Albrecht, Martin R.; Haller, Miro; Mareková, Lenka; Paterson, Kenneth G. Caveat implementor! Key recovery attacks on MEGA. (English) Zbl 07774567 Hazay, Carmit (ed.) et al., Advances in cryptology – EUROCRYPT 2023. 42nd annual international conference on the theory and applications of cryptographic techniques, Lyon, France, April 23–27, 2023. Proceedings. Part V. Cham: Springer. Lect. Notes Comput. Sci. 14008, 190-218 (2023). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{M. R. Albrecht} et al., Lect. Notes Comput. Sci. 14008, 190--218 (2023; Zbl 07774567) Full Text: DOI
Czumaj, Artur; Kontogeorgiou, George; Paterson, Mike Haystack hunting hints and locker room communication. (English) Zbl 07753400 Random Struct. Algorithms 62, No. 4, 832-856 (2023). MSC: 68-XX 60-XX PDFBibTeX XMLCite \textit{A. Czumaj} et al., Random Struct. Algorithms 62, No. 4, 832--856 (2023; Zbl 07753400) Full Text: DOI arXiv OA License
Backendal, Matilda; Günther, Felix; Paterson, Kenneth G. Puncturable key wrapping and its applications. (English) Zbl 1519.94042 Agrawal, Shweta (ed.) et al., Advances in cryptology – ASIACRYPT 2022. 28th international conference on the theory and application of cryptology and information security, Taipei, Taiwan, December 5–9, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13792, 651-681 (2023). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Backendal} et al., Lect. Notes Comput. Sci. 13792, 651--681 (2023; Zbl 1519.94042) Full Text: DOI
Einsele, Semira; Paterson, Kenneth Average Case Error Estimates of the Strong Lucas Test. arXiv:2306.09472 Preprint, arXiv:2306.09472 [cs.CR] (2023). BibTeX Cite \textit{S. Einsele} and \textit{K. Paterson}, ``Average Case Error Estimates of the Strong Lucas Test'', Preprint, arXiv:2306.09472 [cs.CR] (2023) Full Text: arXiv OA License
Falzon, Francesca; Paterson, Kenneth G. An efficient query recovery attack against a graph encryption scheme. (English) Zbl 1523.68024 Atluri, Vijayalakshmi (ed.) et al., Computer security – ESORICS 2022. 27th European symposium on research in computer security, Copenhagen, Denmark, September 26–30, 2022. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13554, 325-345 (2022). MSC: 68P15 68P25 94A60 PDFBibTeX XMLCite \textit{F. Falzon} and \textit{K. G. Paterson}, Lect. Notes Comput. Sci. 13554, 325--345 (2022; Zbl 1523.68024) Full Text: DOI
Grubbs, Paul; Maram, Varun; Paterson, Kenneth G. Anonymous, robust post-quantum public key encryption. (English) Zbl 1502.81027 Dunkelman, Orr (ed.) et al., Advances in cryptology – EUROCRYPT 2022. 41st annual international conference on the theory and applications of cryptographic techniques, Trondheim, Norway, May 30 – June 3, 2022. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 13277, 402-432 (2022). MSC: 81P94 94A60 81P70 81P68 68M25 PDFBibTeX XMLCite \textit{P. Grubbs} et al., Lect. Notes Comput. Sci. 13277, 402--432 (2022; Zbl 1502.81027) Full Text: DOI
Iwama, Kazuo; Paterson, Mike Bounded Hanoi. (English) Zbl 1486.00001 Am. Math. Mon. 129, No. 4, 303-319 (2022). MSC: 00A08 68W40 PDFBibTeX XMLCite \textit{K. Iwama} and \textit{M. Paterson}, Am. Math. Mon. 129, No. 4, 303--319 (2022; Zbl 1486.00001) Full Text: DOI
Chikin, Nikolay; Gurvich, Vladimir; Knop, Konstantin; Paterson, Mike; Vyalyi, Michael More about exact slow \(k\)-Nim. (English) Zbl 1487.91019 Integers 21, Paper G4, 14 p. (2021). Reviewer: Michel Rigo (Liège) MSC: 91A46 PDFBibTeX XMLCite \textit{N. Chikin} et al., Integers 21, Paper G4, 14 p. (2021; Zbl 1487.91019) Full Text: arXiv Link
Paterson, Kenneth G. (ed.) Topics in cryptology – CT-RSA 2021. Cryptographers’ track at the RSA conference 2021, virtual event, May 17–20, 2021. Proceedings. (English) Zbl 1476.94005 Lecture Notes in Computer Science 12704. Cham: Springer (ISBN 978-3-030-75538-6/pbk; 978-3-030-75539-3/ebook). xi, 684 p. (2021). MSC: 94-06 94A60 00B25 PDFBibTeX XMLCite \textit{K. G. Paterson} (ed.), Topics in cryptology -- CT-RSA 2021. Cryptographers' track at the RSA conference 2021, virtual event, May 17--20, 2021. Proceedings. Cham: Springer (2021; Zbl 1476.94005) Full Text: DOI
Dowling, Benjamin; Hansen, Torben Brandt; Paterson, Kenneth G. Many a mickle makes a muckle: a framework for provably quantum-secure hybrid key exchange. (English) Zbl 1500.94023 Ding, Jinta (ed.) et al., Post-quantum cryptography. 11th international conference, PQCrypto 2020, Paris, France, April 15–17, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12100, 483-502 (2020). MSC: 94A60 81P94 PDFBibTeX XMLCite \textit{B. Dowling} et al., Lect. Notes Comput. Sci. 12100, 483--502 (2020; Zbl 1500.94023) Full Text: DOI
Chistikov, Dmitry; Goulko, Olga; Kent, Adrian; Paterson, Mike Globe-hopping. (English) Zbl 1472.82003 Proc. R. Soc. Lond., A, Math. Phys. Eng. Sci. 476, No. 2238, Article ID 20200038, 22 p. (2020). MSC: 82B10 60D05 PDFBibTeX XMLCite \textit{D. Chistikov} et al., Proc. R. Soc. Lond., A, Math. Phys. Eng. Sci. 476, No. 2238, Article ID 20200038, 22 p. (2020; Zbl 1472.82003) Full Text: DOI arXiv Link
Albrecht, Martin R.; Farshim, Pooya; Han, Shuai; Hofheinz, Dennis; Larraia, Enrique; Paterson, Kenneth G. Multilinear maps from obfuscation. (English) Zbl 1457.94090 J. Cryptology 33, No. 3, 1080-1113 (2020). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{M. R. Albrecht} et al., J. Cryptology 33, No. 3, 1080--1113 (2020; Zbl 1457.94090) Full Text: DOI
Paterson, Kenneth G. (ed.); Stebila, Douglas (ed.) Selected areas in cryptography – SAC 2019. 26th international conference, Waterloo, ON, Canada, August 12–16, 2019. Revised selected papers. (English) Zbl 1430.94005 Lecture Notes in Computer Science 11959. Cham: Springer (ISBN 978-3-030-38470-8/pbk; 978-3-030-38471-5/ebook). xv, 715 p. (2020). MSC: 94-06 94A60 00B25 PDFBibTeX XMLCite \textit{K. G. Paterson} (ed.) and \textit{D. Stebila} (ed.), Selected areas in cryptography -- SAC 2019. 26th international conference, Waterloo, ON, Canada, August 12--16, 2019. Revised selected papers. Cham: Springer (2020; Zbl 1430.94005) Full Text: DOI
