Kenneth G. Paterson

From MaRDI portal
Person:385712

Available identifiers

zbMath Open paterson.kenneth-gMaRDI QIDQ385712

List of research outcomes





PublicationDate of PublicationType
A formal treatment of end-to-end encrypted cloud storage2024-12-04Paper
\textit{Caveat implementor!} Key recovery attacks on MEGA2023-12-08Paper
Puncturable key wrapping and its applications2023-08-16Paper
An efficient query recovery attack against a graph encryption scheme2023-07-21Paper
Average Case Error Estimates of the Strong Lucas Test2023-06-15Paper
Many a Mickle Makes a Muckle: A Framework for Provably Quantum-Secure Hybrid Key Exchange2022-10-13Paper
Anonymous, robust post-quantum public key encryption2022-08-30Paper
Tightly secure ring-LWE based key encapsulation with short ciphertexts2022-08-25Paper
Multilinear maps from obfuscation2020-06-15Paper
Safety in numbers: on the need for robust Diffie-Hellman parameter validation2020-01-28Paper
Public-key cryptography on smart cards2019-10-10Paper
Related-key security for pseudorandom functions beyond the linear barrier2018-11-01Paper
A cryptographic analysis of the WireGuard protocol2018-08-10Paper
Statistical attacks on cookie masking for RC42018-05-28Paper
Cold boot attacks on NTRU2018-04-26Paper
Analysing and exploiting the Mantin biases in RC42018-04-10Paper
Analyzing multi-key security degradation2018-03-08Paper
Key rotation for authenticated encryption2017-10-27Paper
Properties of the Error Linear Complexity Spectrum2017-08-08Paper
Backdoors in pseudorandom number generators: possibility and impossibility results2016-11-30Paper
Lucky microseconds: a timing attack on Amazon's s2n implementation of TLS2016-09-09Paper
Multilinear maps from obfuscation2016-03-23Paper
Security Against Related Randomness Attacks via Reconstructive Extractors2016-01-12Paper
Data is a stream: security of stream-based channels2015-12-10Paper
Plaintext Recovery Attacks Against WPA/TKIP2015-09-18Paper
On symmetric encryption with distinguishable decryption failures2015-09-18Paper
Simulation-based selective opening CCA security for PKE from key encapsulation mechanisms2015-08-27Paper
Big Bias Hunting in Amazonia: Large-Scale Computation and Exploitation of RC4 Biases (Invited Paper)2015-01-16Paper
ASICS: Authenticated key exchange security incorporating certification systems2014-10-16Paper
Related-key security for pseudorandom functions beyond the linear barrier2014-08-07Paper
Security of symmetric encryption against mass surveillance2014-08-07Paper
Related randomness attacks for public key encryption2014-03-25Paper
Signal-flow-based analysis of wireless security protocols2013-12-03Paper
On the security of the TLS protocol: a systematic analysis2013-09-02Paper
Programmable hash functions in the multilinear setting2013-09-02Paper
Robust encryption, revisited2013-04-19Paper
Non-interactive key exchange2013-04-19Paper
RKA security beyond the linear barrier: IBE, encryption and signatures2013-03-19Paper
A coding-theoretic approach to recovering noisy RSA keys2013-03-19Paper
Simple, efficient and strongly KI-secure hierarchical key assignment schemes2013-03-18Paper
Anonymous broadcast encryption: adaptive security and efficient constructions in the standard model2012-07-20Paper
Security of symmetric encryption in the presence of ciphertext fragmentation2012-06-29Paper
On the joint security of encryption and signature in EMV2012-06-08Paper
Authenticated-encryption with padding: a formal security treatment2012-06-08Paper
Breaking an identity-based encryption scheme based on DHIES2011-12-16Paper
On the joint security of encryption and signature, revisited2011-12-02Paper
Tag size does matter: attacks and proofs for the TLS record protocol2011-12-02Paper
On cipher-dependent related-key attacks in the ideal-cipher model2011-07-07Paper
Provably Secure Key Assignment Schemes from Factoring2011-07-07Paper
Time-specific encryption2010-09-10Paper
Plaintext-dependent decryption: a formal security treatment of SSH-CTR2010-06-01Paper
Certificateless public key cryptography2010-01-05Paper
On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups2009-10-14Paper
Building Key-Private Public-Key Encryption Schemes2009-06-25Paper
One-round key exchange in the standard model2009-05-12Paper
Topics in Cryptology – CT-RSA 20042009-05-07Paper
Pairings for cryptographers2009-03-04Paper
Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities2009-02-10Paper
On Codes With Low Peak-to-Average Power Ratio for Multicode CDMA2008-12-21Paper
Zero/Positive Capacities of Two-Dimensional Runlength-Constrained Arrays2008-12-21Paper
Immunising CBC Mode Against Padding Oracle Attacks: A Formal Security Treatment2008-11-20Paper
Efficient One-Round Key Exchange in the Standard Model2008-07-08Paper
Modular Security Proofs for Key Agreement Protocols2008-03-18Paper
Multi-key Hierarchical Identity-Based Signatures2008-03-07Paper
Certificateless Encryption Schemes Strongly Secure in the Standard Model2008-03-05Paper
Proxy Signatures Secure Against Proxy Key Exposure2008-03-05Paper
Cryptography and Coding2007-11-28Paper
Advances in Cryptology - EUROCRYPT 20042007-09-25Paper
Cryptography in Theory and Practice: The Case of Encryption in IPsec2007-09-24Paper
Efficient Identity-Based Signatures Secure in the Standard Model2007-09-07Paper
A comment on "A new public-key cipher system based upon the Diophantine equations"2007-01-09Paper
Cryptography and Coding2006-11-01Paper
Fast Software Encryption2006-06-22Paper
Fast Software Encryption2005-12-27Paper
Public Key Cryptography - PKC 20052005-12-07Paper
Applied Cryptography and Network Security2005-06-13Paper
Computing the error linear complexity spectrum of a binary sequence of period 2/sup n/2005-05-31Paper
https://portal.mardi4nfdi.de/entity/Q44720752004-08-03Paper
https://portal.mardi4nfdi.de/entity/Q44608152004-03-29Paper
Single-track circuit codes2002-08-04Paper
https://portal.mardi4nfdi.de/entity/Q44216232002-01-01Paper
https://portal.mardi4nfdi.de/entity/Q49344122001-11-22Paper
On the existence and construction of good codes with low peak-to-average power ratios2001-03-19Paper
Generalized Reed-Muller codes and power control in OFDM modulation2000-09-07Paper
https://portal.mardi4nfdi.de/entity/Q49418132000-08-24Paper
https://portal.mardi4nfdi.de/entity/Q49453472000-05-15Paper
Efficient decoding algorithms for generalized Reed-Muller codes.2000-01-01Paper
Root counting, the DFT and the linear complexity of nonlinear filtering1999-08-17Paper
Bounds on partial correlations of sequences1999-05-31Paper
Some new circuit codes1999-04-20Paper
Perfect Factors from Cyclic Codes and Interleaving1998-05-11Paper
Binary sequence sets with favorable correlations from difference sets and MDS codes1998-01-01Paper
Permutation polynomials, de Bruijn sequences, and linear complexity1997-10-01Paper
https://portal.mardi4nfdi.de/entity/Q43362081997-05-12Paper
Near optimal single-track Gray codes1997-03-16Paper
On the existence of de Bruijn tori with two by two windows1996-12-16Paper
A method for constructing decodable de Bruijn sequences1996-10-22Paper
Single-track Gray codes1996-10-22Paper
New classes of perfect maps. II1996-05-13Paper
New classes of perfect maps. I1996-02-26Paper
Perfect maps1995-10-05Paper
Storage efficient decoding for a class of binary de Bruijn sequences1995-08-08Paper
Perfect factors in the de Bruijn graph1995-02-26Paper
A weak cipher that generates the symmetric group1994-09-11Paper
Decoding perfect maps1994-08-24Paper

Research outcomes over time

This page was built for person: Kenneth G. Paterson