1. Nick Frymann, Daniel Gardham, Mark Manulis: Unlinkable Delegation of WebAuthn Credentials, ESORICS (3) 2022 dblp

  2. Martin R. Albrecht, Lenka Mareková, Kenneth G. Paterson, Igors Stepanovs: Four Attacks and a Proof for Telegram, IEEE Symposium on Security and Privacy 2022 dblp

  3. Chris J. Mitchell, Peter R. Wild: Constructing Orientable Sequences, IEEE Trans. Inf. Theory 2022 dblp

  4. Daniel Gardham, Mark Manulis: Revocable Hierarchical Attribute-Based Signatures from Lattices, ACNS 2022 dblp

  5. Haibat Khan, Benjamin Dowling, Keith M. Martin: Pragmatic authenticated key agreement for IEEE Std 802.15.6, Int. J. Inf. Sec. 2022 dblp

  6. Carlos Cid, Lorenzo Grassi, Aldo Gunsing, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger: Influence of the Linear Layer on the Algebraic Degree in SP-Networks, IACR Trans. Symmetric Cryptol. 2022 dblp

  7. Tako Boris Fouotsa, Péter Kutas, Simon-Philipp Merz, Yan Bo Ti: On the Isogeny Problem with Torsion Point Information, Public Key Cryptography (1) 2022 dblp

  8. Liqun Chen, Siaw-Lynn Ng: Securing emergent behaviour in swarm robotics, J. Inf. Secur. Appl. 2022 dblp

  9. Lydia Garms, Siaw-Lynn Ng, Elizabeth A. Quaglia, Giulia Traverso: Anonymity and rewards in peer rating systems, J. Comput. Secur. 2022 dblp

  10. Carlos Cid, John Petter Indrøy, Håvard Raddum: FASTA - A Stream Cipher for Fast FHE Evaluation, CT-RSA 2022 dblp

  11. Keitaro Hashimoto, Shuichi Katsumata, Eamonn W. Postlethwaite, Thomas Prest, Bas Westerbaan: A Concrete Treatment of Efficient Continuous Group Key Agreement via Multi-Recipient PKEs, CCS 2021 dblp

  12. Gaëtan Pradel, Chris J. Mitchell: Privacy-Preserving Biometric Matching Using Homomorphic Encryption, TrustCom 2021 dblp

  13. Rouzbeh Behnia, Eamonn W. Postlethwaite, Muslum Ozgur Ozmen, Attila Altay Yavuz: Lattice-Based Proof-of-Work for Post-Quantum Blockchains, DPM/CBT@ESORICS 2021 dblp

  14. Chris J. Mitchell: How not to secure wireless sensor networks: a plethora of insecure polynomial-based key pre-distribution schemes, IET Inf. Secur. 2021 dblp

  15. Marcel Armour, Carlos Cid: Partition Oracles from Weak Key Forgeries, CANS 2021 dblp

  16. Ashley Fraser, Elizabeth A. Quaglia: Report and Trace Ring Signatures, CANS 2021 dblp

  17. Andrea Basso, Péter Kutas, Simon-Philipp Merz, Christophe Petit, Antonio Sanso: Cryptanalysis of an Oblivious PRF from Supersingular Isogenies, ASIACRYPT (1) 2021 dblp

  18. Liqun Chen, Chris J. Mitchell, Thanassis Giannetsos, Daniele Sgandurra: CYSARM@CCS ‘21: Proceedings of the 3rd Workshop on Cyber-Security Arms Race, Virtual Event, Republic of Korea, 19 November 2021, ACM 2021 dblp

  19. Maryam Mehrnezhad, Thyla van der Merwe, Chris J. Mitchell: Guest Editorial: Security and Privacy, IEEE Commun. Stand. Mag. 2021 dblp

