Kenneth G. Paterson
Orcid: 0000-0002-5145-4489Affiliations:
- Department of Computer Science, ETH Zurich, Switzerland
- Royal Holloway University of London, Information Security Group, UK (former)
According to our database1,
Kenneth G. Paterson
authored at least 187 papers
between 1994 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on twitter.com
-
on id.loc.gov
-
on d-nb.info
On csauthors.net:
Bibliography
2024
Des. Codes Cryptogr., May, 2024
Proc. Priv. Enhancing Technol., January, 2024
IEEE Internet Things J., January, 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
SoK: Efficient Design and Implementation of Polynomial Hash Functions over Prime Fields.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Proc. Priv. Enhancing Technol., 2021
IACR Cryptol. ePrint Arch., 2021
Leakage Perturbation is Not Enough: Breaking Structured Encryption Using Simulated Annealing.
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Many a Mickle Makes a Muckle: A Framework for Provably Quantum-Secure Hybrid Key Exchange.
IACR Cryptol. ePrint Arch., 2020
2019
IACR Trans. Symmetric Cryptol., 2019
Message Time of Arrival Codes: A Fundamental Primitive for Secure Distance Measurement.
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Catch Me (On Time) If You Can: Understanding the Effectiveness of Twitter URL Blacklists.
CoRR, 2019
2018
Frequency-smoothing encryption: preventing snapshot attacks on deterministically encrypted data.
IACR Trans. Symmetric Cryptol., 2018
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018
J. Cryptol., 2018
IACR Cryptol. ePrint Arch., 2018
Pump up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries.
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Commun. ACM, 2018
Proceedings of the Internet Measurement Conference 2018, 2018
2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Progress in Cryptology - INDOCRYPT 2017, 2017
2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Security Standardisation Research - Third International Conference, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
IACR Cryptol. ePrint Arch., 2015
Simulation-based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms.
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the 24th USENIX Security Symposium, 2015
A Practical Attack Against the Use of RC4 in the HIVE Hidden Volume Encryption System.
Proceedings of the 10th ACM Symposium on Information, 2015
2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Unpicking PLAID - A Cryptographic Analysis of an ISO-standards-track Authentication Protocol.
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Big Bias Hunting in Amazonia: Large-Scale Computation and Exploitation of RC4 Biases (Invited Paper).
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014
2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model.
Proceedings of the Public Key Cryptography - PKC 2012, 2012
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Proceedings of the Cryptography and Security: From Theory to Applications, 2012
2011
Int. J. Inf. Sec., 2011
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011
2010
Secur. Commun. Networks, 2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Information Security - 13th International Conference, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2009
On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups.
Des. Codes Cryptogr., 2009
Proceedings of the 30th IEEE Symposium on Security and Privacy (SP 2009), 2009
09311 Abstracts Collection - Classical and Quantum Information Assurance Foundations and Practice.
Proceedings of the Classical and Quantum Information Assurance Foundations and Practice, 26.07., 2009
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009
2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008
Proceedings of the Public Key Cryptography, 2008
Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities.
Proceedings of the Pairing-Based Cryptography, 2008
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008
Augmenting Internet-Based Card Not Present Transactions with Trusted Computing (Extended Abstract).
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008
Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, 2008
2007
IACR Cryptol. ePrint Arch., 2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of the 4th ACM Workshop On Secure Web Services, 2007
Proceedings of the Cryptography and Coding, 2007
2006
IACR Cryptol. ePrint Arch., 2006
2005
IEEE Trans. Inf. Theory, 2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the Public Key Cryptography, 2005
Proceedings of the Fifth IEEE International Conference on Peer-to-Peer Computing (P2P 2005), 31 August, 2005
Proceedings of the Cryptography and Coding, 2005
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005
Proceedings of the Advances in Cryptology, 2005
2004
IEEE Trans. Inf. Theory, 2004
IACR Cryptol. ePrint Arch., 2004
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004
Proceedings of the Topics in Cryptology, 2004
Proceedings of the Applied Cryptography and Network Security, 2004
2003
Computing the error linear complexity spectrum of a binary sequence of period 2<sup>n</sup>.
IEEE Trans. Inf. Theory, 2003
A comparison between traditional public key infrastructures and identity-based cryptography.
Inf. Secur. Tech. Rep., 2003
IACR Cryptol. ePrint Arch., 2003
Proceedings of the Security Protocols, 2003
2002
IACR Cryptol. ePrint Arch., 2002
IACR Cryptol. ePrint Arch., 2002
Proceedings of the Topics in Cryptology, 2002
2001
Proceedings of the Sequences and their Applications, 2001
2000
On the existence and construction of good codes with low peak-to-average power ratios.
IEEE Trans. Inf. Theory, 2000
IEEE Trans. Inf. Theory, 2000
IEEE Trans. Commun., 2000
1999
Proceedings of the Cryptography and Coding, 1999
Proceedings of the Fast Software Encryption, 6th International Workshop, 1999
1998
IEEE Trans. Inf. Theory, 1998
Des. Codes Cryptogr., 1998
Proceedings of the 9th IEEE International Symposium on Personal, 1998
1997
IEEE Trans. Computers, 1997
1996
IEEE Trans. Inf. Theory, 1996
J. Comb. Theory A, 1996
1995
Discret. Math., 1995
Proceedings of the Cryptography: Policy and Algorithms, 1995
1994