


default search action
Kenneth G. Paterson
Kenny Paterson
Person information
- affiliation: Department of Computer Science, ETH Zurich, Switzerland
- affiliation (former): Royal Holloway University of London, Information Security Group, UK
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j60]Semira Einsele
, Kenneth G. Paterson:
Average case error estimates of the strong Lucas test. Des. Codes Cryptogr. 92(5): 1341-1378 (2024) - [j59]Matilda Backendal
, Miro Haller
, Kenny Paterson
:
End-to-End Encrypted Cloud Storage. IEEE Secur. Priv. 22(2): 69-74 (2024) - [j58]Martin R. Albrecht, Kenneth G. Paterson
:
Analyzing Cryptography in the Wild: A Retrospective. IEEE Secur. Priv. 22(6): 12-18 (2024) - [j57]Patrick Camilleri, Shahram Mossayebi
, Kenneth G. Paterson
, Charles Grover
:
Using Gate Tunneling in Bulk CMOS to Create a PUF. IEEE Internet Things J. 11(2): 2070-2081 (2024) - [j56]Zichen Gui
, Kenneth G. Paterson, Sikhar Patranabis, Bogdan Warinschi:
SWiSSSE: System-Wide Security for Searchable Symmetric Encryption. Proc. Priv. Enhancing Technol. 2024(1): 549-581 (2024) - [c117]Francesca Falzon
, Esha Ghosh
, Kenneth G. Paterson
, Roberto Tamassia
:
PathGES: An Efficient and Secure Graph Encryption Scheme for Shortest Path Queries. CCS 2024: 4047-4061 - [c116]Matilda Backendal
, Hannah Davis
, Felix Günther
, Miro Haller
, Kenneth G. Paterson
:
A Formal Treatment of End-to-End Encrypted Cloud Storage. CRYPTO (2) 2024: 40-74 - [c115]Martin R. Albrecht, Matilda Backendal, Daniele Coppola, Kenneth G. Paterson:
Share with Care: Breaking E2EE in Nextcloud. EuroS&P 2024: 828-840 - [c114]Jean Paul Degabriele, Jan Gilcher, Jérôme Govinden, Kenneth G. Paterson:
SoK: Efficient Design and Implementation of Polynomial Hash Functions over Prime Fields. SP 2024: 3128-3146 - [c113]Yuanming Song, Lenka Mareková, Kenneth G. Paterson:
Cryptographic Analysis of Delta Chat. USENIX Security Symposium 2024 - [i93]Atul Luykx, Kenneth G. Paterson:
Limits on Authenticated Encryption Use in TLS. IACR Cryptol. ePrint Arch. 2024: 51 (2024) - [i92]Martin R. Albrecht, Kenneth G. Paterson:
Analysing Cryptography in the Wild - A Retrospective. IACR Cryptol. ePrint Arch. 2024: 532 (2024) - [i91]Martin R. Albrecht, Matilda Backendal, Daniele Coppola, Kenneth G. Paterson:
Share with Care: Breaking E2EE in Nextcloud. IACR Cryptol. ePrint Arch. 2024: 546 (2024) - [i90]Francesca Falzon, Esha Ghosh, Kenneth G. Paterson, Roberto Tamassia:
PathGES: An Efficient and Secure Graph Encryption Scheme for Shortest Path Queries. IACR Cryptol. ePrint Arch. 2024: 845 (2024) - [i89]Yuanming Song, Lenka Mareková, Kenneth G. Paterson:
Cryptographic Analysis of Delta Chat. IACR Cryptol. ePrint Arch. 2024: 918 (2024) - [i88]Matilda Backendal, Hannah Davis, Felix Günther, Miro Haller, Kenneth G. Paterson:
A Formal Treatment of End-to-End Encrypted Cloud Storage. IACR Cryptol. ePrint Arch. 2024: 989 (2024) - [i87]Mia Filic, Jonas Hofmann, Sam A. Markelon, Kenneth G. Paterson, Anupama Unnikrishnan:
