Colin A. Boyd

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Modular design of KEM-based authenticated key exchange2024-01-11Paper
Key Exchange
Asymmetric Cryptography
2023-08-04Paper
Offline Assisted Group Key Exchange
Developments in Language Theory
2023-06-30Paper
Symmetric Key Exchange with Full Forward Security and Robust Synchronization
Lecture Notes in Computer Science
2023-05-26Paper
Fast and secure updatable encryption2022-11-09Paper
On strengthening authentication protocols to foil cryptanalysis2021-12-20Paper
Designing secure key exchange protocols2021-12-20Paper
A formal framework for authentication
Computer Security — ESORICS 92
2021-04-07Paper
A blind coupon mechanism enabling veto voting over unreliable networks2020-05-12Paper
Secure channels and termination: the last word on TLS2020-03-02Paper
Protocols for authentication and key establishment
Information Security and Cryptography
2019-10-10Paper
Security notions for cloud storage and deduplication2018-11-07Paper
Key recovery: inert and public2017-10-23Paper
From stateless to stateful: generic authentication and authenticated encryption constructions with application to TLS
Topics in Cryptology - CT-RSA 2016
2016-04-08Paper
Continuous after-the-fact leakage-resilient eCK-secure key exchange
Cryptography and Coding
2016-01-12Paper
ASICS: Authenticated key exchange security incorporating certification systems
Lecture Notes in Computer Science
2014-10-16Paper
Continuous After-the-Fact Leakage-Resilient Key Exchange
Information Security and Privacy
2014-07-24Paper
Efficient modular exponentiation-based puzzles for denial-of-service protection
Information Security and Cryptology - ICISC 2011
2012-11-01Paper
Effort-release public-key encryption from cryptographic puzzles
Information Security and Privacy
2012-09-07Paper
Minimizing information leakage of tree-based RFID authentication protocols using alternate tree-walking
Information Security and Privacy
2012-09-07Paper
On Forward Secrecy in One-Round Key Exchange
Cryptography and Coding
2011-12-16Paper
Towards a provably secure DoS-resilient key exchange protocol with perfect forward secrecy
Lecture Notes in Computer Science
2011-12-16Paper
Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols
Topics in Cryptology – CT-RSA 2011
2011-02-11Paper
Delaying mismatched field multiplications in pairing computations
Arithmetic of Finite Fields
2010-07-20Paper
Generic one round group key exchange in the standard model
Information, Security and Cryptology – ICISC 2009
2010-07-16Paper
Efficient certificateless KEM in the standard model
Information, Security and Cryptology – ICISC 2009
2010-07-16Paper
Avoiding full extension field arithmetic in pairing computations
Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings
2010-05-04Paper
Strongly Secure Certificateless Key Agreement
Pairing-Based Cryptography – Pairing 2009
2009-08-18Paper
Faster Pairings on Special Weierstrass Curves
Pairing-Based Cryptography – Pairing 2009
2009-08-18Paper
Designing a secure e-tender submission protocol
Electronic Commerce Research
2009-05-29Paper
Public Key Cryptography – PKC 2004
Lecture Notes in Computer Science
2009-05-14Paper
One-round key exchange in the standard model
International Journal of Applied Cryptography
2009-05-12Paper
Identity-based strong designated verifier signature schemes: attacks and new construction
Computers and Electrical Engineering
2009-04-17Paper
A novel nonrepudiable threshold multi-proxy multi-signature scheme with shared verification
Computers and Electrical Engineering
2009-04-17Paper
Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols
Public Key Cryptography – PKC 2009
2009-03-24Paper
Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems
Cryptology and Network Security
2009-01-09Paper
Applications of elliptic curve pairings in cryptography2008-07-21Paper
Efficient One-Round Key Exchange in the Standard Model
Information Security and Privacy
2008-07-08Paper
Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions
Progress in Cryptology - INDOCRYPT 2006
2008-04-11Paper
Errors in Computational Complexity Proofs for Protocols
Lecture Notes in Computer Science
2008-03-18Paper
Examining Indistinguishability-Based Proof Models for Key Establishment Protocols
Lecture Notes in Computer Science
2008-03-18Paper
An Efficient and Verifiable Solution to the Millionaire Problem
Lecture Notes in Computer Science
2008-03-17Paper
Simple and Efficient Shuffling with Provable Correctness and ZK Privacy
Advances in Cryptology – CRYPTO 2005
2008-03-17Paper
Verifier-Key-Flexible Universal Designated-Verifier Signatures
Cryptography and Coding
2008-03-07Paper
On the Connection Between Signcryption and One-Pass Key Establishment
Cryptography and Coding
2008-03-07Paper
Progress in Cryptology - INDOCRYPT 2003
Lecture Notes in Computer Science
2007-11-29Paper
An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys
Information Security and Privacy
2007-09-07Paper
A Novel Range Test
Information Security and Privacy
2007-09-07Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2007-05-02Paper
Public Key Cryptography - PKC 2006
Lecture Notes in Computer Science
2007-05-02Paper
Information and Communications Security
Lecture Notes in Computer Science
2006-10-24Paper
Information Security
Lecture Notes in Computer Science
2006-10-20Paper
Security in Communication Networks
Lecture Notes in Computer Science
2006-10-10Paper
Progress in Cryptology – Mycrypt 2005
Lecture Notes in Computer Science
2006-10-05Paper
Progress in Cryptology – Mycrypt 2005
Lecture Notes in Computer Science
2006-10-05Paper
Progress in Cryptology – Mycrypt 2005
Lecture Notes in Computer Science
2006-10-05Paper
Modular proofs for key exchange: rigorous optimizations in the Canetti-Krawczyk model
Applicable Algebra in Engineering, Communication and Computing
2006-09-12Paper
Information Security and Cryptology - ICISC 2003
Lecture Notes in Computer Science
2005-12-27Paper
Progress in Cryptology - INDOCRYPT 2004
Lecture Notes in Computer Science
2005-12-22Paper
Progress in Cryptology - INDOCRYPT 2004
Lecture Notes in Computer Science
2005-12-22Paper
Progress in Cryptology - INDOCRYPT 2004
Lecture Notes in Computer Science
2005-12-22Paper
A public key cryptosystem based on a subgroup membership problem
Designs, Codes and Cryptography
2005-11-07Paper
Information Security and Privacy
Lecture Notes in Computer Science
2005-09-07Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2005-06-13Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2005-06-13Paper
scientific article; zbMATH DE number 2085424 (Why is no real title available?)2004-08-09Paper
scientific article; zbMATH DE number 2080720 (Why is no real title available?)2004-08-04Paper
scientific article; zbMATH DE number 2080707 (Why is no real title available?)2004-08-04Paper
scientific article; zbMATH DE number 2080180 (Why is no real title available?)2004-08-04Paper
scientific article; zbMATH DE number 2080176 (Why is no real title available?)2004-08-04Paper
scientific article; zbMATH DE number 2080179 (Why is no real title available?)2004-08-04Paper
scientific article; zbMATH DE number 2079930 (Why is no real title available?)2004-08-03Paper
scientific article; zbMATH DE number 2048535 (Why is no real title available?)2004-03-01Paper
scientific article; zbMATH DE number 2043319 (Why is no real title available?)2004-02-16Paper
scientific article; zbMATH DE number 1980956 (Why is no real title available?)2003-09-15Paper
Round-Optimal Contributory Conference Key Agreement
Public Key Cryptography — PKC 2003
2003-07-27Paper
scientific article; zbMATH DE number 1950627 (Why is no real title available?)2003-07-17Paper
scientific article; zbMATH DE number 1857525 (Why is no real title available?)2003-05-19Paper
Protocols for authentification and key establishment
Information Security and Cryptography
2003-05-15Paper
scientific article; zbMATH DE number 1808249 (Why is no real title available?)2002-09-26Paper
scientific article; zbMATH DE number 1808271 (Why is no real title available?)2002-09-26Paper
scientific article; zbMATH DE number 1500492 (Why is no real title available?)2002-08-14Paper
scientific article; zbMATH DE number 1424188 (Why is no real title available?)2002-04-08Paper
scientific article; zbMATH DE number 1424161 (Why is no real title available?)2002-03-18Paper
scientific article; zbMATH DE number 1689605 (Why is no real title available?)2002-01-13Paper
scientific article; zbMATH DE number 1925560 (Why is no real title available?)
International Journal of Information Security
2002-01-01Paper
scientific article; zbMATH DE number 1440060 (Why is no real title available?)2001-10-03Paper
scientific article; zbMATH DE number 1440073 (Why is no real title available?)2001-10-02Paper
scientific article; zbMATH DE number 1583769 (Why is no real title available?)2001-08-20Paper
scientific article; zbMATH DE number 1612529 (Why is no real title available?)2001-07-01Paper
scientific article; zbMATH DE number 1612507 (Why is no real title available?)2001-07-01Paper
scientific article; zbMATH DE number 1612508 (Why is no real title available?)2001-07-01Paper
scientific article; zbMATH DE number 1500499 (Why is no real title available?)2000-09-04Paper
scientific article; zbMATH DE number 1394314 (Why is no real title available?)2000-02-01Paper
scientific article; zbMATH DE number 1302800 (Why is no real title available?)1999-06-17Paper
scientific article; zbMATH DE number 1303959 (Why is no real title available?)1999-06-17Paper
scientific article; zbMATH DE number 1303975 (Why is no real title available?)1999-06-17Paper
scientific article; zbMATH DE number 1182517 (Why is no real title available?)1998-10-28Paper
scientific article; zbMATH DE number 1189394 (Why is no real title available?)1998-10-08Paper
scientific article; zbMATH DE number 1107707 (Why is no real title available?)1998-08-28Paper
scientific article; zbMATH DE number 1107702 (Why is no real title available?)1998-07-03Paper
scientific article; zbMATH DE number 1024094 (Why is no real title available?)1997-06-18Paper
scientific article; zbMATH DE number 721893 (Why is no real title available?)1995-02-13Paper
Enhancing Secrecy by Data Compression: Theoretical and Practical Aspects
Advances in Cryptology — EUROCRYPT ’91
1993-05-18Paper
scientific article; zbMATH DE number 67079 (Why is no real title available?)1992-09-27Paper
scientific article; zbMATH DE number 4039974 (Why is no real title available?)1988-01-01Paper
On the structure of the family of Cherry fields on the torus
Ergodic Theory and Dynamical Systems
1985-01-01Paper
Residuation in semigroups of pre-closures
Semigroup Forum
1976-01-01Paper
scientific article; zbMATH DE number 3504076 (Why is no real title available?)1976-01-01Paper


Research outcomes over time


This page was built for person: Colin A. Boyd