Kenny Paterson
Kenny Paterson
Professor of Computer Science, ETH Zurich
Verified email at inf.ethz.ch - Homepage
TitleCited byYear
Certificateless public key cryptography
SS Al-Riyami, KG Paterson
International conference on the theory and application of cryptology and …, 2003
22462003
Pairings for cryptographers
SD Galbraith, KG Paterson, NP Smart
Discrete Applied Mathematics 156 (16), 3113-3121, 2008
7562008
ID-based signatures from pairings on elliptic curves
KG Paterson
Electronics Letters 38 (18), 1025-1026, 2002
5812002
Generalized Reed-Muller codes and power control in OFDM modulation
KG Paterson
IEEE Transactions on Information Theory 46 (1), 104-120, 2000
4082000
Efficient identity-based signatures secure in the standard model
KG Paterson, JCN Schuldt
Australasian Conference on Information Security and Privacy, 207-222, 2006
4032006
Lucky thirteen: Breaking the TLS and DTLS record protocols
NJ Al Fardan, KG Paterson
2013 IEEE Symposium on Security and Privacy, 526-540, 2013
3482013
On the existence and construction of good codes with low peak-to-average power ratios
KG Paterson, V Tarokh
IEEE Transactions on Information Theory 46 (6), 1974-1987, 2000
3192000
CBE from CL-PKE: A generic construction and efficient schemes
SS Al-Riyami, KG Paterson
International Workshop on Public Key Cryptography, 398-415, 2005
2022005
Concurrent signatures
L Chen, C Kudla, KG Paterson
International Conference on the Theory and Applications of Cryptographic …, 2004
1932004
On the Security of RC4 in {TLS}
N AlFardan, DJ Bernstein, KG Paterson, B Poettering, JCN Schuldt
Presented as part of the 22nd {USENIX} Security Symposium ({USENIX} Security …, 2013
1832013
On the security of the TLS protocol: A systematic analysis
H Krawczyk, KG Paterson, H Wee
Annual Cryptology Conference, 429-448, 2013
1772013
Tripartite authenticated key agreement protocols from pairings
SS Al-Riyami, KG Paterson
IMA International Conference on Cryptography and Coding, 332-359, 2003
177*2003
Access control through secure channel using personal identification system
G Seroussi, KG Paterson, W Mao, MT Smith
US Patent 6,836,843, 2004
1602004
Efficient one-round key exchange in the standard model
C Boyd, Y Cliff, JG Nieto, KG Paterson
Australasian Conference on Information Security and Privacy, 69-83, 2008
130*2008
Certificateless encryption schemes strongly secure in the standard model
AW Dent, B Libert, KG Paterson
International Workshop on Public Key Cryptography, 344-359, 2008
1282008
Anonymous broadcast encryption: Adaptive security and efficient constructions in the standard model
B Libert, KG Paterson, EA Quaglia
International Workshop on Public Key Cryptography, 206-224, 2012
1262012
Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol
KG Paterson, T Ristenpart, T Shrimpton
International Conference on the Theory and Application of Cryptology and …, 2011
1242011
Modular security proofs for key agreement protocols
C Kudla, KG Paterson
International conference on the theory and application of cryptology and …, 2005
1152005
Plaintext recovery attacks against SSH
MR Albrecht, KG Paterson, GJ Watson
2009 30th IEEE Symposium on Security and Privacy, 16-26, 2009
1142009
G olay Complementary Sequences
MG Parker, KG Paterson, C Tellambura
Wiley Encyclopedia of Telecommunications, 2003
1122003
The system can't perform the operation now. Try again later.
Articles 1–20