Probabilistic Data Structures in the Wild: A Security Analysis of Redis. IACR Cryptol. ePrint Arch. 2024: 1312 (2024) - [i86]Simon-Philipp Merz, Kenneth G. Paterson, Àlex Rodríguez García:
Breaking BASS. IACR Cryptol. ePrint Arch. 2024: 1808 (2024) - [i85]Zichen Gui, Kenneth G. Paterson, Sikhar Patranabis:
A Query Reconstruction Attack on the Chase-Shen Substring-Searchable Symmetric Encryption Scheme. IACR Cryptol. ePrint Arch. 2024: 1837 (2024) - 2023
- [j55]David Ott, Kenny Paterson, Dennis Moreau:
Where Is the Research on Cryptographic Transition and Agility? Commun. ACM 66(4): 29-32 (2023) - [c112]Theo von Arx
, Kenneth G. Paterson
:
On the Cryptographic Fragility of the Telegram Ecosystem. AsiaCCS 2023: 328-341 - [c111]Martin R. Albrecht, Miro Haller
, Lenka Mareková
, Kenneth G. Paterson
:
Caveat Implementor! Key Recovery Attacks on MEGA. EUROCRYPT (5) 2023: 190-218 - [c110]Matilda Backendal, Miro Haller, Kenneth G. Paterson:
MEGA: Malleable Encryption Goes Awry. SP 2023: 146-163 - [c109]Zichen Gui
, Kenneth G. Paterson, Sikhar Patranabis:
Rethinking Searchable Symmetric Encryption. SP 2023: 1401-1418 - [c108]Kenneth G. Paterson, Matteo Scarlata
, Kien Tuong Truong:
Three Lessons From Threema: Analysis of a Secure Messenger. USENIX Security Symposium 2023: 1289-1306 - [c107]Massimiliano Taverna, Kenneth G. Paterson:
Snapping Snap Sync: Practical Attacks on Go Ethereum Synchronising Nodes. USENIX Security Symposium 2023: 3331-3348 - [c106]Zichen Gui, Kenneth G. Paterson, Tianxin Tang:
Security Analysis of MongoDB Queryable Encryption. USENIX Security Symposium 2023: 7445-7462 - [i84]Semira Einsele, Kenneth G. Paterson:
Average Case Error Estimates of the Strong Lucas Test. CoRR abs/2306.09472 (2023) - [i83]Jean Paul Degabriele, Jérôme Govinden, Felix Günther, Kenneth G. Paterson:
The Security of ChaCha20-Poly1305 in the Multi-user Setting. IACR Cryptol. ePrint Arch. 2023: 85 (2023) - [i82]Martin R. Albrecht, Miro Haller, Lenka Mareková, Kenneth G. Paterson:
Caveat Implementor! Key Recovery Attacks on MEGA. IACR Cryptol. ePrint Arch. 2023: 329 (2023) - [i81]Martin R. Albrecht, Lenka Mareková, Kenneth G. Paterson, Igors Stepanovs:
Four Attacks and a Proof for Telegram. IACR Cryptol. ePrint Arch. 2023: 469 (2023) - [i80]Robertas Maleckas, Kenneth G. Paterson, Martin R. Albrecht:
Practically-exploitable Vulnerabilities in the Jitsi Video Conferencing System. IACR Cryptol. ePrint Arch. 2023: 1118 (2023) - 2022
- [c105]Matilda Backendal
, Felix Günther
, Kenneth G. Paterson
:
Puncturable Key Wrapping and Its Applications. ASIACRYPT (2) 2022: 651-681 - [c104]Lara Bruseghini, Daniel Huigens, Kenneth G. Paterson:
Victory by KO: Attacking OpenPGP Using Key Overwriting. CCS 2022: 411-423 - [c103]Mia Filic
, Kenneth G. Paterson, Anupama Unnikrishnan, Fernando Virdia
:
Adversarial Correctness and Privacy for Probabilistic Data Structures. CCS 2022: 1037-1050 - [c102]Francesca Falzon, Kenneth G. Paterson:
An Efficient Query Recovery Attack Against a Graph Encryption Scheme. ESORICS (1) 2022: 325-345 - [c101]Paul Grubbs, Varun Maram
