Yvonne Hitchcock

According to our database1, Yvonne Hitchcock authored at least 17 papers between 2002 and 2006.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2006
The importance of proofs of security for key establishment protocols: Formal analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, and Yeh-Sun protocols.
Comput. Commun., 2006

Modular proofs for key exchange: rigorous optimizations in the Canetti-Krawczyk model.
Appl. Algebra Eng. Commun. Comput., 2006

2005
Errors in Computational Complexity Proofs for Protocols.
IACR Cryptol. ePrint Arch., 2005

Examining Indistinguishability-Based Proof Models for Key Establishment Protocols.
IACR Cryptol. ePrint Arch., 2005

On Session Key Construction in Provably-Secure Key Establishment Protocols: Revisiting Chen & Kudla (2003) and McCullagh & Barreto (2005) ID-Based Protocols.
IACR Cryptol. ePrint Arch., 2005

RAK factoring algorithm.
Australas. J Comb., 2005

Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves.
Proceedings of the Selected Areas in Cryptography, 12th International Workshop, 2005

On Session Key Construction in Provably-Secure Key Establishment Protocols.
Proceedings of the Progress in Cryptology, 2005

Security Requirements for Key Establishment Proof Models: Revisiting Bellare-Rogaway and Jeong-Katz-Lee Protocols.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005

2004
The efficiency of solving multiple discrete logarithm problems and the implications for the security of fixed elliptic curves.
Int. J. Inf. Sec., 2004

On Session Identifiers in Provably Secure Protocols: The Bellare-Rogaway Three-Party Key Distribution Protocol Revisited.
IACR Cryptol. ePrint Arch., 2004

Tripartite Key Exchange in the Canetti-Krawczyk Proof Model.
Proceedings of the Progress in Cryptology, 2004

Complementing Computational Protocol Analysis with Formal Specifications.
Proceedings of the Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), 2004

Improvements to the RAK Factoring Algorithm.
Proceedings of the Cryptographic Algorithms and their Uses, 2004

2003
A Password-Based Authenticator: Security Proof and Applications.
Proceedings of the Progress in Cryptology, 2003

The Security of Fixed versus Random Elliptic Curves in Cryptography.
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003

2002
A New Elliptic Curve Scalar Multiplication Algorithm to Resist Simple Power Analysis.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002


  Loading...