Kenneth G. Paterson

From MaRDI portal
(Redirected from Person:385712)


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
A formal treatment of end-to-end encrypted cloud storage
 
2024-12-04Paper
\textit{Caveat implementor!} Key recovery attacks on MEGA
Advances in Cryptology – EUROCRYPT 2023
2023-12-08Paper
Puncturable key wrapping and its applications
Advances in Cryptology – ASIACRYPT 2022
2023-08-16Paper
An efficient query recovery attack against a graph encryption scheme
Computer Security – ESORICS 2022
2023-07-21Paper
Average Case Error Estimates of the Strong Lucas Test
 
2023-06-15Paper
Many a mickle makes a muckle: a framework for provably quantum-secure hybrid key exchange
Post-Quantum Cryptography
2022-10-13Paper
Anonymous, robust post-quantum public key encryption
 
2022-08-30Paper
Tightly secure ring-LWE based key encapsulation with short ciphertexts
 
2022-08-25Paper
Multilinear maps from obfuscation
Journal of Cryptology
2020-06-15Paper
Safety in numbers: on the need for robust Diffie-Hellman parameter validation
 
2020-01-28Paper
Public-key cryptography on smart cards
Cryptography: Policy and Algorithms
2019-10-10Paper
Related-key security for pseudorandom functions beyond the linear barrier
Journal of Cryptology
2018-11-01Paper
A cryptographic analysis of the WireGuard protocol
 
2018-08-10Paper
Statistical attacks on cookie masking for RC4
Cryptography and Communications
2018-05-28Paper
Cold boot attacks on NTRU
 
2018-04-26Paper
Analysing and exploiting the Mantin biases in RC4
Designs, Codes and Cryptography
2018-04-10Paper
Analyzing multi-key security degradation
 