, Kenneth G. Paterson:
Anonymous, Robust Post-quantum Public Key Encryption. EUROCRYPT (3) 2022: 402-432 - [c100]Kenneth G. Paterson, Mathilde Raynal:
HyperLogLog: Exponentially Bad in Adversarial Settings. EuroS&P 2022: 154-170 - [c99]Martin R. Albrecht, Lenka Mareková
, Kenneth G. Paterson, Igors Stepanovs:
Four Attacks and a Proof for Telegram. SP 2022: 87-106 - [c98]Martin R. Albrecht, Raphael Eikenberg, Kenneth G. Paterson:
Breaking Bridgefy, again: Adopting libsignal is not enough. USENIX Security Symposium 2022: 269-286 - [i79]Mia Filic, Kenneth G. Paterson, Anupama Unnikrishnan, Fernando Virdia:
Adversarial Correctness and Privacy for Probabilistic Data Structures. CoRR abs/2209.06955 (2022) - [i78]Nimrod Aviram, Benjamin Dowling, Ilan Komargodski, Kenneth G. Paterson, Eyal Ronen, Eylon Yogev:
Practical (Post-Quantum) Key Combiners from One-Wayness and Applications to TLS. IACR Cryptol. ePrint Arch. 2022: 65 (2022) - [i77]Theo von Arx, Kenneth G. Paterson:
On the Cryptographic Fragility of the Telegram Ecosystem. IACR Cryptol. ePrint Arch. 2022: 595 (2022) - [i76]Francesca Falzon, Kenneth G. Paterson:
An Efficient Query Recovery Attack Against a Graph Encryption Scheme. IACR Cryptol. ePrint Arch. 2022: 838 (2022) - [i75]Matilda Backendal, Miro Haller, Kenneth G. Paterson:
MEGA: Malleable Encryption Goes Awry. IACR Cryptol. ePrint Arch. 2022: 959 (2022) - [i74]Mia Filic, Kenneth G. Paterson, Anupama Unnikrishnan, Fernando Virdia:
Adversarial Correctness and Privacy for Probabilistic Data Structures. IACR Cryptol. ePrint Arch. 2022: 1186 (2022) - [i73]Matilda Backendal, Felix Günther, Kenneth G. Paterson:
Puncturable Key Wrapping and Its Applications. IACR Cryptol. ePrint Arch. 2022: 1209 (2022) - 2021
- [j54]Wouter Lueks, Seda F. Gürses, Michael Veale
, Edouard Bugnion, Marcel Salathé, Kenneth G. Paterson, Carmela Troncoso:
CrowdNotifier: Decentralized Privacy-Preserving Presence Tracing. Proc. Priv. Enhancing Technol. 2021(4): 350-368 (2021) - [c97]Jean Paul Degabriele, Jérôme Govinden
, Felix Günther, Kenneth G. Paterson:
The Security of ChaCha20-Poly1305 in the Multi-User Setting. CCS 2021: 1981-2003 - [e6]Kenneth G. Paterson:
Topics in Cryptology - CT-RSA 2021 - Cryptographers' Track at the RSA Conference 2021, Virtual Event, May 17-20, 2021, Proceedings. Lecture Notes in Computer Science 12704, Springer 2021, ISBN 978-3-030-75538-6 [contents] - [i72]Paul Grubbs, Varun Maram, Kenneth G. Paterson:
Anonymous, Robust Post-Quantum Public Key Encryption. IACR Cryptol. ePrint Arch. 2021: 708 (2021) - [i71]Zichen Gui, Kenneth G. Paterson, Sikhar Patranabis:
Leakage Perturbation is Not Enough: Breaking Structured Encryption Using Simulated Annealing. IACR Cryptol. ePrint Arch. 2021: 879 (2021) - [i70]Kenneth G. Paterson, Mathilde Raynal:
HyperLogLog: Exponentially Bad in Adversarial Settings. IACR Cryptol. ePrint Arch. 2021: 1139 (2021) - 2020
