Albrecht, Martin R.; Haller, Miro; Mareková, Lenka; Paterson, Kenneth G. Caveat implementor! Key recovery attacks on MEGA. (English) Zbl 07774567 Hazay, Carmit (ed.) et al., Advances in cryptology – EUROCRYPT 2023. 42nd annual international conference on the theory and applications of cryptographic techniques, Lyon, France, April 23–27, 2023. Proceedings. Part V. Cham: Springer. Lect. Notes Comput. Sci. 14008, 190-218 (2023). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{M. R. Albrecht} et al., Lect. Notes Comput. Sci. 14008, 190--218 (2023; Zbl 07774567) Full Text: DOI
Backendal, Matilda; Günther, Felix; Paterson, Kenneth G. Puncturable key wrapping and its applications. (English) Zbl 1519.94042 Agrawal, Shweta (ed.) et al., Advances in cryptology – ASIACRYPT 2022. 28th international conference on the theory and application of cryptology and information security, Taipei, Taiwan, December 5–9, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13792, 651-681 (2023). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Backendal} et al., Lect. Notes Comput. Sci. 13792, 651--681 (2023; Zbl 1519.94042) Full Text: DOI
Falzon, Francesca; Paterson, Kenneth G. An efficient query recovery attack against a graph encryption scheme. (English) Zbl 1523.68024 Atluri, Vijayalakshmi (ed.) et al., Computer security – ESORICS 2022. 27th European symposium on research in computer security, Copenhagen, Denmark, September 26–30, 2022. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13554, 325-345 (2022). MSC: 68P15 68P25 94A60 PDFBibTeX XMLCite \textit{F. Falzon} and \textit{K. G. Paterson}, Lect. Notes Comput. Sci. 13554, 325--345 (2022; Zbl 1523.68024) Full Text: DOI
Grubbs, Paul; Maram, Varun; Paterson, Kenneth G. Anonymous, robust post-quantum public key encryption. (English) Zbl 1502.81027 Dunkelman, Orr (ed.) et al., Advances in cryptology – EUROCRYPT 2022. 41st annual international conference on the theory and applications of cryptographic techniques, Trondheim, Norway, May 30 – June 3, 2022. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 13277, 402-432 (2022). MSC: 81P94 94A60 81P70 81P68 68M25 PDFBibTeX XMLCite \textit{P. Grubbs} et al., Lect. Notes Comput. Sci. 13277, 402--432 (2022; Zbl 1502.81027) Full Text: DOI
Paterson, Kenneth G. (ed.) Topics in cryptology – CT-RSA 2021. Cryptographers’ track at the RSA conference 2021, virtual event, May 17–20, 2021. Proceedings. (English) Zbl 1476.94005 Lecture Notes in Computer Science 12704. Cham: Springer (ISBN 978-3-030-75538-6/pbk; 978-3-030-75539-3/ebook). xi, 684 p. (2021). MSC: 94-06 94A60 00B25 PDFBibTeX XMLCite \textit{K. G. Paterson} (ed.), Topics in cryptology -- CT-RSA 2021. Cryptographers' track at the RSA conference 2021, virtual event, May 17--20, 2021. Proceedings. Cham: Springer (2021; Zbl 1476.94005) Full Text: DOI
Dowling, Benjamin; Hansen, Torben Brandt; Paterson, Kenneth G. Many a mickle makes a muckle: a framework for provably quantum-secure hybrid key exchange. (English) Zbl 1500.94023 Ding, Jinta (ed.) et al., Post-quantum cryptography. 11th international conference, PQCrypto 2020, Paris, France, April 15–17, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12100, 483-502 (2020). MSC: 94A60 81P94 PDFBibTeX XMLCite \textit{B. Dowling} et al., Lect. Notes Comput. Sci. 12100, 483--502 (2020; Zbl 1500.94023) Full Text: DOI
Albrecht, Martin R.; Farshim, Pooya; Han, Shuai; Hofheinz, Dennis; Larraia, Enrique; Paterson, Kenneth G. Multilinear maps from obfuscation. (English) Zbl 1457.94090 J. Cryptology 33, No. 3, 1080-1113 (2020). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{M. R. Albrecht} et al., J. Cryptology 33, No. 3, 1080--1113 (2020; Zbl 1457.94090) Full Text: DOI
Paterson, Kenneth G. (ed.); Stebila, Douglas (ed.) Selected areas in cryptography – SAC 2019. 26th international conference, Waterloo, ON, Canada, August 12–16, 2019. Revised selected papers. (English) Zbl 1430.94005 Lecture Notes in Computer Science 11959. Cham: Springer (ISBN 978-3-030-38470-8/pbk; 978-3-030-38471-5/ebook). xv, 715 p. (2020). MSC: 94-06 94A60 00B25 PDFBibTeX XMLCite \textit{K. G. Paterson} (ed.) and \textit{D. Stebila} (ed.), Selected areas in cryptography -- SAC 2019. 26th international conference, Waterloo, ON, Canada, August 12--16, 2019. Revised selected papers. Cham: Springer (2020; Zbl 1430.94005) Full Text: DOI
Galbraith, Steven; Massimo, Jake; Paterson, Kenneth G. Safety in numbers: on the need for robust Diffie-Hellman parameter validation. (English) Zbl 1509.94088 Lin, Dongdai (ed.) et al., Public-key cryptography – PKC 2019. 22nd IACR international conference on practice and theory of public-key cryptography, Beijing, China, April 14–17, 2019. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11443, 379-407 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Galbraith} et al., Lect. Notes Comput. Sci. 11443, 379--407 (2019; Zbl 1509.94088) Full Text: DOI Link
Abdalla, Michel; Benhamouda, Fabrice; Passelègue, Alain; Paterson, Kenneth G. Related-key security for pseudorandom functions beyond the linear barrier. (English) Zbl 1442.94029 J. Cryptology 31, No. 4, 917-964 (2018). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{M. Abdalla} et al., J. Cryptology 31, No. 4, 917--964 (2018; Zbl 1442.94029) Full Text: DOI
Dowling, Benjamin; Paterson, Kenneth G. A cryptographic analysis of the WireGuard protocol. (English) Zbl 1440.94045 Preneel, Bart (ed.) et al., Applied cryptography and network security. 16th international conference, ACNS 2018, Leuven, Belgium, July 2–4, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10892, 3-21 (2018). MSC: 94A60 68M12 PDFBibTeX XMLCite \textit{B. Dowling} and \textit{K. G. Paterson}, Lect. Notes Comput. Sci. 10892, 3--21 (2018; Zbl 1440.94045) Full Text: DOI
Paterson, Kenneth G.; Schuldt, Jacob C. N. Statistical attacks on cookie masking for RC4. (English) Zbl 1423.94097 Cryptogr. Commun. 10, No. 5, 777-801 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{K. G. Paterson} and \textit{J. C. N. Schuldt}, Cryptogr. Commun. 10, No. 5, 777--801 (2018; Zbl 1423.94097) Full Text: DOI
