Professor Kenny Paterson

  1. 2018
  2. Published

    Prime and Prejudice: Primality Testing Under Adversarial Conditions

    Albrecht, M., Paterson, K., Massimo, J. & Somorovsky, J. 15 Oct 2018 25th ACM Conference on Computer and Communications Security 2018. p. 281-298 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Cold Boot Attacks on Ring and Module LWE Keys Under the NTT

    Albrecht, M., Paterson, K. & Deo, R. 14 Aug 2018 In : TCHES. 2018, 3, p. 173-213 41 p.

    Research output: Contribution to journalArticle

  4. E-pub ahead of print

    A cryptographic analysis of the WireGuard protocol

    Dowling, B. & Paterson, K. G. 10 Jun 2018 Applied Cryptography and Network Security - 16th International Conference, ACNS 2018, Proceedings. Springer-Verlag, Vol. 10892 LNCS, p. 3-21 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10892 LNCS)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Frequency-smoothing encryption: preventing snapshot attacks on deterministically encrypted data

    Lacharite, M-S. & Paterson, K. 1 Mar 2018 IACR Transactions on Symmetric Cryptology. 1 ed. Ruhr-Universität Bochum, Vol. 2018, p. 277-313 37 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage

    Lacharite, M-S., Minaud, B. & Paterson, K. 2018 2018 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, p. 1-18 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. 2017
  8. Published

    Analyzing multi-key security degradation

    Luykx, A., Mennink, B. & Paterson, K. G. 1 Dec 2017 Advances in Cryptology – ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Proceedings. Springer-Verlag, Vol. 10625 LNCS, p. 575-605 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10625 LNCS)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Cold boot attacks on NTRU

    Paterson, K. G. & Villanueva-Polanco, R. 1 Dec 2017 Progress in Cryptology – INDOCRYPT 2017 - 18th International Conference on Cryptology in India, Proceedings. Springer-Verlag, Vol. 10698 LNCS, p. 107-125 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10698 LNCS)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts

    Albrecht, M., Paterson, K., Orsini, E., Smart, N. & Peer, G. 12 Aug 2017 Computer Security – ESORICS 2017. Springer, p. 29-46 18 p. (Lecture Notes in Computer Science; vol. 10492)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Key rotation for authenticated encryption

    Everspaugh, A., Paterson, K., Ristenpart, T. & Scott, S. 1 Aug 2017 Advances in Cryptology – CRYPTO 2017 - 37th Annual International Cryptology Conference, Proceedings. Springer-Verlag, Vol. 10403, p. 98-129 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10403 LNCS)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    ASICS: authenticated key exchange security incorporating certification systems

    Boyd, C., Cremers, C., Feltz, M., Paterson, K., Poettering, B. & Stebila, D. 1 Apr 2017 In : International Journal of Information Security. 16, 2, p. 151-171 21 p.

    Research output: Contribution to journalArticle

  13. E-pub ahead of print

    Analysing and Exploiting the Mantin Biases in RC4

    Bricout, R., Murphy, S., Paterson, K. & Van Der Merwe, T. 28 Mar 2017 In : Designs, Codes and Cryptography. p. 1-28 28 p.

    Research output: Contribution to journalArticle

  14. 2016
  15. Published

    Building a Community of Real-World Cryptographers

    Boneh, D., Paterson, K. & Smart, N. P. 14 Dec 2016 In : IEEE Security and Privacy Magazine. 14, 6, p. 7-9 3 p.

    Research output: Contribution to journalArticle

  16. Published

    Reactive and Proactive Standardisation of TLS

    Paterson, K. & Merwe, T. V. D. 2 Nov 2016 Security Standardisation Research - Third International Conference, SSR 2016, Gaithersburg, MD, USA, December 5-6, 2016, Proceedings. Chen, L., McGrew, D. A. & Mitchell, C. (eds.). Springer Verlag, Vol. 10074, p. 160-186 27 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol

    Degabriele, J. P., Fehr, V., Fischlin, M., Gagliardoni, T., Günther, F., Marson, G. A., Mittelbach, A. & Paterson, K. 1 Nov 2016 In : International Journal of Information Security. 15, 6, p. 637-657 21 p.

