Kenneth G. Paterson

Affiliations:
  • Royal Holloway University of London, Information Security Group, UK


According to our database1, Kenneth G. Paterson authored at least 163 papers between 1994 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Practical (Post-Quantum) Key Combiners from One-Wayness and Applications to TLS.
IACR Cryptol. ePrint Arch., 2022

On the Cryptographic Fragility of the Telegram Ecosystem.
IACR Cryptol. ePrint Arch., 2022

Four Attacks and a Proof for Telegram.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

2021
CrowdNotifier: Decentralized Privacy-Preserving Presence Tracing.
Proc. Priv. Enhancing Technol., 2021

HyperLogLog: Exponentially Bad in Adversarial Settings.
IACR Cryptol. ePrint Arch., 2021

Leakage Perturbation is Not Enough: Breaking Structured Encryption Using Simulated Annealing.
IACR Cryptol. ePrint Arch., 2021

Anonymous, Robust Post-Quantum Public Key Encryption.
IACR Cryptol. ePrint Arch., 2021

The Security of ChaCha20-Poly1305 in the Multi-User Setting.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Multilinear Maps from Obfuscation.
J. Cryptol., 2020

Remote Side-Channel Attacks on Anonymous Transactions.
IACR Cryptol. ePrint Arch., 2020

A Performant, Misuse-Resistant API for Primality Testing.
IACR Cryptol. ePrint Arch., 2020

SWiSSSE: System-Wide Security for Searchable Symmetric Encryption.
IACR Cryptol. ePrint Arch., 2020

Many a Mickle Makes a Muckle: A Framework for Provably Quantum-Secure Hybrid Key Exchange.
IACR Cryptol. ePrint Arch., 2020

Decentralized Privacy-Preserving Proximity Tracing.
IEEE Data Eng. Bull., 2020

Decentralized Privacy-Preserving Proximity Tracing.
CoRR, 2020

2019
Message Time of Arrival Codes: A Fundamental Primitive for Secure Distance Measurement.
IACR Cryptol. ePrint Arch., 2019

Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks.
IACR Cryptol. ePrint Arch., 2019

Safety in Numbers: On the Need for Robust Diffie-Hellman Parameter Validation.
IACR Cryptol. ePrint Arch., 2019

libInterMAC: Beyond Confidentiality and Integrity in Practice.
IACR Cryptol. ePrint Arch., 2019

Catch Me (On Time) If You Can: Understanding the Effectiveness of Twitter URL Blacklists.
CoRR, 2019

2018
Cold Boot Attacks on Ring and Module LWE Keys Under the NTT.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier.
J. Cryptol., 2018

Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure.
IACR Cryptol. ePrint Arch., 2018

Pump up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries.
IACR Cryptol. ePrint Arch., 2018

A Cryptographic Analysis of the WireGuard Protocol.
IACR Cryptol. ePrint Arch., 2018

Prime and Prejudice: Primality Testing Under Adversarial Conditions.
IACR Cryptol. ePrint Arch., 2018

Analysing and exploiting the Mantin biases in RC4.
Des. Codes Cryptogr., 2018

Standards News.
IEEE Commun. Stand. Mag., 2018

Statistical attacks on cookie masking for RC4.
Cryptogr. Commun., 2018

Technical perspective: On heartbleed: a hard beginnyng makth a good endyng.
Commun. ACM, 2018

Coming of Age: A Longitudinal Study of TLS Deployment.
Proceedings of the Internet Measurement Conference 2018, 2018

2017
ASICS: authenticated key exchange security incorporating certification systems.
Int. J. Inf. Sec., 2017

Analyzing Multi-Key Security Degradation.
IACR Cryptol. ePrint Arch., 2017

Frequency-smoothing encryption: preventing snapshot attacks on deterministically encrypted data.
IACR Cryptol. ePrint Arch., 2017

Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage.
IACR Cryptol. ePrint Arch., 2017

Data Is a Stream: Security of Stream-Based Channels.
IACR Cryptol. ePrint Arch., 2017

Key Rotation for Authenticated Encryption.
IACR Cryptol. ePrint Arch., 2017

Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts.
IACR Cryptol. ePrint Arch., 2017