Bricout, Remi; Murphy, Sean; Paterson, Kenneth G.; van der Merwe, Thyla Analysing and exploiting the Mantin biases in RC4. (English) Zbl 1414.94908 Des. Codes Cryptography 86, No. 4, 743-770 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Bricout} et al., Des. Codes Cryptography 86, No. 4, 743--770 (2018; Zbl 1414.94908) Full Text: DOI Link
Albrecht, Martin R.; Orsini, Emmanuela; Paterson, Kenneth G.; Peer, Guy; Smart, Nigel P. Tightly secure ring-LWE based key encapsulation with short ciphertexts. (English) Zbl 1500.94016 Foley, Simon N. (ed.) et al., Computer security – ESORICS 2017. 22nd European symposium on research in computer security, Oslo, Norway, September 11–15, 2017. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10492, 29-46 (2017). MSC: 94A60 68M25 68P25 PDFBibTeX XMLCite \textit{M. R. Albrecht} et al., Lect. Notes Comput. Sci. 10492, 29--46 (2017; Zbl 1500.94016) Full Text: DOI Link
Paterson, Kenneth G.; Villanueva-Polanco, Ricardo Cold boot attacks on NTRU. (English) Zbl 1429.94064 Patra, Arpita (ed.) et al., Progress in cryptology – INDOCRYPT 2017. 18th international conference on cryptology in India, Chennai, India, December 10–13, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10698, 107-125 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{K. G. Paterson} and \textit{R. Villanueva-Polanco}, Lect. Notes Comput. Sci. 10698, 107--125 (2017; Zbl 1429.94064) Full Text: DOI
Luykx, Atul; Mennink, Bart; Paterson, Kenneth G. Analyzing multi-key security degradation. (English) Zbl 1417.94071 Takagi, Tsuyoshi (ed.) et al., Advances in cryptology – ASIACRYPT 2017. 23rd international conference on the theory and applications of cryptology and information security, Hong Kong, China, December 3–7, 2017. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10625, 575-605 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Luykx} et al., Lect. Notes Comput. Sci. 10625, 575--605 (2017; Zbl 1417.94071) Full Text: DOI Link
Everspaugh, Adam; Paterson, Kenneth; Ristenpart, Thomas; Scott, Sam Key rotation for authenticated encryption. (English) Zbl 1390.94862 Katz, Jonathan (ed.) et al., Advances in cryptology – CRYPTO 2017. 37th annual international cryptology conference, Santa Barbara, CA, USA, August 20–24, 2017. Proceedings. Part III. Cham: Springer (ISBN 978-3-319-63696-2/pbk; 978-3-319-63697-9/ebook). Lecture Notes in Computer Science 10403, 98-129 (2017). MSC: 94A62 PDFBibTeX XMLCite \textit{A. Everspaugh} et al., Lect. Notes Comput. Sci. 10403, 98--129 (2017; Zbl 1390.94862) Full Text: DOI
Degabriele, Jean Paul; Paterson, Kenneth G.; Schuldt, Jacob C. N.; Woodage, Joanne Backdoors in pseudorandom number generators: possibility and impossibility results. (English) Zbl 1379.94036 Robshaw, Matthew (ed.) et al., Advances in cryptology – CRYPTO 2016. 36th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53017-7/pbk; 978-3-662-53018-4/ebook). Lecture Notes in Computer Science 9814, 403-432 (2016). MSC: 94A60 65C10 PDFBibTeX XMLCite \textit{J. P. Degabriele} et al., Lect. Notes Comput. Sci. 9814, 403--432 (2016; Zbl 1379.94036) Full Text: DOI
Albrecht, Martin R.; Paterson, Kenneth G. Lucky microseconds: a timing attack on Amazon’s s2n implementation of TLS. (English) Zbl 1385.94004 Fischlin, Marc (ed.) et al., Advances in cryptology – EUROCRYPT 2016. 35th annual international conference on the theory and applications of cryptographic techniques, Vienna, Austria, May 8–12, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49889-7/pbk; 978-3-662-49890-3/ebook). Lecture Notes in Computer Science 9665, 622-643 (2016). MSC: 94A60 68P25 68M10 PDFBibTeX XMLCite \textit{M. R. Albrecht} and \textit{K. G. Paterson}, Lect. Notes Comput. Sci. 9665, 622--643 (2016; Zbl 1385.94004) Full Text: DOI
Albrecht, Martin R.; Farshim, Pooya; Hofheinz, Dennis; Larraia, Enrique; Paterson, Kenneth G. Multilinear maps from obfuscation. (English) Zbl 1388.94030 Kushilevitz, Eyal (ed.) et al., Theory of cryptography. 13th international conference, TCC 2016-A, Tel Aviv, Israel, January 10–13, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49095-2/pbk; 978-3-662-49096-9/ebook). Lecture Notes in Computer Science 9562, 446-473 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{M. R. Albrecht} et al., Lect. Notes Comput. Sci. 9562, 446--473 (2016; Zbl 1388.94030) Full Text: DOI Link
Paterson, Kenneth G.; Schuldt, Jacob C. N.; Sibborn, Dale L.; Wee, Hoeteck Security against related randomness attacks via reconstructive extractors. (English) Zbl 1376.94042 Groth, Jens (ed.), Cryptography and coding. 15th IMA international conference, IMACC 2015, Oxford, UK, December 15–17, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-27238-2/pbk; 978-3-319-27239-9/ebook). Lecture Notes in Computer Science 9496, 23-40 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{K. G. Paterson} et al., Lect. Notes Comput. Sci. 9496, 23--40 (2015; Zbl 1376.94042) Full Text: DOI
Fischlin, Marc; Günther, Felix; Marson, Giorgia Azzurra; Paterson, Kenneth G. Data is a stream: security of stream-based channels. (English) Zbl 1369.94535 Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-47999-5/pbk; 978-3-662-48000-7/ebook). Lecture Notes in Computer Science 9216, 545-564 (2015). MSC: 94A60 68P30 PDFBibTeX XMLCite \textit{M. Fischlin} et al., Lect. Notes Comput. Sci. 9216, 545--564 (2015; Zbl 1369.94535) Full Text: DOI
Paterson, Kenneth; Poettering, Bertram; Schuldt, Jacob Plaintext recovery attacks against WPA/TKIP. (English) Zbl 1382.94152 Cid, Carlos (ed.) et al., Fast software encryption. 21st international workshop, FSE 2014, London, UK, March 3–5, 2014. Revised selected papers. Berlin: Springer (ISBN 978-3-662-46705-3/pbk; 978-3-662-46706-0/ebook). Lecture Notes in Computer Science 8540, 325-349 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Paterson} et al., Lect. Notes Comput. Sci. 8540, 325--349 (2015; Zbl 1382.94152) Full Text: DOI
Liu, Shengli; Paterson, Kenneth G. Simulation-based selective opening CCA security for PKE from key encapsulation mechanisms. (English) Zbl 1319.94078 Katz, Jonathan (ed.), Public-key cryptography – PKC 2015. 18th IACR international conference on practice and theory in public-key cryptography, Gaithersburg, MD, USA, March 30 – April 1, 2015. Proceedings. Berlin: Springer (ISBN 978-3-662-46446-5/pbk; 978-3-662-46447-2/ebook). Lecture Notes in Computer Science 9020, 3-26 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Liu} and \textit{K. G. Paterson}, Lect. Notes Comput. Sci. 9020, 3--26 (2015; Zbl 1319.94078) Full Text: DOI