    Research output: Contribution to journalArticle

  18. Published

    A Surfeit of SSH Cipher Suites

    Albrecht, M., Paterson, K., Degabriele, J. & Hansen, T. 24 Oct 2016 Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 1480-1491 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results

    Degabriele, J., Paterson, K., Schuldt, J. & Woodage, J. 21 Jul 2016 Advances in Cryptology – CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I. Robshaw, M. & Katz, J. (eds.). Springer Berlin / Heidelberg, Vol. 9814, p. 403-432 30 p. (Lecture Notes in Computer Science ; vol. 9814)

    Research output: Chapter in Book/Report/Conference proceedingChapter

  20. Published

    Lucky Microseconds: A Timing Attack on Amazon’s s2n Implementation of TLS

    Albrecht, M. & Paterson, K. 28 Apr 2016 Advances in Cryptology – EUROCRYPT 2016: 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I. Vol. 9665, p. 622-643 22 p. (Lecture Notes in Computer Science; vol. 9665)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. 2015
  22. Published

    Multilinear Maps from Obfuscation

    Albrecht, M., Farshim, P., Hofheinz, D., Larraia de Vega, E. & Paterson, K. 19 Dec 2015 Theory of Cryptography. Kushilevitz, E. & Malkin, T. (eds.). Springer, Vol. 9562, p. 446-473 27 p. (Lecture Notes in Computer Science; vol. 9562)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Security Against Related Randomness Attacks via Reconstructive Extractors

    Paterson, K., Sibborn, D., Schuldt, J. & Wee, H. 8 Dec 2015 Cryptography and Coding - 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings. Groth, J. (ed.). Springer Verlag, Vol. 9496, p. 23-40 18 p. (Lecture Notes in Computer Science; vol. 9496)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Data Is a Stream: Security of Stream-Based Channels

    Fischlin, M., Guenther, F., Paterson, K. & Marson, G. A. 1 Aug 2015 Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II. Gennaro, R. & Robshaw, M. (eds.). Springer Verlag, Vol. 9216, p. 545-564 20 p. (LNCS)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Attacks Only Get Better: Password Recovery Attacks Against RC4 in TLS

    Garman, C., Paterson, K. & Van Der Merwe, T. Jul 2015 USENIX Security 2015. USENIX Association, p. 113-128

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. E-pub ahead of print
  27. Published

    A Practical Attack Against the Use of RC4 in the HIVE Hidden Volume Encryption System

    Paterson, K. G. & Strefler, M. 2015 Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '15, Singapore, April 14-17, 2015. Bao, F., Miller, S., Zhou, J. & Ahn, G-J. (eds.). ACM, p. 475-482 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Simulation-Based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms

    Liu, S. & Paterson, K. G. 2015 Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings. Katz, J. (ed.). Springer, Vol. 9020, p. 3-26 24 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. 2014
  30. Published

    Big Bias Hunting in Amazonia: Large-Scale Computation and Exploitation of RC4 Biases (Invited Paper)

    Paterson, K. G., Poettering, B. & Schuldt, J. C. N. 2014 Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I. Sarkar, P. & Iwata, T. (eds.). Springer, p. 398-419 22 p. (Lecture Notes in Computer Science; vol. 8873)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    On Symmetric Encryption with Distinguishable Decryption Failures

    Boldyreva, A., Degabriele, J. P., Paterson, K. & Stam, M. 2014 FSE 2013. Moriai, S. (ed.). Springer, Vol. 8424, p. 1–24 24 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    Plaintext Recovery Attacks Against WPA/TKIP

    Paterson, K. G., Poettering, B. & Schuldt, J. C. N. 2014 Fast Software Encryption - 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papers. p. 325-349 25 p. (Lecture Notes in Computer Science; vol. 8540)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Related Randomness Attacks for Public Key Encryption