- [j53]Carmela Troncoso, Mathias Payer, Jean-Pierre Hubaux, Marcel Salathé, James R. Larus, Wouter Lueks, Theresa Stadler, Apostolos Pyrgelis, Daniele Antonioli, Ludovic Barman, Sylvain Chatel, Kenneth G. Paterson, Srdjan Capkun, David A. Basin, Jan Beutel, Dennis Jackson, Marc Roeschlin, Patrick Leu, Bart Preneel, Nigel P. Smart, Aysajan Abidin, Seda Gurses, Michael Veale, Cas Cremers, Michael Backes, Nils Ole Tippenhauer, Reuben Binns, Ciro Cattuto, Alain Barrat, Dario Fiore, Manuel Barbosa, Rui Oliveira, José Pereira:
Decentralized Privacy-Preserving Proximity Tracing. IEEE Data Eng. Bull. 43(2): 36-66 (2020) - [j52]Martin R. Albrecht, Pooya Farshim, Shuai Han, Dennis Hofheinz, Enrique Larraia, Kenneth G. Paterson:
Multilinear Maps from Obfuscation. J. Cryptol. 33(3): 1080-1113 (2020) - [c96]Jake Massimo, Kenneth G. Paterson:
A Performant, Misuse-Resistant API for Primality Testing. CCS 2020: 195-210 - [c95]Benjamin Dowling
, Torben Brandt Hansen, Kenneth G. Paterson:
Many a Mickle Makes a Muckle: A Framework for Provably Quantum-Secure Hybrid Key Exchange. PQCrypto 2020: 483-502 - [c94]Patrick Leu, Mridula Singh, Marc Roeschlin, Kenneth G. Paterson, Srdjan Capkun:
Message Time of Arrival Codes: A Fundamental Primitive for Secure Distance Measurement. SP 2020: 500-516 - [c93]Florian Tramèr
, Dan Boneh, Kenny Paterson:
Remote Side-Channel Attacks on Anonymous Transactions. USENIX Security Symposium 2020: 2739-2756 - [e5]Kenneth G. Paterson, Douglas Stebila
:
Selected Areas in Cryptography - SAC 2019 - 26th International Conference, Waterloo, ON, Canada, August 12-16, 2019, Revised Selected Papers. Lecture Notes in Computer Science 11959, Springer 2020, ISBN 978-3-030-38470-8 [contents] - [i69]Carmela Troncoso, Mathias Payer, Jean-Pierre Hubaux, Marcel Salathé, James R. Larus, Edouard Bugnion, Wouter Lueks, Theresa Stadler, Apostolos Pyrgelis, Daniele Antonioli, Ludovic Barman, Sylvain Chatel, Kenneth G. Paterson, Srdjan Capkun, David A. Basin, Jan Beutel, Dennis Jackson, Marc Roeschlin, Patrick Leu, Bart Preneel, Nigel P. Smart, Aysajan Abidin, Seda F. Gürses, Michael Veale, Cas Cremers, Michael Backes, Nils Ole Tippenhauer, Reuben Binns, Ciro Cattuto, Alain Barrat, Dario Fiore, Manuel Barbosa, Rui Oliveira, José Pereira:
Decentralized Privacy-Preserving Proximity Tracing. CoRR abs/2005.12273 (2020) - [i68]Jake Massimo, Kenneth G. Paterson:
A Performant, Misuse-Resistant API for Primality Testing. IACR Cryptol. ePrint Arch. 2020: 65 (2020) - [i67]Benjamin Dowling, Torben Brandt Hansen, Kenneth G. Paterson:
Many a Mickle Makes a Muckle: A Framework for Provably Quantum-Secure Hybrid Key Exchange. IACR Cryptol. ePrint Arch. 2020: 99 (2020) - [i66]Florian Tramèr
, Dan Boneh, Kenneth G. Paterson:
Remote Side-Channel Attacks on Anonymous Transactions. IACR Cryptol. ePrint Arch. 2020: 220 (2020) - [i65]Zichen Gui, Kenneth G. Paterson, Sikhar Patranabis, Bogdan Warinschi:
SWiSSSE: System-Wide Security for Searchable Symmetric Encryption. IACR Cryptol. ePrint Arch. 2020: 1328 (2020)
2010 – 2019
- 2019
- [j51]Martin R. Albrecht, Torben Brandt Hansen, Kenneth G. Paterson:
libInterMAC: Beyond Confidentiality and Integrity in Practice. IACR Trans. Symmetric Cryptol. 2019(1): 46-83 (2019) - [c92]Steven D. Galbraith
