Kenny Paterson
Kenny Paterson
Professor of Computer Science, ETH Zurich
Verified email at - Homepage
Cited by
Cited by
Certificateless public key cryptography
SS Al-Riyami, KG Paterson
International conference on the theory and application of cryptology and …, 2003
Pairings for cryptographers
SD Galbraith, KG Paterson, NP Smart
Discrete Applied Mathematics 156 (16), 3113-3121, 2008
ID-based signatures from pairings on elliptic curves
KG Paterson
Cryptology ePrint Archive, 2002
Lucky thirteen: Breaking the TLS and DTLS record protocols
NJ Al Fardan, KG Paterson
2013 IEEE symposium on security and privacy, 526-540, 2013
Generalized Reed-Muller codes and power control in OFDM modulation
KG Paterson
IEEE Transactions on Information Theory 46 (1), 104-120, 2000
Efficient identity-based signatures secure in the standard model
KG Paterson, JCN Schuldt
Australasian conference on information security and privacy, 207-222, 2006
On the existence and construction of good codes with low peak-to-average power ratios
KG Paterson, V Tarokh
IEEE Transactions on Information Theory 46 (6), 1974-1987, 2000
Decentralized privacy-preserving proximity tracing
C Troncoso, M Payer, JP Hubaux, M Salathé, J Larus, E Bugnion, ...
arXiv preprint arXiv:2005.12273, 2020
On the security of the TLS protocol: A systematic analysis
H Krawczyk, KG Paterson, H Wee
Annual Cryptology Conference, 429-448, 2013
On the Security of RC4 in TLS
N AlFardan, DJ Bernstein, KG Paterson, B Poettering, JCN Schuldt
22nd USENIX Security Symposium (USENIX Security 13), 305-320, 2013
Concurrent signatures
L Chen, C Kudla, KG Paterson
International Conference on the Theory and Applications of Cryptographic …, 2004
CBE from CL-PKE: A generic construction and efficient schemes
SS Al-Riyami, KG Paterson
International Workshop on Public Key Cryptography, 398-415, 2005
Tripartite authenticated key agreement protocols from pairings
SS Al-Riyami, KG Paterson
IMA International Conference on Cryptography and Coding, 332-359, 2003
Anonymous broadcast encryption: Adaptive security and efficient constructions in the standard model
B Libert, KG Paterson, EA Quaglia
International Workshop on Public Key Cryptography, 206-224, 2012
Access control through secure channel using personal identification system
G Seroussi, KG Paterson, W Mao, MT Smith
US Patent 6,836,843, 2004
Security of symmetric encryption against mass surveillance
M Bellare, KG Paterson, P Rogaway
Annual Cryptology Conference, 1-19, 2014
Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol
KG Paterson, T Ristenpart, T Shrimpton
International Conference on the Theory and Application of Cryptology and …, 2011
Efficient one-round key exchange in the standard model
C Boyd, Y Cliff, J Gonzalez Nieto, KG Paterson
Australasian Conference on Information Security and Privacy, 69-83, 2008
Certificateless encryption schemes strongly secure in the standard model
AW Dent, B Libert, KG Paterson
International workshop on public key cryptography, 344-359, 2008
Improved reconstruction attacks on encrypted data using range query leakage
MS Lacharité, B Minaud, KG Paterson
2018 IEEE Symposium on Security and Privacy (SP), 297-314, 2018
The system can't perform the operation now. Try again later.
Articles 1–20