Galbraith, Steven; Massimo, Jake; Paterson, Kenneth G. Safety in numbers: on the need for robust Diffie-Hellman parameter validation. (English) Zbl 1509.94088 Lin, Dongdai (ed.) et al., Public-key cryptography – PKC 2019. 22nd IACR international conference on practice and theory of public-key cryptography, Beijing, China, April 14–17, 2019. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11443, 379-407 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Galbraith} et al., Lect. Notes Comput. Sci. 11443, 379--407 (2019; Zbl 1509.94088) Full Text: DOI Link
Abdalla, Michel; Benhamouda, Fabrice; Passelègue, Alain; Paterson, Kenneth G. Related-key security for pseudorandom functions beyond the linear barrier. (English) Zbl 1442.94029 J. Cryptology 31, No. 4, 917-964 (2018). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{M. Abdalla} et al., J. Cryptology 31, No. 4, 917--964 (2018; Zbl 1442.94029) Full Text: DOI
Hillebrand, Malcolm; Paterson-Jones, Guy; Kalosakas, George; Skokos, Charalampos Distribution of base pair alternations in a periodic DNA chain: application of Pólya counting to a physical system. (English) Zbl 1397.05015 Regul. Chaotic Dyn. 23, No. 2, 135-151 (2018). MSC: 05A15 92D20 PDFBibTeX XMLCite \textit{M. Hillebrand} et al., Regul. Chaotic Dyn. 23, No. 2, 135--151 (2018; Zbl 1397.05015) Full Text: DOI arXiv
Dowling, Benjamin; Paterson, Kenneth G. A cryptographic analysis of the WireGuard protocol. (English) Zbl 1440.94045 Preneel, Bart (ed.) et al., Applied cryptography and network security. 16th international conference, ACNS 2018, Leuven, Belgium, July 2–4, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10892, 3-21 (2018). MSC: 94A60 68M12 PDFBibTeX XMLCite \textit{B. Dowling} and \textit{K. G. Paterson}, Lect. Notes Comput. Sci. 10892, 3--21 (2018; Zbl 1440.94045) Full Text: DOI
Paterson, Kenneth G.; Schuldt, Jacob C. N. Statistical attacks on cookie masking for RC4. (English) Zbl 1423.94097 Cryptogr. Commun. 10, No. 5, 777-801 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{K. G. Paterson} and \textit{J. C. N. Schuldt}, Cryptogr. Commun. 10, No. 5, 777--801 (2018; Zbl 1423.94097) Full Text: DOI
Bricout, Remi; Murphy, Sean; Paterson, Kenneth G.; van der Merwe, Thyla Analysing and exploiting the Mantin biases in RC4. (English) Zbl 1414.94908 Des. Codes Cryptography 86, No. 4, 743-770 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Bricout} et al., Des. Codes Cryptography 86, No. 4, 743--770 (2018; Zbl 1414.94908) Full Text: DOI Link
Albrecht, Martin R.; Orsini, Emmanuela; Paterson, Kenneth G.; Peer, Guy; Smart, Nigel P. Tightly secure ring-LWE based key encapsulation with short ciphertexts. (English) Zbl 1500.94016 Foley, Simon N. (ed.) et al., Computer security – ESORICS 2017. 22nd European symposium on research in computer security, Oslo, Norway, September 11–15, 2017. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10492, 29-46 (2017). MSC: 94A60 68M25 68P25 PDFBibTeX XMLCite \textit{M. R. Albrecht} et al., Lect. Notes Comput. Sci. 10492, 29--46 (2017; Zbl 1500.94016) Full Text: DOI Link
Paterson, Kenneth G.; Villanueva-Polanco, Ricardo Cold boot attacks on NTRU. (English) Zbl 1429.94064 Patra, Arpita (ed.) et al., Progress in cryptology – INDOCRYPT 2017. 18th international conference on cryptology in India, Chennai, India, December 10–13, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10698, 107-125 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{K. G. Paterson} and \textit{R. Villanueva-Polanco}, Lect. Notes Comput. Sci. 10698, 107--125 (2017; Zbl 1429.94064) Full Text: DOI
Luykx, Atul; Mennink, Bart; Paterson, Kenneth G. Analyzing multi-key security degradation. (English) Zbl 1417.94071 Takagi, Tsuyoshi (ed.) et al., Advances in cryptology – ASIACRYPT 2017. 23rd international conference on the theory and applications of cryptology and information security, Hong Kong, China, December 3–7, 2017. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10625, 575-605 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Luykx} et al., Lect. Notes Comput. Sci. 10625, 575--605 (2017; Zbl 1417.94071) Full Text: DOI Link
Everspaugh, Adam; Paterson, Kenneth; Ristenpart, Thomas; Scott, Sam Key rotation for authenticated encryption. (English) Zbl 1390.94862 Katz, Jonathan (ed.) et al., Advances in cryptology – CRYPTO 2017. 37th annual international cryptology conference, Santa Barbara, CA, USA, August 20–24, 2017. Proceedings. Part III. Cham: Springer (ISBN 978-3-319-63696-2/pbk; 978-3-319-63697-9/ebook). Lecture Notes in Computer Science 10403, 98-129 (2017). MSC: 94A62 PDFBibTeX XMLCite \textit{A. Everspaugh} et al., Lect. Notes Comput. Sci. 10403, 98--129 (2017; Zbl 1390.94862) Full Text: DOI
Laing, Thalia M.; Martin, Keith M.; Paterson, Maura B.; Stinson, Douglas R. Localised multisecret sharing. (English) Zbl 1409.94916 Cryptogr. Commun. 9, No. 5, 581-597 (2017). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{T. M. Laing} et al., Cryptogr. Commun. 9, No. 5, 581--597 (2017; Zbl 1409.94916) Full Text: DOI Link
Degabriele, Jean Paul; Paterson, Kenneth G.; Schuldt, Jacob C. N.; Woodage, Joanne Backdoors in pseudorandom number generators: possibility and impossibility results. (English) Zbl 1379.94036 Robshaw, Matthew (ed.) et al., Advances in cryptology – CRYPTO 2016. 36th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53017-7/pbk; 978-3-662-53018-4/ebook). Lecture Notes in Computer Science 9814, 403-432 (2016). MSC: 94A60 65C10 PDFBibTeX XMLCite \textit{J. P. Degabriele} et al., Lect. Notes Comput. Sci. 9814, 403--432 (2016; Zbl 1379.94036) Full Text: DOI
Albrecht, Martin R.; Paterson, Kenneth G. Lucky microseconds: a timing attack on Amazon’s s2n implementation of TLS. (English) Zbl 1385.94004 Fischlin, Marc (ed.) et al., Advances in cryptology – EUROCRYPT 2016. 35th annual international conference on the theory and applications of cryptographic techniques, Vienna, Austria, May 8–12, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49889-7/pbk; 978-3-662-49890-3/ebook). Lecture Notes in Computer Science 9665, 622-643 (2016). MSC: 94A60 68P25 68M10 PDFBibTeX XMLCite \textit{M. R. Albrecht} and \textit{K. G. Paterson}, Lect. Notes Comput. Sci. 9665, 622--643 (2016; Zbl 1385.94004) Full Text: DOI