, Jake Massimo, Kenneth G. Paterson:
Safety in Numbers: On the Need for Robust Diffie-Hellman Parameter Validation. Public Key Cryptography (2) 2019: 379-407 - [c91]Paul Grubbs, Marie-Sarah Lacharité, Brice Minaud, Kenneth G. Paterson:
Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks. IEEE Symposium on Security and Privacy 2019: 1067-1083 - [i64]Patrick Leu, Mridula Singh, Marc Roeschlin, Kenneth G. Paterson, Srdjan Capkun:
Message Time of Arrival Codes: A Fundamental Primitive for Secure Distance Measurement. CoRR abs/1911.11052 (2019) - [i63]Simon Bell, Kenny Paterson, Lorenzo Cavallaro:
Catch Me (On Time) If You Can: Understanding the Effectiveness of Twitter URL Blacklists. CoRR abs/1912.02520 (2019) - [i62]Paul Grubbs, Marie-Sarah Lacharité, Brice Minaud, Kenneth G. Paterson:
Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks. IACR Cryptol. ePrint Arch. 2019: 11 (2019) - [i61]Steven D. Galbraith, Jake Massimo, Kenneth G. Paterson:
Safety in Numbers: On the Need for Robust Diffie-Hellman Parameter Validation. IACR Cryptol. ePrint Arch. 2019: 32 (2019) - [i60]Martin R. Albrecht, Torben Brandt Hansen, Kenneth G. Paterson:
libInterMAC: Beyond Confidentiality and Integrity in Practice. IACR Cryptol. ePrint Arch. 2019: 165 (2019) - [i59]Patrick Leu, Mridula Singh, Marc Roeschlin, Kenneth G. Paterson, Srdjan Capkun:
Message Time of Arrival Codes: A Fundamental Primitive for Secure Distance Measurement. IACR Cryptol. ePrint Arch. 2019: 1350 (2019) - 2018
- [j50]Kenny Paterson:
Technical perspective: On heartbleed: a hard beginnyng makth a good endyng. Commun. ACM 61(3): 108 (2018) - [j49]Kenneth G. Paterson, Jacob C. N. Schuldt:
Statistical attacks on cookie masking for RC4. Cryptogr. Commun. 10(5): 777-801 (2018) - [j48]Xutao Zhou, Diego R. López, Vijay K. Gurbani, Jan Seedorf, Alexey Melnikov, Kenny Paterson, Avri Doria, Laurent Ciavaglia, Lisandro Zambenedetti Granville, Vincent Roca, Marie-José Montpetit, Ari Keränen, Carsten Bormann, Marco Carugi, Gyu Myoung Lee, Okan Geray:
Standards News. IEEE Commun. Stand. Mag. 2(1): 12-18 (2018) - [j47]Rémi Bricout, Sean Murphy, Kenneth G. Paterson, Thyla van der Merwe:
Analysing and exploiting the Mantin biases in RC4. Des. Codes Cryptogr. 86(4): 743-770 (2018) - [j46]Michel Abdalla
, Fabrice Benhamouda
, Alain Passelègue, Kenneth G. Paterson:
Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier. J. Cryptol. 31(4): 917-964 (2018) - [j45]Martin R. Albrecht, Amit Deo, Kenneth G. Paterson:
Cold Boot Attacks on Ring and Module LWE Keys Under the NTT. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(3): 173-213 (2018) - [j44]Marie-Sarah Lacharité, Kenneth G. Paterson:
Frequency-smoothing encryption: preventing snapshot attacks on deterministically encrypted data. IACR Trans. Symmetric Cryptol. 2018(1): 277-313 (2018) - [c90]Benjamin Dowling
, Kenneth G. Paterson:
A Cryptographic Analysis of the WireGuard Protocol. ACNS 2018: 3-21 - [c89]Martin R. Albrecht, Jake Massimo, Kenneth G. Paterson, Juraj Somorovsky:
