Kenneth G. Paterson

Orcid: 0000-0002-5145-4489

Affiliations:
  • Department of Computer Science, ETH Zurich, Switzerland
  • Royal Holloway University of London, Information Security Group, UK (former)


According to our database1, Kenneth G. Paterson authored at least 193 papers between 1994 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Breaking and Fixing Content-Defined Chunking.
IACR Cryptol. ePrint Arch., 2025

Sabot: Efficient and Strongly Anonymous Bootstrapping of Communication Channels.
IACR Cryptol. ePrint Arch., 2025

Breaking BASS.
IACR Commun. Cryptol., 2025

Analysis of the Telegram Key Exchange.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

Probabilistic Data Structures in the Wild: A Security Analysis of Redis.
Proceedings of the Fifteenth ACM Conference on Data and Application Security and Privacy, 2025

2024
Average case error estimates of the strong Lucas test.
Des. Codes Cryptogr., May, 2024

Using Gate Tunneling in Bulk CMOS to Create a PUF.
IEEE Internet Things J., January, 2024

End-to-End Encrypted Cloud Storage.
IEEE Secur. Priv., 2024

Analyzing Cryptography in the Wild: A Retrospective.
IEEE Secur. Priv., 2024

Limits on Authenticated Encryption Use in TLS.
IACR Cryptol. ePrint Arch., 2024

A Query Reconstruction Attack on the Chase-Shen Substring-Searchable Symmetric Encryption Scheme.
IACR Cryptol. ePrint Arch., 2024

Analysing Cryptography in the Wild - A Retrospective.
IACR Cryptol. ePrint Arch., 2024

Cryptographic Analysis of Delta Chat.
Proceedings of the 33rd USENIX Security Symposium, 2024

SoK: Efficient Design and Implementation of Polynomial Hash Functions over Prime Fields.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Share with Care: Breaking E2EE in Nextcloud.
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024

A Formal Treatment of End-to-End Encrypted Cloud Storage.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

PathGES: An Efficient and Secure Graph Encryption Scheme for Shortest Path Queries.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
Practically-exploitable Vulnerabilities in the Jitsi Video Conferencing System.
IACR Cryptol. ePrint Arch., 2023

Where Is the Research on Cryptographic Transition and Agility?
Commun. ACM, 2023

Snapping Snap Sync: Practical Attacks on Go Ethereum Synchronising Nodes.
Proceedings of the 32nd USENIX Security Symposium, 2023

Three Lessons From Threema: Analysis of a Secure Messenger.
Proceedings of the 32nd USENIX Security Symposium, 2023

Security Analysis of MongoDB Queryable Encryption.
Proceedings of the 32nd USENIX Security Symposium, 2023

Rethinking Searchable Symmetric Encryption.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

MEGA: Malleable Encryption Goes Awry.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Caveat Implementor! Key Recovery Attacks on MEGA.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

On the Cryptographic Fragility of the Telegram Ecosystem.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
Practical (Post-Quantum) Key Combiners from One-Wayness and Applications to TLS.
IACR Cryptol. ePrint Arch., 2022

Breaking Bridgefy, again: Adopting libsignal is not enough.
Proceedings of the 31st USENIX Security Symposium, 2022

Four Attacks and a Proof for Telegram.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

HyperLogLog: Exponentially Bad in Adversarial Settings.
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022

Anonymous, Robust Post-quantum Public Key Encryption.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

An Efficient Query Recovery Attack Against a Graph Encryption Scheme.
Proceedings of the Computer Security - ESORICS 2022, 2022

Adversarial Correctness and Privacy for Probabilistic Data Structures.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Victory by KO: Attacking OpenPGP Using Key Overwriting.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Puncturable Key Wrapping and Its Applications.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

2021
CrowdNotifier: Decentralized Privacy-Preserving Presence Tracing.
Proc. Priv. Enhancing Technol., 2021

Leakage Perturbation is Not Enough: Breaking Structured Encryption Using Simulated Annealing.
IACR Cryptol. ePrint Arch., 2021

The Security of ChaCha20-Poly1305 in the Multi-User Setting.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Multilinear Maps from Obfuscation.
J. Cryptol., 2020

SWiSSSE: System-Wide Security for Searchable Symmetric Encryption.
IACR Cryptol. ePrint Arch., 2020

Decentralized Privacy-Preserving Proximity Tracing.
IEEE Data Eng. Bull., 2020

Decentralized Privacy-Preserving Proximity Tracing.
CoRR, 2020

Remote Side-Channel Attacks on Anonymous Transactions.
Proceedings of the 29th USENIX Security Symposium, 2020