Albrecht, Martin R.; Farshim, Pooya; Hofheinz, Dennis; Larraia, Enrique; Paterson, Kenneth G. Multilinear maps from obfuscation. (English) Zbl 1388.94030 Kushilevitz, Eyal (ed.) et al., Theory of cryptography. 13th international conference, TCC 2016-A, Tel Aviv, Israel, January 10–13, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49095-2/pbk; 978-3-662-49096-9/ebook). Lecture Notes in Computer Science 9562, 446-473 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{M. R. Albrecht} et al., Lect. Notes Comput. Sci. 9562, 446--473 (2016; Zbl 1388.94030) Full Text: DOI Link
Paterson, Kenneth G.; Schuldt, Jacob C. N.; Sibborn, Dale L.; Wee, Hoeteck Security against related randomness attacks via reconstructive extractors. (English) Zbl 1376.94042 Groth, Jens (ed.), Cryptography and coding. 15th IMA international conference, IMACC 2015, Oxford, UK, December 15–17, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-27238-2/pbk; 978-3-319-27239-9/ebook). Lecture Notes in Computer Science 9496, 23-40 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{K. G. Paterson} et al., Lect. Notes Comput. Sci. 9496, 23--40 (2015; Zbl 1376.94042) Full Text: DOI
Fischlin, Marc; Günther, Felix; Marson, Giorgia Azzurra; Paterson, Kenneth G. Data is a stream: security of stream-based channels. (English) Zbl 1369.94535 Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-47999-5/pbk; 978-3-662-48000-7/ebook). Lecture Notes in Computer Science 9216, 545-564 (2015). MSC: 94A60 68P30 PDFBibTeX XMLCite \textit{M. Fischlin} et al., Lect. Notes Comput. Sci. 9216, 545--564 (2015; Zbl 1369.94535) Full Text: DOI
Paterson, C.; Wilson, S. K.; Duffy, B. R. Strongly coupled interaction between a ridge of fluid and an inviscid airflow. (English) Zbl 1326.76051 Phys. Fluids 27, No. 7, Paper No. 072104, 25 p. (2015). MSC: 76G25 76B10 35Q35 76D27 PDFBibTeX XMLCite \textit{C. Paterson} et al., Phys. Fluids 27, No. 7, Paper No. 072104, 25 p. (2015; Zbl 1326.76051) Full Text: DOI Link
Paterson, Kenneth; Poettering, Bertram; Schuldt, Jacob Plaintext recovery attacks against WPA/TKIP. (English) Zbl 1382.94152 Cid, Carlos (ed.) et al., Fast software encryption. 21st international workshop, FSE 2014, London, UK, March 3–5, 2014. Revised selected papers. Berlin: Springer (ISBN 978-3-662-46705-3/pbk; 978-3-662-46706-0/ebook). Lecture Notes in Computer Science 8540, 325-349 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Paterson} et al., Lect. Notes Comput. Sci. 8540, 325--349 (2015; Zbl 1382.94152) Full Text: DOI
Liu, Shengli; Paterson, Kenneth G. Simulation-based selective opening CCA security for PKE from key encapsulation mechanisms. (English) Zbl 1319.94078 Katz, Jonathan (ed.), Public-key cryptography – PKC 2015. 18th IACR international conference on practice and theory in public-key cryptography, Gaithersburg, MD, USA, March 30 – April 1, 2015. Proceedings. Berlin: Springer (ISBN 978-3-662-46446-5/pbk; 978-3-662-46447-2/ebook). Lecture Notes in Computer Science 9020, 3-26 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Liu} and \textit{K. G. Paterson}, Lect. Notes Comput. Sci. 9020, 3--26 (2015; Zbl 1319.94078) Full Text: DOI
Jackson, Wen-Ai; Martin, Keith M.; Paterson, Maura B. Applications of Galois geometry to cryptology. (English) Zbl 1361.94040 Storme, Leo (ed.) et al., Current research topics in Galois geometry. New York, NY: Nova Science Publishers/Novinka (ISBN 978-1-63117-340-0/pbk; 978-1-62081-363-8/ebook). Mathematics Research Developments, 215-243 (2014). MSC: 94A60 94A62 94B27 PDFBibTeX XMLCite \textit{W.-A. Jackson} et al., in: Current research topics in Galois geometry. New York, NY: Nova Science Publishers/Novinka. 215--243 (2014; Zbl 1361.94040)
Henry, Kevin; Paterson, Maura B.; Stinson, Douglas R. Practical approaches to varying network size in combinatorial key predistribution schemes. (English) Zbl 1321.94146 Lange, Tanja (ed.) et al., Selected areas in cryptography – SAC 2013. 20th international conference, Burnaby, BC, Canada, August 14–16, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-662-43413-0/pbk; 978-3-662-43414-7/ebook). Lecture Notes in Computer Science 8282, 89-117 (2014). MSC: 94C30 94A60 68R05 05B05 PDFBibTeX XMLCite \textit{K. Henry} et al., Lect. Notes Comput. Sci. 8282, 89--117 (2014; Zbl 1321.94146) Full Text: DOI
Boldyreva, Alexandra; Degabriele, Jean; Paterson, Kenneth; Stam, Martijn On symmetric encryption with distinguishable decryption failures. (English) Zbl 1321.94044 Moriai, Shiho (ed.), Fast software encryption. 20th international workshop, FSE 2013, Washington, DC, USA, March 11–13, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-662-43932-6/pbk; 978-3-662-43933-3/ebook). Lecture Notes in Computer Science 8424, 367-390 (2014). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{A. Boldyreva} et al., Lect. Notes Comput. Sci. 8424, 367--390 (2014; Zbl 1321.94044) Full Text: DOI
Paterson, Kenneth G.; Poettering, Bertram; Schuldt, Jacob C. N. Big bias hunting in Amazonia: large-scale computation and exploitation of RC4 biases (invited paper). (English) Zbl 1306.94082 Sarkar, Palash (ed.) et al., Advances in cryptology – ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-45610-1/pbk). Lecture Notes in Computer Science 8873, 398-419 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{K. G. Paterson} et al., Lect. Notes Comput. Sci. 8873, 398--419 (2014; Zbl 1306.94082) Full Text: DOI
Paterson, C.; Wilson, S. K.; Duffy, B. R. Rivulet flow round a horizontal cylinder subject to a uniform surface shear stress. (English) Zbl 1309.76081 Q. J. Mech. Appl. Math. 67, No. 4, 567-597 (2014). MSC: 76D27 PDFBibTeX XMLCite \textit{C. Paterson} et al., Q. J. Mech. Appl. Math. 67, No. 4, 567--597 (2014; Zbl 1309.76081) Full Text: DOI
Abdalla, Michel; Benhamouda, Fabrice; Passelègue, Alain; Paterson, Kenneth G. Related-key security for pseudorandom functions beyond the linear barrier. (English) Zbl 1343.94035 Garay, Juan A. (ed.) et al., Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-44370-5/pbk). Lecture Notes in Computer Science 8616, 77-94 (2014). MSC: 94A60 65C10 PDFBibTeX XMLCite \textit{M. Abdalla} et al., Lect. Notes Comput. Sci. 8616, 77--94 (2014; Zbl 1343.94035) Full Text: DOI
Bellare, Mihir; Paterson, Kenneth G.; Rogaway, Phillip Security of symmetric encryption against mass surveillance. (English) Zbl 1317.94084 Garay, Juan A. (ed.) et al., Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-44370-5/pbk). Lecture Notes in Computer Science 8616, 1-19 (2014). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{M. Bellare} et al., Lect. Notes Comput. Sci. 8616, 1--19 (2014; Zbl 1317.94084) Full Text: DOI