Cold Boot Attacks on NTRU.
Proceedings of the Progress in Cryptology - INDOCRYPT 2017, 2017

2016
Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol.
Int. J. Inf. Sec., 2016

Building a Community of Real-World Cryptographers.
IEEE Secur. Priv., 2016

Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results.
IACR Cryptol. ePrint Arch., 2016

Reactive and Proactive Standardisation of TLS.
Proceedings of the Security Standardisation Research - Third International Conference, 2016

A Surfeit of SSH Cipher Suites.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Security Against Related Randomness Attacks via Reconstructive Extractors.
IACR Cryptol. ePrint Arch., 2015

Simulation-based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms.
IACR Cryptol. ePrint Arch., 2015

A note on the optimality of frequency analysis vs. ℓ<sub>p</sub>-optimization.
IACR Cryptol. ePrint Arch., 2015

Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation.
IACR Cryptol. ePrint Arch., 2015

Lucky Microseconds: A Timing Attack on Amazon's s2n Implementation of TLS.
IACR Cryptol. ePrint Arch., 2015

Multilinear Maps from Obfuscation.
IACR Cryptol. ePrint Arch., 2015

Attacks Only Get Better: Password Recovery Attacks Against RC4 in TLS.
Proceedings of the 24th USENIX Security Symposium, 2015

A Practical Attack Against the Use of RC4 in the HIVE Hidden Volume Encryption System.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Related Randomness Attacks for Public Key Encryption.
IACR Cryptol. ePrint Arch., 2014

A Practical Attack Against the HIVE Hidden Volume Encryption System.
IACR Cryptol. ePrint Arch., 2014

Security of Symmetric Encryption against Mass Surveillance.
IACR Cryptol. ePrint Arch., 2014

Big Bias Hunting in Amazonia: Large-Scale Computation and Exploitation of RC4 Biases (Invited Paper).
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
Signal-flow-based analysis of wireless security protocols.
Inf. Comput., 2013

Plaintext Recovery Attacks Against WPA/TKIP.
IACR Cryptol. ePrint Arch., 2013

On the Security of the TLS Protocol: A Systematic Analysis.
IACR Cryptol. ePrint Arch., 2013

Programmable Hash Functions in the Multilinear Setting.
IACR Cryptol. ePrint Arch., 2013

On Symmetric Encryption with Distinguishable Decryption Failures.
IACR Cryptol. ePrint Arch., 2013

On the Security of RC4 in TLS.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Lucky Thirteen: Breaking the TLS and DTLS Record Protocols.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

2012
A Coding-Theoretic Approach to Recovering Noisy RSA Keys.
IACR Cryptol. ePrint Arch., 2012

Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes.
IACR Cryptol. ePrint Arch., 2012

Non-Interactive Key Exchange.
IACR Cryptol. ePrint Arch., 2012

Robust Encryption, Revisited.
IACR Cryptol. ePrint Arch., 2012

RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures.
IACR Cryptol. ePrint Arch., 2012

Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model.
Proceedings of the Public Key Cryptography - PKC 2012, 2012

Plaintext-Recovery Attacks Against Datagram TLS.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Authenticated-Encryption with Padding: A Formal Security Treatment.
Proceedings of the Cryptography and Security: From Theory to Applications, 2012

2011
Identity-based cryptography for grid security.
Int. J. Inf. Sec., 2011

User-friendly and certificate-free grid security infrastructure.
Int. J. Inf. Sec., 2011

Provable Security in the Real World.
IEEE Secur. Priv., 2011

On the Joint Security of Encryption and Signature, Revisited.
IACR Cryptol. ePrint Arch., 2011

Anonymous Broadcast Encryption.
IACR Cryptol. ePrint Arch., 2011

On the Joint Security of Encryption and Signature in EMV.
IACR Cryptol. ePrint Arch., 2011

On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model.
IACR Cryptol. ePrint Arch., 2011

Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

Provably Secure Key Assignment Schemes from Factoring.
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

2010
A guide to trust in mobile ad hoc networks.
Secur. Commun. Networks, 2010

Identity crisis: on the problem of namespace design for ID-PKC and MANETs.
Secur. Commun. Networks, 2010

Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR.
IACR Cryptol. ePrint Arch., 2010

Time-Specific Encryption.
IACR Cryptol. ePrint Arch., 2010

Breaking An Identity-Based Encryption Scheme based on DHIES.
IACR Cryptol. ePrint Arch., 2010

An Analysis of DepenDNS.
Proceedings of the Information Security - 13th International Conference, 2010

On the (in)security of IPsec in MAC-then-encrypt configurations.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Properties of the error linear complexity spectrum.
IEEE Trans. Inf. Theory, 2009

One-round key exchange in the standard model.
Int. J. Appl. Cryptogr., 2009

One-time-password-authenticated key exchange.
IACR Cryptol. ePrint Arch., 2009

On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups.
Des. Codes Cryptogr., 2009

Plaintext Recovery Attacks against SSH.
Proceedings of the 30th IEEE Symposium on Security and Privacy (S&P 2009), 2009

09311 Abstracts Collection - Classical and Quantum Information Assurance Foundations and Practice.
Proceedings of the Classical and Quantum Information Assurance Foundations and Practice, 26.07., 2009

Building Key-Private Public-Key Encryption Schemes.
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009

2008
Challenges for Trusted Computing.
IEEE Secur. Priv., 2008

Efficient One-round Key Exchange in the Standard Model.
IACR Cryptol. ePrint Arch., 2008

Pairings for cryptographers.
Discret. Appl. Math., 2008

Immunising CBC Mode Against Padding Oracle Attacks: A Formal Security Treatment.
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008

Proxy Signatures Secure Against Proxy Key Exposure.
Proceedings of the Public Key Cryptography, 2008

Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities.
Proceedings of the Pairing-Based Cryptography, 2008

On the error linear complexity profiles of binary sequences of period 2<sup>n</sup>.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

Augmenting Internet-Based Card Not Present Transactions with Trusted Computing (Extended Abstract).
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008

Trust management for secure information flows.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

e-EMV: emulating EMV for internet payments with trusted computing technologies.
Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, 2008

2007
Certificateless Encryption Schemes Strongly Secure in the Standard Model.
IACR Cryptol. ePrint Arch., 2007

Attacking the IPsec Standards in Encryption-only Configurations.
IACR Cryptol. ePrint Arch., 2007

What can identity-based cryptography offer to web services?
Proceedings of the 4th ACM Workshop On Secure Web Services, 2007

Multi-key Hierarchical Identity-Based Signatures.
Proceedings of the Cryptography and Coding, 2007

2006
A cryptographic tour of the IPsec standards.
Inf. Secur. Tech. Rep., 2006

Lost in translation: theory and practice in cryptography.
IEEE Secur. Priv., 2006

Efficient Identity-based Signatures Secure in the Standard Model.
IACR Cryptol. ePrint Arch., 2006

An Attack on a Certificateless Signature Scheme.
IACR Cryptol. ePrint Arch., 2006

Secret Public Key Protocols Revisited.
Proceedings of the Security Protocols, 2006

2005
Zero/Positive Capacities of Two-Dimensional Runlength-Constrained Arrays.
IEEE Trans. Inf. Theory, 2005

Cryptography in Theory and Practice: The Case of Encryption in IPsec.
IACR Cryptol. ePrint Arch., 2005

CBE from CL-PKE: A Generic Construction and Efficient Schemes.
Proceedings of the Public Key Cryptography, 2005

Trusted Computing: Providing Security for Peer-to-Peer Networks.
Proceedings of the Fifth IEEE International Conference on Peer-to-Peer Computing (P2P 2005), 31 August, 2005

Non-interactive Designated Verifier Proofs and Undeniable Signatures.
Proceedings of the Cryptography and Coding, 2005

Padding Oracle Attacks on CBC-Mode Encryption with Secret and Random IVs.
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005

Modular Security Proofs for Key Agreement Protocols.
Proceedings of the Advances in Cryptology, 2005

2004
On codes with low peak-to-average power ratio for multicode CDMA.
IEEE Trans. Inf. Theory, 2004

Quantum cryptography: a practical information security perspective.
IACR Cryptol. ePrint Arch., 2004

Crest-factor analysis of carrier interferometry MC-CDMA and OFDM systems.
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004

