Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Kenneth G. Paterson
Search web for home page
Program Committees
1
2013
Eurocrypt
pc
2
2012
Asiacrypt
pc
3
2012
Crypto
pc
4
2011
Eurocrypt
pc chair
5
2011
Crypto
pc
6
2010
PKC
pc
7
2009
PKC
pc
8
2008
Eurocrypt
pc
9
2007
Crypto
pc
10
2006
Eurocrypt
pc
11
2006
PKC
pc
12
2006
Asiacrypt
pc
Publications
year
title
booktitle
pages
1
2012
Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model
pkc
206-224
2
2012
Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation
eurocrypt
682-699
3
2011
Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol
asiacrypt
372-389
4
2011
On the Joint Security of Encryption and Signature, Revisited
asiacrypt
161-178
5
2011
Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings
eurocrypt
6
2011
On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model
fse
128
7
2010
Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR
eurocrypt
345-361
8
2010
Time-Specific Encryption
eprint
online
9
2010
Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR
eprint
online
10
2008
Efficient One-round Key Exchange in the Standard Model
eprint
online
11
2008
Proxy Signatures Secure Against Proxy Key Exposure
pkc
141-161
12
2008
Certificateless Encryption Schemes Strongly Secure in the Standard Model
pkc
344-359
13
2007
Certificateless Encryption Schemes Strongly Secure in the Standard Model
eprint
online
14
2007
Attacking the IPsec Standards in Encryption-only Configurations
eprint
online
15
2007
On the Relations Between Non-Interactive Key Distribution, Identity-Based Encryption and Trapdoor Discrete Log Groups
eprint
online
16
2006
Efficient Identity-based Signatures Secure in the Standard Model
eprint
online
17
2006
A Cryptographic Tour of the IPsec Standards
eprint
online
18
2006
An Attack on a Certificateless Signature Scheme
eprint
online
19
2006
Cryptography in Theory and Practice: The Case of Encryption in IPsec
eurocrypt
online
20
2006
Pairings for Cryptographers
eprint
online
21
2005
Modular Security Proofs for Key Agreement Protocols
asiacrypt
online
22
2005
Padding Oracle Attacks on CBC-Mode Encryption with Secret and Random IVs
fse
online
23
2005
Cryptography in Theory and Practice: The Case of Encryption in IPsec
eprint
online
24
2005
CBE from CL-PKE: A Generic Construction and Efficient Schemes
pkc
online
25
2004
Concurrent Signatures
eurocrypt
online
26
2004
Why Quantum Cryptography?
eprint
online
27
2004
Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan
fse
446-453
28
2003
Certificateless Public Key Cryptography
asiacrypt
online
29
2003
Certificateless Public Key Cryptography
eprint
online
30
2003
Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan
eprint
online
31
2002
ID-based Signatures from Pairings on Elliptic Curves
eprint
online
32
2002
Tripartite Authenticated Key Agreement Protocols from Pairings
eprint
online
33
1999
Imprimitive Permutation Groups and Trapdoors in Iterated Block Ciphers
fse
201-214
34
1994
A Weak Cipher that Generates the Symmetric Group
jofc
61-65
Coauthors of Kenneth G. Paterson
Sattam S. Al-Riyami
Martin R. Albrecht
Simon R. Blackburn
Alexandra Boldyreva
Colin Boyd
Xuefei Cao
Liqun Chen
Yvonne Cliff
Jean Paul Degabriele
Alexander W. Dent
Pooya Farshim
Steven D. Galbraith
Weidong Kou
Caroline Kudla
Benoît Libert
Kanta Matsuura
Chris J. Mitchell
Sean Murphy
Juan Manuel González Nieto
Fred Piper
Elizabeth A. Quaglia
Herman J. J. te Riele
Thomas Ristenpart
Ruediger Schack
Jacob C. N. Schuldt
Thomas Shrimpton
Nigel P. Smart
Sriramkrishnan Srinivasan
Martijn Stam
Susan Thomson
Gaven J. Watson
Peter R. Wild
Arnold K. L. Yau