    Paterson, K. G., Schuldt, J. C. N. & Sibborn, D. L. 2014 PKC 2014. Krawczyk, H. (ed.). Springer, Vol. 8383, p. 465-482 18 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier

    Abdalla, M., Benhamouda, F., Passelègue, A. & Paterson, K. G. 2014 Advances in Cryptology - CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I. Garay, J. & Gennaro, R. (eds.). Springer, Vol. 8616, p. 77-94 18 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Security of Symmetric Encryption against Mass Surveillance

    Bellare, M., Paterson, K. G. & Rogaway, P. 2014 Advances in Cryptology - CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I. Garay, J. & Gennaro, R. (eds.). Springer, Vol. 8616, p. 1-19 19 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Unpicking PLAID

    Degabriele, J. P., Fehr, V., Fischlin, M., Gagliardoni, T., Guenther, F., Marson, G. A., Mittelbach, A. & Paterson, K. G. 2014 Security Standardisation Research. Chen, L. & Mitchell, C. (eds.). Springer International Publishing, Vol. 8893, p. 1-25 25 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  37. 2013
  38. Published

    ASICS: Authenticated Key Exchange Security Incorporating Certification Systems

    Boyd, C., Cremers, C., Feltz, M., Paterson, K., Poettering, B. & Stebila, D. Sep 2013 ESORICS 2013. Springer, Vol. 8134, p. 381-399 19 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    On the Security of RC4 in TLS

    Alfardan, N., Bernstein, D. J., Paterson, K., Poettering, B. & Schuldt, J. Aug 2013 USENIX Security Symposium. USENIX

    Research output: Chapter in Book/Report/Conference proceedingChapter

  40. Published

    On the Security of the TLS Protocol: A Systematic Analysis

    Krawczyk, H., Paterson, K. G. & Wee, H. Aug 2013 Advances in Cryptology – CRYPTO 2013: 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings. Garay, . J. A. & Canetti, . R. (eds.). Springer, Vol. 1, p. 429-448 (Lecture Notes in Computer Science; vol. 8042)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Programmable Hash Functions in the Multilinear Setting

    Freire, E. S. V., Hofheinz, D., Paterson, K. G. & Striecks, C. Aug 2013 CRYPTO 2013 (1). Canetti, R. & J. G. (eds.). Springer, Vol. 8042, p. 513-530 18 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Signal-flow-based analysis of wireless security protocols

    Capar, C., Paterson, K., Goeckel, D., Quaglia, E., Towsley, D. & Zafer, M. May 2013 In : Information and Computation. 226, p. 37–56

    Research output: Contribution to journalArticle

  43. Published

    One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography

    Jager, T., Paterson, K. & Somorovsky, J. 24 Apr 2013 Network and Distributed System Security Symposium.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    Lucky Thirteen: Breaking the TLS and DTLS Record Protocols

    Al Fardan, N. J. & Paterson, K. G. 2013 2013 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, p. 526-540 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    Non-Interactive Key Exchange

    Freire, E. S. V., Hofheinz, D., Kiltz, E. & Paterson, K. G. 2013 PKC 2013. Kurosawa, K. & Hanaoka, G. (eds.). Springer, Vol. 7778, p. 254-271 18 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Robust Encryption, Revisited

    Farshim, P., Libert, B., Paterson, K. G. & Quaglia, E. A. 2013 PKC 2013. Kurosawa, K. & Hanaoka, G. (eds.). Springer, Vol. 7778, p. 352-368 17 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes

    Freire, E. S. V., Paterson, K. G. & Poettering, B. 2013 CT-RSA 2013. Dawson, E. (ed.). Springer, Vol. 7779, p. 101-114 14 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. 2012
  49. Published

