The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Yvonne Hitchcock: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yvonne Hitchcock, Paul Montague
    A New Elliptic Curve Scalar Multiplication Algorithm to Resist Simple Power Analysis. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:214-225 [Conf]
  2. Kim-Kwang Raymond Choo, Yvonne Hitchcock
    Security Requirements for Key Establishment Proof Models: Revisiting Bellare-Rogaway and Jeong-Katz-Lee Protocols. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:429-442 [Conf]
  3. Yvonne Hitchcock, Paul Montague, Gary Carter, Ed Dawson
    The Security of Fixed versus Random Elliptic Curves in Cryptography. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:55-66 [Conf]
  4. Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock
    Examining Indistinguishability-Based Proof Models for Key Establishment Protocols. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2005, pp:585-604 [Conf]
  5. Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock
    Errors in Computational Complexity Proofs for Protocols. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2005, pp:624-643 [Conf]
  6. Yousef Bani Hammad, Gary Carter, Ed Dawson, Yvonne Hitchcock
    Improvements to the RAK Factoring Algorithm. [Citation Graph (0, 0)][DBLP]
    Cryptographic Algorithms and their Uses, 2004, pp:152-0 [Conf]
  7. Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock, Greg Maitland
    Complementing Computational Protocol Analysis with Formal Specifications. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2004, pp:129-144 [Conf]
  8. Yvonne Hitchcock, Colin Boyd, Juan Manuel González Nieto
    Tripartite Key Exchange in the Canetti-Krawczyk Proof Model. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:17-32 [Conf]
  9. Yvonne Hitchcock, Yiu Shing Terry Tin, Juan Manuel González Nieto, Colin Boyd, Paul Montague
    A Password-Based Authenticator: Security Proof and Applications. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2003, pp:388-401 [Conf]
  10. Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock
    On Session Key Construction in Provably-Secure Key Establishment Protocols. [Citation Graph (0, 0)][DBLP]
    Mycrypt, 2005, pp:116-131 [Conf]
  11. Sanggon Lee, Yvonne Hitchcock, Youngho Park, Sangjae Moon
    Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2005, pp:205-220 [Conf]
  12. Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock, Greg Maitland
    On Session Identifiers in Provably Secure Protocols: The Bellare-Rogaway Three-Party Key Distribution Protocol Revisited. [Citation Graph (0, 0)][DBLP]
    SCN, 2004, pp:351-366 [Conf]
  13. Yvonne Hitchcock, Colin Boyd, Juan Manuel González Nieto
    Modular proofs for key exchange: rigorous optimizations in the Canetti-Krawczyk model. [Citation Graph (0, 0)][DBLP]
    Appl. Algebra Eng. Commun. Comput., 2006, v:16, n:6, pp:405-438 [Journal]
  14. Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock
    The importance of proofs of security for key establishment protocols: Formal analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, and Yeh-Sun protocols. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:15, pp:2788-2797 [Journal]
  15. Yvonne Hitchcock, Paul Montague, Gary Carter, Ed Dawson
    The efficiency of solving multiple discrete logarithm problems and the implications for the security of fixed elliptic curves. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2004, v:3, n:2, pp:86-98 [Journal]

Search in 0.003secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002