Kenneth G. Paterson

From MaRDI portal
Person:385712

Available identifiers

zbMath Open paterson.kenneth-gMaRDI QIDQ385712

List of research outcomes

PublicationDate of PublicationType
\textit{Caveat implementor!} Key recovery attacks on MEGA2023-12-08Paper
Puncturable key wrapping and its applications2023-08-16Paper
An efficient query recovery attack against a graph encryption scheme2023-07-21Paper
Many a Mickle Makes a Muckle: A Framework for Provably Quantum-Secure Hybrid Key Exchange2022-10-13Paper
Anonymous, robust post-quantum public key encryption2022-08-30Paper
Tightly secure ring-LWE based key encapsulation with short ciphertexts2022-08-25Paper
Multilinear maps from obfuscation2020-06-15Paper
Safety in numbers: on the need for robust Diffie-Hellman parameter validation2020-01-28Paper
Public-key cryptography on smart cards2019-10-10Paper
Related-key security for pseudorandom functions beyond the linear barrier2018-11-01Paper
A cryptographic analysis of the WireGuard protocol2018-08-10Paper
Statistical attacks on cookie masking for RC42018-05-28Paper
Cold boot attacks on NTRU2018-04-26Paper
Analysing and exploiting the Mantin biases in RC42018-04-10Paper
Analyzing multi-key security degradation2018-03-08Paper
Key rotation for authenticated encryption2017-10-27Paper
Properties of the Error Linear Complexity Spectrum2017-08-08Paper
Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results2016-11-30Paper
Lucky Microseconds: A Timing Attack on Amazon’s s2n Implementation of TLS2016-09-09Paper
Multilinear Maps from Obfuscation2016-03-23Paper
Security Against Related Randomness Attacks via Reconstructive Extractors2016-01-12Paper
Data Is a Stream: Security of Stream-Based Channels2015-12-10Paper
On Symmetric Encryption with Distinguishable Decryption Failures2015-09-18Paper
Plaintext Recovery Attacks Against WPA/TKIP2015-09-18Paper
Simulation-Based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms2015-08-27Paper
Big Bias Hunting in Amazonia: Large-Scale Computation and Exploitation of RC4 Biases (Invited Paper)2015-01-16Paper
ASICS: Authenticated Key Exchange Security Incorporating Certification Systems2014-10-16Paper
Security of Symmetric Encryption against Mass Surveillance2014-08-07Paper
Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier2014-08-07Paper
Related Randomness Attacks for Public Key Encryption2014-03-25Paper
Signal-flow-based analysis of wireless security protocols2013-12-03Paper
On the Security of the TLS Protocol: A Systematic Analysis2013-09-02Paper
Programmable Hash Functions in the Multilinear Setting2013-09-02Paper
Non-Interactive Key Exchange2013-04-19Paper
Robust Encryption, Revisited2013-04-19Paper
RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures2013-03-19Paper
A Coding-Theoretic Approach to Recovering Noisy RSA Keys2013-03-19Paper
Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes2013-03-18Paper
Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model2012-07-20Paper
Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation2012-06-29Paper
Authenticated-Encryption with Padding: A Formal Security Treatment2012-06-08Paper
On the Joint Security of Encryption and Signature in EMV2012-06-08Paper
Breaking an Identity-Based Encryption Scheme Based on DHIES2011-12-16Paper
On the Joint Security of Encryption and Signature, Revisited2011-12-02Paper
Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol2011-12-02Paper
Provably Secure Key Assignment Schemes from Factoring2011-07-07Paper
On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model2011-07-07Paper
Time-Specific Encryption2010-09-10Paper
Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR2010-06-01Paper
Advances in Cryptology - ASIACRYPT 20032010-01-05Paper
On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups2009-10-14Paper
Building Key-Private Public-Key Encryption Schemes2009-06-25Paper
One-round key exchange in the standard model2009-05-12Paper
Topics in Cryptology – CT-RSA 20042009-05-07Paper
Pairings for cryptographers2009-03-04Paper
Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities2009-02-10Paper
Zero/Positive Capacities of Two-Dimensional Runlength-Constrained Arrays2008-12-21Paper
On Codes With Low Peak-to-Average Power Ratio for Multicode CDMA2008-12-21Paper
Immunising CBC Mode Against Padding Oracle Attacks: A Formal Security Treatment2008-11-20Paper
Efficient One-Round Key Exchange in the Standard Model2008-07-08Paper
Modular Security Proofs for Key Agreement Protocols2008-03-18Paper
Multi-key Hierarchical Identity-Based Signatures2008-03-07Paper
Proxy Signatures Secure Against Proxy Key Exposure2008-03-05Paper
Certificateless Encryption Schemes Strongly Secure in the Standard Model2008-03-05Paper
Cryptography and Coding2007-11-28Paper
Advances in Cryptology - EUROCRYPT 20042007-09-25Paper
Cryptography in Theory and Practice: The Case of Encryption in IPsec2007-09-24Paper
Efficient Identity-Based Signatures Secure in the Standard Model2007-09-07Paper
A comment on "A new public-key cipher system based upon the Diophantine equations"2007-01-09Paper
Cryptography and Coding2006-11-01Paper
Fast Software Encryption2006-06-22Paper
Fast Software Encryption2005-12-27Paper
Public Key Cryptography - PKC 20052005-12-07Paper
Applied Cryptography and Network Security2005-06-13Paper
Computing the error linear complexity spectrum of a binary sequence of period 2/sup n/2005-05-31Paper
https://portal.mardi4nfdi.de/entity/Q44720752004-08-03Paper
https://portal.mardi4nfdi.de/entity/Q44608152004-03-29Paper
Single-track circuit codes2002-08-04Paper
https://portal.mardi4nfdi.de/entity/Q44216232002-01-01Paper
https://portal.mardi4nfdi.de/entity/Q49344122001-11-22Paper
On the existence and construction of good codes with low peak-to-average power ratios2001-03-19Paper
Generalized Reed-Muller codes and power control in OFDM modulation2000-09-07Paper
https://portal.mardi4nfdi.de/entity/Q49418132000-08-24Paper
https://portal.mardi4nfdi.de/entity/Q49453472000-05-15Paper
Efficient decoding algorithms for generalized Reed-Muller codes2000-01-01Paper
Root counting, the DFT and the linear complexity of nonlinear filtering1999-08-17Paper
Bounds on partial correlations of sequences1999-05-31Paper
Some new circuit codes1999-04-20Paper
Perfect Factors from Cyclic Codes and Interleaving1998-05-11Paper
Binary sequence sets with favorable correlations from difference sets and MDS codes1998-01-01Paper
Permutation polynomials, de Bruijn sequences, and linear complexity1997-10-01Paper
https://portal.mardi4nfdi.de/entity/Q43362081997-05-12Paper
Near optimal single-track Gray codes1997-03-16Paper
On the existence of de Bruijn tori with two by two windows1996-12-16Paper
A method for constructing decodable de Bruijn sequences1996-10-22Paper
Single-track Gray codes1996-10-22Paper
New classes of perfect maps. II1996-05-13Paper
New classes of perfect maps. I1996-02-26Paper
Perfect maps1995-10-05Paper
Storage efficient decoding for a class of binary de Bruijn sequences1995-08-08Paper
Perfect factors in the de Bruijn graph1995-02-26Paper
A weak cipher that generates the symmetric group1994-09-11Paper
Decoding perfect maps1994-08-24Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Kenneth G. Paterson