default search action
Kenneth G. Paterson
Person information
- affiliation: Department of Computer Science, ETH Zurich, Switzerland
- affiliation (former): Royal Holloway University of London, Information Security Group, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j59]Semira Einsele, Kenneth G. Paterson:
Average case error estimates of the strong Lucas test. Des. Codes Cryptogr. 92(5): 1341-1378 (2024) - [j58]Matilda Backendal, Miro Haller, Kenny Paterson:
End-to-End Encrypted Cloud Storage. IEEE Secur. Priv. 22(2): 69-74 (2024) - [j57]Patrick Camilleri, Shahram Mossayebi, Kenneth G. Paterson, Charles Grover:
Using Gate Tunneling in Bulk CMOS to Create a PUF. IEEE Internet Things J. 11(2): 2070-2081 (2024) - [j56]Zichen Gui, Kenneth G. Paterson, Sikhar Patranabis, Bogdan Warinschi:
SWiSSSE: System-Wide Security for Searchable Symmetric Encryption. Proc. Priv. Enhancing Technol. 2024(1): 549-581 (2024) - [c116]Matilda Backendal, Hannah Davis, Felix Günther, Miro Haller, Kenneth G. Paterson:
A Formal Treatment of End-to-End Encrypted Cloud Storage. CRYPTO (2) 2024: 40-74 - [c115]Martin R. Albrecht, Matilda Backendal, Daniele Coppola, Kenneth G. Paterson:
Share with Care: Breaking E2EE in Nextcloud. EuroS&P 2024: 828-840 - [c114]Jean Paul Degabriele, Jan Gilcher, Jérôme Govinden, Kenneth G. Paterson:
SoK: Efficient Design and Implementation of Polynomial Hash Functions over Prime Fields. SP 2024: 3128-3146 - [c113]Yuanming Song, Lenka Mareková, Kenneth G. Paterson:
Cryptographic Analysis of Delta Chat. USENIX Security Symposium 2024 - [i91]Atul Luykx, Kenneth G. Paterson:
Limits on Authenticated Encryption Use in TLS. IACR Cryptol. ePrint Arch. 2024: 51 (2024) - [i90]Martin R. Albrecht, Kenneth G. Paterson:
Analysing Cryptography in the Wild - A Retrospective. IACR Cryptol. ePrint Arch. 2024: 532 (2024) - [i89]Martin R. Albrecht, Matilda Backendal, Daniele Coppola, Kenneth G. Paterson:
Share with Care: Breaking E2EE in Nextcloud. IACR Cryptol. ePrint Arch. 2024: 546 (2024) - [i88]Francesca Falzon, Esha Ghosh, Kenneth G. Paterson, Roberto Tamassia:
PathGES: An Efficient and Secure Graph Encryption Scheme for Shortest Path Queries. IACR Cryptol. ePrint Arch. 2024: 845 (2024) - [i87]Yuanming Song, Lenka Mareková, Kenneth G. Paterson:
Cryptographic Analysis of Delta Chat. IACR Cryptol. ePrint Arch. 2024: 918 (2024) - [i86]Matilda Backendal, Hannah Davis, Felix Günther, Miro Haller, Kenneth G. Paterson:
A Formal Treatment of End-to-End Encrypted Cloud Storage. IACR Cryptol. ePrint Arch. 2024: 989 (2024) - [i85]Mia Filic, Jonas Hofmann, Sam A. Markelon, Kenneth G. Paterson, Anupama Unnikrishnan:
Probabilistic Data Structures in the Wild: A Security Analysis of Redis. IACR Cryptol. ePrint Arch. 2024: 1312 (2024) - 2023
- [j55]David Ott, Kenny Paterson, Dennis Moreau:
Where Is the Research on Cryptographic Transition and Agility? Commun. ACM 66(4): 29-32 (2023) - [c112]Theo von Arx, Kenneth G. Paterson:
On the Cryptographic Fragility of the Telegram Ecosystem. AsiaCCS 2023: 328-341 - [c111]Martin R. Albrecht, Miro Haller, Lenka Mareková, Kenneth G. Paterson:
Caveat Implementor! Key Recovery Attacks on MEGA. EUROCRYPT (5) 2023: 190-218 - [c110]Matilda Backendal, Miro Haller, Kenneth G. Paterson:
MEGA: Malleable Encryption Goes Awry. SP 2023: 146-163 - [c109]Zichen Gui, Kenneth G. Paterson, Sikhar Patranabis:
Rethinking Searchable Symmetric Encryption. SP 2023: 1401-1418 - [c108]Kenneth G. Paterson, Matteo Scarlata, Kien T. Truong:
Three Lessons From Threema: Analysis of a Secure Messenger. USENIX Security Symposium 2023: 1289-1306 - [c107]Massimiliano Taverna, Kenneth G. Paterson:
Snapping Snap Sync: Practical Attacks on Go Ethereum Synchronising Nodes. USENIX Security Symposium 2023: 3331-3348 - [c106]Zichen Gui, Kenneth G. Paterson, Tianxin Tang:
Security Analysis of MongoDB Queryable Encryption. USENIX Security Symposium 2023: 7445-7462 - [i84]Semira Einsele, Kenneth G. Paterson:
Average Case Error Estimates of the Strong Lucas Test. CoRR abs/2306.09472 (2023) - [i83]Jean Paul Degabriele, Jérôme Govinden, Felix Günther, Kenneth G. Paterson:
The Security of ChaCha20-Poly1305 in the Multi-user Setting. IACR Cryptol. ePrint Arch. 2023: 85 (2023) - [i82]Martin R. Albrecht, Miro Haller, Lenka Mareková, Kenneth G. Paterson:
Caveat Implementor! Key Recovery Attacks on MEGA. IACR Cryptol. ePrint Arch. 2023: 329 (2023) - [i81]Martin R. Albrecht, Lenka Mareková, Kenneth G. Paterson, Igors Stepanovs:
Four Attacks and a Proof for Telegram. IACR Cryptol. ePrint Arch. 2023: 469 (2023) - [i80]Robertas Maleckas, Kenneth G. Paterson, Martin R. Albrecht:
Practically-exploitable Vulnerabilities in the Jitsi Video Conferencing System. IACR Cryptol. ePrint Arch. 2023: 1118 (2023) - 2022
- [c105]Matilda Backendal, Felix Günther, Kenneth G. Paterson:
Puncturable Key Wrapping and Its Applications. ASIACRYPT (2) 2022: 651-681 - [c104]Lara Bruseghini, Daniel Huigens, Kenneth G. Paterson:
Victory by KO: Attacking OpenPGP Using Key Overwriting. CCS 2022: 411-423 - [c103]Mia Filic, Kenneth G. Paterson, Anupama Unnikrishnan, Fernando Virdia:
Adversarial Correctness and Privacy for Probabilistic Data Structures. CCS 2022: 1037-1050 - [c102]Francesca Falzon, Kenneth G. Paterson:
An Efficient Query Recovery Attack Against a Graph Encryption Scheme. ESORICS (1) 2022: 325-345 - [c101]Paul Grubbs, Varun Maram, Kenneth G. Paterson:
Anonymous, Robust Post-quantum Public Key Encryption. EUROCRYPT (3) 2022: 402-432 - [c100]Kenneth G. Paterson, Mathilde Raynal:
HyperLogLog: Exponentially Bad in Adversarial Settings. EuroS&P 2022: 154-170 - [c99]Martin R. Albrecht, Lenka Mareková, Kenneth G. Paterson, Igors Stepanovs:
Four Attacks and a Proof for Telegram. SP 2022: 87-106 - [c98]Martin R. Albrecht, Raphael Eikenberg, Kenneth G. Paterson:
Breaking Bridgefy, again: Adopting libsignal is not enough. USENIX Security Symposium 2022: 269-286 - [i79]Mia Filic, Kenneth G. Paterson, Anupama Unnikrishnan, Fernando Virdia:
Adversarial Correctness and Privacy for Probabilistic Data Structures. CoRR abs/2209.06955 (2022) - [i78]Nimrod Aviram, Benjamin Dowling, Ilan Komargodski, Kenneth G. Paterson, Eyal Ronen, Eylon Yogev:
Practical (Post-Quantum) Key Combiners from One-Wayness and Applications to TLS. IACR Cryptol. ePrint Arch. 2022: 65 (2022) - [i77]Theo von Arx, Kenneth G. Paterson:
On the Cryptographic Fragility of the Telegram Ecosystem. IACR Cryptol. ePrint Arch. 2022: 595 (2022) - [i76]Francesca Falzon, Kenneth G. Paterson:
An Efficient Query Recovery Attack Against a Graph Encryption Scheme. IACR Cryptol. ePrint Arch. 2022: 838 (2022) - [i75]Matilda Backendal, Miro Haller, Kenneth G. Paterson:
MEGA: Malleable Encryption Goes Awry. IACR Cryptol. ePrint Arch. 2022: 959 (2022) - [i74]Mia Filic, Kenneth G. Paterson, Anupama Unnikrishnan, Fernando Virdia:
Adversarial Correctness and Privacy for Probabilistic Data Structures. IACR Cryptol. ePrint Arch. 2022: 1186 (2022) - [i73]Matilda Backendal, Felix Günther, Kenneth G. Paterson:
Puncturable Key Wrapping and Its Applications. IACR Cryptol. ePrint Arch. 2022: 1209 (2022) - 2021
- [j54]Wouter Lueks, Seda F. Gürses, Michael Veale, Edouard Bugnion, Marcel Salathé, Kenneth G. Paterson, Carmela Troncoso:
CrowdNotifier: Decentralized Privacy-Preserving Presence Tracing. Proc. Priv. Enhancing Technol. 2021(4): 350-368 (2021) - [c97]Jean Paul Degabriele, Jérôme Govinden, Felix Günther, Kenneth G. Paterson:
The Security of ChaCha20-Poly1305 in the Multi-User Setting. CCS 2021: 1981-2003 - [e6]Kenneth G. Paterson:
Topics in Cryptology - CT-RSA 2021 - Cryptographers' Track at the RSA Conference 2021, Virtual Event, May 17-20, 2021, Proceedings. Lecture Notes in Computer Science 12704, Springer 2021, ISBN 978-3-030-75538-6 [contents] - [i72]Paul Grubbs, Varun Maram, Kenneth G. Paterson:
Anonymous, Robust Post-Quantum Public Key Encryption. IACR Cryptol. ePrint Arch. 2021: 708 (2021) - [i71]Zichen Gui, Kenneth G. Paterson, Sikhar Patranabis:
Leakage Perturbation is Not Enough: Breaking Structured Encryption Using Simulated Annealing. IACR Cryptol. ePrint Arch. 2021: 879 (2021) - [i70]Kenneth G. Paterson, Mathilde Raynal:
HyperLogLog: Exponentially Bad in Adversarial Settings. IACR Cryptol. ePrint Arch. 2021: 1139 (2021) - 2020
- [j53]Carmela Troncoso, Mathias Payer, Jean-Pierre Hubaux, Marcel Salathé, James R. Larus, Wouter Lueks, Theresa Stadler, Apostolos Pyrgelis, Daniele Antonioli, Ludovic Barman, Sylvain Chatel, Kenneth G. Paterson, Srdjan Capkun, David A. Basin, Jan Beutel, Dennis Jackson, Marc Roeschlin, Patrick Leu, Bart Preneel, Nigel P. Smart, Aysajan Abidin, Seda Gurses, Michael Veale, Cas Cremers, Michael Backes, Nils Ole Tippenhauer, Reuben Binns, Ciro Cattuto, Alain Barrat, Dario Fiore, Manuel Barbosa, Rui Oliveira, José Pereira:
Decentralized Privacy-Preserving Proximity Tracing. IEEE Data Eng. Bull. 43(2): 36-66 (2020) - [j52]Martin R. Albrecht, Pooya Farshim, Shuai Han, Dennis Hofheinz, Enrique Larraia, Kenneth G. Paterson:
Multilinear Maps from Obfuscation. J. Cryptol. 33(3): 1080-1113 (2020) - [c96]Jake Massimo, Kenneth G. Paterson:
A Performant, Misuse-Resistant API for Primality Testing. CCS 2020: 195-210 - [c95]Benjamin Dowling, Torben Brandt Hansen, Kenneth G. Paterson:
Many a Mickle Makes a Muckle: A Framework for Provably Quantum-Secure Hybrid Key Exchange. PQCrypto 2020: 483-502 - [c94]Patrick Leu, Mridula Singh, Marc Roeschlin, Kenneth G. Paterson, Srdjan Capkun:
Message Time of Arrival Codes: A Fundamental Primitive for Secure Distance Measurement. SP 2020: 500-516 - [c93]Florian Tramèr, Dan Boneh, Kenny Paterson:
Remote Side-Channel Attacks on Anonymous Transactions. USENIX Security Symposium 2020: 2739-2756 - [e5]Kenneth G. Paterson, Douglas Stebila:
Selected Areas in Cryptography - SAC 2019 - 26th International Conference, Waterloo, ON, Canada, August 12-16, 2019, Revised Selected Papers. Lecture Notes in Computer Science 11959, Springer 2020, ISBN 978-3-030-38470-8 [contents] - [i69]Carmela Troncoso, Mathias Payer, Jean-Pierre Hubaux, Marcel Salathé, James R. Larus, Edouard Bugnion, Wouter Lueks, Theresa Stadler, Apostolos Pyrgelis, Daniele Antonioli, Ludovic Barman, Sylvain Chatel, Kenneth G. Paterson, Srdjan Capkun, David A. Basin, Jan Beutel, Dennis Jackson, Marc Roeschlin, Patrick Leu, Bart Preneel, Nigel P. Smart, Aysajan Abidin, Seda F. Gürses, Michael Veale, Cas Cremers, Michael Backes, Nils Ole Tippenhauer, Reuben Binns, Ciro Cattuto, Alain Barrat, Dario Fiore, Manuel Barbosa, Rui Oliveira, José Pereira:
Decentralized Privacy-Preserving Proximity Tracing. CoRR abs/2005.12273 (2020) - [i68]Jake Massimo, Kenneth G. Paterson:
A Performant, Misuse-Resistant API for Primality Testing. IACR Cryptol. ePrint Arch. 2020: 65 (2020) - [i67]Benjamin Dowling, Torben Brandt Hansen, Kenneth G. Paterson:
Many a Mickle Makes a Muckle: A Framework for Provably Quantum-Secure Hybrid Key Exchange. IACR Cryptol. ePrint Arch. 2020: 99 (2020) - [i66]Florian Tramèr, Dan Boneh, Kenneth G. Paterson:
Remote Side-Channel Attacks on Anonymous Transactions. IACR Cryptol. ePrint Arch. 2020: 220 (2020) - [i65]Zichen Gui, Kenneth G. Paterson, Sikhar Patranabis, Bogdan Warinschi:
