Certificateless public key cryptography SS Al-Riyami, KG Paterson International conference on the theory and application of cryptology and …, 2003 | 3302 | 2003 |
Pairings for cryptographers SD Galbraith, KG Paterson, NP Smart Discrete Applied Mathematics 156 (16), 3113-3121, 2008 | 1121 | 2008 |
ID-based signatures from pairings on elliptic curves KG Paterson Cryptology ePrint Archive, 2002 | 672 | 2002 |
Lucky thirteen: Breaking the TLS and DTLS record protocols NJ Al Fardan, KG Paterson 2013 IEEE symposium on security and privacy, 526-540, 2013 | 589 | 2013 |
Generalized Reed-Muller codes and power control in OFDM modulation KG Paterson IEEE Transactions on Information Theory 46 (1), 104-120, 2000 | 553 | 2000 |
Efficient identity-based signatures secure in the standard model KG Paterson, JCN Schuldt Australasian conference on information security and privacy, 207-222, 2006 | 497 | 2006 |
On the existence and construction of good codes with low peak-to-average power ratios KG Paterson, V Tarokh IEEE Transactions on Information Theory 46 (6), 1974-1987, 2000 | 352 | 2000 |
Decentralized privacy-preserving proximity tracing C Troncoso, M Payer, JP Hubaux, M Salathé, J Larus, E Bugnion, ... arXiv preprint arXiv:2005.12273, 2020 | 339 | 2020 |
On the security of the TLS protocol: A systematic analysis H Krawczyk, KG Paterson, H Wee Annual Cryptology Conference, 429-448, 2013 | 274 | 2013 |
On the Security of RC4 in TLS N AlFardan, DJ Bernstein, KG Paterson, B Poettering, JCN Schuldt 22nd USENIX Security Symposium (USENIX Security 13), 305-320, 2013 | 266 | 2013 |
Security of symmetric encryption against mass surveillance M Bellare, KG Paterson, P Rogaway Advances in Cryptology–CRYPTO 2014: 34th Annual Cryptology Conference, Santa …, 2014 | 222 | 2014 |
Concurrent signatures L Chen, C Kudla, KG Paterson Advances in Cryptology-EUROCRYPT 2004: International Conference on the …, 2004 | 221 | 2004 |
Anonymous broadcast encryption: Adaptive security and efficient constructions in the standard model B Libert, KG Paterson, EA Quaglia Public Key Cryptography–PKC 2012: 15th International Conference on Practice …, 2012 | 219 | 2012 |
CBE from CL-PKE: A generic construction and efficient schemes SS Al-Riyami, KG Paterson Public Key Cryptography-PKC 2005: 8th International Workshop on Theory and …, 2005 | 214 | 2005 |
Improved reconstruction attacks on encrypted data using range query leakage MS Lacharité, B Minaud, KG Paterson 2018 IEEE Symposium on Security and Privacy (SP), 297-314, 2018 | 211 | 2018 |
Tripartite authenticated key agreement protocols from pairings SS Al-Riyami, KG Paterson Cryptography and Coding: 9th IMA International Conference, Cirencester, UK …, 2003 | 211* | 2003 |
Access control through secure channel using personal identification system G Seroussi, KG Paterson, W Mao, MT Smith US Patent 6,836,843, 2004 | 188 | 2004 |
Pump up the volume: Practical database reconstruction from volume leakage on range queries P Grubbs, MS Lacharité, B Minaud, KG Paterson Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 170 | 2018 |
Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol KG Paterson, T Ristenpart, T Shrimpton International Conference on the Theory and Application of Cryptology and …, 2011 | 167 | 2011 |
Efficient one-round key exchange in the standard model C Boyd, Y Cliff, J Gonzalez Nieto, KG Paterson Information Security and Privacy: 13th Australasian Conference, ACISP 2008 …, 2008 | 167* | 2008 |