-20465-4}, isbn = {978-3-642-20464-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlbrechtFPW11, author = {Martin R. Albrecht and Pooya Farshim and Kenneth G. Paterson and Gaven J. Watson}, title = {On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {213}, year = {2011}, url = {http://eprint.iacr.org/2011/213}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlbrechtFPW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LibertPQ11, author = {Beno{\^{\i}}t Libert and Kenneth G. Paterson and Elizabeth A. Quaglia}, title = {Anonymous Broadcast Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {476}, year = {2011}, url = {http://eprint.iacr.org/2011/476}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LibertPQ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatersonSST11, author = {Kenneth G. Paterson and Jacob C. N. Schuldt and Martijn Stam and Susan Thomson}, title = {On the Joint Security of Encryption and Signature, Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {486}, year = {2011}, url = {http://eprint.iacr.org/2011/486}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatersonSST11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DegabrieleLPSS11, author = {Jean Paul Degabriele and Anja Lehmann and Kenneth G. Paterson and Nigel P. Smart and Mario Strefler}, title = {On the Joint Security of Encryption and Signature in {EMV}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {615}, year = {2011}, url = {http://eprint.iacr.org/2011/615}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DegabrieleLPSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/BalfeYP10, author = {Shane Balfe and Po{-}Wah Yau and Kenneth G. Paterson}, title = {A guide to trust in mobile ad hoc networks}, journal = {Secur. Commun. Networks}, volume = {3}, number = {6}, pages = {503--516}, year = {2010}, url = {https://doi.org/10.1002/sec.147}, doi = {10.1002/SEC.147}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/BalfeYP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/BalfeMPP10, author = {Shane Balfe and Andrew D. McDonald and Kenneth G. Paterson and Helen Phillips}, title = {Identity crisis: on the problem of namespace design for {ID-PKC} and MANETs}, journal = {Secur. Commun. Networks}, volume = {3}, number = {6}, pages = {535--545}, year = {2010}, url = {https://doi.org/10.1002/sec.145}, doi = {10.1002/SEC.145}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/BalfeMPP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PatersonS10, author = {Kenneth G. Paterson and Douglas Stebila}, editor = {Ron Steinfeld and Philip Hawkes}, title = {One-Time-Password-Authenticated Key Exchange}, booktitle = {Information Security and Privacy - 15th Australasian Conference, {ACISP} 2010, Sydney, Australia, July 5-7, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6168}, pages = {264--281}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14081-5\_17}, doi = {10.1007/978-3-642-14081-5\_17}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PatersonS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DegabrieleP10, author = {Jean Paul Degabriele and Kenneth G. Paterson}, editor = {Ehab Al{-}Shaer and Angelos D. Keromytis and Vitaly Shmatikov}, title = {On the (in)security of IPsec in MAC-then-encrypt configurations}, booktitle = {Proceedings of the 17th {ACM} Conference on Computer and Communications Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010}, pages = {493--504}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866307.1866363}, doi = {10.1145/1866307.1866363}, timestamp = {Tue, 10 Nov 2020 20:00:21 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DegabrieleP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/PatersonW10, author = {Kenneth G. Paterson and Gaven J. Watson}, editor = {Henri Gilbert}, title = {Plaintext-Dependent Decryption: {A} Formal Security Treatment of {SSH-CTR}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30 - June 3, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6110}, pages = {345--361}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13190-5\_18}, doi = {10.1007/978-3-642-13190-5\_18}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/PatersonW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/AlFardanP10, author = {Nadhem J. AlFardan and Kenneth G. Paterson}, editor = {Mike Burmester and Gene Tsudik and Spyros S. Magliveras and Ivana Ilic}, title = {An Analysis of DepenDNS}, booktitle = {Information Security - 13th International Conference, {ISC} 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6531}, pages = {31--38}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-18178-8\_4}, doi = {10.1007/978-3-642-18178-8\_4}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/AlFardanP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/PatersonQ10, author = {Kenneth G. Paterson and Elizabeth A. Quaglia}, editor = {Juan A. Garay and Roberto De Prisco}, title = {Time-Specific Encryption}, booktitle = {Security and Cryptography for Networks, 7th International Conference, {SCN} 2010, Amalfi, Italy, September 13-15, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6280}, pages = {1--16}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15317-4\_1}, doi = {10.1007/978-3-642-15317-4\_1}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/PatersonQ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatersonW10, author = {Kenneth G. Paterson and Gaven J. Watson}, title = {Plaintext-Dependent Decryption: {A} Formal Security Treatment of {SSH-CTR}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {95}, year = {2010}, url = {http://eprint.iacr.org/2010/095}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatersonW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatersonQ10, author = {Kenneth G. Paterson and Elizabeth A. Quaglia}, title = {Time-Specific Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {347}, year = {2010}, url = {http://eprint.iacr.org/2010/347}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatersonQ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlbrechtP10, author = {Martin R. Albrecht and Kenneth G. Paterson}, title = {Breaking An Identity-Based Encryption Scheme based on {DHIES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {637}, year = {2010}, url = {http://eprint.iacr.org/2010/637}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlbrechtP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/PatersonS09, author = {Kenneth G. Paterson and Sriramkrishnan Srinivasan}, title = {On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups}, journal = {Des. Codes Cryptogr.