Kenneth G. Paterson

From MaRDI portal


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
A formal treatment of end-to-end encrypted cloud storage
 
2024-12-04Paper
\textit{Caveat implementor!} Key recovery attacks on MEGA
Advances in Cryptology – EUROCRYPT 2023
2023-12-08Paper
Puncturable key wrapping and its applications
Advances in Cryptology – ASIACRYPT 2022
2023-08-16Paper
An efficient query recovery attack against a graph encryption scheme
Computer Security – ESORICS 2022
2023-07-21Paper
Average Case Error Estimates of the Strong Lucas Test
 
2023-06-15Paper
Many a mickle makes a muckle: a framework for provably quantum-secure hybrid key exchange
Post-Quantum Cryptography
2022-10-13Paper
Anonymous, robust post-quantum public key encryption
 
2022-08-30Paper
Tightly secure ring-LWE based key encapsulation with short ciphertexts
 
2022-08-25Paper
Multilinear maps from obfuscation
Journal of Cryptology
2020-06-15Paper
Safety in numbers: on the need for robust Diffie-Hellman parameter validation
 
2020-01-28Paper
Public-key cryptography on smart cards
Cryptography: Policy and Algorithms
2019-10-10Paper
Related-key security for pseudorandom functions beyond the linear barrier
Journal of Cryptology
2018-11-01Paper
A cryptographic analysis of the WireGuard protocol
 
2018-08-10Paper
Statistical attacks on cookie masking for RC4
Cryptography and Communications
2018-05-28Paper
Cold boot attacks on NTRU
 
2018-04-26Paper
Analysing and exploiting the Mantin biases in RC4
Designs, Codes and Cryptography
2018-04-10Paper
Analyzing multi-key security degradation
 