  20. Liam Medley, Elizabeth A. Quaglia: Collaborative Verifiable Delay Functions, Inscrypt 2021 dblp

  21. Martin R. Albrecht, Jorge Blasco, Rikke Bjerg Jensen, Lenka Mareková: Collective Information Security in Large-Scale Urban Protests: the Case of Hong Kong, USENIX Security Symposium 2021 dblp

  22. Hiroki Okada, Shinsaku Kiyomoto, Carlos Cid: Integer-Wise Functional Bootstrapping on TFHE: Applications in Secure Integer Arithmetics, Inf. 2021 dblp

  23. Marc Sel, Chris J. Mitchell: Automating the Evaluation of Trustworthiness, TrustBus 2021 dblp

  24. Martin R. Albrecht, Russell W. F. Lai: Subtractive Sets over Cyclotomic Rings - Limits of Schnorr-Like Arguments over Lattices, CRYPTO (2) 2021 dblp

  25. Martin R. Albrecht, Shi Bai, Jianwei Li, Joe Rowell: Lattice Reduction with Approximate Enumeration Oracles - Practical Algorithms and Concrete Performance, CRYPTO (2) 2021 dblp

  26. Hiroki Okada, Shinsaku Kiyomoto, Carlos Cid: A Comparison of GKE Protocols based on SIDH, SECRYPT 2021 dblp

  27. Jianwei Li: On the Smallest Ratio Problem of Lattice Bases, ISSAC 2021 dblp

  28. Martin R. Albrecht, Nadia Heninger: On Bounded Distance Decoding with Predicate: Breaking the “Lattice Barrier” for the Hidden Number Problem, EUROCRYPT (1) 2021 dblp

  29. Péter Kutas, Simon-Philipp Merz, Christophe Petit, Charlotte Weitkämper: One-Way Functions and Malleability Oracles: Hidden Shift Attacks on Isogeny-Based Protocols, EUROCRYPT (1) 2021 dblp

  30. Martin R. Albrecht, Jorge Blasco, Rikke Bjerg Jensen, Lenka Mareková: Mesh Messaging in Large-Scale Protests: Breaking Bridgefy, CT-RSA 2021 dblp

  31. Martin R. Albrecht, Alex Davidson, Amit Deo, Nigel P. Smart: Round-Optimal Verifiable Oblivious Pseudorandom Functions from Ideal Lattices, Public Key Cryptography (2) 2021 dblp

  32. Eamonn W. Postlethwaite, Fernando Virdia: On the Success Probability of Solving Unique SVP via BKZ, Public Key Cryptography (1) 2021 dblp

  33. Chris J. Mitchell: Yet another insecure group key distribution scheme using secret sharing, J. Inf. Secur. Appl. 2021 dblp

  34. Liqun Chen, Chris J. Mitchell, Thanassis Giannetsos, Daniele Sgandurra: CYSARM@CCS ‘20: Proceedings of the 2nd Workshop on Cyber-Security Arms Race, Virtual Event, USA, November, 2020, ACM 2020 dblp

  35. Jeroen Pijnenburg, Bertram Poettering: Efficiency Improvements for Encrypt-to-Self, CYSARM@CCS 2020 dblp

  36. Sean Murphy, Maura B. Paterson, Christine Swart: Boolean Ring Cryptographic Equation Solving, SAC 2020 dblp

  37. Ashley Fraser, Elizabeth A. Quaglia: Protecting the Privacy of Voters: New Definitions of Ballot Secrecy for E-Voting, SAC 2020 dblp

  38. Steven D. Galbraith, Robert Granger, Simon-Philipp Merz, Christophe Petit: On Index Calculus Algorithms for Subfield Curves, SAC 2020 dblp

  39. Sean Murphy, Rachel Player: Discretisation and Product Distributions in Ring-LWE, J. Math. Cryptol. 2020 dblp

  40. Gaëtan Pradel, Chris J. Mitchell: Post-quantum Certificates for Electronic Travel Documents, DETIPS/DeSECSys/MPS/SPOSE@ESORICS 2020 dblp