Paterson, Kenneth G.; Schuldt, Jacob C. N.; Sibborn, Dale L. Related randomness attacks for public key encryption. (English) Zbl 1335.94072 Krawczyk, Hugo (ed.), Public-key cryptography – PKC 2014. 17th international conference on practice and theory in public-key cryptography, Buenos Aires, Argentina, March 26–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54630-3/pbk). Lecture Notes in Computer Science 8383, 465-482 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{K. G. Paterson} et al., Lect. Notes Comput. Sci. 8383, 465--482 (2014; Zbl 1335.94072) Full Text: DOI
Paterson, C.; Wilson, S. K.; Duffy, B. R. Pinning, de-pinning and re-pinning of a slowly varying rivulet. (English) Zbl 1408.76038 Eur. J. Mech., B, Fluids 41, 94-108 (2013). MSC: 76A20 76D08 PDFBibTeX XMLCite \textit{C. Paterson} et al., Eur. J. Mech., B, Fluids 41, 94--108 (2013; Zbl 1408.76038) Full Text: DOI Link
Boyd, Colin; Cremers, Cas; Feltz, Michèle; Paterson, Kenneth G.; Poettering, Bertram; Stebila, Douglas ASICS: Authenticated key exchange security incorporating certification systems. (English) Zbl 1443.94089 Crampton, Jason (ed.) et al., Computer security – ESORICS 2013. 18th European symposium on research in computer security, Egham, UK, September 9–13, 2013. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 8134, 381-399 (2013). MSC: 94A62 PDFBibTeX XMLCite \textit{C. Boyd} et al., Lect. Notes Comput. Sci. 8134, 381--399 (2013; Zbl 1443.94089) Full Text: DOI Link
Çapar, Çağatay; Goeckel, Dennis; Paterson, Kenneth G.; Quaglia, Elizabeth A.; Towsley, Don; Zafer, Murtaza Signal-flow-based analysis of wireless security protocols. (English) Zbl 1277.68029 Inf. Comput. 226, 37-56 (2013). MSC: 68M12 68P25 94A62 PDFBibTeX XMLCite \textit{Ç. Çapar} et al., Inf. Comput. 226, 37--56 (2013; Zbl 1277.68029) Full Text: DOI
Freire, Eduarda S. V.; Hofheinz, Dennis; Paterson, Kenneth G.; Striecks, Christoph Programmable hash functions in the multilinear setting. (English) Zbl 1310.94145 Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-40040-7/pbk). Lecture Notes in Computer Science 8042, 513-530 (2013). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{E. S. V. Freire} et al., Lect. Notes Comput. Sci. 8042, 513--530 (2013; Zbl 1310.94145) Full Text: DOI
Krawczyk, Hugo; Paterson, Kenneth G.; Wee, Hoeteck On the security of the TLS protocol: a systematic analysis. (English) Zbl 1310.94158 Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-40040-7/pbk). Lecture Notes in Computer Science 8042, 429-448 (2013). MSC: 94A60 68M11 68M12 68P25 PDFBibTeX XMLCite \textit{H. Krawczyk} et al., Lect. Notes Comput. Sci. 8042, 429--448 (2013; Zbl 1310.94158) Full Text: DOI
Farshim, Pooya; Libert, Benoît; Paterson, Kenneth G.; Quaglia, Elizabeth A. Robust encryption, revisited. (English) Zbl 1314.94068 Kurosawa, Kaoru (ed.) et al., Public-key cryptography – PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36361-0/pbk). Lecture Notes in Computer Science 7778, 352-368 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{P. Farshim} et al., Lect. Notes Comput. Sci. 7778, 352--368 (2013; Zbl 1314.94068) Full Text: DOI
Freire, Eduarda S. V.; Hofheinz, Dennis; Kiltz, Eike; Paterson, Kenneth G. Non-interactive key exchange. (English) Zbl 1314.94069 Kurosawa, Kaoru (ed.) et al., Public-key cryptography – PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36361-0/pbk). Lecture Notes in Computer Science 7778, 254-271 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{E. S. V. Freire} et al., Lect. Notes Comput. Sci. 7778, 254--271 (2013; Zbl 1314.94069) Full Text: DOI
Freire, Eduarda S. V.; Paterson, Kenneth G.; Poettering, Bertram Simple, efficient and strongly KI-secure hierarchical key assignment schemes. (English) Zbl 1312.94050 Dawson, Ed (ed.), Topics in cryptology – CT-RSA 2013. The cryptographers’ track at the RSA conference 2013, San Francisco, CA, USA, February 25–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36094-7/pbk). Lecture Notes in Computer Science 7779, 101-114 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{E. S. V. Freire} et al., Lect. Notes Comput. Sci. 7779, 101--114 (2013; Zbl 1312.94050) Full Text: DOI
Sullivan, J. M.; Paterson, C.; Wilson, S. K.; Duffy, B. R. A thin rivulet or ridge subject to a uniform transverse shear stress at its free surface due to an external airflow. (English) Zbl 1309.76073 Phys. Fluids 24, No. 8, Paper No. 082109, 19 p. (2012). MSC: 76D08 76F10 76D27 PDFBibTeX XMLCite \textit{J. M. Sullivan} et al., Phys. Fluids 24, No. 8, Paper No. 082109, 19 p. (2012; Zbl 1309.76073) Full Text: DOI Link
Paterson, Kenneth G.; Polychroniadou, Antigoni; Sibborn, Dale L. A coding-theoretic approach to recovering noisy RSA keys. (English) Zbl 1292.94126 Wang, Xiaoyun (ed.) et al., Advances in cryptology – ASIACRYPT 2012. 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2–6, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34960-7/pbk). Lecture Notes in Computer Science 7658, 386-403 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{K. G. Paterson} et al., Lect. Notes Comput. Sci. 7658, 386--403 (2012; Zbl 1292.94126) Full Text: DOI
Bellare, Mihir; Paterson, Kenneth G.; Thomson, Susan RKA security beyond the linear barrier: IBE, encryption and signatures. (English) Zbl 1292.94028 Wang, Xiaoyun (ed.) et al., Advances in cryptology – ASIACRYPT 2012. 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2–6, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34960-7/pbk). Lecture Notes in Computer Science 7658, 331-348 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Bellare} et al., Lect. Notes Comput. Sci. 7658, 331--348 (2012; Zbl 1292.94028) Full Text: DOI
Paterson, Colin; Teunter, Ruud; Glazebrook, Kevin Enhanced lateral transshipments in a multi-location inventory system. (English) Zbl 1253.90030 Eur. J. Oper. Res. 221, No. 2, 317-327 (2012). MSC: 90B05 90C39 PDFBibTeX XMLCite \textit{C. Paterson} et al., Eur. J. Oper. Res. 221, No. 2, 317--327 (2012; Zbl 1253.90030) Full Text: DOI Link