Concurrent Signatures.
Proceedings of the Advances in Cryptology, 2004

Padding Oracle Attacks on the ISO CBC Mode Encryption Standard.
Proceedings of the Topics in Cryptology, 2004

Key Agreement Using Statically Keyed Authenticators.
Proceedings of the Applied Cryptography and Network Security, 2004

2003
Computing the error linear complexity spectrum of a binary sequence of period 2<sup>n</sup>.
IEEE Trans. Inf. Theory, 2003

Introduction.
Inf. Secur. Tech. Rep., 2003

A comparison between traditional public key infrastructures and identity-based cryptography.
Inf. Secur. Tech. Rep., 2003

Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan.
IACR Cryptol. ePrint Arch., 2003

Certificateless Public Key Cryptography.
IACR Cryptol. ePrint Arch., 2003

Deniable Authenticated Key Establishment for Internet Protocols.
Proceedings of the Security Protocols, 2003

2002
ID-based Signatures from Pairings on Elliptic Curves.
IACR Cryptol. ePrint Arch., 2002

Tripartite Authenticated Key Agreement Protocols from Pairings.
IACR Cryptol. ePrint Arch., 2002

RSA-Based Undeniable Signatures for General Moduli.
Proceedings of the Topics in Cryptology, 2002

2001
Single-track circuit codes.
IEEE Trans. Inf. Theory, 2001

Sequences for OFDM and Multi-Code CDMA: Two Problems in Algebraic Coding Theory.
Proceedings of the Sequences and their Applications, 2001

2000
On the existence and construction of good codes with low peak-to-average power ratios.
IEEE Trans. Inf. Theory, 2000

Generalized Reed-Muller codes and power control in OFDM modulation.
IEEE Trans. Inf. Theory, 2000

Efficient decoding algorithms for generalized Reed-Muller codes.
IEEE Trans. Commun., 2000

1999
Applications of Exponential Sums in Communications Theory.
Proceedings of the Cryptography and Coding, 1999

Imprimitive Permutation Groups and Trapdoors in Iterated Block Ciphers.
Proceedings of the Fast Software Encryption, 6th International Workshop, 1999

1998
Some New Circuit Codes.
IEEE Trans. Inf. Theory, 1998

Bounds on Partial Correlations of Sequences.
IEEE Trans. Inf. Theory, 1998

Binary Sequence Sets with Favorable Correlations from Difference Sets and MDS Codes.
IEEE Trans. Inf. Theory, 1998

Perfect Factors from Cyclic Codes and Interleaving.
SIAM J. Discret. Math., 1998

Root Counting, the DFT and the Linear Complexity of Nonlinear Filtering.
Des. Codes Cryptogr., 1998

Coding techniques for power controlled OFDM.
Proceedings of the 9th IEEE International Symposium on Personal, 1998

1997
Comments on "Theory and Applications of Cellular Automata in Cryptography".
IEEE Trans. Computers, 1997

1996
A method for constructing decodable de Bruijn sequences.
IEEE Trans. Inf. Theory, 1996

Single-track Gray codes.
IEEE Trans. Inf. Theory, 1996

Near optimal single-track Gray codes.
IEEE Trans. Inf. Theory, 1996

New Classes of Perfect Maps II.
J. Comb. Theory, Ser. A, 1996

New Classes of Perfect Maps I.
J. Comb. Theory, Ser. A, 1996

On the Existence of de Bruijn Tori with Two by Two Windows.
J. Comb. Theory, Ser. A, 1996

Permutation Polynomials, de Bruijn Sequences, and Linear Complexity.
J. Comb. Theory, Ser. A, 1996

1995
Storage efficient decoding for a class of binary be Bruijn sequences.
Discret. Math., 1995

Perfect Factors in the de Bruijn Graph.
Des. Codes Cryptogr., 1995

Public-key Cryptography on Smart Cards.
Proceedings of the Cryptography: Policy and Algorithms, 1995

1994
Perfect maps.
IEEE Trans. Inf. Theory, 1994

A Weak Cipher that Generates the Symmetric Group.
J. Cryptol., 1994

Decoding Perfect Maps.
Des. Codes Cryptogr., 1994


  Loading...