Message Time of Arrival Codes: A Fundamental Primitive for Secure Distance Measurement.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Many a Mickle Makes a Muckle: A Framework for Provably Quantum-Secure Hybrid Key Exchange.
Proceedings of the Post-Quantum Cryptography - 11th International Conference, 2020

A Performant, Misuse-Resistant API for Primality Testing.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
libInterMAC: Beyond Confidentiality and Integrity in Practice.
IACR Cryptol. ePrint Arch., 2019

Catch Me (On Time) If You Can: Understanding the Effectiveness of Twitter URL Blacklists.
CoRR, 2019

Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Safety in Numbers: On the Need for Robust Diffie-Hellman Parameter Validation.
Proceedings of the Public-Key Cryptography - PKC 2019, 2019

2018
Statistical Attacks on Cookie Masking for RC4.
IACR Cryptol. ePrint Arch., 2018

Cold Boot Attacks on Ring and Module LWE Keys Under the NTT.
IACR Cryptol. ePrint Arch., 2018

Standards News.
IEEE Commun. Stand. Mag., 2018

Technical perspective: On heartbleed: a hard beginnyng makth a good endyng.
Commun. ACM, 2018

Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Coming of Age: A Longitudinal Study of TLS Deployment.
Proceedings of the Internet Measurement Conference 2018, 2018

Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Pump up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Prime and Prejudice: Primality Testing Under Adversarial Conditions.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

A Cryptographic Analysis of the WireGuard Protocol.
Proceedings of the Applied Cryptography and Network Security, 2018

2017
Frequency-smoothing encryption: preventing snapshot attacks on deterministically encrypted data.
IACR Cryptol. ePrint Arch., 2017

Cold Boot Attacks on NTRU.
Proceedings of the Progress in Cryptology - INDOCRYPT 2017, 2017

Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts.
Proceedings of the Computer Security - ESORICS 2017, 2017

Key Rotation for Authenticated Encryption.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

Analyzing Multi-key Security Degradation.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

2016
Building a Community of Real-World Cryptographers.
IEEE Secur. Priv., 2016

Analysing and Exploiting the Mantin Biases in RC4.
IACR Cryptol. ePrint Arch., 2016

Multilinear Maps from Obfuscation.
Proceedings of the Theory of Cryptography - 13th International Conference, 2016

Reactive and Proactive Standardisation of TLS.
Proceedings of the Security Standardisation Research - Third International Conference, 2016

Lucky Microseconds: A Timing Attack on Amazon's s2n Implementation of TLS.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016

Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

A Surfeit of SSH Cipher Suites.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
A note on the optimality of frequency analysis vs. ℓ<sub>p</sub>-optimization.
IACR Cryptol. ePrint Arch., 2015

Attacks Only Get Better: Password Recovery Attacks Against RC4 in TLS.
Proceedings of the 24th USENIX Security Symposium, 2015

Simulation-Based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms.
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015

Security Against Related Randomness Attacks via Reconstructive Extractors.
Proceedings of the Cryptography and Coding - 15th IMA International Conference, 2015

Data Is a Stream: Security of Stream-Based Channels.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

A Practical Attack Against the Use of RC4 in the HIVE Hidden Volume Encryption System.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
A Practical Attack Against the HIVE Hidden Volume Encryption System.
IACR Cryptol. ePrint Arch., 2014

Unpicking PLAID - A Cryptographic Analysis of an ISO-Standards-Track Authentication Protocol.
Proceedings of the Security Standardisation Research - First International Conference, 2014

Related Randomness Attacks for Public Key Encryption.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014

Plaintext Recovery Attacks Against WPA/TKIP.
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014

Security of Symmetric Encryption against Mass Surveillance.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

Big Bias Hunting in Amazonia: Large-Scale Computation and Exploitation of RC4 Biases (Invited Paper).
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
Signal-flow-based analysis of wireless security protocols.
Inf. Comput., 2013

On the Security of RC4 in TLS.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Lucky Thirteen: Breaking the TLS and DTLS Record Protocols.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

Non-Interactive Key Exchange.
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013

Robust Encryption, Revisited.
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013

One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

On Symmetric Encryption with Distinguishable Decryption Failures.
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013

ASICS: Authenticated Key Exchange Security Incorporating Certification Systems.
Proceedings of the Computer Security - ESORICS 2013, 2013

Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes.
Proceedings of the Topics in Cryptology - CT-RSA 2013, 2013

On the Security of the TLS Protocol: A Systematic Analysis.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

Programmable Hash Functions in the Multilinear Setting.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

2012
Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model.
Proceedings of the Public Key Cryptography - PKC 2012, 2012