2018-03-08Paper
Key rotation for authenticated encryption
 
2017-10-27Paper
Properties of the Error Linear Complexity Spectrum
IEEE Transactions on Information Theory
2017-08-08Paper
Backdoors in pseudorandom number generators: possibility and impossibility results
Advances in Cryptology – CRYPTO 2016
2016-11-30Paper
Lucky microseconds: a timing attack on Amazon's s2n implementation of TLS
Advances in Cryptology – EUROCRYPT 2016
2016-09-09Paper
Multilinear maps from obfuscation
Theory of Cryptography
2016-03-23Paper
Security Against Related Randomness Attacks via Reconstructive Extractors
Cryptography and Coding
2016-01-12Paper
Data is a stream: security of stream-based channels
Lecture Notes in Computer Science
2015-12-10Paper
Plaintext Recovery Attacks Against WPA/TKIP
Fast Software Encryption
2015-09-18Paper
On symmetric encryption with distinguishable decryption failures
Fast Software Encryption
2015-09-18Paper
Simulation-based selective opening CCA security for PKE from key encapsulation mechanisms
Lecture Notes in Computer Science
2015-08-27Paper
Big Bias Hunting in Amazonia: Large-Scale Computation and Exploitation of RC4 Biases (Invited Paper)
Lecture Notes in Computer Science
2015-01-16Paper
ASICS: Authenticated key exchange security incorporating certification systems
Lecture Notes in Computer Science
2014-10-16Paper
Related-key security for pseudorandom functions beyond the linear barrier
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Security of symmetric encryption against mass surveillance
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Related randomness attacks for public key encryption
Public-Key Cryptography – PKC 2014
2014-03-25Paper
Signal-flow-based analysis of wireless security protocols
Information and Computation
2013-12-03Paper
On the security of the TLS protocol: a systematic analysis
Advances in Cryptology – CRYPTO 2013
2013-09-02Paper
Programmable hash functions in the multilinear setting
Advances in Cryptology – CRYPTO 2013
2013-09-02Paper
Robust encryption, revisited
Public-Key Cryptography – PKC 2013
2013-04-19Paper
Non-interactive key exchange
Public-Key Cryptography – PKC 2013
2013-04-19Paper
RKA security beyond the linear barrier: IBE, encryption and signatures
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
A coding-theoretic approach to recovering noisy RSA keys
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
Simple, efficient and strongly KI-secure hierarchical key assignment schemes
Topics in Cryptology – CT-RSA 2013
2013-03-18Paper
Anonymous broadcast encryption: adaptive security and efficient constructions in the standard model
Public Key Cryptography – PKC 2012
2012-07-20Paper
Security of symmetric encryption in the presence of ciphertext fragmentation
Advances in Cryptology – EUROCRYPT 2012
2012-06-29Paper
On the joint security of encryption and signature in EMV
Lecture Notes in Computer Science
2012-06-08Paper
Authenticated-encryption with padding: a formal security treatment
Cryptography and Security: From Theory to Applications
2012-06-08Paper
Breaking an identity-based encryption scheme based on DHIES
Cryptography and Coding
2011-12-16Paper
On the joint security of encryption and signature, revisited
Lecture Notes in Computer Science
2011-12-02Paper
Tag size does matter: attacks and proofs for the TLS record protocol
Lecture Notes in Computer Science
2011-12-02Paper
On cipher-dependent related-key attacks in the ideal-cipher model
Fast Software Encryption
2011-07-07Paper
Provably Secure Key Assignment Schemes from Factoring
Information Security and Privacy
2011-07-07Paper
Time-specific encryption
Lecture Notes in Computer Science
2010-09-10Paper
Plaintext-dependent decryption: a formal security treatment of SSH-CTR
Advances in Cryptology – EUROCRYPT 2010
2010-06-01Paper
Certificateless public key cryptography
Lecture Notes in Computer Science
2010-01-05Paper
On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups
Designs, Codes and Cryptography
2009-10-14Paper
Building Key-Private Public-Key Encryption Schemes
Information Security and Privacy
2009-06-25Paper
One-round key exchange in the standard model
International Journal of Applied Cryptography
2009-05-12Paper
Topics in Cryptology – CT-RSA 2004
Lecture Notes in Computer Science
2009-05-07Paper
Pairings for cryptographers
Discrete Applied Mathematics
2009-03-04Paper
Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities
Pairing-Based Cryptography – Pairing 2008
2009-02-10Paper
On Codes With Low Peak-to-Average Power Ratio for Multicode CDMA
IEEE Transactions on Information Theory
2008-12-21Paper
Zero/Positive Capacities of Two-Dimensional Runlength-Constrained Arrays
IEEE Transactions on Information Theory
2008-12-21Paper
Immunising CBC Mode Against Padding Oracle Attacks: A Formal Security Treatment
Lecture Notes in Computer Science
2008-11-20Paper
Efficient One-Round Key Exchange in the Standard Model
Information Security and Privacy
2008-07-08Paper
Modular Security Proofs for Key Agreement Protocols
Lecture Notes in Computer Science
2008-03-18Paper
Multi-key Hierarchical Identity-Based Signatures
Cryptography and Coding
2008-03-07Paper
Certificateless Encryption Schemes Strongly Secure in the Standard Model
Public key cryptography -- PKC 2008. 11th international workshop on practice and theory in public-key cryptography, Barcelona, Spain, March 9--12, 2008. Proceedings
2008-03-05Paper
Proxy Signatures Secure Against Proxy Key Exposure
Public key cryptography -- PKC 2008. 11th international workshop on practice and theory in public-key cryptography, Barcelona, Spain, March 9--12, 2008. Proceedings
2008-03-05Paper
Cryptography and Coding
Lecture Notes in Computer Science
2007-11-28Paper
Advances in Cryptology - EUROCRYPT 2004
Lecture Notes in Computer Science
2007-09-25Paper
Cryptography in Theory and Practice: The Case of Encryption in IPsec
Advances in Cryptology - EUROCRYPT 2006
2007-09-24Paper
Efficient Identity-Based Signatures Secure in the Standard Model
Information Security and Privacy
2007-09-07Paper
A comment on "A new public-key cipher system based upon the Diophantine equations"
IEEE Transactions on Computers
2007-01-09Paper
Cryptography and Coding
Lecture Notes in Computer Science
2006-11-01Paper
Fast Software Encryption
Lecture Notes in Computer Science
2006-06-22Paper
Fast Software Encryption
Lecture Notes in Computer Science
2005-12-27Paper
Public Key Cryptography - PKC 2005
Lecture Notes in Computer Science
2005-12-07Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2005-06-13Paper
Computing the error linear complexity spectrum of a binary sequence of period 2/sup n/
IEEE Transactions on Information Theory
2005-05-31Paper
scientific article; zbMATH DE number 2079929 (Why is no real title available?)
 