Boldyreva, Alexandra; Degabriele, Jean; Paterson, Kenneth; Stam, Martijn On symmetric encryption with distinguishable decryption failures. (English) Zbl 1321.94044 Moriai, Shiho (ed.), Fast software encryption. 20th international workshop, FSE 2013, Washington, DC, USA, March 11–13, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-662-43932-6/pbk; 978-3-662-43933-3/ebook). Lecture Notes in Computer Science 8424, 367-390 (2014). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{A. Boldyreva} et al., Lect. Notes Comput. Sci. 8424, 367--390 (2014; Zbl 1321.94044) Full Text: DOI
Paterson, Kenneth G.; Poettering, Bertram; Schuldt, Jacob C. N. Big bias hunting in Amazonia: large-scale computation and exploitation of RC4 biases (invited paper). (English) Zbl 1306.94082 Sarkar, Palash (ed.) et al., Advances in cryptology – ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-45610-1/pbk). Lecture Notes in Computer Science 8873, 398-419 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{K. G. Paterson} et al., Lect. Notes Comput. Sci. 8873, 398--419 (2014; Zbl 1306.94082) Full Text: DOI
Abdalla, Michel; Benhamouda, Fabrice; Passelègue, Alain; Paterson, Kenneth G. Related-key security for pseudorandom functions beyond the linear barrier. (English) Zbl 1343.94035 Garay, Juan A. (ed.) et al., Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-44370-5/pbk). Lecture Notes in Computer Science 8616, 77-94 (2014). MSC: 94A60 65C10 PDFBibTeX XMLCite \textit{M. Abdalla} et al., Lect. Notes Comput. Sci. 8616, 77--94 (2014; Zbl 1343.94035) Full Text: DOI
Bellare, Mihir; Paterson, Kenneth G.; Rogaway, Phillip Security of symmetric encryption against mass surveillance. (English) Zbl 1317.94084 Garay, Juan A. (ed.) et al., Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-44370-5/pbk). Lecture Notes in Computer Science 8616, 1-19 (2014). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{M. Bellare} et al., Lect. Notes Comput. Sci. 8616, 1--19 (2014; Zbl 1317.94084) Full Text: DOI
Paterson, Kenneth G.; Schuldt, Jacob C. N.; Sibborn, Dale L. Related randomness attacks for public key encryption. (English) Zbl 1335.94072 Krawczyk, Hugo (ed.), Public-key cryptography – PKC 2014. 17th international conference on practice and theory in public-key cryptography, Buenos Aires, Argentina, March 26–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54630-3/pbk). Lecture Notes in Computer Science 8383, 465-482 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{K. G. Paterson} et al., Lect. Notes Comput. Sci. 8383, 465--482 (2014; Zbl 1335.94072) Full Text: DOI
Boyd, Colin; Cremers, Cas; Feltz, Michèle; Paterson, Kenneth G.; Poettering, Bertram; Stebila, Douglas ASICS: Authenticated key exchange security incorporating certification systems. (English) Zbl 1443.94089 Crampton, Jason (ed.) et al., Computer security – ESORICS 2013. 18th European symposium on research in computer security, Egham, UK, September 9–13, 2013. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 8134, 381-399 (2013). MSC: 94A62 PDFBibTeX XMLCite \textit{C. Boyd} et al., Lect. Notes Comput. Sci. 8134, 381--399 (2013; Zbl 1443.94089) Full Text: DOI Link
Çapar, Çağatay; Goeckel, Dennis; Paterson, Kenneth G.; Quaglia, Elizabeth A.; Towsley, Don; Zafer, Murtaza Signal-flow-based analysis of wireless security protocols. (English) Zbl 1277.68029 Inf. Comput. 226, 37-56 (2013). MSC: 68M12 68P25 94A62 PDFBibTeX XMLCite \textit{Ç. Çapar} et al., Inf. Comput. 226, 37--56 (2013; Zbl 1277.68029) Full Text: DOI
Freire, Eduarda S. V.; Hofheinz, Dennis; Paterson, Kenneth G.; Striecks, Christoph Programmable hash functions in the multilinear setting. (English) Zbl 1310.94145 Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-40040-7/pbk). Lecture Notes in Computer Science 8042, 513-530 (2013). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{E. S. V. Freire} et al., Lect. Notes Comput. Sci. 8042, 513--530 (2013; Zbl 1310.94145) Full Text: DOI
Krawczyk, Hugo; Paterson, Kenneth G.; Wee, Hoeteck On the security of the TLS protocol: a systematic analysis. (English) Zbl 1310.94158 Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-40040-7/pbk). Lecture Notes in Computer Science 8042, 429-448 (2013). MSC: 94A60 68M11 68M12 68P25 PDFBibTeX XMLCite \textit{H. Krawczyk} et al., Lect. Notes Comput. Sci. 8042, 429--448 (2013; Zbl 1310.94158) Full Text: DOI
Farshim, Pooya; Libert, Benoît; Paterson, Kenneth G.; Quaglia, Elizabeth A. Robust encryption, revisited. (English) Zbl 1314.94068 Kurosawa, Kaoru (ed.) et al., Public-key cryptography – PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36361-0/pbk). Lecture Notes in Computer Science 7778, 352-368 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{P. Farshim} et al., Lect. Notes Comput. Sci. 7778, 352--368 (2013; Zbl 1314.94068) Full Text: DOI
Freire, Eduarda S. V.; Hofheinz, Dennis; Kiltz, Eike; Paterson, Kenneth G. Non-interactive key exchange. (English) Zbl 1314.94069 Kurosawa, Kaoru (ed.) et al., Public-key cryptography – PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36361-0/pbk). Lecture Notes in Computer Science 7778, 254-271 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{E. S. V. Freire} et al., Lect. Notes Comput. Sci. 7778, 254--271 (2013; Zbl 1314.94069) Full Text: DOI
Freire, Eduarda S. V.; Paterson, Kenneth G.; Poettering, Bertram Simple, efficient and strongly KI-secure hierarchical key assignment schemes. (English) Zbl 1312.94050 Dawson, Ed (ed.), Topics in cryptology – CT-RSA 2013. The cryptographers’ track at the RSA conference 2013, San Francisco, CA, USA, February 25–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36094-7/pbk). Lecture Notes in Computer Science 7779, 101-114 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{E. S. V. Freire} et al., Lect. Notes Comput. Sci. 7779, 101--114 (2013; Zbl 1312.94050) Full Text: DOI