Plaintext-Recovery Attacks Against Datagram TLS.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012

On the Joint Security of Encryption and Signature in EMV.
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012

Authenticated-Encryption with Padding: A Formal Security Treatment.
Proceedings of the Cryptography and Security: From Theory to Applications, 2012

A Coding-Theoretic Approach to Recovering Noisy RSA Keys.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

2011
User-friendly and certificate-free grid security infrastructure.
Int. J. Inf. Sec., 2011

Provable Security in the Real World.
IEEE Secur. Priv., 2011

Anonymous Broadcast Encryption.
IACR Cryptol. ePrint Arch., 2011

Breaking an Identity-Based Encryption Scheme Based on DHIES.
Proceedings of the Cryptography and Coding - 13th IMA International Conference, 2011

On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model.
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011

On the Joint Security of Encryption and Signature, Revisited.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

Provably Secure Key Assignment Schemes from Factoring.
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

2010
A guide to trust in mobile ad hoc networks.
Secur. Commun. Networks, 2010

Identity crisis: on the problem of namespace design for ID-PKC and MANETs.
Secur. Commun. Networks, 2010

Time-Specific Encryption.
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010

An Analysis of DepenDNS.
Proceedings of the Information Security - 13th International Conference, 2010

Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR.
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010

On the (in)security of IPsec in MAC-then-encrypt configurations.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

One-Time-Password-Authenticated Key Exchange.
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010

2009
Properties of the error linear complexity spectrum.
IEEE Trans. Inf. Theory, 2009

One-round key exchange in the standard model.
Int. J. Appl. Cryptogr., 2009

Plaintext Recovery Attacks against SSH.
Proceedings of the 30th IEEE Symposium on Security and Privacy (SP 2009), 2009

09311 Abstracts Collection - Classical and Quantum Information Assurance Foundations and Practice.
Proceedings of the Classical and Quantum Information Assurance Foundations and Practice, 26.07., 2009

Building Key-Private Public-Key Encryption Schemes.
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009

2008
Challenges for Trusted Computing.
IEEE Secur. Priv., 2008

Immunising CBC Mode Against Padding Oracle Attacks: A Formal Security Treatment.
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008

Proxy Signatures Secure Against Proxy Key Exposure.
Proceedings of the Public Key Cryptography, 2008

Certificateless Encryption Schemes Strongly Secure in the Standard Model.
Proceedings of the Public Key Cryptography, 2008

Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities.
Proceedings of the Pairing-Based Cryptography, 2008

On the error linear complexity profiles of binary sequences of period 2<sup>n</sup>.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

Augmenting Internet-Based Card Not Present Transactions with Trusted Computing (Extended Abstract).
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008

Trust management for secure information flows.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

e-EMV: emulating EMV for internet payments with trusted computing technologies.
Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, 2008

Efficient One-Round Key Exchange in the Standard Model.
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008

2007
On the Relations Between Non-Interactive Key Distribution, Identity-Based Encryption and Trapdoor Discrete Log Groups.
IACR Cryptol. ePrint Arch., 2007

What can identity-based cryptography offer to web services?
Proceedings of the 4th ACM Workshop On Secure Web Services, 2007

Attacking the IPsec Standards in Encryption-only Configurations.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007

Multi-key Hierarchical Identity-Based Signatures.
Proceedings of the Cryptography and Coding, 2007

2006
A cryptographic tour of the IPsec standards.
Inf. Secur. Tech. Rep., 2006

Lost in translation: theory and practice in cryptography.
IEEE Secur. Priv., 2006

Pairings for Cryptographers.
IACR Cryptol. ePrint Arch., 2006

An Attack on a Certificateless Signature Scheme.
IACR Cryptol. ePrint Arch., 2006

Secret Public Key Protocols Revisited.
Proceedings of the Security Protocols, 2006

Cryptography in Theory and Practice: The Case of Encryption in IPsec.
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006

Efficient Identity-Based Signatures Secure in the Standard Model.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006

2005
Zero/Positive Capacities of Two-Dimensional Runlength-Constrained Arrays.
IEEE Trans. Inf. Theory, 2005

CBE from CL-PKE: A Generic Construction and Efficient Schemes.
Proceedings of the Public Key Cryptography, 2005

Trusted Computing: Providing Security for Peer-to-Peer Networks.
Proceedings of the Fifth IEEE International Conference on Peer-to-Peer Computing (P2P 2005), 31 August, 2005

Non-interactive Designated Verifier Proofs and Undeniable Signatures.
Proceedings of the Cryptography and Coding, 2005

Padding Oracle Attacks on CBC-Mode Encryption with Secret and Random IVs.
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005