SWiSSSE: System-Wide Security for Searchable Symmetric Encryption. IACR Cryptol. ePrint Arch. 2020: 1328 (2020)
2010 – 2019
- 2019
- [j51]Martin R. Albrecht, Torben Brandt Hansen, Kenneth G. Paterson:
libInterMAC: Beyond Confidentiality and Integrity in Practice. IACR Trans. Symmetric Cryptol. 2019(1): 46-83 (2019) - [c92]Steven D. Galbraith, Jake Massimo, Kenneth G. Paterson:
Safety in Numbers: On the Need for Robust Diffie-Hellman Parameter Validation. Public Key Cryptography (2) 2019: 379-407 - [c91]Paul Grubbs, Marie-Sarah Lacharité, Brice Minaud, Kenneth G. Paterson:
Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks. IEEE Symposium on Security and Privacy 2019: 1067-1083 - [i64]Patrick Leu, Mridula Singh, Marc Roeschlin, Kenneth G. Paterson, Srdjan Capkun:
Message Time of Arrival Codes: A Fundamental Primitive for Secure Distance Measurement. CoRR abs/1911.11052 (2019) - [i63]Simon Bell, Kenny Paterson, Lorenzo Cavallaro:
Catch Me (On Time) If You Can: Understanding the Effectiveness of Twitter URL Blacklists. CoRR abs/1912.02520 (2019) - [i62]Paul Grubbs, Marie-Sarah Lacharité, Brice Minaud, Kenneth G. Paterson:
Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks. IACR Cryptol. ePrint Arch. 2019: 11 (2019) - [i61]Steven D. Galbraith, Jake Massimo, Kenneth G. Paterson:
Safety in Numbers: On the Need for Robust Diffie-Hellman Parameter Validation. IACR Cryptol. ePrint Arch. 2019: 32 (2019) - [i60]Martin R. Albrecht, Torben Brandt Hansen, Kenneth G. Paterson:
libInterMAC: Beyond Confidentiality and Integrity in Practice. IACR Cryptol. ePrint Arch. 2019: 165 (2019) - [i59]Patrick Leu, Mridula Singh, Marc Roeschlin, Kenneth G. Paterson, Srdjan Capkun:
Message Time of Arrival Codes: A Fundamental Primitive for Secure Distance Measurement. IACR Cryptol. ePrint Arch. 2019: 1350 (2019) - 2018
- [j50]Kenny Paterson:
Technical perspective: On heartbleed: a hard beginnyng makth a good endyng. Commun. ACM 61(3): 108 (2018) - [j49]Kenneth G. Paterson, Jacob C. N. Schuldt:
Statistical attacks on cookie masking for RC4. Cryptogr. Commun. 10(5): 777-801 (2018) - [j48]Xutao Zhou, Diego R. López, Vijay K. Gurbani, Jan Seedorf, Alexey Melnikov, Kenny Paterson, Avri Doria, Laurent Ciavaglia, Lisandro Zambenedetti Granville, Vincent Roca, Marie-José Montpetit, Ari Keränen, Carsten Bormann, Marco Carugi, Gyu Myoung Lee, Okan Geray:
Standards News. IEEE Commun. Stand. Mag. 2(1): 12-18 (2018) - [j47]Rémi Bricout, Sean Murphy, Kenneth G. Paterson, Thyla van der Merwe:
Analysing and exploiting the Mantin biases in RC4. Des. Codes Cryptogr. 86(4): 743-770 (2018) - [j46]Michel Abdalla, Fabrice Benhamouda, Alain Passelègue, Kenneth G. Paterson:
Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier. J. Cryptol. 31(4): 917-964 (2018) - [j45]Martin R. Albrecht, Amit Deo, Kenneth G. Paterson:
Cold Boot Attacks on Ring and Module LWE Keys Under the NTT. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(3): 173-213 (2018) - [j44]Marie-Sarah Lacharité, Kenneth G. Paterson:
Frequency-smoothing encryption: preventing snapshot attacks on deterministically encrypted data. IACR Trans. Symmetric Cryptol. 2018(1): 277-313 (2018) - [c90]Benjamin Dowling, Kenneth G. Paterson:
A Cryptographic Analysis of the WireGuard Protocol. ACNS 2018: 3-21 - [c89]Martin R. Albrecht, Jake Massimo, Kenneth G. Paterson, Juraj Somorovsky:
Prime and Prejudice: Primality Testing Under Adversarial Conditions. CCS 2018: 281-298 - [c88]Paul Grubbs, Marie-Sarah Lacharité, Brice Minaud, Kenneth G. Paterson:
Pump up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries. CCS 2018: 315-331 - [c87]Eyal Ronen, Kenneth G. Paterson, Adi Shamir:
Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure. CCS 2018: 1397-1414 - [c86]Platon Kotzias, Abbas Razaghpanah, Johanna Amann, Kenneth G. Paterson, Narseo Vallina-Rodriguez, Juan Caballero:
Coming of Age: A Longitudinal Study of TLS Deployment. Internet Measurement Conference 2018: 415-428 - [c85]Marie-Sarah Lacharité, Brice Minaud, Kenneth G. Paterson:
Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage. IEEE Symposium on Security and Privacy 2018: 297-314 - [i58]Benjamin Dowling, Kenneth G. Paterson:
A Cryptographic Analysis of the WireGuard Protocol. IACR Cryptol. ePrint Arch. 2018: 80 (2018) - [i57]Kenneth G. Paterson, Jacob C. N. Schuldt:
Statistical Attacks on Cookie Masking for RC4. IACR Cryptol. ePrint Arch. 2018: 93 (2018) - [i56]Martin R. Albrecht, Amit Deo, Kenneth G. Paterson:
Cold Boot Attacks on Ring and Module LWE Keys Under the NTT. IACR Cryptol. ePrint Arch. 2018: 672 (2018) - [i55]Eyal Ronen, Kenneth G. Paterson, Adi Shamir:
Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure. IACR Cryptol. ePrint Arch. 2018: 747 (2018) - [i54]Martin R. Albrecht, Jake Massimo, Kenneth G. Paterson, Juraj Somorovsky:
Prime and Prejudice: Primality Testing Under Adversarial Conditions. IACR Cryptol. ePrint Arch. 2018: 749 (2018) - [i53]Paul Grubbs, Marie-Sarah Lacharité, Brice Minaud, Kenny Paterson:
Pump up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries. IACR Cryptol. ePrint Arch. 2018: 965 (2018) - 2017
- [j43]Colin Boyd, Cas Cremers, Michèle Feltz, Kenneth G. Paterson, Bertram Poettering, Douglas Stebila:
ASICS: authenticated key exchange security incorporating certification systems. Int. J. Inf. Sec. 16(2): 151-171 (2017) - [c84]Atul Luykx, Bart Mennink, Kenneth G. Paterson:
Analyzing Multi-key Security Degradation. ASIACRYPT (2) 2017: 575-605 - [c83]Adam Everspaugh, Kenneth G. Paterson, Thomas Ristenpart, Samuel Scott:
Key Rotation for Authenticated Encryption. CRYPTO (3) 2017: 98-129 - [c82]Martin R. Albrecht, Emmanuela Orsini, Kenneth G. Paterson, Guy Peer, Nigel P. Smart:
Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts. ESORICS (1) 2017: 29-46 - [c81]Kenneth G. Paterson, Ricardo Villanueva-Polanco:
Cold Boot Attacks on NTRU. INDOCRYPT 2017: 107-125 - [i52]Martin R. Albrecht, Emmanuela Orsini, Kenneth G. Paterson, Guy Peer, Nigel P. Smart:
Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts. IACR Cryptol. ePrint Arch. 2017: 354 (2017) - [i51]Atul Luykx, Bart Mennink, Kenneth G. Paterson:
Analyzing Multi-Key Security Degradation. IACR Cryptol. ePrint Arch. 2017: 435 (2017) - [i50]Adam Everspaugh, Kenneth G. Paterson, Thomas Ristenpart, Samuel Scott:
Key Rotation for Authenticated Encryption. IACR Cryptol. ePrint Arch. 2017: 527 (2017) - [i49]Marie-Sarah Lacharité, Brice Minaud, Kenneth G. Paterson:
Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage. IACR Cryptol. ePrint Arch. 2017: 701 (2017) - [i48]Marie-Sarah Lacharité, Kenneth G. Paterson:
Frequency-smoothing encryption: preventing snapshot attacks on deterministically encrypted data. IACR Cryptol. ePrint Arch. 2017: 1068 (2017) - [i47]Marc Fischlin, Felix Günther, Giorgia Azzurra Marson, Kenneth G. Paterson:
Data Is a Stream: Security of Stream-Based Channels. IACR Cryptol. ePrint Arch. 2017: 1191 (2017) - 2016
- [j42]Dan Boneh, Kenny Paterson, Nigel P. Smart:
Building a Community of Real-World Cryptographers. IEEE Secur. Priv. 14(6): 7-9 (2016) - [j41]Jean Paul Degabriele, Victoria Fehr, Marc Fischlin, Tommaso Gagliardoni, Felix Günther, Giorgia Azzurra Marson, Arno Mittelbach, Kenneth G. Paterson:
Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol. Int. J. Inf. Sec. 15(6): 637-657 (2016) - [c80]Martin R. Albrecht, Jean Paul Degabriele, Torben Brandt Hansen, Kenneth G. Paterson:
A Surfeit of SSH Cipher Suites. CCS 2016: 1480-1491 - [c79]Jean Paul Degabriele, Kenneth G. Paterson, Jacob C. N. Schuldt, Joanne Woodage:
Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results. CRYPTO (1) 2016: 403-432 - [c78]Martin R. Albrecht, Kenneth G. Paterson:
Lucky Microseconds: A Timing Attack on Amazon's s2n Implementation of TLS. EUROCRYPT (1) 2016: 622-643 - [c77]Kenneth G. Paterson, Thyla van der Merwe:
Reactive and Proactive Standardisation of TLS. SSR 2016: 160-186 - [c76]Martin R. Albrecht, Pooya Farshim, Dennis Hofheinz, Enrique Larraia, Kenneth G. Paterson:
Multilinear Maps from Obfuscation. TCC (A1) 2016: 446-473 - [i46]Rémi Bricout, Sean Murphy, Kenneth G. Paterson, Thyla van der Merwe:
Analysing and Exploiting the Mantin Biases in RC4. IACR Cryptol. ePrint Arch. 2016: 63 (2016) - [i45]Jean Paul Degabriele, Kenneth G. Paterson, Jacob C. N. Schuldt, Joanne Woodage:
Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results. IACR Cryptol. ePrint Arch. 2016: 577 (2016) - 2015
- [c75]Kenneth G. Paterson, Mario Strefler:
A Practical Attack Against the Use of RC4 in the HIVE Hidden Volume Encryption System. AsiaCCS 2015: 475-482 - [c74]Marc Fischlin, Felix Günther, Giorgia Azzurra Marson, Kenneth G. Paterson:
Data Is a Stream: Security of Stream-Based Channels. CRYPTO (2) 2015: 545-564 - [c73]Kenneth G. Paterson, Jacob C. N. Schuldt, Dale L. Sibborn, Hoeteck Wee:
Security Against Related Randomness Attacks via Reconstructive Extractors. IMACC 2015: 23-40 - [c72]Shengli Liu, Kenneth G. Paterson:
Simulation-Based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms. Public Key Cryptography 2015: 3-26 - [c71]Christina Garman, Kenneth G. Paterson, Thyla van der Merwe:
Attacks Only Get Better: Password Recovery Attacks Against RC4 in TLS. USENIX Security Symposium 2015: 113-128 - [i44]Shengli Liu, Kenneth G. Paterson:
Simulation-based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms. IACR Cryptol. ePrint Arch. 2015: 10 (2015) - [i43]Alexandra Boldyreva, Jean Paul Degabriele, Kenneth G. Paterson, Martijn Stam:
Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation. IACR Cryptol. ePrint Arch. 2015: 59 (2015) - [i42]Martin R. Albrecht, Pooya Farshim, Dennis Hofheinz, Enrique Larraia, Kenneth G. Paterson:
Multilinear Maps from Obfuscation. IACR Cryptol. ePrint Arch. 2015: 780 (2015) - [i41]Kenneth G. Paterson, Jacob C. N. Schuldt, Dale L. Sibborn, Hoeteck Wee:
Security Against Related Randomness Attacks via Reconstructive Extractors. IACR Cryptol. ePrint Arch. 2015: 892 (2015) - [i40]Martin R. Albrecht, Kenneth G. Paterson:
Lucky Microseconds: A Timing Attack on Amazon's s2n Implementation of TLS. IACR Cryptol. ePrint Arch. 2015: 1129 (2015) - [i39]Marie-Sarah Lacharité, Kenneth G. Paterson:
A note on the optimality of frequency analysis vs. ℓp-optimization. IACR Cryptol. ePrint Arch. 2015: 1158 (2015) - 2014
- [c70]Kenneth G. Paterson, Bertram Poettering, Jacob C. N. Schuldt:
Big Bias Hunting in Amazonia: Large-Scale Computation and Exploitation of RC4 Biases (Invited Paper). ASIACRYPT (1) 2014: 398-419 - [c69]Mihir Bellare, Kenneth G. Paterson, Phillip Rogaway:
Security of Symmetric Encryption against Mass Surveillance. CRYPTO (1) 2014: 1-19 - [c68]Michel Abdalla, Fabrice Benhamouda, Alain Passelègue, Kenneth G. Paterson:
Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier. CRYPTO (1) 2014: 77-94 - [c67]Kenneth G. Paterson, Bertram Poettering, Jacob C. N. Schuldt:
Plaintext Recovery Attacks Against WPA/TKIP. FSE 2014: 325-349 - [c66]Kenneth G. Paterson, Jacob C. N. Schuldt, Dale L. Sibborn:
Related Randomness Attacks for Public Key Encryption. Public Key Cryptography 2014: 465-482 - [c65]Jean Paul Degabriele, Victoria Fehr, Marc Fischlin, Tommaso Gagliardoni, Felix Günther, Giorgia Azzurra Marson, Arno Mittelbach, Kenneth G. Paterson:
Unpicking PLAID - A Cryptographic Analysis of an ISO-Standards-Track Authentication Protocol. SSR 2014: 1-25 - [i38]Kenneth G. Paterson, Jacob C. N. Schuldt, Dale L. Sibborn:
Related Randomness Attacks for Public Key Encryption. IACR Cryptol. ePrint Arch. 2014: 337 (2014) - [i37]Mihir Bellare, Kenneth G. Paterson, Phillip Rogaway:
Security of Symmetric Encryption against Mass Surveillance. IACR Cryptol. ePrint Arch. 2014: 438 (2014) - [i36]Michel Abdalla, Fabrice Benhamouda, Alain Passelègue, Kenneth G. Paterson:
Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier. IACR Cryptol. ePrint Arch. 2014: 488 (2014) - [i35]Jean Paul Degabriele, Victoria Fehr, Marc Fischlin, Tommaso Gagliardoni, Felix Günther, Giorgia Azzurra Marson, Arno Mittelbach, Kenneth G. Paterson:
Unpicking PLAID - A Cryptographic Analysis of an ISO-standards-track Authentication Protocol. IACR Cryptol. ePrint Arch. 2014: 728 (2014) - [i34]Kenneth G. Paterson, Mario Strefler:
A Practical Attack Against the HIVE Hidden Volume Encryption System. IACR Cryptol. ePrint Arch. 2014: 901 (2014) - 2013
- [j40]Cagatay Capar, Dennis Goeckel, Kenneth G. Paterson, Elizabeth A. Quaglia, Don Towsley, Murtaza Zafer:
Signal-flow-based analysis of wireless security protocols. Inf. Comput. 226: 37-56 (2013) - [c64]Hugo Krawczyk, Kenneth G. Paterson, Hoeteck Wee:
On the Security of the TLS Protocol: A Systematic Analysis. CRYPTO (1) 2013: 429-448 - [c63]Eduarda S. V. Freire, Dennis Hofheinz, Kenneth G. Paterson, Christoph Striecks:
Programmable Hash Functions in the Multilinear Setting. CRYPTO (1) 2013: 513-530 - [c62]Eduarda S. V. Freire, Kenneth G. Paterson, Bertram Poettering:
Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes. CT-RSA 2013: 101-114 - [c61]Colin Boyd, Cas Cremers, Michèle Feltz, Kenneth G. Paterson, Bertram Poettering, Douglas Stebila:
ASICS: Authenticated Key Exchange Security Incorporating Certification Systems. ESORICS 2013: 381-399 - [c60]Alexandra Boldyreva, Jean Paul Degabriele, Kenneth G. Paterson, Martijn Stam:
On Symmetric Encryption with Distinguishable Decryption Failures. FSE 2013: 367-390 - [c59]Tibor Jager, Kenneth G. Paterson, Juraj Somorovsky:
One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography. NDSS 2013 - [c58]Eduarda S. V. Freire, Dennis Hofheinz, Eike Kiltz, Kenneth G. Paterson:
Non-Interactive Key Exchange. Public Key Cryptography 2013: 254-271 - [c57]Pooya Farshim, Benoît Libert, Kenneth G. Paterson, Elizabeth A. Quaglia:
Robust Encryption, Revisited. Public Key Cryptography 2013: 352-368 - [c56]Nadhem J. AlFardan, Kenneth G. Paterson:
Lucky Thirteen: Breaking the TLS and DTLS Record Protocols. IEEE Symposium on Security and Privacy 2013: 526-540 - [c55]Nadhem J. AlFardan, Daniel J. Bernstein, Kenneth G. Paterson, Bertram Poettering, Jacob C. N. Schuldt:
On the Security of RC4 in TLS. USENIX Security Symposium 2013: 305-320 - [i33]Hugo Krawczyk, Kenneth G. Paterson, Hoeteck Wee:
On the Security of the TLS Protocol: A Systematic Analysis. IACR Cryptol. ePrint Arch. 2013: 339 (2013) - [i32]Eduarda S. V. Freire, Dennis Hofheinz, Kenneth G. Paterson, Christoph Striecks:
Programmable Hash Functions in the Multilinear Setting. IACR Cryptol. ePrint Arch. 2013: 354 (2013) - [i31]Colin Boyd, Cas Cremers, Michèle Feltz, Kenneth G. Paterson, Bertram Poettering, Douglas Stebila:
ASICS: Authenticated Key Exchange Security Incorporating Certification Systems. IACR Cryptol. ePrint Arch. 2013: 398 (2013) - [i30]Alexandra Boldyreva, Jean Paul Degabriele, Kenneth G. Paterson, Martijn Stam:
On Symmetric Encryption with Distinguishable Decryption Failures. IACR Cryptol. ePrint Arch. 2013: 433 (2013) - [i29]Kenneth G. Paterson, Bertram Poettering, Jacob C. N. Schuldt:
Plaintext Recovery Attacks Against WPA/TKIP. IACR Cryptol. ePrint Arch. 2013: 748 (2013) - 2012
- [c54]Mihir Bellare, Kenneth G. Paterson, Susan Thomson:
RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures. ASIACRYPT 2012: 331-348 - [c53]Kenneth G. Paterson, Antigoni Polychroniadou, Dale L. Sibborn:
A Coding-Theoretic Approach to Recovering Noisy RSA Keys. ASIACRYPT 2012: 386-403 - [c52]Kenneth G. Paterson, Gaven J. Watson:
Authenticated-Encryption with Padding: A Formal Security Treatment. Cryptography and Security 2012: 83-107 - [c51]Jean Paul Degabriele, Anja Lehmann, Kenneth G. Paterson, Nigel P. Smart, Mario Strefler:
On the Joint Security of Encryption and Signature in EMV. CT-RSA 2012: 116-135 - [c50]Alexandra Boldyreva, Jean Paul Degabriele, Kenneth G. Paterson, Martijn Stam:
Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation. EUROCRYPT 2012: 682-699 - [c49]Kenneth G. Paterson, Nadhem J. AlFardan:
Plaintext-Recovery Attacks Against Datagram TLS. NDSS 2012 - [c48]Benoît Libert, Kenneth G. Paterson, Elizabeth A. Quaglia:
Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model. Public Key Cryptography 2012: 206-224 - [i28]Mihir Bellare, Kenneth G. Paterson, Susan Thomson:
RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures. IACR Cryptol. ePrint Arch. 2012: 514 (2012) - [i27]Eduarda S. V. Freire, Kenneth G. Paterson, Bertram Poettering:
Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes. IACR Cryptol. ePrint Arch. 2012: 645 (2012) - [i26]Pooya Farshim, Benoît Libert, Kenneth G. Paterson, Elizabeth A. Quaglia:
Robust Encryption, Revisited. IACR Cryptol. ePrint Arch. 2012: 673 (2012) - [i25]Kenneth G. Paterson, Antigoni Polychroniadou, Dale L. Sibborn:
A Coding-Theoretic Approach to Recovering Noisy RSA Keys. IACR Cryptol. ePrint Arch. 2012: 724 (2012) - [i24]Eduarda S. V. Freire, Dennis Hofheinz, Eike Kiltz, Kenneth G. Paterson:
Non-Interactive Key Exchange. IACR Cryptol. ePrint Arch. 2012: 732 (2012) - 2011
