Thomas Shrimpton

From MaRDI portal
(Redirected from Person:1675214)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Quantifying the security cost of migrating protocols to practice2022-11-09Paper
Security in the presence of key reuse: context-separable interfaces and their applications2020-05-20Paper
Hedging public-key encryption in the real world2017-10-27Paper
Salvaging weak security bounds for blockcipher-based constructions
Advances in Cryptology – ASIACRYPT 2016
2017-02-01Paper
A modular treatment of cryptographic APIs: the symmetric-key case
Advances in Cryptology – CRYPTO 2016
2016-11-30Paper
A provable-security analysis of Intel's secure key RNG
Advances in Cryptology -- EUROCRYPT 2015
2015-09-30Paper
Reconsidering generic composition
Advances in Cryptology – EUROCRYPT 2014
2014-05-27Paper
A modular framework for building variable-input-length tweakable ciphers
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
Tweakable Blockciphers with Beyond Birthday-Bound Security
Lecture Notes in Computer Science
2012-09-25Paper
Tag size does matter: attacks and proofs for the TLS record protocol
Lecture Notes in Computer Science
2011-12-02Paper
Careful with composition: limitations of the indifferentiability framework
Advances in Cryptology – EUROCRYPT 2011
2011-05-27Paper
Random oracles with(out) programmability
Advances in Cryptology - ASIACRYPT 2010
2010-12-07Paper
An analysis of the blockcipher-based hash functions from PGV
Journal of Cryptology
2010-11-12Paper
Attacking the Knudsen-Preneel Compression Functions
Fast Software Encryption
2010-07-13Paper
On the impossibility of highly-efficient blockcipher-based hash functions
Journal of Cryptology
2009-06-30Paper
Salvaging Merkle-Damgård for Practical Applications
Advances in Cryptology - EUROCRYPT 2009
2009-05-12Paper
Building a Collision-Resistant Compression Function from Non-compressing Primitives
Automata, Languages and Programming
2008-08-19Paper
Seven-Property-Preserving Iterated Hashing: ROX
Advances in Cryptology – ASIACRYPT 2007
2008-05-15Paper
How to Build a Hash Function from Any Collision-Resistant Function
Advances in Cryptology – ASIACRYPT 2007
2008-05-15Paper
On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions
Lecture Notes in Computer Science
2008-05-06Paper
A Provable-Security Treatment of the Key-Wrap Problem
Advances in Cryptology - EUROCRYPT 2006
2007-09-24Paper
Threshold password-authenticated key exchange
Journal of Cryptology
2006-08-14Paper
Fast Software Encryption
Lecture Notes in Computer Science
2005-12-27Paper
scientific article; zbMATH DE number 1951605 (Why is no real title available?)2003-07-21Paper
scientific article; zbMATH DE number 1942429 (Why is no real title available?)2003-06-30Paper
scientific article; zbMATH DE number 1942433 (Why is no real title available?)2003-06-30Paper


Research outcomes over time


This page was built for person: Thomas Shrimpton