Paterson, Kenneth G.; Polychroniadou, Antigoni; Sibborn, Dale L. A coding-theoretic approach to recovering noisy RSA keys. (English) Zbl 1292.94126 Wang, Xiaoyun (ed.) et al., Advances in cryptology – ASIACRYPT 2012. 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2–6, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34960-7/pbk). Lecture Notes in Computer Science 7658, 386-403 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{K. G. Paterson} et al., Lect. Notes Comput. Sci. 7658, 386--403 (2012; Zbl 1292.94126) Full Text: DOI
Bellare, Mihir; Paterson, Kenneth G.; Thomson, Susan RKA security beyond the linear barrier: IBE, encryption and signatures. (English) Zbl 1292.94028 Wang, Xiaoyun (ed.) et al., Advances in cryptology – ASIACRYPT 2012. 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2–6, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34960-7/pbk). Lecture Notes in Computer Science 7658, 331-348 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Bellare} et al., Lect. Notes Comput. Sci. 7658, 331--348 (2012; Zbl 1292.94028) Full Text: DOI
Libert, Benoît; Paterson, Kenneth G.; Quaglia, Elizabeth A. Anonymous broadcast encryption: adaptive security and efficient constructions in the standard model. (English) Zbl 1290.94107 Fischlin, Marc (ed.) et al., Public key cryptography – PKC 2012. 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-30056-1/pbk). Lecture Notes in Computer Science 7293, 206-224 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{B. Libert} et al., Lect. Notes Comput. Sci. 7293, 206--224 (2012; Zbl 1290.94107) Full Text: DOI
Boldyreva, Alexandra; Degabriele, Jean Paul; Paterson, Kenneth G.; Stam, Martijn Security of symmetric encryption in the presence of ciphertext fragmentation. (English) Zbl 1297.94053 Pointcheval, David (ed.) et al., Advances in cryptology – EUROCRYPT 2012. 31st annual international conference on the theory and applications of cryptographic techniques, Cambridge, UK, April 15–19, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29010-7/pbk). Lecture Notes in Computer Science 7237, 682-699 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Boldyreva} et al., Lect. Notes Comput. Sci. 7237, 682--699 (2012; Zbl 1297.94053) Full Text: DOI
Degabriele, Jean Paul; Lehmann, Anja; Paterson, Kenneth G.; Smart, Nigel P.; Strefler, Mario On the joint security of encryption and signature in EMV. (English) Zbl 1292.94053 Dunkelman, Orr (ed.), Topics in cryptology – CT-RSA 2012. The cryptographers’ track at the RSA conference 2012, San Francisco, CA, USA, February 27–March 2, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-27953-9/pbk). Lecture Notes in Computer Science 7178, 116-135 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{J. P. Degabriele} et al., Lect. Notes Comput. Sci. 7178, 116--135 (2012; Zbl 1292.94053) Full Text: DOI
Paterson, Kenneth G.; Watson, Gaven J. Authenticated-encryption with padding: a formal security treatment. (English) Zbl 1285.94111 Naccache, David (ed.), Cryptography and security: From theory to applications. Essays dedicated to Jean-Jacques Quisquater on the occasion of his 65th birthday. Berlin: Springer (ISBN 978-3-642-28367-3/pbk). Lecture Notes in Computer Science 6805, 83-107 (2012). MSC: 94A62 PDFBibTeX XMLCite \textit{K. G. Paterson} and \textit{G. J. Watson}, Lect. Notes Comput. Sci. 6805, 83--107 (2012; Zbl 1285.94111) Full Text: DOI
Albrecht, Martin R.; Paterson, Kenneth G. Breaking an identity-based encryption scheme based on DHIES. (English) Zbl 1291.94042 Chen, Liqun (ed.), Cryptography and coding. 13th IMA international conference, IMACC 2011, Oxford, UK, December 12–15, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25515-1/pbk). Lecture Notes in Computer Science 7089, 344-355 (2011). MSC: 94A60 13P10 PDFBibTeX XMLCite \textit{M. R. Albrecht} and \textit{K. G. Paterson}, Lect. Notes Comput. Sci. 7089, 344--355 (2011; Zbl 1291.94042) Full Text: DOI
Paterson, Kenneth G.; Ristenpart, Thomas; Shrimpton, Thomas Tag size does matter: attacks and proofs for the TLS record protocol. (English) Zbl 1227.94060 Lee, Dong Hoon (ed.) et al., Advances in cryptology – ASIACRYPT 2011. 17th international conference on the theory and application of cryptology and information security, Seoul, South Korea, December 4–8, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25384-3/pbk). Lecture Notes in Computer Science 7073, 372-389 (2011). MSC: 94A60 68M12 94A62 PDFBibTeX XMLCite \textit{K. G. Paterson} et al., Lect. Notes Comput. Sci. 7073, 372--389 (2011; Zbl 1227.94060) Full Text: DOI
Paterson, Kenneth G.; Schuldt, Jacob C. N.; Stam, Martijn; Thomson, Susan On the joint security of encryption and signature, revisited. (English) Zbl 1227.94061 Lee, Dong Hoon (ed.) et al., Advances in cryptology – ASIACRYPT 2011. 17th international conference on the theory and application of cryptology and information security, Seoul, South Korea, December 4–8, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25384-3/pbk). Lecture Notes in Computer Science 7073, 161-178 (2011). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{K. G. Paterson} et al., Lect. Notes Comput. Sci. 7073, 161--178 (2011; Zbl 1227.94061) Full Text: DOI
Albrecht, M. R.; Farshim, P.; Paterson, K. G.; Watson, G. J. On cipher-dependent related-key attacks in the ideal-cipher model. (English) Zbl 1282.94030 Joux, Antoine (ed.), Fast software encryption. 18th international workshop, FSE 2011, Lyngby, Denmark, February 13–16, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-21701-2/pbk). Lecture Notes in Computer Science 6733, 128-145 (2011). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{M. R. Albrecht} et al., Lect. Notes Comput. Sci. 6733, 128--145 (2011; Zbl 1282.94030) Full Text: DOI
Freire, Eduarda S. V.; Paterson, Kenneth G. Provably secure key assignment schemes from factoring. (English) Zbl 1295.94066 Parampalli, Udaya (ed.) et al., Information security and privacy. 16th Australasian conference, ACISP 2011, Melbourne, Australia, July 11–13, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22496-6/pbk). Lecture Notes in Computer Science 6812, 292-309 (2011). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{E. S. V. Freire} and \textit{K. G. Paterson}, Lect. Notes Comput. Sci. 6812, 292--309 (2011; Zbl 1295.94066) Full Text: DOI