Prime and Prejudice: Primality Testing Under Adversarial Conditions. CCS 2018: 281-298 - [c88]Paul Grubbs, Marie-Sarah Lacharité, Brice Minaud, Kenneth G. Paterson:
Pump up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries. CCS 2018: 315-331 - [c87]Eyal Ronen, Kenneth G. Paterson, Adi Shamir:
Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure. CCS 2018: 1397-1414 - [c86]Platon Kotzias, Abbas Razaghpanah, Johanna Amann, Kenneth G. Paterson, Narseo Vallina-Rodriguez, Juan Caballero:
Coming of Age: A Longitudinal Study of TLS Deployment. Internet Measurement Conference 2018: 415-428 - [c85]Marie-Sarah Lacharité, Brice Minaud, Kenneth G. Paterson:
Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage. IEEE Symposium on Security and Privacy 2018: 297-314 - [i58]Benjamin Dowling, Kenneth G. Paterson:
A Cryptographic Analysis of the WireGuard Protocol. IACR Cryptol. ePrint Arch. 2018: 80 (2018) - [i57]Kenneth G. Paterson, Jacob C. N. Schuldt:
Statistical Attacks on Cookie Masking for RC4. IACR Cryptol. ePrint Arch. 2018: 93 (2018) - [i56]Martin R. Albrecht, Amit Deo, Kenneth G. Paterson:
Cold Boot Attacks on Ring and Module LWE Keys Under the NTT. IACR Cryptol. ePrint Arch. 2018: 672 (2018) - [i55]Eyal Ronen, Kenneth G. Paterson, Adi Shamir:
Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure. IACR Cryptol. ePrint Arch. 2018: 747 (2018) - [i54]Martin R. Albrecht, Jake Massimo, Kenneth G. Paterson, Juraj Somorovsky:
Prime and Prejudice: Primality Testing Under Adversarial Conditions. IACR Cryptol. ePrint Arch. 2018: 749 (2018) - [i53]Paul Grubbs, Marie-Sarah Lacharité, Brice Minaud, Kenny Paterson:
Pump up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries. IACR Cryptol. ePrint Arch. 2018: 965 (2018) - 2017
- [j43]Colin Boyd, Cas Cremers, Michèle Feltz, Kenneth G. Paterson, Bertram Poettering, Douglas Stebila
:
ASICS: authenticated key exchange security incorporating certification systems. Int. J. Inf. Sec. 16(2): 151-171 (2017) - [c84]Atul Luykx, Bart Mennink, Kenneth G. Paterson:
Analyzing Multi-key Security Degradation. ASIACRYPT (2) 2017: 575-605 - [c83]Adam Everspaugh, Kenneth G. Paterson, Thomas Ristenpart, Samuel Scott:
Key Rotation for Authenticated Encryption. CRYPTO (3) 2017: 98-129 - [c82]Martin R. Albrecht, Emmanuela Orsini
, Kenneth G. Paterson, Guy Peer, Nigel P. Smart:
Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts. ESORICS (1) 2017: 29-46 - [c81]Kenneth G. Paterson, Ricardo Villanueva-Polanco
:
Cold Boot Attacks on NTRU. INDOCRYPT 2017: 107-125 - [i52]Martin R. Albrecht, Emmanuela Orsini, Kenneth G. Paterson, Guy Peer, Nigel P. Smart:
Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts. IACR Cryptol. ePrint Arch. 2017: 354 (2017) - [i51]Atul Luykx, Bart Mennink, Kenneth G. Paterson:
Analyzing Multi-Key Security Degradation. IACR Cryptol. ePrint Arch. 2017: 435 (2017) - [i50]Adam Everspaugh, Kenneth G. Paterson, Thomas Ristenpart, Samuel Scott:
Key Rotation for Authenticated Encryption. IACR Cryptol. ePrint Arch. 2017: 527 (2017) - [i49]Marie-Sarah Lacharité, Brice Minaud, Kenneth G. Paterson:
Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage. IACR Cryptol. ePrint Arch. 2017: 701 (2017) - [i48]Marie-Sarah Lacharité, Kenneth G. Paterson:
Frequency-smoothing encryption: preventing snapshot attacks on deterministically encrypted data. IACR Cryptol. ePrint Arch. 2017: 1068 (2017) - [i47]Marc Fischlin, Felix Günther, Giorgia Azzurra Marson, Kenneth G. Paterson:
Data Is a Stream: Security of Stream-Based Channels. IACR Cryptol. ePrint Arch. 2017: 1191 (2017) - 2016
- [j42]Dan Boneh, Kenny Paterson, Nigel P. Smart:
Building a Community of Real-World Cryptographers. IEEE Secur. Priv. 14(6): 7-9 (2016) - [j41]Jean Paul Degabriele, Victoria Fehr, Marc Fischlin, Tommaso Gagliardoni, Felix Günther, Giorgia Azzurra Marson, Arno Mittelbach, Kenneth G. Paterson:
Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol. Int. J. Inf. Sec. 15(6): 637-657 (2016) - [c80]Martin R. Albrecht, Jean Paul Degabriele, Torben Brandt Hansen, Kenneth G. Paterson:
A Surfeit of SSH Cipher Suites. CCS 2016: 1480-1491 - [c79]Jean Paul Degabriele, Kenneth G. Paterson, Jacob C. N. Schuldt, Joanne Woodage:
Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results. CRYPTO (1) 2016: 403-432 - [c78]Martin R. Albrecht, Kenneth G. Paterson:
Lucky Microseconds: A Timing Attack on Amazon's s2n Implementation of TLS. EUROCRYPT (1) 2016: 622-643 - [c77]Kenneth G. Paterson, Thyla van der Merwe:
Reactive and Proactive Standardisation of TLS. SSR 2016: 160-186 - [c76]Martin R. Albrecht, Pooya Farshim, Dennis Hofheinz, Enrique Larraia, Kenneth G. Paterson:
Multilinear Maps from Obfuscation. TCC (A1) 2016: 446-473 - [i46]Rémi Bricout, Sean Murphy, Kenneth G. Paterson, Thyla van der Merwe:
Analysing and Exploiting the Mantin Biases in RC4. IACR Cryptol. ePrint Arch. 2016: 63 (2016) - [i45]Jean Paul Degabriele, Kenneth G. Paterson, Jacob C. N. Schuldt, Joanne Woodage:
Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results. IACR Cryptol. ePrint Arch. 2016: 577 (2016) - 2015
- [c75]Kenneth G. Paterson, Mario Strefler:
A Practical Attack Against the Use of RC4 in the HIVE Hidden Volume Encryption System. AsiaCCS 2015: 475-482 - [c74]Marc Fischlin, Felix Günther, Giorgia Azzurra Marson, Kenneth G. Paterson:
Data Is a Stream: Security of Stream-Based Channels. CRYPTO (2) 2015: 545-564 - [c73]Kenneth G. Paterson, Jacob C. N. Schuldt, Dale L. Sibborn, Hoeteck Wee:
Security Against Related Randomness Attacks via Reconstructive Extractors. IMACC 2015: 23-40 - [c72]Shengli Liu, Kenneth G. Paterson:
Simulation-Based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms. Public Key Cryptography 2015: 3-26 - [c71]Christina Garman, Kenneth G. Paterson, Thyla van der Merwe:
Attacks Only Get Better: Password Recovery Attacks Against RC4 in TLS. USENIX Security Symposium 2015: 113-128 - [i44]Shengli Liu, Kenneth G. Paterson:
Simulation-based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms. IACR Cryptol. ePrint Arch. 2015: 10 (2015) - [i43]