Libert, Benoît; Paterson, Kenneth G.; Quaglia, Elizabeth A. Anonymous broadcast encryption: adaptive security and efficient constructions in the standard model. (English) Zbl 1290.94107 Fischlin, Marc (ed.) et al., Public key cryptography – PKC 2012. 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-30056-1/pbk). Lecture Notes in Computer Science 7293, 206-224 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{B. Libert} et al., Lect. Notes Comput. Sci. 7293, 206--224 (2012; Zbl 1290.94107) Full Text: DOI
Boldyreva, Alexandra; Degabriele, Jean Paul; Paterson, Kenneth G.; Stam, Martijn Security of symmetric encryption in the presence of ciphertext fragmentation. (English) Zbl 1297.94053 Pointcheval, David (ed.) et al., Advances in cryptology – EUROCRYPT 2012. 31st annual international conference on the theory and applications of cryptographic techniques, Cambridge, UK, April 15–19, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29010-7/pbk). Lecture Notes in Computer Science 7237, 682-699 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Boldyreva} et al., Lect. Notes Comput. Sci. 7237, 682--699 (2012; Zbl 1297.94053) Full Text: DOI
Degabriele, Jean Paul; Lehmann, Anja; Paterson, Kenneth G.; Smart, Nigel P.; Strefler, Mario On the joint security of encryption and signature in EMV. (English) Zbl 1292.94053 Dunkelman, Orr (ed.), Topics in cryptology – CT-RSA 2012. The cryptographers’ track at the RSA conference 2012, San Francisco, CA, USA, February 27–March 2, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-27953-9/pbk). Lecture Notes in Computer Science 7178, 116-135 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{J. P. Degabriele} et al., Lect. Notes Comput. Sci. 7178, 116--135 (2012; Zbl 1292.94053) Full Text: DOI
Paterson, Kenneth G.; Watson, Gaven J. Authenticated-encryption with padding: a formal security treatment. (English) Zbl 1285.94111 Naccache, David (ed.), Cryptography and security: From theory to applications. Essays dedicated to Jean-Jacques Quisquater on the occasion of his 65th birthday. Berlin: Springer (ISBN 978-3-642-28367-3/pbk). Lecture Notes in Computer Science 6805, 83-107 (2012). MSC: 94A62 PDFBibTeX XMLCite \textit{K. G. Paterson} and \textit{G. J. Watson}, Lect. Notes Comput. Sci. 6805, 83--107 (2012; Zbl 1285.94111) Full Text: DOI
Martin, Keith M.; Paterson, Maura B.; Stinson, Douglas R. Error decodable secret sharing and one-round perfectly secure message transmission for general adversary structures. (English) Zbl 1235.94056 Cryptogr. Commun. 3, No. 2, 65-86 (2011). MSC: 94A62 94B05 PDFBibTeX XMLCite \textit{K. M. Martin} et al., Cryptogr. Commun. 3, No. 2, 65--86 (2011; Zbl 1235.94056) Full Text: DOI
Albrecht, Martin R.; Paterson, Kenneth G. Breaking an identity-based encryption scheme based on DHIES. (English) Zbl 1291.94042 Chen, Liqun (ed.), Cryptography and coding. 13th IMA international conference, IMACC 2011, Oxford, UK, December 12–15, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25515-1/pbk). Lecture Notes in Computer Science 7089, 344-355 (2011). MSC: 94A60 13P10 PDFBibTeX XMLCite \textit{M. R. Albrecht} and \textit{K. G. Paterson}, Lect. Notes Comput. Sci. 7089, 344--355 (2011; Zbl 1291.94042) Full Text: DOI
Paterson, Kenneth G.; Ristenpart, Thomas; Shrimpton, Thomas Tag size does matter: attacks and proofs for the TLS record protocol. (English) Zbl 1227.94060 Lee, Dong Hoon (ed.) et al., Advances in cryptology – ASIACRYPT 2011. 17th international conference on the theory and application of cryptology and information security, Seoul, South Korea, December 4–8, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25384-3/pbk). Lecture Notes in Computer Science 7073, 372-389 (2011). MSC: 94A60 68M12 94A62 PDFBibTeX XMLCite \textit{K. G. Paterson} et al., Lect. Notes Comput. Sci. 7073, 372--389 (2011; Zbl 1227.94060) Full Text: DOI
Paterson, Kenneth G.; Schuldt, Jacob C. N.; Stam, Martijn; Thomson, Susan On the joint security of encryption and signature, revisited. (English) Zbl 1227.94061 Lee, Dong Hoon (ed.) et al., Advances in cryptology – ASIACRYPT 2011. 17th international conference on the theory and application of cryptology and information security, Seoul, South Korea, December 4–8, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25384-3/pbk). Lecture Notes in Computer Science 7073, 161-178 (2011). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{K. G. Paterson} et al., Lect. Notes Comput. Sci. 7073, 161--178 (2011; Zbl 1227.94061) Full Text: DOI
Albrecht, M. R.; Farshim, P.; Paterson, K. G.; Watson, G. J. On cipher-dependent related-key attacks in the ideal-cipher model. (English) Zbl 1282.94030 Joux, Antoine (ed.), Fast software encryption. 18th international workshop, FSE 2011, Lyngby, Denmark, February 13–16, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-21701-2/pbk). Lecture Notes in Computer Science 6733, 128-145 (2011). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{M. R. Albrecht} et al., Lect. Notes Comput. Sci. 6733, 128--145 (2011; Zbl 1282.94030) Full Text: DOI
Freire, Eduarda S. V.; Paterson, Kenneth G. Provably secure key assignment schemes from factoring. (English) Zbl 1295.94066 Parampalli, Udaya (ed.) et al., Information security and privacy. 16th Australasian conference, ACISP 2011, Melbourne, Australia, July 11–13, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22496-6/pbk). Lecture Notes in Computer Science 6812, 292-309 (2011). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{E. S. V. Freire} and \textit{K. G. Paterson}, Lect. Notes Comput. Sci. 6812, 292--309 (2011; Zbl 1295.94066) Full Text: DOI
Paterson, Kenneth G. (ed.) Advances in cryptology – EUROCRYPT 2011. 30th annual international conference on the theory and applications of cryptographic techniques, Tallinn, Estonia, May 15–19, 2011. Proceedings. (English) Zbl 1214.94003 Lecture Notes in Computer Science 6632. Berlin: Springer (ISBN 978-3-642-20464-7/pbk). xiv, 628 p. (2011). MSC: 94-06 94A60 00B25 PDFBibTeX XMLCite \textit{K. G. Paterson} (ed.), Advances in cryptology -- EUROCRYPT 2011. 30th annual international conference on the theory and applications of cryptographic techniques, Tallinn, Estonia, May 15--19, 2011. Proceedings. Berlin: Springer (2011; Zbl 1214.94003) Full Text: DOI
