Search the dblp DataBase
Kenneth G. Paterson :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Kenneth G. Paterson , Jacob C. N. Schuldt Efficient Identity-Based Signatures Secure in the Standard Model. [Citation Graph (0, 0)][DBLP ] ACISP, 2006, pp:207-222 [Conf ] Colin Boyd , Wenbo Mao , Kenneth G. Paterson Key Agreement Using Statically Keyed Authenticators. [Citation Graph (0, 0)][DBLP ] ACNS, 2004, pp:248-262 [Conf ] Sattam S. Al-Riyami , Kenneth G. Paterson Certificateless Public Key Cryptography. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2003, pp:452-473 [Conf ] Caroline Kudla , Kenneth G. Paterson Modular Security Proofs for Key Agreement Protocols. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2005, pp:549-565 [Conf ] Andreas Fuchsberger , Dieter Gollmann , Paul J. G. Lothian , Kenneth G. Paterson , Abraham Sidiropoulos Public-key Cryptography on Smart Cards. [Citation Graph (0, 0)][DBLP ] Cryptography: Policy and Algorithms, 1995, pp:250-269 [Conf ] Kenneth G. Paterson , Arnold K. L. Yau Padding Oracle Attacks on the ISO CBC Mode Encryption Standard. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2004, pp:305-323 [Conf ] Steven D. Galbraith , Wenbo Mao , Kenneth G. Paterson RSA-Based Undeniable Signatures for General Moduli. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2002, pp:200-217 [Conf ] Hoon Wei Lim , Kenneth G. Paterson Identity-Based Cryptography for Grid Security. [Citation Graph (0, 0)][DBLP ] e-Science, 2005, pp:395-404 [Conf ] Liqun Chen , Caroline Kudla , Kenneth G. Paterson Concurrent Signatures. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2004, pp:287-305 [Conf ] Kenneth G. Paterson , Arnold K. L. Yau Cryptography in Theory and Practice: The Case of Encryption in IPsec. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2006, pp:12-29 [Conf ] Simon R. Blackburn , Kenneth G. Paterson Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan. [Citation Graph (0, 0)][DBLP ] FSE, 2004, pp:446-453 [Conf ] Kenneth G. Paterson Imprimitive Permutation Groups and Trapdoors in Iterated Block Ciphers. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1999, pp:201-214 [Conf ] Arnold K. L. Yau , Kenneth G. Paterson , Chris J. Mitchell Padding Oracle Attacks on CBC-Mode Encryption with Secret and Random IVs. [Citation Graph (0, 0)][DBLP ] FSE, 2005, pp:299-319 [Conf ] Sattam S. Al-Riyami , Kenneth G. Paterson Tripartite Authenticated Key Agreement Protocols from Pairings. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2003, pp:332-359 [Conf ] Caroline Kudla , Kenneth G. Paterson Non-interactive Designated Verifier Proofs and Undeniable Signatures. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2005, pp:136-154 [Conf ] Kenneth G. Paterson Applications of Exponential Sums in Communications Theory. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 1999, pp:1-24 [Conf ] Shane Balfe , Amit D. Lakhani , Kenneth G. Paterson Trusted Computing: Providing Security for Peer-to-Peer Networks. [Citation Graph (0, 0)][DBLP ] Peer-to-Peer Computing, 2005, pp:117-124 [Conf ] Sattam S. Al-Riyami , Kenneth G. Paterson CBE from CL-PKE: A Generic Construction and Efficient Schemes. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2005, pp:398-415 [Conf ] Jean Paul Degabriele , Kenneth G. Paterson Attacking the IPsec Standards in Encryption-only Configurations. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2007, pp:335-349 [Conf ] Colin Boyd , Wenbo Mao , Kenneth G. Paterson Deniable Authenticated Key Establishment for Internet Protocols. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2003, pp:255-271 [Conf ] Chris J. Mitchell , Kenneth G. Paterson Decoding Perfect Maps. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 1994, v:4, n:1, pp:11-30 [Journal ] Kenneth G. Paterson Perfect Factors in the de Bruijn Graph. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 1995, v:5, n:2, pp:115-138 [Journal ] Kenneth G. Paterson Root Counting, the DFT and the Linear Complexity of Nonlinear Filtering. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 1998, v:14, n:3, pp:247-259 [Journal ] Simon R. Blackburn , Tuvi Etzion , Kenneth G. Paterson Permutation Polynomials, de Bruijn Sequences, and Linear Complexity. [Citation Graph (0, 0)][DBLP ] J. Comb. Theory, Ser. A, 1996, v:76, n:1, pp:55-82 [Journal ] Glenn Hurlbert , Chris J. Mitchell , Kenneth G. Paterson On the Existence of de Bruijn Tori with Two by Two Windows. [Citation Graph (0, 0)][DBLP ] J. Comb. Theory, Ser. A, 1996, v:76, n:2, pp:213-230 [Journal ] Kenneth G. Paterson New Classes of Perfect Maps I. [Citation Graph (0, 0)][DBLP ] J. Comb. Theory, Ser. A, 1996, v:73, n:2, pp:302-334 [Journal ] Kenneth G. Paterson New Classes of Perfect Maps II. [Citation Graph (0, 0)][DBLP ] J. Comb. Theory, Ser. A, 1996, v:73, n:2, pp:335-345 [Journal ] Sean Murphy , Kenneth G. Paterson , Peter R. Wild A Weak Cipher that Generates the Symmetric Group. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1994, v:7, n:1, pp:61-65 [Journal ] Chris J. Mitchell , Kenneth G. Paterson Perfect Factors from Cyclic Codes and Interleaving. [Citation Graph (0, 0)][DBLP ] SIAM J. Discrete Math., 1998, v:11, n:2, pp:241-264 [Journal ] Simon R. Blackburn , Sean Murphy , Kenneth G. Paterson Comments on "Theory and Applications of Cellular Automata in Cryptography". [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 1997, v:46, n:5, pp:637-638 [Journal ] Tuvi Etzion , Kenneth G. Paterson Zero/Positive Capacities of Two-Dimensional Runlength-Constrained Arrays. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2005, v:51, n:9, pp:3186-3199 [Journal ] Tuvi Etzion , Kenneth G. Paterson Near optimal single-track Gray codes. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1996, v:42, n:3, pp:779-789 [Journal ] Alain P. Hiltgen , Kenneth G. Paterson Single-track circuit codes. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2001, v:47, n:6, pp:2587-2595 [Journal ] Alain P. Hiltgen , Kenneth G. Paterson , M. Brandestini Single-track Gray codes. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1996, v:42, n:5, pp:1555-1561 [Journal ] Alan G. B. Lauder , Kenneth G. Paterson Computing the error linear complexity spectrum of a binary sequence of period 2n . [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2003, v:49, n:1, pp:273-280 [Journal ] Chris J. Mitchell , Tuvi Etzion , Kenneth G. Paterson A method for constructing decodable de Bruijn sequences. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1996, v:42, n:5, pp:1472-1478 [Journal ] Kenneth G. Paterson Generalized Reed-Muller codes and power control in OFDM modulation. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2000, v:46, n:1, pp:104-120 [Journal ] Kenneth G. Paterson Perfect maps. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1994, v:40, n:3, pp:743-753 [Journal ] Kenneth G. Paterson Binary Sequence Sets with Favorable Correlations from Difference Sets and MDS Codes. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1998, v:44, n:1, pp:172-180 [Journal ] Kenneth G. Paterson , Paul J. G. Lothian Bounds on Partial Correlations of Sequences. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1998, v:44, n:3, pp:1164-1175 [Journal ] Kenneth G. Paterson , Vahid Tarokh On the existence and construction of good codes with low peak-to-average power ratios. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2000, v:46, n:6, pp:1974-1987 [Journal ] Kenneth G. Paterson , Jonathan Tuliani Some New Circuit Codes. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1998, v:44, n:3, pp:1305-1309 [Journal ] Efficient One-Round Key Exchange in the Standard Model. [Citation Graph (, )][DBLP ] Building Key-Private Public-Key Encryption Schemes. [Citation Graph (, )][DBLP ] Trust management for secure information flows. [Citation Graph (, )][DBLP ] e-EMV: emulating EMV for internet payments with trusted computing technologies. [Citation Graph (, )][DBLP ] Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR. [Citation Graph (, )][DBLP ] Augmenting Internet-Based Card Not Present Transactions with Trusted Computing (Extended Abstract). [Citation Graph (, )][DBLP ] Multi-key Hierarchical Identity-Based Signatures. [Citation Graph (, )][DBLP ] Proxy Signatures Secure Against Proxy Key Exposure. [Citation Graph (, )][DBLP ] Certificateless Encryption Schemes Strongly Secure in the Standard Model. [Citation Graph (, )][DBLP ] Time-Specific Encryption. [Citation Graph (, )][DBLP ] Immunising CBC Mode Against Padding Oracle Attacks: A Formal Security Treatment. [Citation Graph (, )][DBLP ] Plaintext Recovery Attacks against SSH. [Citation Graph (, )][DBLP ] Secret Public Key Protocols Revisited. [Citation Graph (, )][DBLP ] Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities. [Citation Graph (, )][DBLP ] What can identity-based cryptography offer to web services? [Citation Graph (, )][DBLP ] Pairings for cryptographers. [Citation Graph (, )][DBLP ] On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups. [Citation Graph (, )][DBLP ] Search in 0.043secs, Finished in 0.047secs