    A Coding-Theoretic Approach to Recovering Noisy RSA Keys

    Paterson, K., Polychroniadou, A. & Sibborn, D. 2012 ASIACRYPT 2012. Wang, X. & Sako, K. (eds.). Springer, Vol. 7658, p. 386-403 (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model

    Libert, B., Paterson, K. & Quaglia, E. 2012 Public Key Cryptography. Fischlin, M., Buchmann, J. & Manulis, M. (eds.). Springer, Vol. 7293, p. 206-224 (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    Authenticated-Encryption with Padding: A Formal Security Treatment

    Paterson, K. G. & Watson, G. J. 2012 Cryptography and Security. Naccache, D. (ed.). Springer, Vol. 6805, p. 83-107 25 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    On the Joint Security of Encryption and Signature in EMV

    Degabriele, J. P., Lehmann, A., Paterson, K. G., Smart, N. P. & Strefler, M. 2012 CT-RSA. Dunkelmann, O. (ed.). Springer, Vol. 7178, p. 116-135 20 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    Plaintext-Recovery Attacks Against Datagram TLS

    Alfardan, N. & Paterson, K. 2012 Network and Distributed System Security Symposium. The Internet Society

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Published

    RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures

    Bellare, M., Paterson, K. & Thomson, S. 2012 ASIACRYPT. Wang, X. & Sako, K. (eds.). Springer, Vol. 7658, p. 331-348 18 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Published

    Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation

    Boldyreva, A., Degabriele, J. P., Paterson, K. G. & Stam, M. 2012 EUROCRYPT. Pointcheval, D. & Johansson, T. (eds.). Springer, Vol. 7237, p. 682-699 18 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. 2011
  57. Published

    Breaking An Identity-Based Encryption Scheme based on DHIES

    Albrecht, M. & Paterson, K. 2011 IMA International Conference on Cryptography and Coding. Chen, L. (ed.). Springer, Vol. 7089, p. 344-355 (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. Published

    Identity-Based Cryptography for Grid Security

    Lim, H. W. & Paterson, K. 2011 In : International Journal of Information Security. 10, 1, p. 15-32

    Research output: Contribution to journalArticle

  59. Published

    On Cipher-Dependent Related-Key Attacks in the Ideal Cipher Model

    Albrecht, M., Farshim, P., Paterson, K. & Watson, G. 2011 Fast Software Encryption (FSE). Joux, A. (ed.). Springer, Vol. 6733, p. 128-145 (Lecutre Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Published

    On the Joint Security of Encryption and Signature, Revisited

    Paterson, K., Thomson, S., Schuldt, J. & Stam, M. 2011 ASIACRYPT. Lee, D. H. & Wang, X. (eds.). Springer, Vol. 7073, p. 161-178 (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. Published

    Proceedings, Eurocrypt 2011

    Paterson, K. 2011 Springer

    Research output: Other contribution

  62. Published

    Provable Security in the Real World

    Degabriele, J. P., Paterson, K. & Watson, G. 2011 In : IEEE Security and Privacy Magazine. 9, 3, p. 33-41

    Research output: Contribution to journalArticle

  63. Published

    Provably Secure Key Assignment Schemes from Factoring

    Freire, E. S. V. & Paterson, K. G. 2011 ACISP. Parampalli, U. & Hawkes, P. (eds.). Springer, Vol. 6812, p. 292-309 (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Published

    Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol

    Paterson, K. G., Ristenpart, T. & Shrimpton, T. 2011 Advances in Cryptology – ASIACRYPT 2011: 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011: Proceedings. Lee, D. H. & Wang, X. (eds.). Springer, p. 372-389 (Lecture Notes in Computer Science; vol. 7073)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  65. Published

    User-friendly and certificate-free grid security infrastructure

    Crampton, J., Lim, H. W., Paterson, K. G. & Price, G. 2011 In : International Journal of Information Security. 10, 3, p. 137-153 17 p.