Blackburn, Simon R.; Etzion, Tuvi; Martin, Keith M.; Paterson, Maura B. Two-dimensional patterns with distinct differences – constructions, bounds, and maximal anticodes. (English) Zbl 1366.94658 IEEE Trans. Inf. Theory 56, No. 3, 1216-1229 (2010). MSC: 94B25 94B65 94B50 PDFBibTeX XMLCite \textit{S. R. Blackburn} et al., IEEE Trans. Inf. Theory 56, No. 3, 1216--1229 (2010; Zbl 1366.94658) Full Text: DOI arXiv
Blackburn, Simon R.; Etzion, Tuvi; Martin, Keith M.; Paterson, Maura B. Distinct difference configurations: multihop paths and key predistribution in sensor networks. (English) Zbl 1366.94547 IEEE Trans. Inf. Theory 56, No. 8, 3961-3972 (2010). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{S. R. Blackburn} et al., IEEE Trans. Inf. Theory 56, No. 8, 3961--3972 (2010; Zbl 1366.94547) Full Text: DOI arXiv
Paterson, Kenneth G.; Quaglia, Elizabeth A. Time-specific encryption. (English) Zbl 1291.68163 Garay, Juan A. (ed.) et al., Security and cryptography for networks. 7th international conference, SCN 2010, Amalfi, Italy, September 13–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-15316-7/pbk). Lecture Notes in Computer Science 6280, 1-16 (2010). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{K. G. Paterson} and \textit{E. A. Quaglia}, Lect. Notes Comput. Sci. 6280, 1--16 (2010; Zbl 1291.68163) Full Text: DOI
Paterson, Kenneth G.; Watson, Gaven J. Plaintext-dependent decryption: a formal security treatment of SSH-CTR. (English) Zbl 1280.94090 Gilbert, Henri (ed.), Advances in cryptology – EUROCRYPT 2010. 29th annual international conference on the theory and applications of cryptographic techniques, French Riviera, May 30 – June 3, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13189-9/pbk). Lecture Notes in Computer Science 6110, 345-361 (2010). MSC: 94A60 PDFBibTeX XMLCite \textit{K. G. Paterson} and \textit{G. J. Watson}, Lect. Notes Comput. Sci. 6110, 345--361 (2010; Zbl 1280.94090) Full Text: DOI
Etzion, Tuvi; Kalouptsidis, Nicholas; Kolokotronis, Nicholas; Limniotis, Konstantinos; Paterson, Kenneth G. Properties of the error linear complexity spectrum. (English) Zbl 1367.94288 IEEE Trans. Inf. Theory 55, No. 10, 4681-4686 (2009). MSC: 94A55 68Q30 PDFBibTeX XMLCite \textit{T. Etzion} et al., IEEE Trans. Inf. Theory 55, No. 10, 4681--4686 (2009; Zbl 1367.94288) Full Text: DOI
Paterson, Kenneth G.; Srinivasan, Sriramkrishnan On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups. (English) Zbl 1174.94014 Des. Codes Cryptography 52, No. 2, 219-241 (2009). MSC: 94A60 PDFBibTeX XMLCite \textit{K. G. Paterson} and \textit{S. Srinivasan}, Des. Codes Cryptography 52, No. 2, 219--241 (2009; Zbl 1174.94014) Full Text: DOI
Paterson, Kenneth G.; Srinivasan, Sriramkrishnan Building key-private public-key encryption schemes. (English) Zbl 1284.94098 Boyd, Colin (ed.) et al., Information security and privacy. 14th Australasian conference, ACISP 2009, Brisbane, Australia, July 1–3, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02619-5/pbk). Lecture Notes in Computer Science 5594, 276-292 (2009). MSC: 94A60 PDFBibTeX XMLCite \textit{K. G. Paterson} and \textit{S. Srinivasan}, Lect. Notes Comput. Sci. 5594, 276--292 (2009; Zbl 1284.94098) Full Text: DOI
Ito, Hiro; Paterson, Mike; Sugihara, Kenya The multi-commodity source location problems and the price of greed. (English) Zbl 1279.90096 J. Graph Algorithms Appl. 13, No. 1, 55-73 (2009). MSC: 90B80 91A43 05C70 PDFBibTeX XMLCite \textit{H. Ito} et al., J. Graph Algorithms Appl. 13, No. 1, 55--73 (2009; Zbl 1279.90096) Full Text: DOI
Boyd, Colin; Cliff, Yvonne; Nieto, Juan M. González; Paterson, Kenneth G. One-round key exchange in the standard model. (English) Zbl 1159.94376 Int. J. Appl. Cryptogr. 1, No. 3, 181-199 (2009). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{C. Boyd} et al., Int. J. Appl. Cryptogr. 1, No. 3, 181--199 (2009; Zbl 1159.94376) Full Text: DOI
Martin, Keith M.; Paterson, Maura An application-oriented framework for wireless sensor network key establishment. (English) Zbl 1277.94061 Di Crescenzo, Giovanni (ed.) et al., Proceedings of the third workshop on cryptography for ad-hoc networks (WCAN 2007), Wrocław, Poland, July 8, 2007. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 192, No. 2, 31-41 (2008). MSC: 94A62 68M10 PDFBibTeX XMLCite \textit{K. M. Martin} and \textit{M. Paterson}, Electron. Notes Theor. Comput. Sci. 192, No. 2, 31--41 (2008; Zbl 1277.94061) Full Text: DOI
Galbraith, Steven D.; Paterson, Kenneth G.; Smart, Nigel P. Pairings for cryptographers. (English) Zbl 1156.94347 Discrete Appl. Math. 156, No. 16, 3113-3121 (2008). MSC: 94A60 PDFBibTeX XMLCite \textit{S. D. Galbraith} et al., Discrete Appl. Math. 156, No. 16, 3113--3121 (2008; Zbl 1156.94347) Full Text: DOI
Paterson, Kenneth G.; Srinivasan, Sriramkrishnan Security and anonymity of identity-based encryption with multiple trusted authorities. (English) Zbl 1186.94465 Galbraith, Steven D. (ed.) et al., Pairing-based cryptography – Pairing 2008. Second international conference, Egham, UK, September 1–3, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85503-3/pbk). Lecture Notes in Computer Science 5209, 354-375 (2008). MSC: 94A60 PDFBibTeX XMLCite \textit{K. G. Paterson} and \textit{S. Srinivasan}, Lect. Notes Comput. Sci. 5209, 354--375 (2008; Zbl 1186.94465) Full Text: DOI
Blackburn, Simon R.; Martin, Keith M.; Paterson, Maura B.; Stinson, Douglas R. Key refreshing in wireless sensor networks. (English) Zbl 1162.94342 Safavi-Naini, Reihaneh (ed.), Information theoretic security. Third international conference, ICITS 2008, Calgary, Canada, August 10–13, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85092-2/pbk). Lecture Notes in Computer Science 5155, 156-170 (2008). MSC: 94A60 68M14 PDFBibTeX XMLCite \textit{S. R. Blackburn} et al., Lect. Notes Comput. Sci. 5155, 156--170 (2008; Zbl 1162.94342) Full Text: DOI
Blackburn, Simon R.; Etzion, Tuvi; Martin, Keith M.; Paterson, Maura B. Efficient key predistribution for grid-based wireless sensor networks. (English) Zbl 1162.68315 Safavi-Naini, Reihaneh (ed.), Information theoretic security. Third international conference, ICITS 2008, Calgary, Canada, August 10–13, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85092-2/pbk). Lecture Notes in Computer Science 5155, 54-69 (2008). MSC: 68M10 68P25 PDFBibTeX XMLCite \textit{S. R. Blackburn} et al., Lect. Notes Comput. Sci. 5155, 54--69 (2008; Zbl 1162.68315) Full Text: DOI