Identity-Based Cryptography for Grid Security.
Proceedings of the First International Conference on e-Science and Grid Technologies (e-Science 2005), 2005

Modular Security Proofs for Key Agreement Protocols.
Proceedings of the Advances in Cryptology, 2005

2004
On codes with low peak-to-average power ratio for multicode CDMA.
IEEE Trans. Inf. Theory, 2004

Quantum cryptography: a practical information security perspective.
IACR Cryptol. ePrint Arch., 2004

Crest-factor analysis of carrier interferometry MC-CDMA and OFDM systems.
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004

Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan.
Proceedings of the Fast Software Encryption, 11th International Workshop, 2004

Concurrent Signatures.
Proceedings of the Advances in Cryptology, 2004

Padding Oracle Attacks on the ISO CBC Mode Encryption Standard.
Proceedings of the Topics in Cryptology, 2004

Key Agreement Using Statically Keyed Authenticators.
Proceedings of the Applied Cryptography and Network Security, 2004

2003
Computing the error linear complexity spectrum of a binary sequence of period 2<sup>n</sup>.
IEEE Trans. Inf. Theory, 2003

Introduction.
Inf. Secur. Tech. Rep., 2003

A comparison between traditional public key infrastructures and identity-based cryptography.
Inf. Secur. Tech. Rep., 2003

Deniable Authenticated Key Establishment for Internet Protocols.
Proceedings of the Security Protocols, 2003

Tripartite Authenticated Key Agreement Protocols from Pairings.
Proceedings of the Cryptography and Coding, 2003

Certificateless Public Key Cryptography.
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003

2002
ID-based Signatures from Pairings on Elliptic Curves.
IACR Cryptol. ePrint Arch., 2002

RSA-Based Undeniable Signatures for General Moduli.
Proceedings of the Topics in Cryptology, 2002

2001
Single-track circuit codes.
IEEE Trans. Inf. Theory, 2001

Sequences for OFDM and Multi-Code CDMA: Two Problems in Algebraic Coding Theory.
Proceedings of the Sequences and their Applications, 2001

2000
On the existence and construction of good codes with low peak-to-average power ratios.
IEEE Trans. Inf. Theory, 2000

Generalized Reed-Muller codes and power control in OFDM modulation.
IEEE Trans. Inf. Theory, 2000

Efficient decoding algorithms for generalized Reed-Muller codes.
IEEE Trans. Commun., 2000

1999
Applications of Exponential Sums in Communications Theory.
Proceedings of the Cryptography and Coding, 1999

Imprimitive Permutation Groups and Trapdoors in Iterated Block Ciphers.
Proceedings of the Fast Software Encryption, 6th International Workshop, 1999

1998
Some New Circuit Codes.
IEEE Trans. Inf. Theory, 1998

Bounds on Partial Correlations of Sequences.
IEEE Trans. Inf. Theory, 1998

Binary Sequence Sets with Favorable Correlations from Difference Sets and MDS Codes.
IEEE Trans. Inf. Theory, 1998

Perfect Factors from Cyclic Codes and Interleaving.
SIAM J. Discret. Math., 1998

Root Counting, the DFT and the Linear Complexity of Nonlinear Filtering.
Des. Codes Cryptogr., 1998

Coding techniques for power controlled OFDM.
Proceedings of the 9th IEEE International Symposium on Personal, 1998

1997
Comments on "Theory and Applications of Cellular Automata in Cryptography".
IEEE Trans. Computers, 1997

1996
A method for constructing decodable de Bruijn sequences.
IEEE Trans. Inf. Theory, 1996

Single-track Gray codes.
IEEE Trans. Inf. Theory, 1996

Near optimal single-track Gray codes.
IEEE Trans. Inf. Theory, 1996

New Classes of Perfect Maps II.
J. Comb. Theory A, 1996

New Classes of Perfect Maps I.
J. Comb. Theory A, 1996

On the Existence of de Bruijn Tori with Two by Two Windows.
J. Comb. Theory A, 1996

Permutation Polynomials, de Bruijn Sequences, and Linear Complexity.
J. Comb. Theory A, 1996

1995
Storage efficient decoding for a class of binary be Bruijn sequences.
Discret. Math., 1995

Perfect Factors in the de Bruijn Graph.
Des. Codes Cryptogr., 1995

Public-key Cryptography on Smart Cards.
Proceedings of the Cryptography: Policy and Algorithms, 1995

1994
Perfect maps.
IEEE Trans. Inf. Theory, 1994

A Weak Cipher that Generates the Symmetric Group.
J. Cryptol., 1994

Decoding Perfect Maps.
Des. Codes Cryptogr., 1994


  Loading...