    Research output: Contribution to journalArticle

  66. 2010
  67. Published

    A guide to trust in mobile ad hoc networks

    Balfe, S., Paterson, K. & Yau, P-W. 2010 In : Security and Communication Networks. 3, 6, p. 503-516

    Research output: Contribution to journalArticle

  68. Published

    An Analysis of DepenDNS

    Alfardan, N. & Paterson, K. 2010 Information Security. Springer, Vol. 6531, p. 31-37 (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Published

    Identity crisis: on the problem of namespace design for ID-PKC and MANETs

    Balfe, S., McDonald, A., Paterson, K. & Phillips, H. 2010 In : Security and Communication Networks. 3, 6, p. 535-545

    Research output: Contribution to journalArticle

  70. Published

    On the (in)security of IPsec in MAC-then-encrypt configurations

    Degabriele, J. P. & Paterson, K. G. 2010 CCS '10 Proceedings of the 17th ACM conference on Computer and communications security. New York: ACM, p. 493-504

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. Published

    One-time-password-authenticated key exchange

    Paterson, K. G. & Stebila, D. 2010 ACISP. Steinfeld, R. & Hawkes, P. (eds.). Springer, p. 264-281 18 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingChapter

  72. Published

    Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR

    Paterson, K. G. & Watson, G. J. 2010 Advances in Cryptology – EUROCRYPT 2010: 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30 – June 3, 2010: Proceedings. Gilbert, H. (ed.). Springer, p. 345-361 17 p. (Lecture Notes in Computer Science; vol. 6110)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Published

    Time Specific Encryption

    Paterson, K. & Quaglia, E. 2010 SCN. Springer, Vol. 6280, p. 1-16 16 p. (Lecture Notes in Computer Science; vol. 6280)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. 2009
  75. Published

    Building key-private, public-key encryption schemes

    Paterson, K. G. & Srinivasan, S. 2009 ACISP. Boyd, C. & Neito, J. (eds.). Springer, p. 276-292 17 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingChapter

  76. Published

    On the Relations Between Non-Interactive Key Distribution, Identity-Based Encryption and Trapdoor Discrete Log Groups.

    Paterson, K. G. & Srinivasan, S. 2009 In : Designs, Codes and Cryptography. 52, p. 219-241 23 p.

    Research output: Contribution to journalArticle

  77. Published

    One-round key exchange in the standard model

    Boyd, C., Cliff, Y., Nieto, J. M. G. & Paterson, K. G. 2009 In : International Journal of Applied Cryptography. 1, 3, p. 181-199 19 p.

    Research output: Contribution to journalArticle

  78. Published

    Plaintext Recovery Attacks Against SSH

    Albrecht, M. R., Paterson, K. G. & Watson, G. J. 2009 Proceedings of the 2009 30th IEEE Symposium on Security and Privacy: 17-20 May 2009 / Berkley, CA, US. IEEE Computer Society, p. 16-26 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Published

    Properties of the Error Linear Complexity Spectrum

    Etzion, T., Kalouptsidis, N., Kolokotronis, N., Limniotis, K. & Paterson, K. G. 2009 In : IEEE Transactions on Information Theory. 55, 10, p. 4681-4686 6 p.

    Research output: Contribution to journalArticle

  80. Published

    Secret Public Key Protocols Revisited

    Lim, H. W. & Paterson, K. G. 2009 Security Protocols. Christianson, B. (ed.). Springer, p. 237-256 20 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingChapter

  81. 2008
  82. Published

    Augmenting Internet-based Card-not-present Transactions with Trusted Computing: An Analysis

    Balfe, S. & Paterson, K. G. 2008 Financial Cryptography. Tsudik, G. (ed.). Springer, p. 171-175 5 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingChapter

  83. Published

    Certificateless Encryption Schemes Strongly Secure in the Standard Model

    Dent, A. W., Libert, B. & Paterson, K. G. 2008 Public Key Cryptography. Cramer, R. (ed.). Springer-Verlag, (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingChapter

  84. Published

    Challenges for Trusted Computing

    Balfe, S., Gallery, E., Mitchell, C. J. & Paterson, K. G. 2008 In : IEEE Security and Privacy Magazine. Nov./Dec., p. 60-66 7 p.