Paterson, Kenneth G.; Watson, Gaven J. Immunising CBC mode against padding oracle attacks: A formal security treatment. (English) Zbl 1180.94060 Ostrovsky, Rafail (ed.) et al., Security and cryptography for networks. 6th international conference, SCN 2008, Amalfi, Italy, September 10–12, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85854-6/pbk). Lecture Notes in Computer Science 5229, 340-357 (2008). MSC: 94A60 68M12 PDFBibTeX XMLCite \textit{K. G. Paterson} and \textit{G. J. Watson}, Lect. Notes Comput. Sci. 5229, 340--357 (2008; Zbl 1180.94060) Full Text: DOI
Galbraith, Steven D. (ed.); Paterson, Kenneth G. (ed.) Pairing-based cryptography – Pairing 2008. Second international conference, Egham, UK, September 1–3, 2008. Proceedings. (English) Zbl 1155.94002 Lecture Notes in Computer Science 5209. Berlin: Springer (ISBN 978-3-540-85503-3/pbk). xi, 377 p. (2008). MSC: 94-06 94A60 00B25 PDFBibTeX XMLCite \textit{S. D. Galbraith} (ed.) and \textit{K. G. Paterson} (ed.), Pairing-based cryptography -- Pairing 2008. Second international conference, Egham, UK, September 1--3, 2008. Proceedings. Berlin: Springer (2008; Zbl 1155.94002) Full Text: DOI
Iwama, Kazuo; Nishimura, Harumichi; Paterson, Mike; Raymond, Rudy; Yamashita, Shigeru Polynomial-time construction of linear network coding. (English) Zbl 1153.68320 Aceto, Luca (ed.) et al., Automata, languages and programming. 35th international colloquium, ICALP 2008, Reykjavik, Iceland, July 7–11, 2008. Proceedings, Part I. Berlin: Springer (ISBN 978-3-540-70574-1/pbk). Lecture Notes in Computer Science 5125, 271-282 (2008). MSC: 68M10 68P30 68R10 PDFBibTeX XMLCite \textit{K. Iwama} et al., Lect. Notes Comput. Sci. 5125, 271--282 (2008; Zbl 1153.68320) Full Text: DOI
Boyd, Colin; Cliff, Yvonne; Gonzalez Nieto, Juan; Paterson, Kenneth G. Efficient one-round key exchange in the standard model. (English) Zbl 1279.94057 Mu, Yi (ed.) et al., Information security and privacy. 13th Australasian conference, ACISP 2008, Wollongong, Australia, July 7–9, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-69971-2/pbk). Lecture Notes in Computer Science 5107, 69-83 (2008). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{C. Boyd} et al., Lect. Notes Comput. Sci. 5107, 69--83 (2008; Zbl 1279.94057) Full Text: DOI Link
Ito, Hiro; Paterson, Mike; Sugihara, Kenya Multi-commodity source location problems and price of greed. (English) Zbl 1132.90343 Nakano, Shin-ichi (ed.) et al., WALCOM: Algorithms and computation. Second international workshop, WALCOM 2008, Dhaka, Bangladesh, February 7–8, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-77890-5/pbk). Lecture Notes in Computer Science 4921, 169-179 (2008). MSC: 90B80 91A43 PDFBibTeX XMLCite \textit{H. Ito} et al., Lect. Notes Comput. Sci. 4921, 169--179 (2008; Zbl 1132.90343) Full Text: DOI
Dent, Alexander W.; Libert, Benoît; Paterson, Kenneth G. Certificateless encryption schemes strongly secure in the standard model. (English) Zbl 1162.94352 Cramer, Ronald (ed.), Public key cryptography – PKC 2008. 11th international workshop on practice and theory in public-key cryptography, Barcelona, Spain, March 9–12, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78440-1/pbk). Lecture Notes in Computer Science 4939, 344-359 (2008). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{A. W. Dent} et al., Lect. Notes Comput. Sci. 4939, 344--359 (2008; Zbl 1162.94352) Full Text: DOI
Schuldt, Jacob C. N.; Matsuura, Kanta; Paterson, Kenneth G. Proxy signatures secure against proxy key exposure. (English) Zbl 1162.94400 Cramer, Ronald (ed.), Public key cryptography – PKC 2008. 11th international workshop on practice and theory in public-key cryptography, Barcelona, Spain, March 9–12, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78440-1/pbk). Lecture Notes in Computer Science 4939, 141-161 (2008). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{J. C. N. Schuldt} et al., Lect. Notes Comput. Sci. 4939, 141--161 (2008; Zbl 1162.94400) Full Text: DOI
Lim, Hoon Wei; Paterson, Kenneth G. Multi-key hierarchical identity-based signatures. (English) Zbl 1154.94467 Galbraith, Steven D. (ed.), Cryptography and coding. 11th IMA international conference, Cirencester, UK, December 18–20, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-77271-2/pbk). Lecture Notes in Computer Science 4887, 384-402 (2007). MSC: 94A62 PDFBibTeX XMLCite \textit{H. W. Lim} and \textit{K. G. Paterson}, Lect. Notes Comput. Sci. 4887, 384--402 (2007; Zbl 1154.94467) Full Text: DOI
Moeltner, Klaus; Boyle, Kevin J.; Paterson, Robert W. Meta-analysis and benefit transfer for resource valuation-addressing classical challenges with Bayesian modeling. (English) Zbl 1243.91087 J. Environ. Econ. Manage. 53, No. 2, 250-269 (2007). MSC: 91B82 91B76 PDFBibTeX XMLCite \textit{K. Moeltner} et al., J. Environ. Econ. Manage. 53, No. 2, 250--269 (2007; Zbl 1243.91087) Full Text: DOI
Paterson, Kenneth G.; Yau, Arnold K. L. Cryptography in theory and practice: the case of encryption in IPsec. (English) Zbl 1129.94034 Vaudenay, Serge (ed.), Advances in cryptology – EUROCRYPT 2006. 25th annual international conference on the theory and applications of cryptographic techniques, St. Petersburg, Russia, May 28 – June 1, 2006. Proceedings. Berlin: Springer (ISBN 3-540-34546-9/pbk). Lecture Notes in Computer Science 4004, 12-29 (2006). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{K. G. Paterson} and \textit{A. K. L. Yau}, Lect. Notes Comput. Sci. 4004, 12--29 (2006; Zbl 1129.94034) Full Text: DOI
Paterson, Kenneth G.; Schuldt, Jacob C. N. Efficient identity-based signatures secure in the standard model. (English) Zbl 1176.94056 Batten, Lynn Margaret (ed.) et al., Information security and privacy. 11th Australasian conference, ACISP 2006, Melbourne, Australia, July 3–5, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-35458-1/pbk). Lecture Notes in Computer Science 4058, 207-222 (2006). MSC: 94A60 94A62 68P25 PDFBibTeX XMLCite \textit{K. G. Paterson} and \textit{J. C. N. Schuldt}, Lect. Notes Comput. Sci. 4058, 207--222 (2006; Zbl 1176.94056) Full Text: DOI