}, volume = {52}, number = {2}, pages = {219--241}, year = {2009}, url = {https://doi.org/10.1007/s10623-009-9278-y}, doi = {10.1007/S10623-009-9278-Y}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/PatersonS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/BoydCNP09, author = {Colin Boyd and Yvonne Cliff and Juan Manuel Gonz{\'{a}}lez Nieto and Kenneth G. Paterson}, title = {One-round key exchange in the standard model}, journal = {Int. J. Appl. Cryptogr.}, volume = {1}, number = {3}, pages = {181--199}, year = {2009}, url = {https://doi.org/10.1504/IJACT.2009.023466}, doi = {10.1504/IJACT.2009.023466}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/BoydCNP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/EtzionKKLP09, author = {Tuvi Etzion and Nicholas Kalouptsidis and Nicholas Kolokotronis and Konstantinos Limniotis and Kenneth G. Paterson}, title = {Properties of the error linear complexity spectrum}, journal = {{IEEE} Trans. Inf. Theory}, volume = {55}, number = {10}, pages = {4681--4686}, year = {2009}, url = {https://doi.org/10.1109/TIT.2009.2027495}, doi = {10.1109/TIT.2009.2027495}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/EtzionKKLP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PatersonS09, author = {Kenneth G. Paterson and Sriramkrishnan Srinivasan}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Building Key-Private Public-Key Encryption Schemes}, booktitle = {Information Security and Privacy, 14th Australasian Conference, {ACISP} 2009, Brisbane, Australia, July 1-3, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5594}, pages = {276--292}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02620-1\_20}, doi = {10.1007/978-3-642-02620-1\_20}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PatersonS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/AlbrechtPW09, author = {Martin R. Albrecht and Kenneth G. Paterson and Gaven J. Watson}, title = {Plaintext Recovery Attacks against {SSH}}, booktitle = {30th {IEEE} Symposium on Security and Privacy {(SP} 2009), 17-20 May 2009, Oakland, California, {USA}}, pages = {16--26}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/SP.2009.5}, doi = {10.1109/SP.2009.5}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/AlbrechtPW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dagstuhl/2009P9311, editor = {Samuel L. Braunstein and Hoi{-}Kwong Lo and Kenny Paterson and Peter Y. A. Ryan}, title = {Classical and Quantum Information Assurance Foundations and Practice, 26.07. - 31.07.2009}, series = {Dagstuhl Seminar Proceedings}, volume = {09311}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany}, year = {2009}, url = {http://drops.dagstuhl.de/portals/09311/}, timestamp = {Thu, 10 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/2009P9311.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/BraunsteinLPR09, author = {Samuel L. Braunstein and Hoi{-}Kwong Lo and Kenny Paterson and Peter Y. A. Ryan}, editor = {Samuel L. Braunstein and Hoi{-}Kwong Lo and Kenny Paterson and Peter Y. A. Ryan}, title = {09311 Abstracts Collection - Classical and Quantum Information Assurance Foundations and Practice}, booktitle = {Classical and Quantum Information Assurance Foundations and Practice, 26.07. - 31.07.2009}, series = {Dagstuhl Seminar Proceedings}, volume = {09311}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany}, year = {2009}, url = {http://drops.dagstuhl.de/opus/volltexte/2010/2365/}, timestamp = {Thu, 10 Jun 2021 13:02:05 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/BraunsteinLPR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatersonS09, author = {Kenneth G. Paterson and Douglas Stebila}, title = {One-time-password-authenticated key exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {430}, year = {2009}, url = {http://eprint.iacr.org/2009/430}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatersonS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dam/GalbraithPS08, author = {Steven D. Galbraith and Kenneth G. Paterson and Nigel P. Smart}, title = {Pairings for cryptographers}, journal = {Discret. Appl. Math.}, volume = {156}, number = {16}, pages = {3113--3121}, year = {2008}, url = {https://doi.org/10.1016/j.dam.2007.12.010}, doi = {10.1016/J.DAM.2007.12.010}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dam/GalbraithPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BalfeGMP08, author = {Shane Balfe and Eimear Gallery and Chris J. Mitchell and Kenneth G. Paterson}, title = {Challenges for Trusted Computing}, journal = {{IEEE} Secur. Priv.}, volume = {6}, number = {6}, pages = {60--66}, year = {2008}, url = {https://doi.org/10.1109/MSP.2008.138}, doi = {10.1109/MSP.2008.138}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/BalfeGMP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BoydCNP08, author = {Colin Boyd and Yvonne Cliff and Juan Manuel Gonz{\'{a}}lez Nieto and Kenneth G. Paterson}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Efficient One-Round Key Exchange in the Standard Model}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {69--83}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_6}, doi = {10.1007/978-3-540-70500-0\_6}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BoydCNP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BalfeP08, author = {Shane Balfe and Kenneth G. Paterson}, editor = {Shouhuai Xu and Cristina Nita{-}Rotaru and Jean{-}Pierre Seifert}, title = {e-EMV: emulating {EMV} for internet payments with trusted computing technologies}, booktitle = {Proceedings of the 3rd {ACM} Workshop on Scalable Trusted Computing, {STC} 2008, Alexandria, VA, USA, October 31, 2008}, pages = {81--92}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456455.1456468}, doi = {10.1145/1456455.1456468}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BalfeP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SrivatsaBPR08, author = {Mudhakar Srivatsa and Shane Balfe and Kenneth G. Paterson and Pankaj Rohatgi}, editor = {Peng Ning and Paul F. Syverson and Somesh Jha}, title = {Trust management for secure information flows}, booktitle = {Proceedings of the 2008 {ACM} Conference on Computer and Communications Security, {CCS} 2008, Alexandria, Virginia, USA, October 27-31, 2008}, pages = {175--188}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1455770.1455794}, doi = {10.1145/1455770.1455794}, timestamp = {Tue, 10 Nov 2020 19:59:27 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SrivatsaBPR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/BalfeP08, author = {Shane Balfe and Kenneth G. Paterson}, editor = {Gene Tsudik}, title = {Augmenting Internet-Based Card Not Present Transactions with Trusted Computing (Extended Abstract)}, booktitle = {Financial Cryptography and Data Security, 12th International Conference, {FC} 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5143}, pages = {171--175}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85230-8\_13}, doi = {10.1007/978-3-540-85230-8\_13}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/BalfeP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/EtzionKKLP08, author = {Tuvi Etzion and Nicholas Kalouptsidis and Nicholas Kolokotronis and Konstantinos Limniotis and Kenneth G. Paterson}, editor = {Frank R. Kschischang and En{-}Hui Yang}, title = {On the error linear complexity profiles of binary sequences of period 2\({}^{\mbox{n}}\)}, booktitle = {2008 {IEEE} International Symposium on Information Theory, {ISIT} 2008, Toronto, ON, Canada, July 6-11, 2008}, pages = {2400--2404}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISIT.2008.4595421}, doi = {10.1109/ISIT.2008.4595421}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isit/EtzionKKLP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pairing/PatersonS08, author = {Kenneth G. Paterson and Sriramkrishnan Srinivasan}, editor = {Steven D. Galbraith and Kenneth G. Paterson}, title = {Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities}, booktitle = {Pairing-Based Cryptography - Pairing 2008, Second International Conference, Egham, UK, September 1-3, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5209}, pages = {354--375}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85538-5\_23}, doi = {10.1007/978-3-540-85538-5\_23}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/pairing/PatersonS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/SchuldtMP08, author = {Jacob C. N. Schuldt and Kanta Matsuura and Kenneth G. Paterson}, editor = {Ronald Cramer}, title = {Proxy Signatures Secure Against Proxy Key Exposure}, booktitle = {Public Key Cryptography - {PKC} 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4939}, pages = {141--161}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78440-1\_9}, doi = {10.1007/978-3-540-78440-1\_9}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/SchuldtMP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DentLP08, author = {Alexander W. Dent and Beno{\^{\i}}t Libert and Kenneth G. Paterson}, editor = {Ronald Cramer}, title = {Certificateless Encryption Schemes Strongly Secure in the Standard Model}, booktitle = {Public Key Cryptography - {PKC} 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4939}, pages = {344--359}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78440-1\_20}, doi = {10.1007/978-3-540-78440-1\_20}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DentLP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/PatersonW08, author = {Kenneth G. Paterson and Gaven J. Watson}, editor = {Rafail Ostrovsky and Roberto De Prisco and Ivan Visconti}, title = {Immunising {CBC} Mode Against Padding Oracle Attacks: {A} Formal Security Treatment}, booktitle = {Security and Cryptography for Networks, 6th International Conference, {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5229}, pages = {340--357}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85855-3\_23}, doi = {10.1007/978-3-540-85855-3\_23}, timestamp = {Tue, 25 Feb 2020 11:33:46 +0100}, biburl = {https://dblp.org/rec/conf/scn/PatersonW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pairing/2008, editor = {Steven D. Galbraith and Kenneth G. Paterson}, title = {Pairing-Based Cryptography - Pairing 2008, Second International Conference, Egham, UK, September 1-3, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5209}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85538-5}, doi = {10.1007/978-3-540-85538-5}, isbn = {978-3-540-85503-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pairing/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoydCNP08, author = {Colin Boyd and Yvonne Cliff and Juan Manuel Gonz{\'{a}}lez Nieto and Kenneth G. Paterson}, title = {Efficient One-round Key Exchange in the Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {7}, year = {2008}, url = {http://eprint.iacr.org/2008/007}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoydCNP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/LimP07, author = {Hoon Wei Lim and Kenneth G. Paterson}, editor = {Steven D. Galbraith}, title = {Multi-key Hierarchical Identity-Based Signatures}, booktitle = {Cryptography and Coding, 11th {IMA} International Conference, Cirencester, UK, December 18-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4887}, pages = {384--402}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77272-9\_23}, doi = {10.1007/978-3-540-77272-9\_23}, timestamp = {Wed, 18 Mar 2020 16:00:59 +0100}, biburl = {https://dblp.org/rec/conf/ima/LimP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/DegabrieleP07, author = {Jean Paul Degabriele and Kenneth G. Paterson}, title = {Attacking the IPsec Standards in Encryption-only Configurations}, booktitle = {2007 {IEEE} Symposium on Security and Privacy (S{\&}P 2007), 20-23 May 2007, Oakland, California, {USA}}, pages = {335--349}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/SP.2007.8}, doi = {10.1109/SP.2007.8}, timestamp = {Thu, 21 Sep 2023 15:57:31 +0200}, biburl = {https://dblp.org/rec/conf/sp/DegabrieleP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sws/CramptonLP07, author = {Jason Crampton and Hoon Wei Lim and Kenneth G. Paterson}, editor = {Peng Ning and Ernesto Damiani and Seth Proctor}, title = {What can identity-based cryptography offer to web services?