  41. Martin R. Albrecht, Shi Bai, Pierre-Alain Fouque, Paul Kirchner, Damien Stehlé, Weiqiang Wen: Faster Enumeration-Based Lattice Reduction: Root Hermite Factor k, CRYPTO (2) 2020 dblp

  42. Jan-Pieter D’Anvers, Mélissa Rossi, Fernando Virdia: (One) Failure Is Not an Option: Bootstrapping the Search for Failures in Lattice-Based Encryption Schemes, EUROCRYPT (3) 2020 dblp

  43. Simon-Philipp Merz, Romy Minko, Christophe Petit: Another Look at Some Isogeny Hardness Assumptions, CT-RSA 2020 dblp

  44. Andrea Basso, Péter Kutas, Simon-Philipp Merz, Christophe Petit, Charlotte Weitkämper: On Adaptive Attacks Against Jao-Urbanik’s Isogeny-Based Protocol, AFRICACRYPT 2020 dblp

  45. Martin R. Albrecht, Vlad Gheorghiu, Eamonn W. Postlethwaite, John M. Schanck: Estimating Quantum Speedups for Lattice Sieves, ASIACRYPT (2) 2020 dblp

  46. Carlos Cid, Akinori Hosoyamada, Yunwen Liu, Siang Meng Sim: Quantum Cryptanalysis on Contracting Feistel Structures and Observation on Related-Key Settings, INDOCRYPT 2020 dblp

  47. Hiroki Okada, Shinsaku Kiyomoto, Carlos Cid: Integerwise Functional Bootstrapping on TFHE, ISC 2020 dblp

  48. Thyla van der Merwe, Chris J. Mitchell, Maryam Mehrnezhad: Security Standardisation Research - 6th International Conference, SSR 2020, London, UK, November 30 - December 1, 2020, Proceedings, Springer 2020 dblp

  49. Jodie Knapp, Elizabeth A. Quaglia: Fair and Sound Secret Sharing from Homomorphic Time-Lock Puzzles, ProvSec 2020 dblp

  50. Wanpeng Li, Chris J. Mitchell: User Access Privacy in OAuth 2.0 and OpenID Connect, EuroS&P Workshops 2020 dblp

  51. Jeroen Pijnenburg, Bertram Poettering: Encrypt-to-Self: Securely Outsourcing Storage, ESORICS (1) 2020 dblp

  52. Martin R. Albrecht, Pooya Farshim, Shuai Han, Dennis Hofheinz, Enrique Larraia, Kenneth G. Paterson: Multilinear Maps from Obfuscation, J. Cryptol. 2020 dblp

  53. Anamaria Costache, Kim Laine, Rachel Player: Evaluating the Effectiveness of Heuristic Worst-Case Noise Analysis in FHE, ESORICS (2) 2020 dblp

  54. Lydia Garms, Siaw-Lynn Ng, Elizabeth A. Quaglia, Giulia Traverso: Anonymity and Rewards in Peer Rating Systems, SCN 2020 dblp

  55. Divesh Aggarwal, Jianwei Li, Phong Q. Nguyen, Noah Stephens-Davidowitz: Slide Reduction, Revisited - Filling the Gaps in SVP Approximation, CRYPTO (2) 2020 dblp

  56. Jeroen Pijnenburg, Bertram Poettering: Key Assignment Schemes with Authenticated Encryption, revisited, IACR Trans. Symmetric Cryptol. 2020 dblp

  57. Haibat Khan, Keith M. Martin: A survey of subscription privacy on the 5G radio interface - The past, present and future, J. Inf. Secur. Appl. 2020 dblp

  58. Morten Øygarden, Patrick Felke, Håvard Raddum, Carlos Cid: Cryptanalysis of the Multivariate Encryption Scheme EFLASH, CT-RSA 2020 dblp