Ennis-King, Jonathan; Preston, Ian; Paterson, Lincoln Onset of convection in anisotropic porous media subject to a rapid change in boundary conditions. (English) Zbl 1187.76141 Phys. Fluids 17, No. 8, Paper No. 084107, 15 p. (2005). MSC: 76-XX PDFBibTeX XMLCite \textit{J. Ennis-King} et al., Phys. Fluids 17, No. 8, Paper No. 084107, 15 p. (2005; Zbl 1187.76141) Full Text: DOI
Etzion, Tuvi; Paterson, Kenneth G. Zero/positive capacities of two-dimensional runlength-constrained arrays. (English) Zbl 1298.94053 IEEE Trans. Inf. Theory 51, No. 9, 3186-3199 (2005). MSC: 94A29 68P20 94A24 PDFBibTeX XMLCite \textit{T. Etzion} and \textit{K. G. Paterson}, IEEE Trans. Inf. Theory 51, No. 9, 3186--3199 (2005; Zbl 1298.94053) Full Text: DOI
Kudla, Caroline; Paterson, Kenneth G. Modular security proofs for key agreement protocols. (English) Zbl 1154.94464 Roy, Bimal (ed.), Advances in cryptology – ASIACRYPT 2005. 11th international conference on the theory and application of cryptology and information security, Chennai, India, December 4–8, 2005, Proceedings. Berlin: Springer (ISBN 978-3-540-30684-9/pbk). Lecture Notes in Computer Science 3788, 549-565 (2005). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{C. Kudla} and \textit{K. G. Paterson}, Lect. Notes Comput. Sci. 3788, 549--565 (2005; Zbl 1154.94464) Full Text: DOI
Kudla, Caroline; Paterson, Kenneth G. Non-interactive designated verifier proofs and undeniable signatures. (English) Zbl 1122.94048 Smart, Nigel P. (ed.), Cryptography and coding. 10th IMA international conference, Cirencester, UK, December 19–21, 2005. Proceedings. Berlin: Springer (ISBN 3-540-30276-X/pbk). Lecture Notes in Computer Science 3796, 136-154 (2005). MSC: 94A62 PDFBibTeX XMLCite \textit{C. Kudla} and \textit{K. G. Paterson}, Lect. Notes Comput. Sci. 3796, 136--154 (2005; Zbl 1122.94048) Full Text: DOI
Yau, Arnold K. L.; Paterson, Kenneth G.; Mitchell, Chris J. Padding oracle attacks on CBC-mode encryption with secret and random IVs. (English) Zbl 1140.68394 Gilbert, Henri (ed.) et al., Fast software encryption. 12th international workshop, FSE 2005, Paris, France, February 21–23, 2005. Revised selected papers. Berlin: Springer (ISBN 3-540-26541-4/pbk). Lecture Notes in Computer Science 3557, 299-319 (2005). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{A. K. L. Yau} et al., Lect. Notes Comput. Sci. 3557, 299--319 (2005; Zbl 1140.68394) Full Text: DOI
Al-Riyami, Sattam S.; Paterson, Kenneth G. CBE from CL-PKE: a generic construction and efficient schemes. (English) Zbl 1081.94514 Vaudenay, Serge (ed.), Public key cryptography – PKC 2005. 8th international workshop on theory and practice in public key cryptography, Les Diablerets, Switzerland, January 23–26, 2005. Proceedings. Berlin: Springer (ISBN 3-540-24454-9/pbk). Lecture Notes in Computer Science 3386, 398-415 (2005). MSC: 94A60 PDFBibTeX XMLCite \textit{S. S. Al-Riyami} and \textit{K. G. Paterson}, Lect. Notes Comput. Sci. 3386, 398--415 (2005; Zbl 1081.94514) Full Text: DOI
Blake, Ian F. (ed.); Seroussi, Gadiel (ed.); Smart, Nigel P. (ed.) [Smart, N. P.; Brown, D.; Dent, A. W.; Oswald, E.; Joye, M.; Vercauteren, F.; Gaudry, P.; Hess, F.; Galbraith, S.; Paterson, K. G.] Advances in elliptic curve cryptography. (English) Zbl 1089.94018 London Mathematical Society Lecture Note Series 317. Cambridge: Cambridge University Press (ISBN 0-521-60415-X). xvi, 281 p. (2005). Reviewer: Juan Tena Ayuso (Valladolid) MSC: 94A60 14G50 94-02 14-02 11G20 PDFBibTeX XMLCite \textit{I. F. Blake} (ed.) et al., Advances in elliptic curve cryptography. Cambridge: Cambridge University Press (2005; Zbl 1089.94018) Full Text: DOI
Paterson, Kenneth G.; Yau, Arnold Padding oracle attacks on the ISO CBC mode encryption standard. (English) Zbl 1196.94064 Okamoto, Tatsuaki (ed.), Topics in cryptology – CT-RSA 2004. The cryptographers’ track at the RSA conference 2004, San Francisco, CA, USA, February 23–27, 2004. Proceedings. Berlin: Springer (ISBN 3-540-20996-4/pbk). Lecture Notes in Computer Science 2964, 305-323 (2004). MSC: 94A60 PDFBibTeX XMLCite \textit{K. G. Paterson} and \textit{A. Yau}, Lect. Notes Comput. Sci. 2964, 305--323 (2004; Zbl 1196.94064) Full Text: DOI
Paterson, K. G. On codes with low peak-to-average power ratio for multicode CDMA. (English) Zbl 1288.94040 IEEE Trans. Inf. Theory 50, No. 3, 550-559 (2004). MSC: 94A29 94B15 PDFBibTeX XMLCite \textit{K. G. Paterson}, IEEE Trans. Inf. Theory 50, No. 3, 550--559 (2004; Zbl 1288.94040) Full Text: DOI
Chen, Liqun; Kudla, Caroline; Paterson, Kenneth G. Concurrent signatures. (English) Zbl 1122.94412 Cachin, Christian (ed.) et al., Advances in cryptology – EUROCRYPT 2004. International conference on the theory and applications of cryptographic techniques, Interlaken, Switzerland, May 2–6, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21935-8/pbk). Lecture Notes in Computer Science 3027, 287-305 (2004). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{L. Chen} et al., Lect. Notes Comput. Sci. 3027, 287--305 (2004; Zbl 1122.94412) Full Text: DOI
Blackburn, Simon R.; Paterson, Kenneth G. Cryptanalysis of a message authentication code due to Cary and Venkatesan. (English) Zbl 1079.68538 Roy, Bimal (ed.) et al., Fast software encryption. 11th international workshop, FSE 2004, Delhi, India, February 5–7, 2004. Revised papers. Berlin: Springer (ISBN 3-540-22171-9/pbk). Lecture Notes in Computer Science 3017, 446-453 (2004). MSC: 68P25 68N99 94A62 PDFBibTeX XMLCite \textit{S. R. Blackburn} and \textit{K. G. Paterson}, Lect. Notes Comput. Sci. 3017, 446--453 (2004; Zbl 1079.68538) Full Text: DOI
Boyd, Colin; Mao, Wenbo; Paterson, Kenneth G. Key agreement using statically keyed authenticators. (English) Zbl 1103.68508 Jakobsson, Markus (ed.) et al., Applied cryptography and network security. Second international conference, ACNS 2004, Yellow Mountain, China, June 8–11, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22217-0/pbk). Lecture Notes in Computer Science 3089, 248-262 (2004). MSC: 68P25 94A60 94A62 PDFBibTeX XMLCite \textit{C. Boyd} et al., Lect. Notes Comput. Sci. 3089, 248--262 (2004; Zbl 1103.68508) Full Text: DOI