Paterson, Kenneth G. (ed.) Advances in cryptology – EUROCRYPT 2011. 30th annual international conference on the theory and applications of cryptographic techniques, Tallinn, Estonia, May 15–19, 2011. Proceedings. (English) Zbl 1214.94003 Lecture Notes in Computer Science 6632. Berlin: Springer (ISBN 978-3-642-20464-7/pbk). xiv, 628 p. (2011). MSC: 94-06 94A60 00B25 PDFBibTeX XMLCite \textit{K. G. Paterson} (ed.), Advances in cryptology -- EUROCRYPT 2011. 30th annual international conference on the theory and applications of cryptographic techniques, Tallinn, Estonia, May 15--19, 2011. Proceedings. Berlin: Springer (2011; Zbl 1214.94003) Full Text: DOI
Paterson, Kenneth G.; Quaglia, Elizabeth A. Time-specific encryption. (English) Zbl 1291.68163 Garay, Juan A. (ed.) et al., Security and cryptography for networks. 7th international conference, SCN 2010, Amalfi, Italy, September 13–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-15316-7/pbk). Lecture Notes in Computer Science 6280, 1-16 (2010). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{K. G. Paterson} and \textit{E. A. Quaglia}, Lect. Notes Comput. Sci. 6280, 1--16 (2010; Zbl 1291.68163) Full Text: DOI
Paterson, Kenneth G.; Watson, Gaven J. Plaintext-dependent decryption: a formal security treatment of SSH-CTR. (English) Zbl 1280.94090 Gilbert, Henri (ed.), Advances in cryptology – EUROCRYPT 2010. 29th annual international conference on the theory and applications of cryptographic techniques, French Riviera, May 30 – June 3, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13189-9/pbk). Lecture Notes in Computer Science 6110, 345-361 (2010). MSC: 94A60 PDFBibTeX XMLCite \textit{K. G. Paterson} and \textit{G. J. Watson}, Lect. Notes Comput. Sci. 6110, 345--361 (2010; Zbl 1280.94090) Full Text: DOI
Etzion, Tuvi; Kalouptsidis, Nicholas; Kolokotronis, Nicholas; Limniotis, Konstantinos; Paterson, Kenneth G. Properties of the error linear complexity spectrum. (English) Zbl 1367.94288 IEEE Trans. Inf. Theory 55, No. 10, 4681-4686 (2009). MSC: 94A55 68Q30 PDFBibTeX XMLCite \textit{T. Etzion} et al., IEEE Trans. Inf. Theory 55, No. 10, 4681--4686 (2009; Zbl 1367.94288) Full Text: DOI
Paterson, Kenneth G.; Srinivasan, Sriramkrishnan On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups. (English) Zbl 1174.94014 Des. Codes Cryptography 52, No. 2, 219-241 (2009). MSC: 94A60 PDFBibTeX XMLCite \textit{K. G. Paterson} and \textit{S. Srinivasan}, Des. Codes Cryptography 52, No. 2, 219--241 (2009; Zbl 1174.94014) Full Text: DOI
Paterson, Kenneth G.; Srinivasan, Sriramkrishnan Building key-private public-key encryption schemes. (English) Zbl 1284.94098 Boyd, Colin (ed.) et al., Information security and privacy. 14th Australasian conference, ACISP 2009, Brisbane, Australia, July 1–3, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02619-5/pbk). Lecture Notes in Computer Science 5594, 276-292 (2009). MSC: 94A60 PDFBibTeX XMLCite \textit{K. G. Paterson} and \textit{S. Srinivasan}, Lect. Notes Comput. Sci. 5594, 276--292 (2009; Zbl 1284.94098) Full Text: DOI
Boyd, Colin; Cliff, Yvonne; Nieto, Juan M. González; Paterson, Kenneth G. One-round key exchange in the standard model. (English) Zbl 1159.94376 Int. J. Appl. Cryptogr. 1, No. 3, 181-199 (2009). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{C. Boyd} et al., Int. J. Appl. Cryptogr. 1, No. 3, 181--199 (2009; Zbl 1159.94376) Full Text: DOI
Galbraith, Steven D.; Paterson, Kenneth G.; Smart, Nigel P. Pairings for cryptographers. (English) Zbl 1156.94347 Discrete Appl. Math. 156, No. 16, 3113-3121 (2008). MSC: 94A60 PDFBibTeX XMLCite \textit{S. D. Galbraith} et al., Discrete Appl. Math. 156, No. 16, 3113--3121 (2008; Zbl 1156.94347) Full Text: DOI
Paterson, Kenneth G.; Srinivasan, Sriramkrishnan Security and anonymity of identity-based encryption with multiple trusted authorities. (English) Zbl 1186.94465 Galbraith, Steven D. (ed.) et al., Pairing-based cryptography – Pairing 2008. Second international conference, Egham, UK, September 1–3, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85503-3/pbk). Lecture Notes in Computer Science 5209, 354-375 (2008). MSC: 94A60 PDFBibTeX XMLCite \textit{K. G. Paterson} and \textit{S. Srinivasan}, Lect. Notes Comput. Sci. 5209, 354--375 (2008; Zbl 1186.94465) Full Text: DOI
Paterson, Kenneth G.; Watson, Gaven J. Immunising CBC mode against padding oracle attacks: A formal security treatment. (English) Zbl 1180.94060 Ostrovsky, Rafail (ed.) et al., Security and cryptography for networks. 6th international conference, SCN 2008, Amalfi, Italy, September 10–12, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85854-6/pbk). Lecture Notes in Computer Science 5229, 340-357 (2008). MSC: 94A60 68M12 PDFBibTeX XMLCite \textit{K. G. Paterson} and \textit{G. J. Watson}, Lect. Notes Comput. Sci. 5229, 340--357 (2008; Zbl 1180.94060) Full Text: DOI
Galbraith, Steven D. (ed.); Paterson, Kenneth G. (ed.) Pairing-based cryptography – Pairing 2008. Second international conference, Egham, UK, September 1–3, 2008. Proceedings. (English) Zbl 1155.94002 Lecture Notes in Computer Science 5209. Berlin: Springer (ISBN 978-3-540-85503-3/pbk). xi, 377 p. (2008). MSC: 94-06 94A60 00B25 PDFBibTeX XMLCite \textit{S. D. Galbraith} (ed.) and \textit{K. G. Paterson} (ed.), Pairing-based cryptography -- Pairing 2008. Second international conference, Egham, UK, September 1--3, 2008. Proceedings. Berlin: Springer (2008; Zbl 1155.94002) Full Text: DOI
Boyd, Colin; Cliff, Yvonne; Gonzalez Nieto, Juan; Paterson, Kenneth G. Efficient one-round key exchange in the standard model. (English) Zbl 1279.94057 Mu, Yi (ed.) et al., Information security and privacy. 13th Australasian conference, ACISP 2008, Wollongong, Australia, July 7–9, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-69971-2/pbk). Lecture Notes in Computer Science 5107, 69-83 (2008). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{C. Boyd} et al., Lect. Notes Comput. Sci. 5107, 69--83 (2008; Zbl 1279.94057) Full Text: DOI Link
Dent, Alexander W.; Libert, Benoît; Paterson, Kenneth G. Certificateless encryption schemes strongly secure in the standard model. (English) Zbl 1162.94352 Cramer, Ronald (ed.), Public key cryptography – PKC 2008. 11th international workshop on practice and theory in public-key cryptography, Barcelona, Spain, March 9–12, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78440-1/pbk). Lecture Notes in Computer Science 4939, 344-359 (2008). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{A. W. Dent} et al., Lect. Notes Comput. Sci. 4939, 344--359 (2008; Zbl 1162.94352) Full Text: DOI
