Yvonne Hitchcock
According to our database1,
Yvonne Hitchcock
authored at least 17 papers
between 2002 and 2006.
Collaborative distances:
Collaborative distances:
Timeline
2002
2003
2004
2005
2006
0
1
2
3
4
5
6
7
8
2
4
2
3
3
2
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2006
The importance of proofs of security for key establishment protocols: Formal analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, and Yeh-Sun protocols.
Comput. Commun., 2006
Modular proofs for key exchange: rigorous optimizations in the Canetti-Krawczyk model.
Appl. Algebra Eng. Commun. Comput., 2006
2005
IACR Cryptol. ePrint Arch., 2005
IACR Cryptol. ePrint Arch., 2005
On Session Key Construction in Provably-Secure Key Establishment Protocols: Revisiting Chen & Kudla (2003) and McCullagh & Barreto (2005) ID-Based Protocols.
IACR Cryptol. ePrint Arch., 2005
Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves.
Proceedings of the Selected Areas in Cryptography, 12th International Workshop, 2005
Proceedings of the Progress in Cryptology, 2005
Security Requirements for Key Establishment Proof Models: Revisiting Bellare-Rogaway and Jeong-Katz-Lee Protocols.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005
2004
The efficiency of solving multiple discrete logarithm problems and the implications for the security of fixed elliptic curves.
Int. J. Inf. Sec., 2004
On Session Identifiers in Provably Secure Protocols: The Bellare-Rogaway Three-Party Key Distribution Protocol Revisited.
IACR Cryptol. ePrint Arch., 2004
Proceedings of the Progress in Cryptology, 2004
Proceedings of the Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), 2004
Improvements to the RAK Factoring Algorithm.
Proceedings of the Cryptographic Algorithms and their Uses, 2004
2003
Proceedings of the Progress in Cryptology, 2003
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003
2002
A New Elliptic Curve Scalar Multiplication Algorithm to Resist Simple Power Analysis.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002