}, booktitle = {Proceedings of the 4th {ACM} Workshop On Secure Web Services, {SWS} 2007, Fairfax, VA, USA, November 2, 2007}, pages = {26--36}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1314418.1314424}, doi = {10.1145/1314418.1314424}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sws/CramptonLP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DentLP07, author = {Alexander W. Dent and Beno{\^{\i}}t Libert and Kenneth G. Paterson}, title = {Certificateless Encryption Schemes Strongly Secure in the Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {121}, year = {2007}, url = {http://eprint.iacr.org/2007/121}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DentLP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DegabrieleP07, author = {Jean Paul Degabriele and Kenneth G. Paterson}, title = {Attacking the IPsec Standards in Encryption-only Configurations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {125}, year = {2007}, url = {http://eprint.iacr.org/2007/125}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DegabrieleP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatersonS07, author = {Kenneth G. Paterson and Sriramkrishnan Srinivasan}, title = {On the Relations Between Non-Interactive Key Distribution, Identity-Based Encryption and Trapdoor Discrete Log Groups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {453}, year = {2007}, url = {http://eprint.iacr.org/2007/453}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatersonS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/PatersonY06, author = {Kenneth G. Paterson and Arnold K. L. Yau}, title = {Lost in translation: theory and practice in cryptography}, journal = {{IEEE} Secur. Priv.}, volume = {4}, number = {3}, pages = {69--72}, year = {2006}, url = {https://doi.org/10.1109/MSP.2006.74}, doi = {10.1109/MSP.2006.74}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/PatersonY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Paterson06, author = {Kenneth G. Paterson}, title = {A cryptographic tour of the IPsec standards}, journal = {Inf. Secur. Tech. Rep.}, volume = {11}, number = {2}, pages = {72--81}, year = {2006}, url = {https://doi.org/10.1016/j.istr.2006.03.004}, doi = {10.1016/J.ISTR.2006.03.004}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Paterson06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PatersonS06, author = {Kenneth G. Paterson and Jacob C. N. Schuldt}, editor = {Lynn Margaret Batten and Reihaneh Safavi{-}Naini}, title = {Efficient Identity-Based Signatures Secure in the Standard Model}, booktitle = {Information Security and Privacy, 11th Australasian Conference, {ACISP} 2006, Melbourne, Australia, July 3-5, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4058}, pages = {207--222}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11780656\_18}, doi = {10.1007/11780656\_18}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PatersonS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/PatersonY06, author = {Kenneth G. Paterson and Arnold K. L. Yau}, editor = {Serge Vaudenay}, title = {Cryptography in Theory and Practice: The Case of Encryption in IPsec}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4004}, pages = {12--29}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11761679\_2}, doi = {10.1007/11761679\_2}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/PatersonY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/LimP06, author = {Hoon Wei Lim and Kenneth G. Paterson}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Secret Public Key Protocols Revisited}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {237--256}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_32}, doi = {10.1007/978-3-642-04904-0\_32}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/LimP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatersonS06, author = {Kenneth G. Paterson and Jacob C. N. Schuldt}, title = {Efficient Identity-based Signatures Secure in the Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {80}, year = {2006}, url = {http://eprint.iacr.org/2006/080}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatersonS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Paterson06, author = {Kenneth G. Paterson}, title = {A Cryptographic Tour of the IPsec Standards}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {97}, year = {2006}, url = {http://eprint.iacr.org/2006/097}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Paterson06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalbraithPS06, author = {Steven D. Galbraith and Kenneth G. Paterson and Nigel P. Smart}, title = {Pairings for Cryptographers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {165}, year = {2006}, url = {http://eprint.iacr.org/2006/165}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalbraithPS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CaoPK06, author = {Xuefei Cao and Kenneth G. Paterson and Weidong Kou}, title = {An Attack on a Certificateless Signature Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {367}, year = {2006}, url = {http://eprint.iacr.org/2006/367}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CaoPK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/EtzionP05, author = {Tuvi Etzion and Kenneth G. Paterson}, title = {Zero/Positive Capacities of Two-Dimensional Runlength-Constrained Arrays}, journal = {{IEEE} Trans. Inf. Theory}, volume = {51}, number = {9}, pages = {3186--3199}, year = {2005}, url = {https://doi.org/10.1109/TIT.2005.853316}, doi = {10.1109/TIT.2005.853316}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/EtzionP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/KudlaP05, author = {Caroline Kudla and Kenneth G. Paterson}, editor = {Bimal K. Roy}, title = {Modular Security Proofs for Key Agreement Protocols}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3788}, pages = {549--565}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11593447\_30}, doi = {10.1007/11593447\_30}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/KudlaP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eScience/LimP05, author = {Hoon Wei Lim and Kenneth G. Paterson}, title = {Identity-Based Cryptography for Grid Security}, booktitle = {First International Conference on e-Science and Grid Technologies (e-Science 2005), 5-8 December 2005, Melbourne, Australia}, pages = {395--404}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/E-SCIENCE.2005.52}, doi = {10.1109/E-SCIENCE.2005.52}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eScience/LimP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/YauPM05, author = {Arnold K. L. Yau and Kenneth G. Paterson and Chris J. Mitchell}, editor = {Henri Gilbert and Helena Handschuh}, title = {Padding Oracle Attacks on CBC-Mode Encryption with Secret and Random IVs}, booktitle = {Fast Software Encryption: 12th International Workshop, {FSE} 2005, Paris, France, February 21-23, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3557}, pages = {299--319}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11502760\_20}, doi = {10.1007/11502760\_20}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/YauPM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/KudlaP05, author = {Caroline Kudla and Kenneth G. Paterson}, editor = {Nigel P. Smart}, title = {Non-interactive Designated Verifier Proofs and Undeniable Signatures}, booktitle = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester, UK, December 19-21, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3796}, pages = {136--154}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11586821\_10}, doi = {10.1007/11586821\_10}, timestamp = {Wed, 18 Mar 2020 16:00:57 +0100}, biburl = {https://dblp.org/rec/conf/ima/KudlaP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/p2p/BalfeLP05, author = {Shane Balfe and Amit D. Lakhani and Kenneth G. Paterson}, editor = {Germano Caronni and Nathalie Weiler and Marcel Waldvogel and Nahid Shahmehri}, title = {Trusted Computing: Providing Security for Peer-to-Peer Networks}, booktitle = {Fifth {IEEE} International Conference on Peer-to-Peer Computing {(P2P} 2005), 31 August - 2 September 2005, Konstanz, Germany}, pages = {117--124}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/P2P.2005.40}, doi = {10.1109/P2P.2005.40}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/p2p/BalfeLP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Al-RiyamiP05, author = {Sattam S. Al{-}Riyami and Kenneth G. Paterson}, editor = {Serge Vaudenay}, title = {{CBE} from {CL-PKE:} {A} Generic Construction and Efficient Schemes}, booktitle = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3386}, pages = {398--415}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30580-4\_27}, doi = {10.1007/978-3-540-30580-4\_27}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Al-RiyamiP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatersonY05, author = {Kenneth G. Paterson and Arnold K. L. Yau}, title = {Cryptography in Theory and Practice: The Case of Encryption in IPsec}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {416}, year = {2005}, url = {http://eprint.iacr.org/2005/416}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatersonY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/Paterson04, author = {Kenneth G. Paterson}, title = {On codes with low peak-to-average power ratio for multicode {CDMA}}, journal = {{IEEE} Trans. Inf. Theory}, volume = {50}, number = {3}, pages = {550--559}, year = {2004}, url = {https://doi.org/10.1109/TIT.2004.825505}, doi = {10.1109/TIT.2004.825505}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/Paterson04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/BoydMP04, author = {Colin Boyd and Wenbo Mao and Kenneth G. Paterson}, editor = {Markus Jakobsson and Moti Yung and Jianying Zhou}, title = {Key Agreement Using Statically Keyed Authenticators}, booktitle = {Applied Cryptography and Network Security, Second International Conference, {ACNS} 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3089}, pages = {248--262}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24852-1\_18}, doi = {10.1007/978-3-540-24852-1\_18}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/acns/BoydMP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/PatersonY04, author = {Kenneth G. Paterson and Arnold K. L. Yau}, editor = {Tatsuaki Okamoto}, title = {Padding Oracle Attacks on the {ISO} {CBC} Mode Encryption Standard}, booktitle = {Topics in Cryptology - {CT-RSA} 2004, The Cryptographers' Track at the {RSA} Conference 2004, San Francisco, CA, USA, February 23-27, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2964}, pages = {305--323}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24660-2\_24}, doi = {10.1007/978-3-540-24660-2\_24}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/PatersonY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ChenKP04, author = {Liqun Chen and Caroline Kudla and Kenneth G. Paterson}, editor = {Christian Cachin and Jan Camenisch}, title = {Concurrent Signatures}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3027}, pages = {287--305}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24676-3\_18}, doi = {10.1007/978-3-540-24676-3\_18}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ChenKP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BlackburnP04, author = {Simon R. Blackburn and Kenneth G. Paterson}, editor = {Bimal K. Roy and Willi Meier}, title = {Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan}, booktitle = {Fast Software Encryption, 11th International Workshop, {FSE} 2004, Delhi, India, February 5-7, 2004, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3017}, pages = {446--453}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25937-4\_28}, doi = {10.1007/978-3-540-25937-4\_28}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/BlackburnP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/WunderP04, author = {Gerhard Wunder and Kenneth G. Paterson}, title = {Crest-factor analysis of carrier interferometry {MC-CDMA} and {OFDM} systems}, booktitle = {Proceedings of the 2004 {IEEE} International Symposium on Information Theory, {ISIT} 2004, Chicago Downtown Marriott, Chicago, Illinois, USA, June 27 - July 2, 2004}, pages = {426}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/ISIT.2004.1365463}, doi = {10.1109/ISIT.2004.1365463}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/WunderP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatersonPS04, author = {Kenneth G. Paterson and Fred Piper and R{\"{u}}diger Schack}, title = {Quantum cryptography: a practical information security perspective}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {156}, year = {2004}, url = {http://eprint.iacr.org/2004/156}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatersonPS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/PiperPP03, author = {Fred Piper and Geraint Price and Kenny Paterson}, title = {Introduction}, journal = {Inf. Secur. Tech. Rep.}, volume = {8}, number = {3}, pages = {5}, year = {2003}, url = {https://doi.org/10.1016/S1363-4127(03)00301-7}, doi = {10.1016/S1363-4127(03)00301-7}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/PiperPP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/PatersonP03, author = {Kenneth G. Paterson and Geraint Price}, title = {A comparison between traditional public key infrastructures and identity-based cryptography}, journal = {Inf. Secur. Tech. Rep.}, volume = {8}, number = {3}, pages = {57--72}, year = {2003}, url = {https://doi.org/10.1016/S1363-4127(03)00308-X}, doi = {10.1016/S1363-4127(03)00308-X}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/PatersonP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/LauderP03, author = {Alan G. B. Lauder and Kenneth G. Paterson}, title = {Computing the error linear complexity spectrum of a binary sequence of period 2\({}^{\mbox{n}}\)}, journal = {{IEEE} Trans. Inf. Theory}, volume = {49}, number = {1}, pages = {273--280}, year = {2003}, url = {https://doi.org/10.1109/TIT.2002.806136}, doi = {10.1109/TIT.2002.806136}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/LauderP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Al-RiyamiP03, author = {Sattam S. Al{-}Riyami and Kenneth G. Paterson}, editor = {Chi{-}Sung Laih}, title = {Certificateless Public Key Cryptography}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 - December 4, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2894}, pages = {452--473}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40061-5\_29}, doi = {10.1007/978-3-540-40061-5\_29}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/Al-RiyamiP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/Al-RiyamiP03, author = {Sattam S. Al{-}Riyami and Kenneth G. Paterson}, editor = {Kenneth G. Paterson}, title = {Tripartite Authenticated Key Agreement Protocols from Pairings}, booktitle = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester, UK, December 16-18, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2898}, pages = {332--359}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40974-8\_27}, doi = {10.1007/978-3-540-40974-8\_27}, timestamp = {Wed, 18 Mar 2020 16:01:02 +0100}, biburl = {https://dblp.org/rec/conf/ima/Al-RiyamiP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BoydMP03, author = {Colin Boyd and Wenbo Mao and Kenneth G. Paterson}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Deniable Authenticated Key Establishment for Internet Protocols}, booktitle = {Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3364}, pages = {255--271}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/11542322\_31}, doi = {10.1007/11542322\_31}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/BoydMP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ima/2003, editor = {Kenneth G. Paterson}, title = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester, UK, December 16-18, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2898}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/b93924}, doi = {10.1007/B93924}, isbn = {3-540-20663-9}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/2003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Al-RiyamiP03, author = {Sattam S. Al{-}Riyami and Kenneth G. Paterson}, title = {Certificateless Public Key Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {126}, year = {2003}, url = {http://eprint.iacr.org/2003/126}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Al-RiyamiP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlackburnP03, author = {Simon R. Blackburn and Kenneth G. Paterson}, title = {Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {199}, year = {2003}, url = {http://eprint.iacr.org/2003/199}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlackburnP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/GalbraithMP02, author = {Steven D. Galbraith and Wenbo Mao and Kenneth G. Paterson}, editor = {Bart Preneel}, title = {RSA-Based Undeniable Signatures for General Moduli}, booktitle = {Topics in Cryptology - {CT-RSA} 2002, The Cryptographer's Track at the {RSA} Conference, 2002, San Jose, CA, USA, February 18-22, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2271}, pages = {200--217}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45760-7\_14}, doi = {10.1007/3-540-45760-7\_14}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/GalbraithMP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Paterson02, author = {Kenneth G. Paterson}, title = {ID-based Signatures from Pairings on Elliptic Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {4}, year = {2002}, url = {http://eprint.iacr.org/2002/004}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Paterson02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Al-RiyamiP02, author = {Sattam S. Al{-}Riyami and Kenneth G. Paterson}, title = {Tripartite Authenticated Key Agreement Protocols from Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {35}, year = {2002}, url = {http://eprint.iacr.org/2002/035}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Al-RiyamiP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/HiltgenP01, author = {Alain P. Hiltgen and Kenneth G. Paterson}, title = {Single-track circuit codes}, journal = {{IEEE} Trans. Inf. Theory}, volume = {47}, number = {6}, pages = {2587--2595}, year = {2001}, url = {https://doi.org/10.1109/18.945274}, doi = {10.1109/18.945274}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/HiltgenP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/seta/Paterson01, author = {Kenneth G. Paterson}, editor = {Tor Helleseth and P. Vijay Kumar and Kyeongcheol Yang}, title = {Sequences for {OFDM} and Multi-Code {CDMA:} Two Problems in Algebraic Coding Theory}, booktitle = {Sequences and their Applications - Proceedings of {SETA} 2001, Bergen, Norway, May 13-17, 2001}, series = {Discrete Mathematics and Theoretical Computer Science}, pages = {46--71}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/978-1-4471-0673-9\_4}, doi = {10.1007/978-1-4471-0673-9\_4}, timestamp = {Tue, 25 Jun 2019 15:57:55 +0200}, biburl = {https://dblp.org/rec/conf/seta/Paterson01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcom/PatersonJ00, author = {Kenneth G. Paterson and Alan E. Jones}, title = {Efficient decoding algorithms for generalized Reed-Muller codes}, journal = {{IEEE} Trans. Commun.}, volume = {48}, number = {8}, pages = {1272--1285}, year = {2000}, url = {https://doi.org/10.1109/26.864165}, doi = {10.1109/26.864165}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcom/PatersonJ00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/Paterson00, author = {Kenneth G. Paterson}, title = {Generalized Reed-Muller codes and power control in {OFDM} modulation}, journal = {{IEEE} Trans. Inf. Theory}, volume = {46}, number = {1}, pages = {104--120}, year = {2000}, url = {https://doi.org/10.1109/18.817512}, doi = {10.1109/18.817512}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/Paterson00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/PatersonT00, author = {Kenneth G. Paterson and Vahid Tarokh}, title = {On the existence and construction of good codes with low peak-to-average power ratios}, journal = {{IEEE} Trans. Inf. Theory}, volume = {46}, number = {6}, pages = {1974--1987}, year = {2000}, url = {https://doi.org/10.1109/18.868473}, doi = {10.1109/18.868473}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/PatersonT00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Paterson99, author = {Kenneth G. Paterson}, editor = {Lars R. Knudsen}, title = {Imprimitive Permutation Groups and Trapdoors in Iterated Block Ciphers}, booktitle = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome, Italy, March 24-26, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1636}, pages = {201--214}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48519-8\_15}, doi = {10.1007/3-540-48519-8\_15}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/Paterson99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/Paterson99, author = {Kenneth G. Paterson}, editor = {Michael Walker}, title = {Applications of Exponential Sums in Communications Theory}, booktitle = {Cryptography and Coding, 7th {IMA} International Conference, Cirencester, UK, December 20-22, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1746}, pages = {1--24}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-46665-7\_1}, doi = {10.1007/3-540-46665-7\_1}, timestamp = {Wed, 18 Mar 2020 16:00:59 +0100}, biburl = {https://dblp.org/rec/conf/ima/Paterson99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Paterson98, author = {Kenneth G. Paterson}, title = {Root Counting, the {DFT} and the Linear Complexity of Nonlinear Filtering}, journal = {Des. Codes Cryptogr.}, volume = {14}, number = {3}, pages = {247--259}, year = {1998}, url = {https://doi.org/10.1023/A:1008256920596}, doi = {10.1023/A:1008256920596}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Paterson98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamdm/MitchellP98, author = {Chris J. Mitchell and Kenneth G. Paterson}, title = {Perfect Factors from Cyclic Codes and Interleaving}, journal = {{SIAM} J. Discret. Math.}, volume = {11}, number = {2}, pages = {241--264}, year = {1998}, url = {https://doi.org/10.1137/S089548019630649X}, doi = {10.1137/S089548019630649X}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamdm/MitchellP98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/Paterson98, author = {Kenneth G. Paterson}, title = {Binary Sequence Sets with Favorable Correlations from Difference Sets and {MDS} Codes}, journal = {{IEEE} Trans. Inf. Theory}, volume = {44}, number = {1}, pages = {172--180}, year = {1998}, url = {https://doi.org/10.1109/18.651014}, doi = {10.1109/18.651014}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/Paterson98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/PatersonL98, author = {Kenneth G. Paterson and Paul J. G. Lothian}, title = {Bounds on Partial Correlations of Sequences}, journal = {{IEEE} Trans. Inf. Theory}, volume = {44}, number = {3}, pages = {1164--1175}, year = {1998}, url = {https://doi.org/10.1109/18.669265}, doi = {10.1109/18.669265}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/PatersonL98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/PatersonT98, author = {Kenneth G. Paterson and Jonathan Tuliani}, title = {Some New Circuit Codes}, journal = {{IEEE} Trans. Inf. Theory}, volume = {44}, number = {3}, pages = {1305--1309}, year = {1998}, url = {https://doi.org/10.1109/18.669420}, doi = {10.1109/18.669420}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/PatersonT98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pimrc/Paterson98, author = {Kenneth G. Paterson}, title = {Coding techniques for power controlled {OFDM}}, booktitle = {The 9th {IEEE} International Symposium on Personal, Indoor and Mobile Radio Communications, {PIMRC} 1998, Boston, MA, USA, September 8-11, 1998}, pages = {801--805}, publisher = {{IEEE}}, year = {1998}, url = {https://doi.org/10.1109/PIMRC.1998.734673}, doi = {10.1109/PIMRC.1998.734673}, timestamp = {Tue, 19 May 2020 15:57:12 +0200}, biburl = {https://dblp.org/rec/conf/pimrc/Paterson98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/BlackburnMP97, author = {Simon R. Blackburn and Sean Murphy and Kenneth G. Paterson}, title = {Comments on "Theory and Applications of Cellular Automata in Cryptography"}, journal = {{IEEE} Trans. Computers}, volume = {46}, number = {5}, pages = {637--638}, year = {1997}, url = {https://doi.org/10.1109/12.589245}, doi = {10.1109/12.589245}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/BlackburnMP97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jct/Paterson96, author = {Kenneth G. Paterson}, title = {New Classes of Perfect Maps {I}}, journal = {J. Comb. Theory, Ser. {A}}, volume = {73}, number = {2}, pages = {302--334}, year = {1996}, url = {https://doi.org/10.1006/jcta.1996.0024}, doi = {10.1006/JCTA.1996.0024}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jct/Paterson96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jct/Paterson96a, author = {Kenneth G. Paterson}, title = {New Classes of Perfect Maps {II}}, journal = {J. Comb. Theory, Ser. {A}}, volume = {73}, number = {2}, pages = {335--345}, year = {1996}, url = {https://doi.org/10.1006/jcta.1996.0025}, doi = {10.1006/JCTA.1996.0025}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jct/Paterson96a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jct/BlackburnEP96, author = {Simon R. Blackburn and Tuvi Etzion and Kenneth G. Paterson}, title = {Permutation Polynomials, de Bruijn Sequences, and Linear Complexity}, journal = {J. Comb. Theory, Ser. {A}}, volume = {76}, number = {1}, pages = {55--82}, year = {1996}, url = {https://doi.org/10.1006/jcta.1996.0088}, doi = {10.1006/JCTA.1996.0088}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jct/BlackburnEP96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jct/HurlbertMP96, author = {Glenn Hurlbert and Chris J. Mitchell and Kenneth G. Paterson}, title = {On the Existence of de Bruijn Tori with Two by Two Windows}, journal = {J. Comb. Theory, Ser. {A}}, volume = {76}, number = {2}, pages = {213--230}, year = {1996}, url = {https://doi.org/10.1006/jcta.1996.0102}, doi = {10.1006/JCTA.1996.0102}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jct/HurlbertMP96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/EtzionP96, author = {Tuvi Etzion and Kenneth G. Paterson}, title = {Near optimal single-track Gray codes}, journal = {{IEEE} Trans. Inf. Theory}, volume = {42}, number = {3}, pages = {779--789}, year = {1996}, url = {https://doi.org/10.1109/18.490544}, doi = {10.1109/18.490544}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/EtzionP96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/MitchellEP96, author = {Chris J. Mitchell and Tuvi Etzion and Kenneth G. Paterson}, title = {A method for constructing decodable de Bruijn sequences}, journal = {{IEEE} Trans. Inf. Theory}, volume = {42}, number = {5}, pages = {1472--1478}, year = {1996}, url = {https://doi.org/10.1109/18.532887}, doi = {10.1109/18.532887}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/MitchellEP96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/HiltgenPB96, author = {Alain P. Hiltgen and Kenneth G. Paterson and M. Brandestini}, title = {Single-track Gray codes}, journal = {{IEEE} Trans. Inf. Theory}, volume = {42}, number = {5}, pages = {1555--1561}, year = {1996}, url = {https://doi.org/10.1109/18.532900}, doi = {10.1109/18.532900}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/HiltgenPB96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Paterson95, author = {Kenneth G. Paterson}, title = {Perfect Factors in the de Bruijn Graph}, journal = {Des. Codes Cryptogr.}, volume = {5}, number = {2}, pages = {115--138}, year = {1995}, url = {https://doi.org/10.1007/BF01397666}, doi = {10.1007/BF01397666}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Paterson95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dm/PatersonR95, author = {Kenneth G. Paterson and Matthew J. B. Robshaw}, title = {Storage efficient decoding for a class of binary be Bruijn sequences}, journal = {Discret. Math.}, volume = {138}, number = {1-3}, pages = {327--341}, year = {1995}, url = {https://doi.org/10.1016/0012-365X(94)00215-5}, doi = {10.1016/0012-365X(94)00215-5}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dm/PatersonR95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cpa/FuchsbergerGLPS95, author = {Andreas Fuchsberger and Dieter Gollmann and Paul J. G. Lothian and Kenneth G. Paterson and Abraham Sidiropoulos}, editor = {Ed Dawson and Jovan Dj. Golic}, title = {Public-key Cryptography on Smart Cards}, booktitle = {Cryptography: Policy and Algorithms, International Conference, Brisbane, Queensland, Australia, July 3-5, 1995, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1029}, pages = {250--269}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/BFb0032364}, doi = {10.1007/BFB0032364}, timestamp = {Sat, 19 Oct 2019 20:36:44 +0200}, biburl = {https://dblp.org/rec/conf/cpa/FuchsbergerGLPS95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MitchellP94, author = {Chris J. Mitchell and Kenneth G. Paterson}, title = {Decoding Perfect Maps}, journal = {Des. Codes Cryptogr.}, volume = {4}, number = {1}, pages = {11--30}, year = {1994}, url = {https://doi.org/10.1007/BF01388557}, doi = {10.1007/BF01388557}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/MitchellP94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/MurphyPW94, author = {Sean Murphy and Kenneth G. Paterson and Peter R. Wild}, title = {A Weak Cipher that Generates the Symmetric Group}, journal = {J. Cryptol.}, volume = {7}, number = {1}, pages = {61--65}, year = {1994}, url = {https://doi.org/10.1007/BF00195210}, doi = {10.1007/BF00195210}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/MurphyPW94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/Paterson94, author = {Kenneth G. Paterson}, title = {Perfect maps}, journal = {{IEEE} Trans. Inf. Theory}, volume = {40}, number = {3}, pages = {743--753}, year = {1994}, url = {https://doi.org/10.1109/18.335886}, doi = {10.1109/18.335886}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/Paterson94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.