Kenny Paterson
Kenny Paterson
Professor of Computer Science, ETH Zurich
Verified email at - Homepage
Cited by
Cited by
Certificateless public key cryptography
SS Al-Riyami, KG Paterson
International conference on the theory and application of cryptology and …, 2003
Pairings for cryptographers
SD Galbraith, KG Paterson, NP Smart
Discrete Applied Mathematics 156 (16), 3113-3121, 2008
ID-based signatures from pairings on elliptic curves
KG Paterson
Cryptology ePrint Archive, 2002
Lucky thirteen: Breaking the TLS and DTLS record protocols
NJ Al Fardan, KG Paterson
2013 IEEE symposium on security and privacy, 526-540, 2013
Generalized Reed-Muller codes and power control in OFDM modulation
KG Paterson
IEEE Transactions on Information Theory 46 (1), 104-120, 2000
Efficient identity-based signatures secure in the standard model
KG Paterson, JCN Schuldt
Australasian conference on information security and privacy, 207-222, 2006
On the existence and construction of good codes with low peak-to-average power ratios
KG Paterson, V Tarokh
IEEE Transactions on Information Theory 46 (6), 1974-1987, 2000
Decentralized privacy-preserving proximity tracing
C Troncoso, M Payer, JP Hubaux, M Salathé, J Larus, E Bugnion, ...
arXiv preprint arXiv:2005.12273, 2020
On the security of the TLS protocol: A systematic analysis
H Krawczyk, KG Paterson, H Wee
Annual Cryptology Conference, 429-448, 2013
On the Security of RC4 in TLS
N AlFardan, DJ Bernstein, KG Paterson, B Poettering, JCN Schuldt
22nd USENIX Security Symposium (USENIX Security 13), 305-320, 2013
Security of symmetric encryption against mass surveillance
M Bellare, KG Paterson, P Rogaway
Advances in Cryptology–CRYPTO 2014: 34th Annual Cryptology Conference, Santa …, 2014
Concurrent signatures
L Chen, C Kudla, KG Paterson
Advances in Cryptology-EUROCRYPT 2004: International Conference on the …, 2004
Anonymous broadcast encryption: Adaptive security and efficient constructions in the standard model
B Libert, KG Paterson, EA Quaglia
Public Key Cryptography–PKC 2012: 15th International Conference on Practice …, 2012
CBE from CL-PKE: A generic construction and efficient schemes
SS Al-Riyami, KG Paterson
Public Key Cryptography-PKC 2005: 8th International Workshop on Theory and …, 2005
Improved reconstruction attacks on encrypted data using range query leakage
MS Lacharité, B Minaud, KG Paterson
2018 IEEE Symposium on Security and Privacy (SP), 297-314, 2018
Tripartite authenticated key agreement protocols from pairings
SS Al-Riyami, KG Paterson
Cryptography and Coding: 9th IMA International Conference, Cirencester, UK …, 2003
Access control through secure channel using personal identification system
G Seroussi, KG Paterson, W Mao, MT Smith
US Patent 6,836,843, 2004
Pump up the volume: Practical database reconstruction from volume leakage on range queries
P Grubbs, MS Lacharité, B Minaud, KG Paterson
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
Efficient one-round key exchange in the standard model
C Boyd, Y Cliff, J Gonzalez Nieto, KG Paterson
Information Security and Privacy: 13th Australasian Conference, ACISP 2008 …, 2008
Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol
KG Paterson, T Ristenpart, T Shrimpton
International Conference on the Theory and Application of Cryptology and …, 2011
The system can't perform the operation now. Try again later.
Articles 1–20