  59. Chris J. Mitchell: The impact of quantum computing on real-world security: A 5G case study, Comput. Secur. 2020 dblp

  60. Samuel Jaques, Michael Naehrig, Martin Roetteler, Fernando Virdia: Implementing Grover Oracles for Quantum Key Search on AES and LowMC, EUROCRYPT (2) 2020 dblp

  61. Craig Costello, Patrick Longa, Michael Naehrig, Joost Renes, Fernando Virdia: Improved Classical Cryptanalysis of SIKE in Practice, Public Key Cryptography (2) 2020 dblp

  62. Wanpeng Li, Chris J. Mitchell, Thomas M. Chen: OAuthGuard: Protecting User Security and Privacy with OAuth 2.0 and OpenID Connect, SSR 2019 dblp

  63. Martin R. Albrecht, Léo Ducas, Gottfried Herold, Elena Kirshanova, Eamonn W. Postlethwaite, Marc Stevens: The General Sieve Kernel and New Records in Lattice Reduction, EUROCRYPT (2) 2019 dblp

  64. Elena Kirshanova, Erik Mårtensson, Eamonn W. Postlethwaite, Subhayan Roy Moulik: Quantum Algorithms for the Approximate k-List Problem and Their Application to Lattice Sieving, ASIACRYPT (1) 2019 dblp

  65. Simon-Philipp Merz, Christophe Petit: Factoring Products of Braids via Garside Normal Form, Public Key Cryptography (2) 2019 dblp

  66. Liqun Chen, Chris J. Mitchell, Thanassis Giannetsos, Daniele Sgandurra: Proceedings of the 1st ACM Workshop on Workshop on Cyber-Security Arms Race, CYSARM@CCS 2019, London, UK, November 15, 2019, ACM 2019 dblp

  67. Angelique Faye Loe, Elizabeth A. Quaglia: You Shall Not Join: A Measurement Study of Cryptocurrency Peer-to-Peer Bootstrapping Techniques, CCS 2019 dblp

  68. Marcel Armour, Bertram Poettering: Substitution Attacks against Message Authentication, IACR Trans. Symmetric Cryptol. 2019 dblp

  69. Marcel Armour, Bertram Poettering: Subverting Decryption in AEAD, IMACC 2019 dblp

  70. Haibat Khan, Keith M. Martin: On the Efficacy of New Privacy Attacks against 5G AKA, ICETE (2) 2019 dblp

  71. Martin R. Albrecht, Christian Hanser, Andrea Höller, Thomas Pöppelmann, Fernando Virdia, Andreas Wallner: Implementing RLWE-based Schemes Using an RSA Co-Processor, IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019 dblp

  72. Martin R. Albrecht, Torben Brandt Hansen, Kenneth G. Paterson: libInterMAC: Beyond Confidentiality and Integrity in Practice, IACR Trans. Symmetric Cryptol. 2019 dblp

  73. Martin R. Albrecht, Benjamin R. Curtis, Thomas Wunderer: Exploring Trade-offs in Batch Bounded Distance Decoding, SAC 2019 dblp

  74. Benjamin R. Curtis, Rachel Player: On the Feasibility and Impact of Standardising Sparse-secret LWE Parameter Sets for Homomorphic Encryption, WAHC@CCS 2019 dblp

  75. Martin R. Albrecht, Carlos Cid, Lorenzo Grassi, Dmitry Khovratovich, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger: Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC, ASIACRYPT (3) 2019 dblp

  76. Martin R. Albrecht, Lorenzo Grassi, Léo Perrin, Sebastian Ramacher, Christian Rechberger, Dragos Rotaru, Arnab Roy, Markus Schofnegger: Feistel Structures for MPC, and More, ESORICS (2) 2019 dblp

  77. Siaw-Lynn Ng, Maura B. Paterson: Functional repair codes: a view from projective geometry, Des. Codes Cryptogr. 2019 dblp

