Person:1872782: Difference between revisions

From MaRDI portal
Person:1872782
Created automatically from import230924090903
 
m AuthorDisambiguator moved page Colin A. Boyd to Colin A. Boyd: Duplicate
 
(One intermediate revision by the same user not shown)
(No difference)

Latest revision as of 01:00, 13 December 2023

Available identifiers

zbMath Open boyd.colin-aDBLPb/ColinBoydWikidataQ21767541 ScholiaQ21767541MaRDI QIDQ1872782

List of research outcomes

PublicationDate of PublicationType
Key Exchange2023-08-04Paper
Offline Assisted Group Key Exchange2023-06-30Paper
Symmetric Key Exchange with Full Forward Security and Robust Synchronization2023-05-26Paper
Fast and secure updatable encryption2022-11-09Paper
Designing secure key exchange protocols2021-12-20Paper
On strengthening authentication protocols to foil cryptanalysis2021-12-20Paper
A formal framework for authentication2021-04-07Paper
A blind coupon mechanism enabling veto voting over unreliable networks2020-05-12Paper
Secure channels and termination: the last word on TLS2020-03-02Paper
Protocols for Authentication and Key Establishment2019-10-10Paper
Security notions for cloud storage and deduplication2018-11-07Paper
Key recovery: inert and public2017-10-23Paper
From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS2016-04-08Paper
Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange2016-01-12Paper
ASICS: Authenticated Key Exchange Security Incorporating Certification Systems2014-10-16Paper
Continuous After-the-Fact Leakage-Resilient Key Exchange2014-07-24Paper
Efficient Modular Exponentiation-Based Puzzles for Denial-of-Service Protection2012-11-01Paper
Effort-Release Public-Key Encryption from Cryptographic Puzzles2012-09-07Paper
Minimizing Information Leakage of Tree-Based RFID Authentication Protocols Using Alternate Tree-Walking2012-09-07Paper
On Forward Secrecy in One-Round Key Exchange2011-12-16Paper
Towards a Provably Secure DoS-Resilient Key Exchange Protocol with Perfect Forward Secrecy2011-12-16Paper
Stronger Difficulty Notions for Client Puzzles and Denial-of-Service-Resistant Protocols2011-02-11Paper
Delaying Mismatched Field Multiplications in Pairing Computations2010-07-20Paper
Generic One Round Group Key Exchange in the Standard Model2010-07-16Paper
Efficient Certificateless KEM in the Standard Model2010-07-16Paper
Avoiding Full Extension Field Arithmetic in Pairing Computations2010-05-04Paper
Faster Pairings on Special Weierstrass Curves2009-08-18Paper
Strongly Secure Certificateless Key Agreement2009-08-18Paper
Designing a secure e-tender submission protocol2009-05-29Paper
Public Key Cryptography – PKC 20042009-05-14Paper
One-round key exchange in the standard model2009-05-12Paper
A novel nonrepudiable threshold multi-proxy multi-signature scheme with shared verification2009-04-17Paper
Identity-based strong designated verifier signature schemes: attacks and new construction2009-04-17Paper
Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols2009-03-24Paper
Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems2009-01-09Paper
https://portal.mardi4nfdi.de/entity/Q35125722008-07-21Paper
Efficient One-Round Key Exchange in the Standard Model2008-07-08Paper
Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions2008-04-11Paper
Examining Indistinguishability-Based Proof Models for Key Establishment Protocols2008-03-18Paper
Errors in Computational Complexity Proofs for Protocols2008-03-18Paper
An Efficient and Verifiable Solution to the Millionaire Problem2008-03-17Paper
Simple and Efficient Shuffling with Provable Correctness and ZK Privacy2008-03-17Paper
On the Connection Between Signcryption and One-Pass Key Establishment2008-03-07Paper
Verifier-Key-Flexible Universal Designated-Verifier Signatures2008-03-07Paper
Progress in Cryptology - INDOCRYPT 20032007-11-29Paper
An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys2007-09-07Paper
A Novel Range Test2007-09-07Paper
Public Key Cryptography - PKC 20062007-05-02Paper
Applied Cryptography and Network Security2007-05-02Paper
Information and Communications Security2006-10-24Paper
Information Security2006-10-20Paper
Security in Communication Networks2006-10-10Paper
Progress in Cryptology – Mycrypt 20052006-10-05Paper
Progress in Cryptology – Mycrypt 20052006-10-05Paper
Progress in Cryptology – Mycrypt 20052006-10-05Paper
Modular proofs for key exchange: rigorous optimizations in the Canetti-Krawczyk model2006-09-12Paper
Information Security and Cryptology - ICISC 20032005-12-27Paper
Progress in Cryptology - INDOCRYPT 20042005-12-22Paper
Progress in Cryptology - INDOCRYPT 20042005-12-22Paper
Progress in Cryptology - INDOCRYPT 20042005-12-22Paper
A public key cryptosystem based on a subgroup membership problem2005-11-07Paper
Information Security and Privacy2005-09-07Paper
Applied Cryptography and Network Security2005-06-13Paper
Applied Cryptography and Network Security2005-06-13Paper
https://portal.mardi4nfdi.de/entity/Q30439302004-08-09Paper
https://portal.mardi4nfdi.de/entity/Q44724082004-08-04Paper
https://portal.mardi4nfdi.de/entity/Q44724152004-08-04Paper
https://portal.mardi4nfdi.de/entity/Q44724162004-08-04Paper
https://portal.mardi4nfdi.de/entity/Q44736182004-08-04Paper
https://portal.mardi4nfdi.de/entity/Q44736352004-08-04Paper
https://portal.mardi4nfdi.de/entity/Q44720762004-08-03Paper
https://portal.mardi4nfdi.de/entity/Q44525682004-03-01Paper
https://portal.mardi4nfdi.de/entity/Q44507432004-02-16Paper
https://portal.mardi4nfdi.de/entity/Q44283382003-09-15Paper
Round-Optimal Contributory Conference Key Agreement2003-07-27Paper
https://portal.mardi4nfdi.de/entity/Q44133402003-07-17Paper
https://portal.mardi4nfdi.de/entity/Q47885742003-05-19Paper
Protocols for authentification and key establishment2003-05-15Paper
https://portal.mardi4nfdi.de/entity/Q31497072002-09-26Paper
https://portal.mardi4nfdi.de/entity/Q31497502002-09-26Paper
https://portal.mardi4nfdi.de/entity/Q45015032002-08-14Paper
https://portal.mardi4nfdi.de/entity/Q49453862002-04-08Paper
https://portal.mardi4nfdi.de/entity/Q49453552002-03-18Paper
https://portal.mardi4nfdi.de/entity/Q27629042002-01-13Paper
https://portal.mardi4nfdi.de/entity/Q47072372002-01-01Paper
https://portal.mardi4nfdi.de/entity/Q49500472001-10-03Paper
https://portal.mardi4nfdi.de/entity/Q49500632001-10-02Paper
https://portal.mardi4nfdi.de/entity/Q27074022001-08-20Paper
https://portal.mardi4nfdi.de/entity/Q27211302001-07-01Paper
https://portal.mardi4nfdi.de/entity/Q27211332001-07-01Paper
https://portal.mardi4nfdi.de/entity/Q27211712001-07-01Paper
https://portal.mardi4nfdi.de/entity/Q45015112000-09-04Paper
https://portal.mardi4nfdi.de/entity/Q49347302000-02-01Paper
https://portal.mardi4nfdi.de/entity/Q42492721999-06-17Paper
https://portal.mardi4nfdi.de/entity/Q42506271999-06-17Paper
https://portal.mardi4nfdi.de/entity/Q42506431999-06-17Paper
https://portal.mardi4nfdi.de/entity/Q44005821998-10-28Paper
https://portal.mardi4nfdi.de/entity/Q38391941998-10-08Paper
https://portal.mardi4nfdi.de/entity/Q43736521998-08-28Paper
https://portal.mardi4nfdi.de/entity/Q43736471998-07-03Paper
https://portal.mardi4nfdi.de/entity/Q43417881997-06-18Paper
https://portal.mardi4nfdi.de/entity/Q43228431995-02-13Paper
Enhancing Secrecy by Data Compression: Theoretical and Practical Aspects1993-05-18Paper
https://portal.mardi4nfdi.de/entity/Q40117671992-09-27Paper
https://portal.mardi4nfdi.de/entity/Q37788011988-01-01Paper
On the structure of the family of Cherry fields on the torus1985-01-01Paper
Residuation in semigroups of pre-closures1976-01-01Paper
https://portal.mardi4nfdi.de/entity/Q40849161976-01-01Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Colin A. Boyd