Search the dblp DataBase
Yvonne Hitchcock :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Yvonne Hitchcock , Paul Montague A New Elliptic Curve Scalar Multiplication Algorithm to Resist Simple Power Analysis. [Citation Graph (0, 0)][DBLP ] ACISP, 2002, pp:214-225 [Conf ] Kim-Kwang Raymond Choo , Yvonne Hitchcock Security Requirements for Key Establishment Proof Models: Revisiting Bellare-Rogaway and Jeong-Katz-Lee Protocols. [Citation Graph (0, 0)][DBLP ] ACISP, 2005, pp:429-442 [Conf ] Yvonne Hitchcock , Paul Montague , Gary Carter , Ed Dawson The Security of Fixed versus Random Elliptic Curves in Cryptography. [Citation Graph (0, 0)][DBLP ] ACISP, 2003, pp:55-66 [Conf ] Kim-Kwang Raymond Choo , Colin Boyd , Yvonne Hitchcock Examining Indistinguishability-Based Proof Models for Key Establishment Protocols. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2005, pp:585-604 [Conf ] Kim-Kwang Raymond Choo , Colin Boyd , Yvonne Hitchcock Errors in Computational Complexity Proofs for Protocols. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2005, pp:624-643 [Conf ] Yousef Bani Hammad , Gary Carter , Ed Dawson , Yvonne Hitchcock Improvements to the RAK Factoring Algorithm. [Citation Graph (0, 0)][DBLP ] Cryptographic Algorithms and their Uses, 2004, pp:152-0 [Conf ] Kim-Kwang Raymond Choo , Colin Boyd , Yvonne Hitchcock , Greg Maitland Complementing Computational Protocol Analysis with Formal Specifications. [Citation Graph (0, 0)][DBLP ] Formal Aspects in Security and Trust, 2004, pp:129-144 [Conf ] Yvonne Hitchcock , Colin Boyd , Juan Manuel González Nieto Tripartite Key Exchange in the Canetti-Krawczyk Proof Model. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2004, pp:17-32 [Conf ] Yvonne Hitchcock , Yiu Shing Terry Tin , Juan Manuel González Nieto , Colin Boyd , Paul Montague A Password-Based Authenticator: Security Proof and Applications. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2003, pp:388-401 [Conf ] Kim-Kwang Raymond Choo , Colin Boyd , Yvonne Hitchcock On Session Key Construction in Provably-Secure Key Establishment Protocols. [Citation Graph (0, 0)][DBLP ] Mycrypt, 2005, pp:116-131 [Conf ] Sanggon Lee , Yvonne Hitchcock , Youngho Park , Sangjae Moon Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2005, pp:205-220 [Conf ] Kim-Kwang Raymond Choo , Colin Boyd , Yvonne Hitchcock , Greg Maitland On Session Identifiers in Provably Secure Protocols: The Bellare-Rogaway Three-Party Key Distribution Protocol Revisited. [Citation Graph (0, 0)][DBLP ] SCN, 2004, pp:351-366 [Conf ] Yvonne Hitchcock , Colin Boyd , Juan Manuel González Nieto Modular proofs for key exchange: rigorous optimizations in the Canetti-Krawczyk model. [Citation Graph (0, 0)][DBLP ] Appl. Algebra Eng. Commun. Comput., 2006, v:16, n:6, pp:405-438 [Journal ] Kim-Kwang Raymond Choo , Colin Boyd , Yvonne Hitchcock The importance of proofs of security for key establishment protocols: Formal analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, and Yeh-Sun protocols. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:29, n:15, pp:2788-2797 [Journal ] Yvonne Hitchcock , Paul Montague , Gary Carter , Ed Dawson The efficiency of solving multiple discrete logarithm problems and the implications for the security of fixed elliptic curves. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2004, v:3, n:2, pp:86-98 [Journal ] Search in 0.003secs, Finished in 0.003secs