    Research output: Contribution to journalArticle

  85. Published

    Crimeware and Trusted Computing

    Balfe, S., Gallery, E., Mitchell, C. J. & Paterson, K. G. 2008 Crimeware: Understanding New Attacks and Defenses. Jacobsson, M. & Ramzan, Z. (eds.). Addison-Wesley/Symantec Press

    Research output: Chapter in Book/Report/Conference proceedingChapter

  86. Published

    e-EMV: Emulating EMV for Internet Payments with Trusted Computing Technologies

    Balfe, S. & Paterson, K. G. 2008 Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing (STC 2008). Xu, S., Nita-Rotaru, C. & Seifert, J. P. (eds.). ACM, p. 81-92 12 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  87. Published

    Efficient one round key exchange in the standard model

    Boyd, C., Cliff, Y., Nieto, J. M. G. & Paterson, K. G. 2008 ACISP. Mu, Y., Susilo, W. & Seberry, J. (eds.). Springer, p. 69-83 15 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingChapter

  88. Published

    Flexible and Secure Communications in an Identity-Based, Coalition Environment.

    Boklan, K. D., Klagsbrun, Z., Paterson, K. G. & Srinivasan., S. 2008 IEEE Milcom, 2008..

    Research output: Chapter in Book/Report/Conference proceedingChapter

  89. Published

    Immunising CBC Mode Against Padding Oracle Attacks: A Formal Security Treatment

    Paterson, K. G. & Watson, G. J. 2008 SCN. Ostrovsky, R., Prisco, R. D. & Visconti, I. (eds.). Springer, Vol. 5229, p. 340-357 18 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingChapter

  90. Published

    Pairing 2008

    Galbraith, S. D. (ed.) & Paterson, K. G. (ed.) 2008 Springer. (Lecture Notes in Computer Science)

    Research output: Book/ReportBook

  91. Published

    Pairings for Cryptographers

    Galbraith, S. D., Paterson, K. G. & Smart, N. P. 2008 In : Discrete Applied Mathematics. 156, p. 3113-3121.

    Research output: Contribution to journalArticle

  92. Published

    Proxy Signatures Secure Against Proxy Key Exposure

    Schdult, J. C. N., Matsuura, K. & Paterson, K. G. 2008 Public Key Cryptography. Cramer, R. (ed.). Springer, Vol. 4939, p. 344-359 16 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingChapter

  93. Published

    Security and Anonymity of Identity-based Encryption with Multiple Trusted Authorities

    Paterson, K. G. & Srinivasan, S. 2008 Pairing 2008. Galbraith, S. D. & Paterson, K. G. (eds.). Springer, p. 354-375 22 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingChapter

  94. Published

    Trust Management For Secure Information Flows

    Srivatsa, M., Balfe, S., Paterson, K. G. & Rohatgi, P. 2008 Proceedings of the 2008 ACM Conference on Computer and Communications Security (CCS 2008). Ning, P., Syverson, P. F. & Jha, S. (eds.). ACM Press, p. 175-188 14 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  95. 2007
  96. Published

    A Certificate-Free Grid Security Infrastructure Supporting Password-Based User Authentication

    Crampton, J., Lim, H. W., Paterson, K. G. & Price, G. 2007 6th Annual PKI R&D Workshop 2007, Gaithersburg, MD, USA. 17-19 April.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  97. Published

    Attacking the IPsec Standards in Encryption-only Configurations

    Degabriele, J. P. & Paterson, K. G. 2007 IEEE Symposium on Privacy and Security. IEEE Computer Society Press, p. 335-349 15 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  98. Published

    Key Refreshing in Identity-based Cryptography and its Applications in MANETs

    Balfe, S., Boklan, K., Klagsbrun, Z. & Paterson, K. G. 2007 IEEE Milcom 2007.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  99. Published