Schuldt, Jacob C. N.; Matsuura, Kanta; Paterson, Kenneth G. Proxy signatures secure against proxy key exposure. (English) Zbl 1162.94400 Cramer, Ronald (ed.), Public key cryptography – PKC 2008. 11th international workshop on practice and theory in public-key cryptography, Barcelona, Spain, March 9–12, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78440-1/pbk). Lecture Notes in Computer Science 4939, 141-161 (2008). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{J. C. N. Schuldt} et al., Lect. Notes Comput. Sci. 4939, 141--161 (2008; Zbl 1162.94400) Full Text: DOI
Lim, Hoon Wei; Paterson, Kenneth G. Multi-key hierarchical identity-based signatures. (English) Zbl 1154.94467 Galbraith, Steven D. (ed.), Cryptography and coding. 11th IMA international conference, Cirencester, UK, December 18–20, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-77271-2/pbk). Lecture Notes in Computer Science 4887, 384-402 (2007). MSC: 94A62 PDFBibTeX XMLCite \textit{H. W. Lim} and \textit{K. G. Paterson}, Lect. Notes Comput. Sci. 4887, 384--402 (2007; Zbl 1154.94467) Full Text: DOI
Paterson, Kenneth G.; Yau, Arnold K. L. Cryptography in theory and practice: the case of encryption in IPsec. (English) Zbl 1129.94034 Vaudenay, Serge (ed.), Advances in cryptology – EUROCRYPT 2006. 25th annual international conference on the theory and applications of cryptographic techniques, St. Petersburg, Russia, May 28 – June 1, 2006. Proceedings. Berlin: Springer (ISBN 3-540-34546-9/pbk). Lecture Notes in Computer Science 4004, 12-29 (2006). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{K. G. Paterson} and \textit{A. K. L. Yau}, Lect. Notes Comput. Sci. 4004, 12--29 (2006; Zbl 1129.94034) Full Text: DOI
Paterson, Kenneth G.; Schuldt, Jacob C. N. Efficient identity-based signatures secure in the standard model. (English) Zbl 1176.94056 Batten, Lynn Margaret (ed.) et al., Information security and privacy. 11th Australasian conference, ACISP 2006, Melbourne, Australia, July 3–5, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-35458-1/pbk). Lecture Notes in Computer Science 4058, 207-222 (2006). MSC: 94A60 94A62 68P25 PDFBibTeX XMLCite \textit{K. G. Paterson} and \textit{J. C. N. Schuldt}, Lect. Notes Comput. Sci. 4058, 207--222 (2006; Zbl 1176.94056) Full Text: DOI
Etzion, Tuvi; Paterson, Kenneth G. Zero/positive capacities of two-dimensional runlength-constrained arrays. (English) Zbl 1298.94053 IEEE Trans. Inf. Theory 51, No. 9, 3186-3199 (2005). MSC: 94A29 68P20 94A24 PDFBibTeX XMLCite \textit{T. Etzion} and \textit{K. G. Paterson}, IEEE Trans. Inf. Theory 51, No. 9, 3186--3199 (2005; Zbl 1298.94053) Full Text: DOI
Kudla, Caroline; Paterson, Kenneth G. Modular security proofs for key agreement protocols. (English) Zbl 1154.94464 Roy, Bimal (ed.), Advances in cryptology – ASIACRYPT 2005. 11th international conference on the theory and application of cryptology and information security, Chennai, India, December 4–8, 2005, Proceedings. Berlin: Springer (ISBN 978-3-540-30684-9/pbk). Lecture Notes in Computer Science 3788, 549-565 (2005). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{C. Kudla} and \textit{K. G. Paterson}, Lect. Notes Comput. Sci. 3788, 549--565 (2005; Zbl 1154.94464) Full Text: DOI
Kudla, Caroline; Paterson, Kenneth G. Non-interactive designated verifier proofs and undeniable signatures. (English) Zbl 1122.94048 Smart, Nigel P. (ed.), Cryptography and coding. 10th IMA international conference, Cirencester, UK, December 19–21, 2005. Proceedings. Berlin: Springer (ISBN 3-540-30276-X/pbk). Lecture Notes in Computer Science 3796, 136-154 (2005). MSC: 94A62 PDFBibTeX XMLCite \textit{C. Kudla} and \textit{K. G. Paterson}, Lect. Notes Comput. Sci. 3796, 136--154 (2005; Zbl 1122.94048) Full Text: DOI
Yau, Arnold K. L.; Paterson, Kenneth G.; Mitchell, Chris J. Padding oracle attacks on CBC-mode encryption with secret and random IVs. (English) Zbl 1140.68394 Gilbert, Henri (ed.) et al., Fast software encryption. 12th international workshop, FSE 2005, Paris, France, February 21–23, 2005. Revised selected papers. Berlin: Springer (ISBN 3-540-26541-4/pbk). Lecture Notes in Computer Science 3557, 299-319 (2005). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{A. K. L. Yau} et al., Lect. Notes Comput. Sci. 3557, 299--319 (2005; Zbl 1140.68394) Full Text: DOI
Al-Riyami, Sattam S.; Paterson, Kenneth G. CBE from CL-PKE: a generic construction and efficient schemes. (English) Zbl 1081.94514 Vaudenay, Serge (ed.), Public key cryptography – PKC 2005. 8th international workshop on theory and practice in public key cryptography, Les Diablerets, Switzerland, January 23–26, 2005. Proceedings. Berlin: Springer (ISBN 3-540-24454-9/pbk). Lecture Notes in Computer Science 3386, 398-415 (2005). MSC: 94A60 PDFBibTeX XMLCite \textit{S. S. Al-Riyami} and \textit{K. G. Paterson}, Lect. Notes Comput. Sci. 3386, 398--415 (2005; Zbl 1081.94514) Full Text: DOI
Blake, Ian F. (ed.); Seroussi, Gadiel (ed.); Smart, Nigel P. (ed.) [Smart, N. P.; Brown, D.; Dent, A. W.; Oswald, E.; Joye, M.; Vercauteren, F.; Gaudry, P.; Hess, F.; Galbraith, S.; Paterson, K. G.] Advances in elliptic curve cryptography. (English) Zbl 1089.94018 London Mathematical Society Lecture Note Series 317. Cambridge: Cambridge University Press (ISBN 0-521-60415-X). xvi, 281 p. (2005). Reviewer: Juan Tena Ayuso (Valladolid) MSC: 94A60 14G50 94-02 14-02 11G20 PDFBibTeX XMLCite \textit{I. F. Blake} (ed.) et al., Advances in elliptic curve cryptography. Cambridge: Cambridge University Press (2005; Zbl 1089.94018) Full Text: DOI
Paterson, Kenneth G.; Yau, Arnold Padding oracle attacks on the ISO CBC mode encryption standard. (English) Zbl 1196.94064 Okamoto, Tatsuaki (ed.), Topics in cryptology – CT-RSA 2004. The cryptographers’ track at the RSA conference 2004, San Francisco, CA, USA, February 23–27, 2004. Proceedings. Berlin: Springer (ISBN 3-540-20996-4/pbk). Lecture Notes in Computer Science 2964, 305-323 (2004). MSC: 94A60 PDFBibTeX XMLCite \textit{K. G. Paterson} and \textit{A. Yau}, Lect. Notes Comput. Sci. 2964, 305--323 (2004; Zbl 1196.94064) Full Text: DOI