2004-08-03Paper
scientific article; zbMATH DE number 2063201 (Why is no real title available?)
 
2004-03-29Paper
Single-track circuit codes
IEEE Transactions on Information Theory
2002-08-04Paper
scientific article; zbMATH DE number 1972831 (Why is no real title available?)
 
2002-01-01Paper
scientific article; zbMATH DE number 1390142 (Why is no real title available?)
 
2001-11-22Paper
On the existence and construction of good codes with low peak-to-average power ratios
IEEE Transactions on Information Theory
2001-03-19Paper
Generalized Reed-Muller codes and power control in OFDM modulation
IEEE Transactions on Information Theory
2000-09-07Paper
scientific article; zbMATH DE number 1418254 (Why is no real title available?)
 
2000-08-24Paper
scientific article; zbMATH DE number 1424154 (Why is no real title available?)
 
2000-05-15Paper
Efficient decoding algorithms for generalized Reed-Muller codes.
IEEE Transactions on Communications
2000-01-01Paper
Root counting, the DFT and the linear complexity of nonlinear filtering
Designs, Codes and Cryptography
1999-08-17Paper
Bounds on partial correlations of sequences
IEEE Transactions on Information Theory
1999-05-31Paper
Some new circuit codes
IEEE Transactions on Information Theory
1999-04-20Paper
Perfect Factors from Cyclic Codes and Interleaving
SIAM Journal on Discrete Mathematics
1998-05-11Paper
Binary sequence sets with favorable correlations from difference sets and MDS codes
IEEE Transactions on Information Theory
1998-01-01Paper
Permutation polynomials, de Bruijn sequences, and linear complexity
Journal of Combinatorial Theory. Series A
1997-10-01Paper
scientific article; zbMATH DE number 1008455 (Why is no real title available?)
 
1997-05-12Paper
Near optimal single-track Gray codes
IEEE Transactions on Information Theory
1997-03-16Paper
On the existence of de Bruijn tori with two by two windows
Journal of Combinatorial Theory. Series A
1996-12-16Paper
A method for constructing decodable de Bruijn sequences
IEEE Transactions on Information Theory
1996-10-22Paper
Single-track Gray codes
IEEE Transactions on Information Theory
1996-10-22Paper
New classes of perfect maps. II
Journal of Combinatorial Theory. Series A
1996-05-13Paper
New classes of perfect maps. I
Journal of Combinatorial Theory. Series A
1996-02-26Paper
Perfect maps
IEEE Transactions on Information Theory
1995-10-05Paper
Storage efficient decoding for a class of binary de Bruijn sequences
Discrete Mathematics
1995-08-08Paper
Perfect factors in the de Bruijn graph
Designs, Codes and Cryptography
1995-02-26Paper
A weak cipher that generates the symmetric group
Journal of Cryptology
1994-09-11Paper
Decoding perfect maps
Designs, Codes and Cryptography
1994-08-24Paper


Research outcomes over time


This page was built for person: Kenneth G. Paterson