    Multi-key Hierarchical Identity-based Signatures

    Lim, H. W. & Paterson, K. G. 2007 Eleventh IMA International Conference on Cryptography and Coding. Galbraith, S. D. & Paterson, K. G. (eds.). Springer, p. 384-402 19 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingChapter

  100. Published

    Quantum Cryptography: A Practical Information Security Perspective

    Paterson, K. G., Piper, F. C. & Schack, R. 2007 Quantum Communication and Security. Zukowski, M., Kilin, S. & Kowalik, J. (eds.). IOS Press, p. 175-180 6 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  101. Published

    What Can Identity-Based Cryptography Offer to Web Services?

    Crampton, J., Lim, H. W. & Paterson, K. G. 2007 Proceedings of the 5th ACM Workshop on Secure Web Services (SWS 2007), Alexandria, Virginia, USA.. ACM Press, p. 26-36 11 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  102. 2006
  103. Published

    A cryptographic tour of the IPsec standards

    Paterson, K. G. 2006 In : Information Security Technical Report. 11, 2, p. 72-81 10 p.

    Research output: Contribution to journalArticle

  104. Published

    An attack on some multi-party key agreement protocols

    Paterson, K. G. 2006 In : IEE Proceedings on Information Security. 153, 2, p. 59-60 2 p.

    Research output: Contribution to journalArticle

  105. Published

    Cryptography in theory and practice: The case of encryption in IPsec

    Paterson, K. G. & Yau, A. K. L. 2006 Eurocrypt 2006. Vaudenay, S. (ed.). Springer, p. 12-29 18 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingChapter

  106. Published

    Efficient identity-based signatures secure in the standard model

    Paterson, K. G. & Schuldt, J. C. N. 2006 ACISP 2006. Batten, L. M. & Safavi-Naini, R. (eds.). Springer, p. 207-222 16 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingChapter

  107. Published

    Information Security

    Crampton, J., Paterson, K. G., Piper, F. & Robshaw, M. J. B. 2006 Handbook of Security. Gill, M. (ed.). Palgrave Macmillan, p. 358-379 22 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  108. Published

    Lost in translation: theory and practice in cryptography

    Paterson, K. G. & Yau, A. K. L. 2006 In : IEEE Security and Privacy Magazine. 4, 3, p. 69-72 4 p.

    Research output: Contribution to journalArticle

  109. 2005
  110. Published

    CBE from CL-PKE: a generic construction and efficient schemes

    Al-Riyami, S. S. & Paterson, K. G. 2005 PKC 2005. Vaudenay, S. (ed.). Springer, p. 398-415 18 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingChapter

  111. Published

    Cryptography from Pairings

    Paterson, K. G. 2005 Advances in Elliptic Curve Cryptography. Blake, I. F., Seroussi, G. & Smart, N. P. (eds.). Cambridge University Press, p. 215-251 37 p. (London Mathematical Society Lecture Note Series)

    Research output: Chapter in Book/Report/Conference proceedingChapter

  112. Published

    Deniable authenticated key establishment for Internet protocols

    Boyd, C., Mao, W. & Paterson, K. G. 2005 Security Protocols, 11th International Workshop, Revised Selected Papers. Christianson, B., Crispo, B., Malcolm, J. A. & Roe, M. (eds.). Springer, p. 255-271 17 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingChapter

  113. Published

    Identity-Based Cryptography for Grid Security

    Lim, H. W. & Paterson, K. G. 2005 Proceedings of the 1st IEEE International Conference on e-Science and Grid Computing (e-Science 2005). Stockinger, H., Buyya, R. & Perrott, R. (eds.). IEEE Computer Society Press, p. 395-404 10 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  114. Published

    Modular security proofs for key agreement protocols

    Kudla, C. J. & Paterson, K. G. 2005 Proc. Asiacrypt 2005. Roy, B. (ed.). Springer, p. 549-565 17 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingChapter

Previous 1 2 Next