Paterson, K. G. On codes with low peak-to-average power ratio for multicode CDMA. (English) Zbl 1288.94040 IEEE Trans. Inf. Theory 50, No. 3, 550-559 (2004). MSC: 94A29 94B15 PDFBibTeX XMLCite \textit{K. G. Paterson}, IEEE Trans. Inf. Theory 50, No. 3, 550--559 (2004; Zbl 1288.94040) Full Text: DOI
Chen, Liqun; Kudla, Caroline; Paterson, Kenneth G. Concurrent signatures. (English) Zbl 1122.94412 Cachin, Christian (ed.) et al., Advances in cryptology – EUROCRYPT 2004. International conference on the theory and applications of cryptographic techniques, Interlaken, Switzerland, May 2–6, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21935-8/pbk). Lecture Notes in Computer Science 3027, 287-305 (2004). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{L. Chen} et al., Lect. Notes Comput. Sci. 3027, 287--305 (2004; Zbl 1122.94412) Full Text: DOI
Blackburn, Simon R.; Paterson, Kenneth G. Cryptanalysis of a message authentication code due to Cary and Venkatesan. (English) Zbl 1079.68538 Roy, Bimal (ed.) et al., Fast software encryption. 11th international workshop, FSE 2004, Delhi, India, February 5–7, 2004. Revised papers. Berlin: Springer (ISBN 3-540-22171-9/pbk). Lecture Notes in Computer Science 3017, 446-453 (2004). MSC: 68P25 68N99 94A62 PDFBibTeX XMLCite \textit{S. R. Blackburn} and \textit{K. G. Paterson}, Lect. Notes Comput. Sci. 3017, 446--453 (2004; Zbl 1079.68538) Full Text: DOI
Boyd, Colin; Mao, Wenbo; Paterson, Kenneth G. Key agreement using statically keyed authenticators. (English) Zbl 1103.68508 Jakobsson, Markus (ed.) et al., Applied cryptography and network security. Second international conference, ACNS 2004, Yellow Mountain, China, June 8–11, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22217-0/pbk). Lecture Notes in Computer Science 3089, 248-262 (2004). MSC: 68P25 94A60 94A62 PDFBibTeX XMLCite \textit{C. Boyd} et al., Lect. Notes Comput. Sci. 3089, 248--262 (2004; Zbl 1103.68508) Full Text: DOI
Al-Riyami, Sattam S.; Paterson, Kenneth G. Certificateless public key cryptography. (English) Zbl 1205.94072 Laih, Chi Sung (ed.), Advances in cryptology – ASIACRYPT 2003. 9th international conference on the theory and application of cryptology and information security, Taipei, Taiwan, November 30 – December 4, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20592-6/pbk). Lect. Notes Comput. Sci. 2894, 452-473 (2003). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{S. S. Al-Riyami} and \textit{K. G. Paterson}, Lect. Notes Comput. Sci. 2894, 452--473 (2003; Zbl 1205.94072) Full Text: DOI
Al-Riyami, Sattam S.; Paterson, Kenneth G. Tripartite authenticated key agreement protocols from pairings. (English) Zbl 1123.94374 Paterson, Kenneth G. (ed.), Cryptography and coding. 9th IMA international conference, Cirencester, UK, December 16–18, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20663-9/pbk). Lect. Notes Comput. Sci. 2898, 332-359 (2003). MSC: 94A62 68M12 94A60 PDFBibTeX XMLCite \textit{S. S. Al-Riyami} and \textit{K. G. Paterson}, Lect. Notes Comput. Sci. 2898, 332--359 (2003; Zbl 1123.94374) Full Text: DOI
Lauder, Alan G. B.; Paterson, Kenneth G. Computing the error linear complexity spectrum of a binary sequence of period \(2^n\). (English) Zbl 1063.68051 IEEE Trans. Inf. Theory 49, No. 1, 273-280 (2003). MSC: 94A55 94A60 68W30 94B05 PDFBibTeX XMLCite \textit{A. G. B. Lauder} and \textit{K. G. Paterson}, IEEE Trans. Inf. Theory 49, No. 1, 273--280 (2003; Zbl 1063.68051) Full Text: DOI
Paterson, Kenneth G. (ed.) Cryptography and coding. 9th IMA international conference, Cirencester, UK, December 16–18, 2003. Proceedings. (English) Zbl 1029.00082 Lecture Notes in Computer Science. 2898. Berlin: Springer. ix, 383 p. (2003). MSC: 00B25 94-06 94A60 PDFBibTeX XMLCite \textit{K. G. Paterson} (ed.), Cryptography and coding. 9th IMA international conference, Cirencester, UK, December 16--18, 2003. Proceedings. Berlin: Springer (2003; Zbl 1029.00082) Full Text: DOI Link
Galbraith, Steven D.; Mao, Wenbo; Paterson, Kenneth G. RSA-based undeniable signatures for general moduli. (English) Zbl 1048.94511 Preneel, Bart (ed.), Topics in cryptology - CT-RSA 2002. The cryptographers’ track at the RSA conference 2002, San José, CA, USA, February 18–22, 2002. Proceedings. Berlin: Springer (ISBN 3-540-43224-8). Lect. Notes Comput. Sci. 2271, 200-217 (2002). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{S. D. Galbraith} et al., Lect. Notes Comput. Sci. 2271, 200--217 (2002; Zbl 1048.94511) Full Text: Link
Paterson, K. G.; Tarokh, V. Existence of good codes with low peak-to-average power ratios for multicarrier communications. (English) Zbl 1039.94003 Blahut, Richard E. (ed.) et al., Codes, graphs, and systems. A celebration of the life and career of G. David Forney, Jr. on the occasion of his sixtieth birthday. Foreword by James L. Massey. Boston, MA: Kluwer Academic Publishers (ISBN 0-7923-7686-2/hbk). Kluwer Int. Ser. Eng. Comput. Sci. 670, 187-197 (2002). MSC: 94A24 PDFBibTeX XMLCite \textit{K. G. Paterson} and \textit{V. Tarokh}, Kluwer Int. Ser. Eng. Comput. Sci. 670, 187--197 (2002; Zbl 1039.94003)
Paterson, Kenneth G. Sequences for OFDM and multi-code CDMA: Two problems in algebraic coding theory. (English) Zbl 1043.94535 Helleseth, Tor (ed.) et al., Sequences and their applications. Proceedings of the 2nd international conference (SETA’01), Bergen, Norway, May 13–17, 2001. London: Springer (ISBN 1-85233-529-7). Discrete Mathematics and Theoretical Computer Science, 46-71 (2002). MSC: 94A55 94A40 94A14 94B60 PDFBibTeX XMLCite \textit{K. G. Paterson}, in: Sequences and their applications. Proceedings of the 2nd international conference (SETA'01), Bergen, Norway, May 13--17, 2001. London: Springer. 46--71 (2002; Zbl 1043.94535)
Hiltgen, Alain P.; Paterson, Kenneth G. Single-track circuit codes. (English) Zbl 1019.94029 IEEE Trans. Inf. Theory 47, No. 6, 2587-2595 (2001). MSC: 94B25 05C38 94A29 68P30 PDFBibTeX XMLCite \textit{A. P. Hiltgen} and \textit{K. G. Paterson}, IEEE Trans. Inf. Theory 47, No. 6, 2587--2595 (2001; Zbl 1019.94029) Full Text: DOI Link
Paterson, Kenneth G.; Tarokh, Vahid On the existence and construction of good codes with low peak-to-average power ratios. (English) Zbl 0998.94006 IEEE Trans. Inf. Theory 46, No. 6, 1974-1987 (2000). MSC: 94A14 94A05 PDFBibTeX XMLCite \textit{K. G. Paterson} and \textit{V. Tarokh}, IEEE Trans. Inf. Theory 46, No. 6, 1974--1987 (2000; Zbl 0998.94006) Full Text: DOI Link
Paterson, Kenneth G. Generalized Reed-Muller codes and power control in OFDM modulation. (English) Zbl 0997.94531 IEEE Trans. Inf. Theory 46, No. 1, 104-120 (2000). MSC: 94A14 94B05 PDFBibTeX XMLCite \textit{K. G. Paterson}, IEEE Trans. Inf. Theory 46, No. 1, 104--120 (2000; Zbl 0997.94531) Full Text: DOI Link
Paterson, Kenneth G. Applications of exponential sums in communications theory. (English) Zbl 0981.94030 Walker, Michael (ed.), Cryptography and coding. 7th IMA international conference, Cirencester, GB, December 20-22, 1999. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1746, 1-24 (1999). MSC: 94A60 11T23 94B99 94A05 PDFBibTeX XMLCite \textit{K. G. Paterson}, Lect. Notes Comput. Sci. 1746, 1--24 (1999; Zbl 0981.94030)
Paterson, Kenneth G. Imprimitive permutation groups and trapdoors in interated block ciphers. (English) Zbl 0942.94008 Knudsen, Lars (ed.), Fast software encryption. 6th international workshop, FSE ‘99. Rome, Italy, March 24-26, 1999. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1636, 201-214 (1999). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{K. G. Paterson}, Lect. Notes Comput. Sci. 1636, 201--214 (1999; Zbl 0942.94008)
Davis, James A.; Jedwab, Jonathan; Paterson, Kenneth G. Codes, correlations and power control in OFDM. (English) Zbl 0972.94009 Pott, A. (ed.) et al., Difference sets, sequences and their correlation properties. Proceedings of the NATO Advanced Study Institute, Bad Winsheim, Germany, August 2-14, 1998. Dordrecht: Kluwer Academic Publishers. NATO ASI Ser., Ser. C, Math. Phys. Sci. 542, 113-132 (1999). MSC: 94A12 94A55 94B05 94-02 PDFBibTeX XMLCite \textit{J. A. Davis} et al., NATO ASI Ser., Ser. C, Math. Phys. Sci. 542, 113--132 (1999; Zbl 0972.94009)
Paterson, Kenneth G. Root counting, the DFT and the linear complexity of nonlinear filtering. (English) Zbl 0918.94010 Des. Codes Cryptography 14, No. 3, 247-259 (1998). Reviewer: Jerzy Żurawiecki (Lublin) MSC: 94A55 65T50 68Q30 94A60 PDFBibTeX XMLCite \textit{K. G. Paterson}, Des. Codes Cryptography 14, No. 3, 247--259 (1998; Zbl 0918.94010) Full Text: DOI
Paterson, Kenneth G.; Lothian, Paul J. G. Bounds on partial correlations of sequences. (English) Zbl 0913.94007 IEEE Trans. Inf. Theory 44, No. 3, 1164-1175 (1998). Reviewer: Jerzy Żurawiecki (Lublin) MSC: 94A55 65C10 PDFBibTeX XMLCite \textit{K. G. Paterson} and \textit{P. J. G. Lothian}, IEEE Trans. Inf. Theory 44, No. 3, 1164--1175 (1998; Zbl 0913.94007) Full Text: DOI
Paterson, Kenneth G. Binary sequence sets with favorable correlations from difference sets and MDS codes. (English) Zbl 1053.94572 IEEE Trans. Inf. Theory 44, No. 1, 172-180 (1998). MSC: 94B15 05B10 94A55 PDFBibTeX XMLCite \textit{K. G. Paterson}, IEEE Trans. Inf. Theory 44, No. 1, 172--180 (1998; Zbl 1053.94572) Full Text: DOI
Mitchell, Chris J.; Paterson, Kenneth G. Perfect factors from cyclic codes and interleaving. (English) Zbl 0914.05059 SIAM J. Discrete Math. 11, No. 2, 241-264 (1998). MSC: 05C70 05C38 94A99 68R10 94A55 PDFBibTeX XMLCite \textit{C. J. Mitchell} and \textit{K. G. Paterson}, SIAM J. Discrete Math. 11, No. 2, 241--264 (1998; Zbl 0914.05059) Full Text: DOI
Blackburn, S. R.; Murphy, S.; Paterson, K. G. Comment on “A new public-key cipher system based upon the Diophantine equations”. (English) Zbl 1361.94037 IEEE Trans. Comput. 46, No. 4, 512 (1997). MSC: 94A60 PDFBibTeX XMLCite \textit{S. R. Blackburn} et al., IEEE Trans. Comput. 46, No. 4, 512 (1997; Zbl 1361.94037) Full Text: DOI
Hiltgen, Alain P.; Paterson, Kenneth G.; Brandestini, Marco Single-track Gray codes. (English) Zbl 0857.94007 IEEE Trans. Inf. Theory 42, No. 5, 1555-1561 (1996). MSC: 94A29 94B25 PDFBibTeX XMLCite \textit{A. P. Hiltgen} et al., IEEE Trans. Inf. Theory 42, No. 5, 1555--1561 (1996; Zbl 0857.94007) Full Text: DOI
Mitchell, Chris J.; Etzion, Tuvi; Paterson, Kenneth G. A method for constructing decodable de Bruijn sequences. (English) Zbl 0857.94012 IEEE Trans. Inf. Theory 42, No. 5, 1472-1478 (1996). MSC: 94A55 94B35 PDFBibTeX XMLCite \textit{C. J. Mitchell} et al., IEEE Trans. Inf. Theory 42, No. 5, 1472--1478 (1996; Zbl 0857.94012) Full Text: DOI
Etzion, Tuvi; Paterson, Kenneth G. Near optimal single-track Gray codes. (English) Zbl 0857.94006 IEEE Trans. Inf. Theory 42, No. 3, 779-789 (1996). MSC: 94A29 94B25 PDFBibTeX XMLCite \textit{T. Etzion} and \textit{K. G. Paterson}, IEEE Trans. Inf. Theory 42, No. 3, 779--789 (1996; Zbl 0857.94006) Full Text: DOI Link
Paterson, Kenneth G. New classes of perfect maps. II. (English) Zbl 0841.94028 J. Comb. Theory, Ser. A 73, No. 2, 335-345 (1996). Reviewer: R.-H.Schulz (Berlin) MSC: 94A55 05B20 PDFBibTeX XMLCite \textit{K. G. Paterson}, J. Comb. Theory, Ser. A 73, No. 2, 335--345 (1996; Zbl 0841.94028) Full Text: DOI
Paterson, Kenneth G. New classes of perfect maps. I. (English) Zbl 0841.94027 J. Comb. Theory, Ser. A 73, No. 2, 302-334 (1996). Reviewer: R.-H.Schulz (Berlin) MSC: 94A55 05B20 PDFBibTeX XMLCite \textit{K. G. Paterson}, J. Comb. Theory, Ser. A 73, No. 2, 302--334 (1996; Zbl 0841.94027) Full Text: DOI
Fuchsberger, Andreas; Gollmann, Dieter; Lothian, Paul; Paterson, Kenneth G.; Sidiropoulos, Abraham Public-key cryptography on smart cards. (English) Zbl 1422.94028 Dawson, Ed (ed.) et al., Cryptography: policy and algorithms. International conference, Brisbane, Queensland, Australia, July 3–5, 1995. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1029, 250-269 (1996). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Fuchsberger} et al., Lect. Notes Comput. Sci. 1029, 250--269 (1996; Zbl 1422.94028) Full Text: DOI
Paterson, K. G.; Robshaw, M. J. B. Storage efficient decoding for a class of binary de Bruijn sequences. (English) Zbl 0817.94008 Discrete Math. 138, No. 1-3, 327-341 (1995). MSC: 94A55 05C90 68W10 94A60 PDFBibTeX XMLCite \textit{K. G. Paterson} and \textit{M. J. B. Robshaw}, Discrete Math. 138, No. 1--3, 327--341 (1995; Zbl 0817.94008) Full Text: DOI