- [j39]Jean Paul Degabriele, Kenneth G. Paterson, Gaven J. Watson:
Provable Security in the Real World. IEEE Secur. Priv. 9(3): 33-41 (2011) - [j38]Hoon Wei Lim, Kenneth G. Paterson:
Identity-based cryptography for grid security. Int. J. Inf. Sec. 10(1): 15-32 (2011) - [j37]Jason Crampton, Hoon Wei Lim, Kenneth G. Paterson, Geraint Price:
User-friendly and certificate-free grid security infrastructure. Int. J. Inf. Sec. 10(3): 137-153 (2011) - [c47]Eduarda S. V. Freire, Kenneth G. Paterson:
Provably Secure Key Assignment Schemes from Factoring. ACISP 2011: 292-309 - [c46]Kenneth G. Paterson, Jacob C. N. Schuldt, Martijn Stam, Susan Thomson:
On the Joint Security of Encryption and Signature, Revisited. ASIACRYPT 2011: 161-178 - [c45]Kenneth G. Paterson, Thomas Ristenpart, Thomas Shrimpton:
Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol. ASIACRYPT 2011: 372-389 - [c44]Martin R. Albrecht, Pooya Farshim, Kenneth G. Paterson, Gaven J. Watson:
On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model. FSE 2011: 128-145 - [c43]Martin R. Albrecht, Kenneth G. Paterson:
Breaking an Identity-Based Encryption Scheme Based on DHIES. IMACC 2011: 344-355 - [e4]Kenneth G. Paterson:
Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings. Lecture Notes in Computer Science 6632, Springer 2011, ISBN 978-3-642-20464-7 [contents] - [i23]Martin R. Albrecht, Pooya Farshim, Kenneth G. Paterson, Gaven J. Watson:
On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model. IACR Cryptol. ePrint Arch. 2011: 213 (2011) - [i22]Benoît Libert, Kenneth G. Paterson, Elizabeth A. Quaglia:
Anonymous Broadcast Encryption. IACR Cryptol. ePrint Arch. 2011: 476 (2011) - [i21]Kenneth G. Paterson, Jacob C. N. Schuldt, Martijn Stam, Susan Thomson:
On the Joint Security of Encryption and Signature, Revisited. IACR Cryptol. ePrint Arch. 2011: 486 (2011) - [i20]Jean Paul Degabriele, Anja Lehmann, Kenneth G. Paterson, Nigel P. Smart, Mario Strefler:
On the Joint Security of Encryption and Signature in EMV. IACR Cryptol. ePrint Arch. 2011: 615 (2011) - 2010
- [j36]Shane Balfe, Po-Wah Yau, Kenneth G. Paterson:
A guide to trust in mobile ad hoc networks. Secur. Commun. Networks 3(6): 503-516 (2010) - [j35]Shane Balfe, Andrew D. McDonald, Kenneth G. Paterson, Helen Phillips:
Identity crisis: on the problem of namespace design for ID-PKC and MANETs. Secur. Commun. Networks 3(6): 535-545 (2010) - [c42]Kenneth G. Paterson, Douglas Stebila:
One-Time-Password-Authenticated Key Exchange. ACISP 2010: 264-281 - [c41]Jean Paul Degabriele, Kenneth G. Paterson:
On the (in)security of IPsec in MAC-then-encrypt configurations. CCS 2010: 493-504 - [c40]Kenneth G. Paterson, Gaven J. Watson:
Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR. EUROCRYPT 2010: 345-361 - [c39]Nadhem J. AlFardan, Kenneth G. Paterson:
An Analysis of DepenDNS. ISC 2010: 31-38 - [c38]Kenneth G. Paterson, Elizabeth A. Quaglia:
Time-Specific Encryption. SCN 2010: 1-16 - [i19]Kenneth G. Paterson, Gaven J. Watson:
Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR. IACR Cryptol. ePrint Arch. 2010: 95 (2010) - [i18]Kenneth G. Paterson, Elizabeth A. Quaglia:
Time-Specific Encryption. IACR Cryptol. ePrint Arch. 2010: 347 (2010) - [i17]Martin R. Albrecht, Kenneth G. Paterson:
Breaking An Identity-Based Encryption Scheme based on DHIES. IACR Cryptol. ePrint Arch. 2010: 637 (2010)
2000 – 2009
- 2009
- [j34]Kenneth G. Paterson, Sriramkrishnan Srinivasan:
On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups. Des. Codes Cryptogr. 52(2): 219-241 (2009) - [j33]Colin Boyd, Yvonne Cliff, Juan Manuel González Nieto, Kenneth G. Paterson:
One-round key exchange in the standard model. Int. J. Appl. Cryptogr. 1(3): 181-199 (2009) - [j32]Tuvi Etzion, Nicholas Kalouptsidis, Nicholas Kolokotronis, Konstantinos Limniotis, Kenneth G. Paterson:
Properties of the error linear complexity spectrum. IEEE Trans. Inf. Theory 55(10): 4681-4686 (2009) - [c37]Kenneth G. Paterson, Sriramkrishnan Srinivasan:
Building Key-Private Public-Key Encryption Schemes. ACISP 2009: 276-292 - [c36]Martin R. Albrecht, Kenneth G. Paterson, Gaven J. Watson:
Plaintext Recovery Attacks against SSH. SP 2009: 16-26 - [e3]Samuel L. Braunstein, Hoi-Kwong Lo, Kenny Paterson, Peter Y. A. Ryan:
Classical and Quantum Information Assurance Foundations and Practice, 26.07. - 31.07.2009. Dagstuhl Seminar Proceedings 09311, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany 2009 [contents] - [i16]Samuel L. Braunstein, Hoi-Kwong Lo, Kenny Paterson, Peter Y. A. Ryan:
09311 Abstracts Collection - Classical and Quantum Information Assurance Foundations and Practice. Classical and Quantum Information Assurance Foundations and Practice 2009 - [i15]Kenneth G. Paterson, Douglas Stebila:
One-time-password-authenticated key exchange. IACR Cryptol. ePrint Arch. 2009: 430 (2009) - 2008
- [j31]Steven D. Galbraith, Kenneth G. Paterson, Nigel P. Smart:
Pairings for cryptographers. Discret. Appl. Math. 156(16): 3113-3121 (2008) - [j30]Shane Balfe, Eimear Gallery, Chris J. Mitchell, Kenneth G. Paterson:
Challenges for Trusted Computing. IEEE Secur. Priv. 6(6): 60-66 (2008) - [c35]Colin Boyd, Yvonne Cliff, Juan Manuel González Nieto, Kenneth G. Paterson:
Efficient One-Round Key Exchange in the Standard Model. ACISP 2008: 69-83 - [c34]Shane Balfe, Kenneth G. Paterson:
e-EMV: emulating EMV for internet payments with trusted computing technologies. STC 2008: 81-92 - [c33]Mudhakar Srivatsa, Shane Balfe, Kenneth G. Paterson, Pankaj Rohatgi:
Trust management for secure information flows. CCS 2008: 175-188 - [c32]Shane Balfe, Kenneth G. Paterson:
Augmenting Internet-Based Card Not Present Transactions with Trusted Computing (Extended Abstract). Financial Cryptography 2008: 171-175 - [c31]Tuvi Etzion, Nicholas Kalouptsidis, Nicholas Kolokotronis, Konstantinos Limniotis, Kenneth G. Paterson:
On the error linear complexity profiles of binary sequences of period 2n. ISIT 2008: 2400-2404 - [c30]Kenneth G. Paterson, Sriramkrishnan Srinivasan:
Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities. Pairing 2008: 354-375 - [c29]Jacob C. N. Schuldt, Kanta Matsuura, Kenneth G. Paterson:
Proxy Signatures Secure Against Proxy Key Exposure. Public Key Cryptography 2008: 141-161 - [c28]Alexander W. Dent, Benoît Libert, Kenneth G. Paterson:
Certificateless Encryption Schemes Strongly Secure in the Standard Model. Public Key Cryptography 2008: 344-359 - [c27]Kenneth G. Paterson, Gaven J. Watson:
Immunising CBC Mode Against Padding Oracle Attacks: A Formal Security Treatment. SCN 2008: 340-357 - [e2]Steven D. Galbraith, Kenneth G. Paterson:
Pairing-Based Cryptography - Pairing 2008, Second International Conference, Egham, UK, September 1-3, 2008. Proceedings. Lecture Notes in Computer Science 5209, Springer 2008, ISBN 978-3-540-85503-3 [contents] - [i14]Colin Boyd, Yvonne Cliff, Juan Manuel González Nieto, Kenneth G. Paterson:
Efficient One-round Key Exchange in the Standard Model. IACR Cryptol. ePrint Arch. 2008: 7 (2008) - 2007
- [c26]Hoon Wei Lim, Kenneth G. Paterson:
Multi-key Hierarchical Identity-Based Signatures. IMACC 2007: 384-402 - [c25]Jean Paul Degabriele, Kenneth G. Paterson:
Attacking the IPsec Standards in Encryption-only Configurations. S&P 2007: 335-349 - [c24]Jason Crampton, Hoon Wei Lim, Kenneth G. Paterson:
What can identity-based cryptography offer to web services? SWS 2007: 26-36 - [i13]Alexander W. Dent, Benoît Libert, Kenneth G. Paterson:
Certificateless Encryption Schemes Strongly Secure in the Standard Model. IACR Cryptol. ePrint Arch. 2007: 121 (2007) - [i12]Jean Paul Degabriele, Kenneth G. Paterson:
Attacking the IPsec Standards in Encryption-only Configurations. IACR Cryptol. ePrint Arch. 2007: 125 (2007) - [i11]Kenneth G. Paterson, Sriramkrishnan Srinivasan:
On the Relations Between Non-Interactive Key Distribution, Identity-Based Encryption and Trapdoor Discrete Log Groups. IACR Cryptol. ePrint Arch. 2007: 453 (2007) - 2006
- [j29]Kenneth G. Paterson, Arnold K. L. Yau:
Lost in translation: theory and practice in cryptography. IEEE Secur. Priv. 4(3): 69-72 (2006) - [j28]Kenneth G. Paterson:
A cryptographic tour of the IPsec standards. Inf. Secur. Tech. Rep. 11(2): 72-81 (2006) - [c23]Kenneth G. Paterson, Jacob C. N. Schuldt:
Efficient Identity-Based Signatures Secure in the Standard Model. ACISP 2006: 207-222 - [c22]Kenneth G. Paterson, Arnold K. L. Yau:
Cryptography in Theory and Practice: The Case of Encryption in IPsec. EUROCRYPT 2006: 12-29 - [c21]Hoon Wei Lim, Kenneth G. Paterson:
Secret Public Key Protocols Revisited. Security Protocols Workshop 2006: 237-256 - [i10]Kenneth G. Paterson, Jacob C. N. Schuldt:
Efficient Identity-based Signatures Secure in the Standard Model. IACR Cryptol. ePrint Arch. 2006: 80 (2006) - [i9]Kenneth G. Paterson:
A Cryptographic Tour of the IPsec Standards. IACR Cryptol. ePrint Arch. 2006: 97 (2006) - [i8]Steven D. Galbraith, Kenneth G. Paterson, Nigel P. Smart:
Pairings for Cryptographers. IACR Cryptol. ePrint Arch. 2006: 165 (2006) - [i7]Xuefei Cao, Kenneth G. Paterson, Weidong Kou:
An Attack on a Certificateless Signature Scheme. IACR Cryptol. ePrint Arch. 2006: 367 (2006) - 2005
- [j27]Tuvi Etzion, Kenneth G. Paterson:
Zero/Positive Capacities of Two-Dimensional Runlength-Constrained Arrays. IEEE Trans. Inf. Theory 51(9): 3186-3199 (2005) - [c20]Caroline Kudla, Kenneth G. Paterson:
Modular Security Proofs for Key Agreement Protocols. ASIACRYPT 2005: 549-565 - [c19]Hoon Wei Lim, Kenneth G. Paterson:
Identity-Based Cryptography for Grid Security. e-Science 2005: 395-404 - [c18]Arnold K. L. Yau, Kenneth G. Paterson, Chris J. Mitchell:
Padding Oracle Attacks on CBC-Mode Encryption with Secret and Random IVs. FSE 2005: 299-319 - [c17]Caroline Kudla, Kenneth G. Paterson:
Non-interactive Designated Verifier Proofs and Undeniable Signatures. IMACC 2005: 136-154 - [c16]Shane Balfe, Amit D. Lakhani, Kenneth G. Paterson:
Trusted Computing: Providing Security for Peer-to-Peer Networks. Peer-to-Peer Computing 2005: 117-124 - [c15]Sattam S. Al-Riyami, Kenneth G. Paterson:
CBE from CL-PKE: A Generic Construction and Efficient Schemes. Public Key Cryptography 2005: 398-415 - [i6]Kenneth G. Paterson, Arnold K. L. Yau:
Cryptography in Theory and Practice: The Case of Encryption in IPsec. IACR Cryptol. ePrint Arch. 2005: 416 (2005) - 2004
- [j26]Kenneth G. Paterson:
On codes with low peak-to-average power ratio for multicode CDMA. IEEE Trans. Inf. Theory 50(3): 550-559 (2004) - [c14]Colin Boyd, Wenbo Mao, Kenneth G. Paterson:
Key Agreement Using Statically Keyed Authenticators. ACNS 2004: 248-262 - [c13]Kenneth G. Paterson, Arnold K. L. Yau:
Padding Oracle Attacks on the ISO CBC Mode Encryption Standard. CT-RSA 2004: 305-323 - [c12]Liqun Chen, Caroline Kudla, Kenneth G. Paterson:
Concurrent Signatures. EUROCRYPT 2004: 287-305 - [c11]Simon R. Blackburn, Kenneth G. Paterson:
Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan. FSE 2004: 446-453 - [c10]Gerhard Wunder, Kenneth G. Paterson:
Crest-factor analysis of carrier interferometry MC-CDMA and OFDM systems. ISIT 2004: 426 - [i5]Kenneth G. Paterson, Fred Piper, Rüdiger Schack:
Quantum cryptography: a practical information security perspective. IACR Cryptol. ePrint Arch. 2004: 156 (2004) - 2003