2018-03-08Paper
Key rotation for authenticated encryption
 
2017-10-27Paper
Properties of the Error Linear Complexity Spectrum
IEEE Transactions on Information Theory
2017-08-08Paper
Backdoors in pseudorandom number generators: possibility and impossibility results
Advances in Cryptology – CRYPTO 2016
2016-11-30Paper
Lucky microseconds: a timing attack on Amazon's s2n implementation of TLS
Advances in Cryptology – EUROCRYPT 2016
2016-09-09Paper
Multilinear maps from obfuscation
Theory of Cryptography
2016-03-23Paper
Security Against Related Randomness Attacks via Reconstructive Extractors
Cryptography and Coding
2016-01-12Paper
Data is a stream: security of stream-based channels
Lecture Notes in Computer Science
2015-12-10Paper
Plaintext Recovery Attacks Against WPA/TKIP
Fast Software Encryption
2015-09-18Paper
On symmetric encryption with distinguishable decryption failures
Fast Software Encryption
2015-09-18Paper
Simulation-based selective opening CCA security for PKE from key encapsulation mechanisms
Lecture Notes in Computer Science
2015-08-27Paper
Big Bias Hunting in Amazonia: Large-Scale Computation and Exploitation of RC4 Biases (Invited Paper)
Lecture Notes in Computer Science
2015-01-16Paper
ASICS: Authenticated key exchange security incorporating certification systems
Lecture Notes in Computer Science
2014-10-16Paper
Related-key security for pseudorandom functions beyond the linear barrier
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Security of symmetric encryption against mass surveillance
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Related randomness attacks for public key encryption
Public-Key Cryptography – PKC 2014
2014-03-25Paper
Signal-flow-based analysis of wireless security protocols
Information and Computation
2013-12-03Paper
On the security of the TLS protocol: a systematic analysis
Advances in Cryptology – CRYPTO 2013
2013-09-02Paper
Programmable hash functions in the multilinear setting
Advances in Cryptology – CRYPTO 2013
2013-09-02Paper
Robust encryption, revisited
Public-Key Cryptography – PKC 2013
2013-04-19Paper
Non-interactive key exchange
Public-Key Cryptography – PKC 2013
2013-04-19Paper
RKA security beyond the linear barrier: IBE, encryption and signatures
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
A coding-theoretic approach to recovering noisy RSA keys
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
Simple, efficient and strongly KI-secure hierarchical key assignment schemes
Topics in Cryptology – CT-RSA 2013
2013-03-18Paper
Anonymous broadcast encryption: adaptive security and efficient constructions in the standard model
Public Key Cryptography – PKC 2012
2012-07-20Paper
Security of symmetric encryption in the presence of ciphertext fragmentation
Advances in Cryptology – EUROCRYPT 2012
2012-06-29Paper
On the joint security of encryption and signature in EMV
Lecture Notes in Computer Science
2012-06-08Paper
Authenticated-encryption with padding: a formal security treatment
Cryptography and Security: From Theory to Applications
2012-06-08Paper
Breaking an identity-based encryption scheme based on DHIES
Cryptography and Coding
2011-12-16Paper
On the joint security of encryption and signature, revisited
Lecture Notes in Computer Science
2011-12-02Paper
Tag size does matter: attacks and proofs for the TLS record protocol
Lecture Notes in Computer Science
2011-12-02Paper
On cipher-dependent related-key attacks in the ideal-cipher model
Fast Software Encryption
2011-07-07Paper
Provably Secure Key Assignment Schemes from Factoring
Information Security and Privacy
2011-07-07Paper
Time-specific encryption
Lecture Notes in Computer Science
2010-09-10Paper
Plaintext-dependent decryption: a formal security treatment of SSH-CTR
Advances in Cryptology – EUROCRYPT 2010
2010-06-01Paper
Certificateless public key cryptography
Lecture Notes in Computer Science
2010-01-05Paper
On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups
Designs, Codes and Cryptography
2009-10-14Paper
Building Key-Private Public-Key Encryption Schemes
Information Security and Privacy
2009-06-25Paper
One-round key exchange in the standard model
International Journal of Applied Cryptography
2009-05-12Paper
Topics in Cryptology – CT-RSA 2004
Lecture Notes in Computer Science
2009-05-07Paper
Pairings for cryptographers
Discrete Applied Mathematics
2009-03-04Paper
Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities
Pairing-Based Cryptography – Pairing 2008
2009-02-10Paper
On Codes With Low Peak-to-Average Power Ratio for Multicode CDMA
IEEE Transactions on Information Theory
2008-12-21Paper
Zero/Positive Capacities of Two-Dimensional Runlength-Constrained Arrays
IEEE Transactions on Information Theory
2008-12-21Paper
Immunising CBC Mode Against Padding Oracle Attacks: A Formal Security Treatment
Lecture Notes in Computer Science
2008-11-20Paper
Efficient One-Round Key Exchange in the Standard Model
Information Security and Privacy
2008-07-08Paper
Modular Security Proofs for Key Agreement Protocols
Lecture Notes in Computer Science
2008-03-18Paper
Multi-key Hierarchical Identity-Based Signatures
Cryptography and Coding
2008-03-07Paper
Certificateless Encryption Schemes Strongly Secure in the Standard Model
Public key cryptography -- PKC 2008. 11th international workshop on practice and theory in public-key cryptography, Barcelona, Spain, March 9--12, 2008. Proceedings
2008-03-05Paper
Proxy Signatures Secure Against Proxy Key Exposure
Public key cryptography -- PKC 2008. 11th international workshop on practice and theory in public-key cryptography, Barcelona, Spain, March 9--12, 2008. Proceedings
2008-03-05Paper
Cryptography and Coding
Lecture Notes in Computer Science
2007-11-28Paper
Advances in Cryptology - EUROCRYPT 2004
Lecture Notes in Computer Science
2007-09-25Paper
Cryptography in Theory and Practice: The Case of Encryption in IPsec
Advances in Cryptology - EUROCRYPT 2006
2007-09-24Paper
Efficient Identity-Based Signatures Secure in the Standard Model
Information Security and Privacy
2007-09-07Paper
A comment on "A new public-key cipher system based upon the Diophantine equations"
IEEE Transactions on Computers
2007-01-09Paper
Cryptography and Coding
Lecture Notes in Computer Science
2006-11-01Paper
Fast Software Encryption
Lecture Notes in Computer Science
2006-06-22Paper
Fast Software Encryption
Lecture Notes in Computer Science
2005-12-27Paper
Public Key Cryptography - PKC 2005
Lecture Notes in Computer Science
2005-12-07Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2005-06-13Paper
Computing the error linear complexity spectrum of a binary sequence of period 2/sup n/
IEEE Transactions on Information Theory
2005-05-31Paper
scientific article; zbMATH DE number 2079929 (Why is no real title available?)
 
2004-08-03Paper
scientific article; zbMATH DE number 2063201 (Why is no real title available?)
 
2004-03-29Paper
Single-track circuit codes
IEEE Transactions on Information Theory
2002-08-04Paper
scientific article; zbMATH DE number 1972831 (Why is no real title available?)
 
2002-01-01Paper
scientific article; zbMATH DE number 1390142 (Why is no real title available?)
 
2001-11-22Paper
On the existence and construction of good codes with low peak-to-average power ratios
IEEE Transactions on Information Theory
2001-03-19Paper
Generalized Reed-Muller codes and power control in OFDM modulation
IEEE Transactions on Information Theory
2000-09-07Paper
scientific article; zbMATH DE number 1418254 (Why is no real title available?)
 
2000-08-24Paper
scientific article; zbMATH DE number 1424154 (Why is no real title available?)
 
2000-05-15Paper
Efficient decoding algorithms for generalized Reed-Muller codes.
IEEE Transactions on Communications
2000-01-01Paper
Root counting, the DFT and the linear complexity of nonlinear filtering
Designs, Codes and Cryptography
1999-08-17Paper
Bounds on partial correlations of sequences
IEEE Transactions on Information Theory
1999-05-31Paper
Some new circuit codes
IEEE Transactions on Information Theory
1999-04-20Paper
Perfect Factors from Cyclic Codes and Interleaving
SIAM Journal on Discrete Mathematics
1998-05-11Paper
Binary sequence sets with favorable correlations from difference sets and MDS codes
IEEE Transactions on Information Theory
1998-01-01Paper
Permutation polynomials, de Bruijn sequences, and linear complexity
Journal of Combinatorial Theory. Series A
1997-10-01Paper
scientific article; zbMATH DE number 1008455 (Why is no real title available?)
 
1997-05-12Paper
Near optimal single-track Gray codes
IEEE Transactions on Information Theory
1997-03-16Paper
On the existence of de Bruijn tori with two by two windows
Journal of Combinatorial Theory. Series A
1996-12-16Paper
A method for constructing decodable de Bruijn sequences
IEEE Transactions on Information Theory
1996-10-22Paper
Single-track Gray codes
IEEE Transactions on Information Theory
1996-10-22Paper
New classes of perfect maps. II
Journal of Combinatorial Theory. Series A
1996-05-13Paper
New classes of perfect maps. I
Journal of Combinatorial Theory. Series A
1996-02-26Paper
Perfect maps
IEEE Transactions on Information Theory
1995-10-05Paper
Storage efficient decoding for a class of binary de Bruijn sequences
Discrete Mathematics
1995-08-08Paper
Perfect factors in the de Bruijn graph
Designs, Codes and Cryptography
1995-02-26Paper
A weak cipher that generates the symmetric group
Journal of Cryptology
1994-09-11Paper
Decoding perfect maps
Designs, Codes and Cryptography
1994-08-24Paper


Research outcomes over time


This page was built for person: Kenneth G. Paterson