


Остановите войну!
for scientists:
Kenneth G. Paterson
Kenny Paterson
Person information

- affiliation: Royal Holloway University of London, Information Security Group, UK
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [c100]Paul Grubbs, Varun Maram
, Kenneth G. Paterson:
Anonymous, Robust Post-quantum Public Key Encryption. EUROCRYPT (3) 2022: 402-432 - [c99]Kenneth G. Paterson, Mathilde Raynal:
HyperLogLog: Exponentially Bad in Adversarial Settings. EuroS&P 2022: 154-170 - [c98]Martin R. Albrecht, Lenka Mareková, Kenneth G. Paterson, Igors Stepanovs:
Four Attacks and a Proof for Telegram. IEEE Symposium on Security and Privacy 2022: 87-106 - [i74]Nimrod Aviram, Benjamin Dowling, Ilan Komargodski, Kenneth G. Paterson, Eyal Ronen, Eylon Yogev:
Practical (Post-Quantum) Key Combiners from One-Wayness and Applications to TLS. IACR Cryptol. ePrint Arch. 2022: 65 (2022) - [i73]Theo von Arx, Kenneth G. Paterson:
On the Cryptographic Fragility of the Telegram Ecosystem. IACR Cryptol. ePrint Arch. 2022: 595 (2022) - 2021
- [j54]Wouter Lueks, Seda F. Gürses, Michael Veale
, Edouard Bugnion, Marcel Salathé, Kenneth G. Paterson, Carmela Troncoso:
CrowdNotifier: Decentralized Privacy-Preserving Presence Tracing. Proc. Priv. Enhancing Technol. 2021(4): 350-368 (2021) - [c97]Jean Paul Degabriele, Jérôme Govinden, Felix Günther, Kenneth G. Paterson:
The Security of ChaCha20-Poly1305 in the Multi-User Setting. CCS 2021: 1981-2003 - [e6]Kenneth G. Paterson:
Topics in Cryptology - CT-RSA 2021 - Cryptographers' Track at the RSA Conference 2021, Virtual Event, May 17-20, 2021, Proceedings. Lecture Notes in Computer Science 12704, Springer 2021, ISBN 978-3-030-75538-6 [contents] - [i72]Paul Grubbs, Varun Maram, Kenneth G. Paterson:
Anonymous, Robust Post-Quantum Public Key Encryption. IACR Cryptol. ePrint Arch. 2021: 708 (2021) - [i71]Zichen Gui, Kenneth G. Paterson, Sikhar Patranabis:
Leakage Perturbation is Not Enough: Breaking Structured Encryption Using Simulated Annealing. IACR Cryptol. ePrint Arch. 2021: 879 (2021) - [i70]Kenneth G. Paterson, Mathilde Raynal:
HyperLogLog: Exponentially Bad in Adversarial Settings. IACR Cryptol. ePrint Arch. 2021: 1139 (2021) - 2020
- [j53]Carmela Troncoso, Mathias Payer, Jean-Pierre Hubaux, Marcel Salathé, James R. Larus, Wouter Lueks, Theresa Stadler, Apostolos Pyrgelis, Daniele Antonioli, Ludovic Barman, Sylvain Chatel, Kenneth G. Paterson, Srdjan Capkun, David A. Basin, Jan Beutel, Dennis Jackson, Marc Roeschlin, Patrick Leu, Bart Preneel, Nigel P. Smart, Aysajan Abidin, Seda Gurses, Michael Veale, Cas Cremers, Michael Backes, Nils Ole Tippenhauer, Reuben Binns, Ciro Cattuto, Alain Barrat, Dario Fiore, Manuel Barbosa, Rui Oliveira, José Pereira:
Decentralized Privacy-Preserving Proximity Tracing. IEEE Data Eng. Bull. 43(2): 36-66 (2020) - [j52]Martin R. Albrecht, Pooya Farshim, Shuai Han, Dennis Hofheinz, Enrique Larraia, Kenneth G. Paterson:
Multilinear Maps from Obfuscation. J. Cryptol. 33(3): 1080-1113 (2020) - [c96]Jake Massimo, Kenneth G. Paterson:
A Performant, Misuse-Resistant API for Primality Testing. CCS 2020: 195-210 - [c95]Benjamin Dowling, Torben Brandt Hansen, Kenneth G. Paterson:
Many a Mickle Makes a Muckle: A Framework for Provably Quantum-Secure Hybrid Key Exchange. PQCrypto 2020: 483-502 - [c94]Patrick Leu, Mridula Singh, Marc Roeschlin, Kenneth G. Paterson, Srdjan Capkun:
Message Time of Arrival Codes: A Fundamental Primitive for Secure Distance Measurement. IEEE Symposium on Security and Privacy 2020: 500-516 - [c93]Florian Tramèr, Dan Boneh, Kenny Paterson:
Remote Side-Channel Attacks on Anonymous Transactions. USENIX Security Symposium 2020: 2739-2756 - [e5]Kenneth G. Paterson, Douglas Stebila:
Selected Areas in Cryptography - SAC 2019 - 26th International Conference, Waterloo, ON, Canada, August 12-16, 2019, Revised Selected Papers. Lecture Notes in Computer Science 11959, Springer 2020, ISBN 978-3-030-38470-8 [contents] - [i69]Carmela Troncoso, Mathias Payer, Jean-Pierre Hubaux, Marcel Salathé, James R. Larus, Edouard Bugnion, Wouter Lueks, Theresa Stadler, Apostolos Pyrgelis, Daniele Antonioli, Ludovic Barman, Sylvain Chatel, Kenneth G. Paterson, Srdjan Capkun, David A. Basin, Jan Beutel, Dennis Jackson, Marc Roeschlin, Patrick Leu, Bart Preneel, Nigel P. Smart, Aysajan Abidin, Seda F. Gürses, Michael Veale, Cas Cremers, Michael Backes, Nils Ole Tippenhauer, Reuben Binns, Ciro Cattuto, Alain Barrat, Dario Fiore, Manuel Barbosa, Rui Oliveira, José Pereira:
Decentralized Privacy-Preserving Proximity Tracing. CoRR abs/2005.12273 (2020) - [i68]Jake Massimo, Kenneth G. Paterson:
A Performant, Misuse-Resistant API for Primality Testing. IACR Cryptol. ePrint Arch. 2020: 65 (2020) - [i67]Benjamin Dowling, Torben Brandt Hansen, Kenneth G. Paterson:
Many a Mickle Makes a Muckle: A Framework for Provably Quantum-Secure Hybrid Key Exchange. IACR Cryptol. ePrint Arch. 2020: 99 (2020) - [i66]Florian Tramèr, Dan Boneh, Kenneth G. Paterson:
Remote Side-Channel Attacks on Anonymous Transactions. IACR Cryptol. ePrint Arch. 2020: 220 (2020) - [i65]Zichen Gui, Kenneth G. Paterson, Sikhar Patranabis, Bogdan Warinschi:
SWiSSSE: System-Wide Security for Searchable Symmetric Encryption. IACR Cryptol. ePrint Arch. 2020: 1328 (2020)
2010 – 2019
- 2019
- [j51]Martin R. Albrecht, Torben Brandt Hansen, Kenneth G. Paterson:
libInterMAC: Beyond Confidentiality and Integrity in Practice. IACR Trans. Symmetric Cryptol. 2019(1): 46-83 (2019) - [c92]Steven D. Galbraith
, Jake Massimo, Kenneth G. Paterson:
Safety in Numbers: On the Need for Robust Diffie-Hellman Parameter Validation. Public Key Cryptography (2) 2019: 379-407 - [c91]Paul Grubbs, Marie-Sarah Lacharité, Brice Minaud, Kenneth G. Paterson:
Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks. IEEE Symposium on Security and Privacy 2019: 1067-1083 - [i64]Patrick Leu, Mridula Singh, Marc Roeschlin, Kenneth G. Paterson, Srdjan Capkun:
Message Time of Arrival Codes: A Fundamental Primitive for Secure Distance Measurement. CoRR abs/1911.11052 (2019) - [i63]Simon Bell, Kenny Paterson, Lorenzo Cavallaro:
Catch Me (On Time) If You Can: Understanding the Effectiveness of Twitter URL Blacklists. CoRR abs/1912.02520 (2019) - [i62]Paul Grubbs, Marie-Sarah Lacharité, Brice Minaud, Kenneth G. Paterson:
Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks. IACR Cryptol. ePrint Arch. 2019: 11 (2019) - [i61]Steven D. Galbraith, Jake Massimo, Kenneth G. Paterson:
Safety in Numbers: On the Need for Robust Diffie-Hellman Parameter Validation. IACR Cryptol. ePrint Arch. 2019: 32 (2019) - [i60]Martin R. Albrecht, Torben Brandt Hansen, Kenneth G. Paterson:
libInterMAC: Beyond Confidentiality and Integrity in Practice. IACR Cryptol. ePrint Arch. 2019: 165 (2019) - [i59]Patrick Leu, Mridula Singh, Marc Roeschlin, Kenneth G. Paterson, Srdjan Capkun:
Message Time of Arrival Codes: A Fundamental Primitive for Secure Distance Measurement. IACR Cryptol. ePrint Arch. 2019: 1350 (2019) - 2018
- [j50]Kenny Paterson:
Technical perspective: On heartbleed: a hard beginnyng makth a good endyng. Commun. ACM 61(3): 108 (2018) - [j49]Kenneth G. Paterson, Jacob C. N. Schuldt:
Statistical attacks on cookie masking for RC4. Cryptogr. Commun. 10(5): 777-801 (2018) - [j48]Xutao Zhou, Diego R. López, Vijay K. Gurbani, Jan Seedorf, Alexey Melnikov, Kenny Paterson, Avri Doria, Laurent Ciavaglia, Lisandro Zambenedetti Granville, Vincent Roca, Marie-José Montpetit, Ari Keränen, Carsten Bormann, Marco Carugi, Gyu Myoung Lee, Okan Geray:
Standards News. IEEE Commun. Stand. Mag. 2(1): 12-18 (2018) - [j47]Rémi Bricout, Sean Murphy, Kenneth G. Paterson, Thyla van der Merwe:
Analysing and exploiting the Mantin biases in RC4. Des. Codes Cryptogr. 86(4): 743-770 (2018) - [j46]Michel Abdalla
, Fabrice Benhamouda
, Alain Passelègue, Kenneth G. Paterson:
Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier. J. Cryptol. 31(4): 917-964 (2018) - [j45]Martin R. Albrecht, Amit Deo, Kenneth G. Paterson:
Cold Boot Attacks on Ring and Module LWE Keys Under the NTT. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(3): 173-213 (2018) - [j44]Marie-Sarah Lacharité, Kenneth G. Paterson:
Frequency-smoothing encryption: preventing snapshot attacks on deterministically encrypted data. IACR Trans. Symmetric Cryptol. 2018(1): 277-313 (2018) - [c90]Benjamin Dowling, Kenneth G. Paterson:
A Cryptographic Analysis of the WireGuard Protocol. ACNS 2018: 3-21 - [c89]Martin R. Albrecht, Jake Massimo, Kenneth G. Paterson, Juraj Somorovsky:
Prime and Prejudice: Primality Testing Under Adversarial Conditions. CCS 2018: 281-298 - [c88]Paul Grubbs, Marie-Sarah Lacharité, Brice Minaud, Kenneth G. Paterson:
Pump up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries. CCS 2018: 315-331 - [c87]Eyal Ronen, Kenneth G. Paterson, Adi Shamir:
Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure. CCS 2018: 1397-1414 - [c86]Platon Kotzias, Abbas Razaghpanah, Johanna Amann, Kenneth G. Paterson, Narseo Vallina-Rodriguez, Juan Caballero:
Coming of Age: A Longitudinal Study of TLS Deployment. Internet Measurement Conference 2018: 415-428 - [c85]Marie-Sarah Lacharité, Brice Minaud, Kenneth G. Paterson:
Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage. IEEE Symposium on Security and Privacy 2018: 297-314 - [i58]Benjamin Dowling, Kenneth G. Paterson:
A Cryptographic Analysis of the WireGuard Protocol. IACR Cryptol. ePrint Arch. 2018: 80 (2018) - [i57]Kenneth G. Paterson, Jacob C. N. Schuldt:
Statistical Attacks on Cookie Masking for RC4. IACR Cryptol. ePrint Arch. 2018: 93 (2018) - [i56]Martin R. Albrecht, Amit Deo, Kenneth G. Paterson:
Cold Boot Attacks on Ring and Module LWE Keys Under the NTT. IACR Cryptol. ePrint Arch. 2018: 672 (2018) - [i55]Eyal Ronen, Kenneth G. Paterson, Adi Shamir:
Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure. IACR Cryptol. ePrint Arch. 2018: 747 (2018) - [i54]Martin R. Albrecht, Jake Massimo, Kenneth G. Paterson, Juraj Somorovsky:
Prime and Prejudice: Primality Testing Under Adversarial Conditions. IACR Cryptol. ePrint Arch. 2018: 749 (2018) - [i53]Paul Grubbs, Marie-Sarah Lacharité, Brice Minaud, Kenny Paterson:
Pump up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries. IACR Cryptol. ePrint Arch. 2018: 965 (2018) - 2017
- [j43]Colin Boyd, Cas Cremers, Michèle Feltz, Kenneth G. Paterson, Bertram Poettering, Douglas Stebila:
ASICS: authenticated key exchange security incorporating certification systems. Int. J. Inf. Sec. 16(2): 151-171 (2017) - [c84]Atul Luykx, Bart Mennink, Kenneth G. Paterson:
Analyzing Multi-key Security Degradation. ASIACRYPT (2) 2017: 575-605 - [c83]Adam Everspaugh, Kenneth G. Paterson, Thomas Ristenpart, Samuel Scott:
Key Rotation for Authenticated Encryption. CRYPTO (3) 2017: 98-129 - [c82]Martin R. Albrecht, Emmanuela Orsini
, Kenneth G. Paterson, Guy Peer, Nigel P. Smart:
Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts. ESORICS (1) 2017: 29-46 - [c81]Kenneth G. Paterson, Ricardo Villanueva-Polanco:
Cold Boot Attacks on NTRU. INDOCRYPT 2017: 107-125 - [i52]Martin R. Albrecht, Emmanuela Orsini, Kenneth G. Paterson, Guy Peer, Nigel P. Smart:
Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts. IACR Cryptol. ePrint Arch. 2017: 354 (2017) - [i51]Atul Luykx, Bart Mennink, Kenneth G. Paterson:
Analyzing Multi-Key Security Degradation. IACR Cryptol. ePrint Arch. 2017: 435 (2017) - [i50]Adam Everspaugh, Kenneth G. Paterson, Thomas Ristenpart, Samuel Scott:
Key Rotation for Authenticated Encryption. IACR Cryptol. ePrint Arch. 2017: 527 (2017) - [i49]Marie-Sarah Lacharité, Brice Minaud, Kenneth G. Paterson:
Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage. IACR Cryptol. ePrint Arch. 2017: 701 (2017) - [i48]Marie-Sarah Lacharité, Kenneth G. Paterson:
Frequency-smoothing encryption: preventing snapshot attacks on deterministically encrypted data. IACR Cryptol. ePrint Arch. 2017: 1068 (2017) - [i47]Marc Fischlin, Felix Günther, Giorgia Azzurra Marson, Kenneth G. Paterson:
Data Is a Stream: Security of Stream-Based Channels. IACR Cryptol. ePrint Arch. 2017: 1191 (2017) - 2016
- [j42]Dan Boneh, Kenny Paterson, Nigel P. Smart:
Building a Community of Real-World Cryptographers. IEEE Secur. Priv. 14(6): 7-9 (2016) - [j41]Jean Paul Degabriele, Victoria Fehr, Marc Fischlin, Tommaso Gagliardoni, Felix Günther, Giorgia Azzurra Marson, Arno Mittelbach, Kenneth G. Paterson:
Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol. Int. J. Inf. Sec. 15(6): 637-657 (2016) - [c80]Martin R. Albrecht, Jean Paul Degabriele, Torben Brandt Hansen, Kenneth G. Paterson:
A Surfeit of SSH Cipher Suites. CCS 2016: 1480-1491 - [c79]Jean Paul Degabriele, Kenneth G. Paterson, Jacob C. N. Schuldt, Joanne Woodage:
Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results. CRYPTO (1) 2016: 403-432 - [c78]Martin R. Albrecht, Kenneth G. Paterson:
Lucky Microseconds: A Timing Attack on Amazon's s2n Implementation of TLS. EUROCRYPT (1) 2016: 622-643 - [c77]Kenneth G. Paterson, Thyla van der Merwe:
Reactive and Proactive Standardisation of TLS. SSR 2016: 160-186 - [c76]Martin R. Albrecht, Pooya Farshim, Dennis Hofheinz, Enrique Larraia, Kenneth G. Paterson:
Multilinear Maps from Obfuscation. TCC (A1) 2016: 446-473 - [i46]Rémi Bricout, Sean Murphy, Kenneth G. Paterson, Thyla van der Merwe:
Analysing and Exploiting the Mantin Biases in RC4. IACR Cryptol. ePrint Arch. 2016: 63 (2016) - [i45]Jean Paul Degabriele, Kenneth G. Paterson, Jacob C. N. Schuldt, Joanne Woodage:
Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results. IACR Cryptol. ePrint Arch. 2016: 577 (2016) - 2015
- [c75]Kenneth G. Paterson, Mario Strefler:
A Practical Attack Against the Use of RC4 in the HIVE Hidden Volume Encryption System. AsiaCCS 2015: 475-482 - [c74]Marc Fischlin, Felix Günther, Giorgia Azzurra Marson, Kenneth G. Paterson:
Data Is a Stream: Security of Stream-Based Channels. CRYPTO (2) 2015: 545-564 - [c73]Kenneth G. Paterson, Jacob C. N. Schuldt, Dale L. Sibborn, Hoeteck Wee:
Security Against Related Randomness Attacks via Reconstructive Extractors. IMACC 2015: 23-40 - [c72]Shengli Liu, Kenneth G. Paterson:
Simulation-Based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms. Public Key Cryptography 2015: 3-26 - [c71]Christina Garman, Kenneth G. Paterson, Thyla van der Merwe:
Attacks Only Get Better: Password Recovery Attacks Against RC4 in TLS. USENIX Security Symposium 2015: 113-128 - [i44]Shengli Liu, Kenneth G. Paterson:
Simulation-based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms. IACR Cryptol. ePrint Arch. 2015: 10 (2015) - [i43]Alexandra Boldyreva, Jean Paul Degabriele, Kenneth G. Paterson, Martijn Stam:
Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation. IACR Cryptol. ePrint Arch. 2015: 59 (2015) - [i42]Martin R. Albrecht, Pooya Farshim, Dennis Hofheinz, Enrique Larraia, Kenneth G. Paterson:
Multilinear Maps from Obfuscation. IACR Cryptol. ePrint Arch. 2015: 780 (2015) - [i41]Kenneth G. Paterson, Jacob C. N. Schuldt, Dale L. Sibborn, Hoeteck Wee:
Security Against Related Randomness Attacks via Reconstructive Extractors. IACR Cryptol. ePrint Arch. 2015: 892 (2015) - [i40]Martin R. Albrecht, Kenneth G. Paterson:
Lucky Microseconds: A Timing Attack on Amazon's s2n Implementation of TLS. IACR Cryptol. ePrint Arch. 2015: 1129 (2015) - [i39]Marie-Sarah Lacharité, Kenneth G. Paterson:
A note on the optimality of frequency analysis vs. ℓp-optimization. IACR Cryptol. ePrint Arch. 2015: 1158 (2015) - 2014
- [c70]Kenneth G. Paterson, Bertram Poettering, Jacob C. N. Schuldt:
Big Bias Hunting in Amazonia: Large-Scale Computation and Exploitation of RC4 Biases (Invited Paper). ASIACRYPT (1) 2014: 398-419 - [c69]Mihir Bellare, Kenneth G. Paterson, Phillip Rogaway:
Security of Symmetric Encryption against Mass Surveillance. CRYPTO (1) 2014: 1-19 - [c68]Michel Abdalla
, Fabrice Benhamouda
, Alain Passelègue, Kenneth G. Paterson:
Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier. CRYPTO (1) 2014: 77-94 - [c67]Kenneth G. Paterson, Bertram Poettering, Jacob C. N. Schuldt:
Plaintext Recovery Attacks Against WPA/TKIP. FSE 2014: 325-349 - [c66]Kenneth G. Paterson, Jacob C. N. Schuldt, Dale L. Sibborn:
Related Randomness Attacks for Public Key Encryption. Public Key Cryptography 2014: 465-482 - [c65]Jean Paul Degabriele, Victoria Fehr, Marc Fischlin, Tommaso Gagliardoni, Felix Günther, Giorgia Azzurra Marson, Arno Mittelbach, Kenneth G. Paterson:
Unpicking PLAID - A Cryptographic Analysis of an ISO-Standards-Track Authentication Protocol. SSR 2014: 1-25 - [i38]Kenneth G. Paterson, Jacob C. N. Schuldt, Dale L. Sibborn:
Related Randomness Attacks for Public Key Encryption. IACR Cryptol. ePrint Arch. 2014: 337 (2014) - [i37]Mihir Bellare, Kenneth G. Paterson, Phillip Rogaway:
Security of Symmetric Encryption against Mass Surveillance. IACR Cryptol. ePrint Arch. 2014: 438 (2014) - [i36]Michel Abdalla, Fabrice Benhamouda, Alain Passelègue, Kenneth G. Paterson:
Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier. IACR Cryptol. ePrint Arch. 2014: 488 (2014) - [i35]Jean Paul Degabriele, Victoria Fehr, Marc Fischlin, Tommaso Gagliardoni, Felix Günther, Giorgia Azzurra Marson, Arno Mittelbach, Kenneth G. Paterson:
Unpicking PLAID - A Cryptographic Analysis of an ISO-standards-track Authentication Protocol. IACR Cryptol. ePrint Arch. 2014: 728 (2014) - [i34]Kenneth G. Paterson, Mario Strefler:
A Practical Attack Against the HIVE Hidden Volume Encryption System. IACR Cryptol. ePrint Arch. 2014: 901 (2014) - 2013
- [j40]Cagatay Capar, Dennis Goeckel, Kenneth G. Paterson, Elizabeth A. Quaglia, Don Towsley, Murtaza Zafer:
Signal-flow-based analysis of wireless security protocols. Inf. Comput. 226: 37-56 (2013) - [c64]Hugo Krawczyk, Kenneth G. Paterson, Hoeteck Wee:
On the Security of the TLS Protocol: A Systematic Analysis. CRYPTO (1) 2013: 429-448 - [c63]Eduarda S. V. Freire, Dennis Hofheinz, Kenneth G. Paterson, Christoph Striecks:
Programmable Hash Functions in the Multilinear Setting. CRYPTO (1) 2013: 513-530 - [c62]Eduarda S. V. Freire, Kenneth G. Paterson, Bertram Poettering:
Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes. CT-RSA 2013: 101-114 - [c61]Colin Boyd, Cas Cremers, Michèle Feltz, Kenneth G. Paterson, Bertram Poettering, Douglas Stebila:
ASICS: Authenticated Key Exchange Security Incorporating Certification Systems. ESORICS 2013: 381-399 - [c60]Alexandra Boldyreva, Jean Paul Degabriele, Kenneth G. Paterson, Martijn Stam:
On Symmetric Encryption with Distinguishable Decryption Failures. FSE 2013: 367-390 - [c59]Tibor Jager, Kenneth G. Paterson, Juraj Somorovsky:
One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography. NDSS 2013 - [c58]Eduarda S. V. Freire, Dennis Hofheinz, Eike Kiltz
, Kenneth G. Paterson:
Non-Interactive Key Exchange. Public Key Cryptography 2013: 254-271 - [c57]Pooya Farshim, Benoît Libert, Kenneth G. Paterson, Elizabeth A. Quaglia:
Robust Encryption, Revisited. Public Key Cryptography 2013: 352-368 - [c56]Nadhem J. AlFardan, Kenneth G. Paterson:
Lucky Thirteen: Breaking the TLS and DTLS Record Protocols. IEEE Symposium on Security and Privacy 2013: 526-540 - [c55]Nadhem J. AlFardan, Daniel J. Bernstein, Kenneth G. Paterson, Bertram Poettering, Jacob C. N. Schuldt:
On the Security of RC4 in TLS. USENIX Security Symposium 2013: 305-320 - [i33]Hugo Krawczyk, Kenneth G. Paterson, Hoeteck Wee:
On the Security of the TLS Protocol: A Systematic Analysis. IACR Cryptol. ePrint Arch. 2013: 339 (2013) - [i32]Eduarda S. V. Freire, Dennis Hofheinz, Kenneth G. Paterson, Christoph Striecks
:
Programmable Hash Functions in the Multilinear Setting. IACR Cryptol. ePrint Arch. 2013: 354 (2013) - [i31]Colin Boyd, Cas Cremers, Michèle Feltz, Kenneth G. Paterson, Bertram Poettering, Douglas Stebila:
ASICS: Authenticated Key Exchange Security Incorporating Certification Systems. IACR Cryptol. ePrint Arch. 2013: 398 (2013) - [i30]Alexandra Boldyreva, Jean Paul Degabriele, Kenneth G. Paterson, Martijn Stam:
On Symmetric Encryption with Distinguishable Decryption Failures. IACR Cryptol. ePrint Arch. 2013: 433 (2013) - [i29]Kenneth G. Paterson, Bertram Poettering, Jacob C. N. Schuldt:
Plaintext Recovery Attacks Against WPA/TKIP. IACR Cryptol. ePrint Arch. 2013: 748 (2013) - 2012
- [c54]Mihir Bellare, Kenneth G. Paterson, Susan Thomson:
RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures. ASIACRYPT 2012: 331-348 - [c53]Kenneth G. Paterson, Antigoni Polychroniadou, Dale L. Sibborn:
A Coding-Theoretic Approach to Recovering Noisy RSA Keys. ASIACRYPT 2012: 386-403 - [c52]Kenneth G. Paterson, Gaven J. Watson:
Authenticated-Encryption with Padding: A Formal Security Treatment. Cryptography and Security 2012: 83-107 - [c51]Jean Paul Degabriele, Anja Lehmann, Kenneth G. Paterson, Nigel P. Smart, Mario Strefler:
On the Joint Security of Encryption and Signature in EMV. CT-RSA 2012: 116-135 - [c50]Alexandra Boldyreva, Jean Paul Degabriele, Kenneth G. Paterson, Martijn Stam:
Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation. EUROCRYPT 2012: 682-699 - [c49]Kenneth G. Paterson, Nadhem J. AlFardan:
Plaintext-Recovery Attacks Against Datagram TLS. NDSS 2012 - [c48]Benoît Libert, Kenneth G. Paterson, Elizabeth A. Quaglia:
Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model. Public Key Cryptography 2012: 206-224 - [i28]Mihir Bellare, Kenneth G. Paterson, Susan Thomson:
RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures. IACR Cryptol. ePrint Arch. 2012: 514 (2012) - [i27]Eduarda S. V. Freire, Kenneth G. Paterson, Bertram Poettering:
Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes. IACR Cryptol. ePrint Arch. 2012: 645 (2012) - [i26]Pooya Farshim, Benoît Libert, Kenneth G. Paterson, Elizabeth A. Quaglia:
Robust Encryption, Revisited. IACR Cryptol. ePrint Arch. 2012: 673 (2012) - [i25]Kenneth G. Paterson, Antigoni Polychroniadou, Dale L. Sibborn:
A Coding-Theoretic Approach to Recovering Noisy RSA Keys. IACR Cryptol. ePrint Arch. 2012: 724 (2012) - [i24]Eduarda S. V. Freire, Dennis Hofheinz, Eike Kiltz, Kenneth G. Paterson:
Non-Interactive Key Exchange. IACR Cryptol. ePrint Arch. 2012: 732 (2012) - 2011
- [j39]Jean Paul Degabriele, Kenneth G. Paterson, Gaven J. Watson:
Provable Security in the Real World. IEEE Secur. Priv. 9(3): 33-41 (2011) - [j38]Hoon Wei Lim, Kenneth G. Paterson:
Identity-based cryptography for grid security. Int. J. Inf. Sec. 10(1): 15-32 (2011) - [j37]Jason Crampton, Hoon Wei Lim, Kenneth G. Paterson, Geraint Price:
User-friendly and certificate-free grid security infrastructure. Int. J. Inf. Sec. 10(3): 137-153 (2011) - [c47]Eduarda S. V. Freire, Kenneth G. Paterson:
Provably Secure Key Assignment Schemes from Factoring. ACISP 2011: 292-309 - [c46]Kenneth G. Paterson, Jacob C. N. Schuldt, Martijn Stam, Susan Thomson:
On the Joint Security of Encryption and Signature, Revisited. ASIACRYPT 2011: 161-178 - [c45]Kenneth G. Paterson, Thomas Ristenpart, Thomas Shrimpton:
Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol. ASIACRYPT 2011: 372-389 - [c44]