- [j25]Fred Piper, Geraint Price, Kenny Paterson:
Introduction. Inf. Secur. Tech. Rep. 8(3): 5 (2003) - [j24]Kenneth G. Paterson, Geraint Price:
A comparison between traditional public key infrastructures and identity-based cryptography. Inf. Secur. Tech. Rep. 8(3): 57-72 (2003) - [j23]Alan G. B. Lauder, Kenneth G. Paterson:
Computing the error linear complexity spectrum of a binary sequence of period 2n. IEEE Trans. Inf. Theory 49(1): 273-280 (2003) - [c9]Sattam S. Al-Riyami, Kenneth G. Paterson:
Certificateless Public Key Cryptography. ASIACRYPT 2003: 452-473 - [c8]Sattam S. Al-Riyami, Kenneth G. Paterson:
Tripartite Authenticated Key Agreement Protocols from Pairings. IMACC 2003: 332-359 - [c7]Colin Boyd, Wenbo Mao, Kenneth G. Paterson:
Deniable Authenticated Key Establishment for Internet Protocols. Security Protocols Workshop 2003: 255-271 - [e1]Kenneth G. Paterson:
Cryptography and Coding, 9th IMA International Conference, Cirencester, UK, December 16-18, 2003, Proceedings. Lecture Notes in Computer Science 2898, Springer 2003, ISBN 3-540-20663-9 [contents] - [i4]Sattam S. Al-Riyami, Kenneth G. Paterson:
Certificateless Public Key Cryptography. IACR Cryptol. ePrint Arch. 2003: 126 (2003) - [i3]Simon R. Blackburn, Kenneth G. Paterson:
Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan. IACR Cryptol. ePrint Arch. 2003: 199 (2003) - 2002
- [c6]Steven D. Galbraith, Wenbo Mao, Kenneth G. Paterson:
RSA-Based Undeniable Signatures for General Moduli. CT-RSA 2002: 200-217 - [i2]Kenneth G. Paterson:
ID-based Signatures from Pairings on Elliptic Curves. IACR Cryptol. ePrint Arch. 2002: 4 (2002) - [i1]Sattam S. Al-Riyami, Kenneth G. Paterson:
Tripartite Authenticated Key Agreement Protocols from Pairings. IACR Cryptol. ePrint Arch. 2002: 35 (2002) - 2001
- [j22]Alain P. Hiltgen, Kenneth G. Paterson:
Single-track circuit codes. IEEE Trans. Inf. Theory 47(6): 2587-2595 (2001) - [c5]Kenneth G. Paterson:
Sequences for OFDM and Multi-Code CDMA: Two Problems in Algebraic Coding Theory. SETA 2001: 46-71 - 2000
- [j21]Kenneth G. Paterson, Alan E. Jones:
Efficient decoding algorithms for generalized Reed-Muller codes. IEEE Trans. Commun. 48(8): 1272-1285 (2000) - [j20]Kenneth G. Paterson:
Generalized Reed-Muller codes and power control in OFDM modulation. IEEE Trans. Inf. Theory 46(1): 104-120 (2000) - [j19]Kenneth G. Paterson, Vahid Tarokh:
On the existence and construction of good codes with low peak-to-average power ratios. IEEE Trans. Inf. Theory 46(6): 1974-1987 (2000)
1990 – 1999
- 1999
- [c4]Kenneth G. Paterson:
Imprimitive Permutation Groups and Trapdoors in Iterated Block Ciphers. FSE 1999: 201-214 - [c3]Kenneth G. Paterson:
Applications of Exponential Sums in Communications Theory. IMACC 1999: 1-24 - 1998
- [j18]Kenneth G. Paterson:
Root Counting, the DFT and the Linear Complexity of Nonlinear Filtering. Des. Codes Cryptogr. 14(3): 247-259 (1998) - [j17]Chris J. Mitchell, Kenneth G. Paterson:
Perfect Factors from Cyclic Codes and Interleaving. SIAM J. Discret. Math. 11(2): 241-264 (1998) - [j16]Kenneth G. Paterson:
Binary Sequence Sets with Favorable Correlations from Difference Sets and MDS Codes. IEEE Trans. Inf. Theory 44(1): 172-180 (1998) - [j15]Kenneth G. Paterson, Paul J. G. Lothian:
Bounds on Partial Correlations of Sequences. IEEE Trans. Inf. Theory 44(3): 1164-1175 (1998) - [j14]Kenneth G. Paterson, Jonathan Tuliani:
Some New Circuit Codes. IEEE Trans. Inf. Theory 44(3): 1305-1309 (1998) - [c2]Kenneth G. Paterson:
Coding techniques for power controlled OFDM. PIMRC 1998: 801-805 - 1997
- [j13]Simon R. Blackburn, Sean Murphy, Kenneth G. Paterson:
Comments on "Theory and Applications of Cellular Automata in Cryptography". IEEE Trans. Computers 46(5): 637-638 (1997) - 1996
- [j12]Kenneth G. Paterson:
New Classes of Perfect Maps I. J. Comb. Theory A 73(2): 302-334 (1996) - [j11]Kenneth G. Paterson:
New Classes of Perfect Maps II. J. Comb. Theory A 73(2): 335-345 (1996) - [j10]Simon R. Blackburn, Tuvi Etzion, Kenneth G. Paterson:
Permutation Polynomials, de Bruijn Sequences, and Linear Complexity. J. Comb. Theory A 76(1): 55-82 (1996) - [j9]Glenn Hurlbert, Chris J. Mitchell, Kenneth G. Paterson:
On the Existence of de Bruijn Tori with Two by Two Windows. J. Comb. Theory A 76(2): 213-230 (1996) - [j8]Tuvi Etzion, Kenneth G. Paterson:
Near optimal single-track Gray codes. IEEE Trans. Inf. Theory 42(3): 779-789 (1996) - [j7]Chris J. Mitchell, Tuvi Etzion, Kenneth G. Paterson:
A method for constructing decodable de Bruijn sequences. IEEE Trans. Inf. Theory 42(5): 1472-1478 (1996) - [j6]Alain P. Hiltgen, Kenneth G. Paterson, M. Brandestini:
Single-track Gray codes. IEEE Trans. Inf. Theory 42(5): 1555-1561 (1996) - 1995
- [j5]Kenneth G. Paterson:
Perfect Factors in the de Bruijn Graph. Des. Codes Cryptogr. 5(2): 115-138 (1995) - [j4]Kenneth G. Paterson, Matthew J. B. Robshaw:
Storage efficient decoding for a class of binary be Bruijn sequences. Discret. Math. 138(1-3): 327-341 (1995) - [c1]Andreas Fuchsberger, Dieter Gollmann, Paul J. G. Lothian, Kenneth G. Paterson, Abraham Sidiropoulos:
Public-key Cryptography on Smart Cards. Cryptography: Policy and Algorithms 1995: 250-269 - 1994
- [j3]Chris J. Mitchell, Kenneth G. Paterson:
Decoding Perfect Maps. Des. Codes Cryptogr. 4(1): 11-30 (1994) - [j2]Sean Murphy, Kenneth G. Paterson, Peter R. Wild:
A Weak Cipher that Generates the Symmetric Group. J. Cryptol. 7(1): 61-65 (1994) - [j1]Kenneth G. Paterson:
Perfect maps. IEEE Trans. Inf. Theory 40(3): 743-753 (1994)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint