The SCEAS System
| |||||||

## Search the dblp DataBase
Yvonne Hitchcock:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
## Publications of Author- Yvonne Hitchcock, Paul Montague
**A New Elliptic Curve Scalar Multiplication Algorithm to Resist Simple Power Analysis.**[Citation Graph (0, 0)][DBLP] ACISP, 2002, pp:214-225 [Conf] - Kim-Kwang Raymond Choo, Yvonne Hitchcock
**Security Requirements for Key Establishment Proof Models: Revisiting Bellare-Rogaway and Jeong-Katz-Lee Protocols.**[Citation Graph (0, 0)][DBLP] ACISP, 2005, pp:429-442 [Conf] - Yvonne Hitchcock, Paul Montague, Gary Carter, Ed Dawson
**The Security of Fixed versus Random Elliptic Curves in Cryptography.**[Citation Graph (0, 0)][DBLP] ACISP, 2003, pp:55-66 [Conf] - Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock
**Examining Indistinguishability-Based Proof Models for Key Establishment Protocols.**[Citation Graph (0, 0)][DBLP] ASIACRYPT, 2005, pp:585-604 [Conf] - Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock
**Errors in Computational Complexity Proofs for Protocols.**[Citation Graph (0, 0)][DBLP] ASIACRYPT, 2005, pp:624-643 [Conf] - Yousef Bani Hammad, Gary Carter, Ed Dawson, Yvonne Hitchcock
**Improvements to the RAK Factoring Algorithm.**[Citation Graph (0, 0)][DBLP] Cryptographic Algorithms and their Uses, 2004, pp:152-0 [Conf] - Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock, Greg Maitland
**Complementing Computational Protocol Analysis with Formal Specifications.**[Citation Graph (0, 0)][DBLP] Formal Aspects in Security and Trust, 2004, pp:129-144 [Conf] - Yvonne Hitchcock, Colin Boyd, Juan Manuel González Nieto
**Tripartite Key Exchange in the Canetti-Krawczyk Proof Model.**[Citation Graph (0, 0)][DBLP] INDOCRYPT, 2004, pp:17-32 [Conf] - Yvonne Hitchcock, Yiu Shing Terry Tin, Juan Manuel González Nieto, Colin Boyd, Paul Montague
**A Password-Based Authenticator: Security Proof and Applications.**[Citation Graph (0, 0)][DBLP] INDOCRYPT, 2003, pp:388-401 [Conf] - Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock
**On Session Key Construction in Provably-Secure Key Establishment Protocols.**[Citation Graph (0, 0)][DBLP] Mycrypt, 2005, pp:116-131 [Conf] - Sanggon Lee, Yvonne Hitchcock, Youngho Park, Sangjae Moon
**Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves.**[Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 2005, pp:205-220 [Conf] - Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock, Greg Maitland
**On Session Identifiers in Provably Secure Protocols: The Bellare-Rogaway Three-Party Key Distribution Protocol Revisited.**[Citation Graph (0, 0)][DBLP] SCN, 2004, pp:351-366 [Conf] - Yvonne Hitchcock, Colin Boyd, Juan Manuel González Nieto
**Modular proofs for key exchange: rigorous optimizations in the Canetti-Krawczyk model.**[Citation Graph (0, 0)][DBLP] Appl. Algebra Eng. Commun. Comput., 2006, v:16, n:6, pp:405-438 [Journal] - Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock
**The importance of proofs of security for key establishment protocols: Formal analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, and Yeh-Sun protocols.**[Citation Graph (0, 0)][DBLP] Computer Communications, 2006, v:29, n:15, pp:2788-2797 [Journal] - Yvonne Hitchcock, Paul Montague, Gary Carter, Ed Dawson
**The efficiency of solving multiple discrete logarithm problems and the implications for the security of fixed elliptic curves.**[Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2004, v:3, n:2, pp:86-98 [Journal]
Search in 0.003secs, Finished in 0.003secs | |||||||

| |||||||

| |||||||

System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002 for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002 |