  78. Ashley Fraser, Elizabeth A. Quaglia, Ben Smyth: A Critique of Game-Based Definitions of Receipt-Freeness for Voting, ProvSec 2019 dblp

  79. Carlos Cid, Michael J. Jacobson Jr.: Selected Areas in Cryptography - SAC 2018 - 25th International Conference, Calgary, AB, Canada, August 15-17, 2018, Revised Selected Papers, Springer 2019 dblp

  80. Jianwei Li, Phong Q. Nguyen: Computing a Lattice Basis Revisited, ISSAC 2019 dblp

  81. Lydia Garms, Elizabeth A. Quaglia: A New Approach to Modelling Centralised Reputation Systems, AFRICACRYPT 2019 dblp

  82. Sean Murphy, Rachel Player: \delta -subgaussian Random Variables in Cryptography, ACISP 2019 dblp

  83. Chris J. Mitchell: Security issues in a group key establishment protocol, Comput. J. 2019 dblp

  84. Rachel Player: Parameter selection in lattice-based cryptography, Royal Holloway, University of London, Egham, UK 2018 dblp

  85. Wanpeng Li, Chris J. Mitchell, Thomas M. Chen: Mitigating CSRF attacks on OAuth 2.0 Systems, PST 2018 dblp

  86. Wanpeng Li, Chris J. Mitchell, Thomas M. Chen: Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations, Security Protocols Workshop 2018 dblp

  87. Jorge Blasco, Elizabeth A. Quaglia: InfoSec Cinema: Using Films for Information Security Teaching, ASE @ USENIX Security Symposium 2018 dblp

  88. Martin R. Albrecht, Jake Massimo, Kenneth G. Paterson, Juraj Somorovsky: Prime and Prejudice: Primality Testing Under Adversarial Conditions, CCS 2018 dblp

  89. Babak Daghighi, Miss Laiha Mat Kiah, Salman Iqbal, Muhammad Habib Ur Rehman, Keith M. Martin: Host mobility key management in dynamic secure group communication, Wirel. Networks 2018 dblp

  90. Carlos Cid, Tao Huang, Thomas Peyrin, Yu Sasaki, Ling Song: Boomerang Connectivity Table: A New Cryptanalysis Tool, EUROCRYPT (2) 2018 dblp

  91. Hiroki Okada, Carlos Cid, Seira Hidano, Shinsaku Kiyomoto: Linear Depth Integer-Wise Homomorphic Division, WISTP 2018 dblp

  92. Fatma Al Maqbali, Chris J. Mitchell: Email-based Password Recovery - Risking or Rescuing Users?, ICCST 2018 dblp

  93. Nasser Mohammed Al-Fannah, Wanpeng Li, Chris J. Mitchell: Beyond Cookie Monster Amnesia: Real World Persistent Online Tracking, ISC 2018 dblp

  94. Martin R. Albrecht, Amit Deo, Kenneth G. Paterson: Cold Boot Attacks on Ring and Module LWE Keys Under the NTT, IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018 dblp

  95. Haibat Khan, Benjamin Dowling, Keith M. Martin: Highly Efficient Privacy-Preserving Key Agreement for Wireless Body Area Networks, TrustCom/BigDataSE 2018 dblp

  96. Liqun Chen, Jinguang Han, Chris J. Mitchell: Message from the Guest Editors, Int. J. Inf. Sec. 2018 dblp

  97. Maxime Meyer, Elizabeth A. Quaglia, Ben Smyth: Attacks Against GSMA’s M2M Remote Provisioning (Short Paper), Financial Cryptography 2018 dblp

  98. Rémi Bricout, Sean Murphy, Kenneth G. Paterson, Thyla van der Merwe: Analysing and exploiting the Mantin biases in RC4, Des. Codes Cryptogr. 2018 dblp

  99. Hao Chen, Kim Laine, Rachel Player, Yuhou Xia: High-Precision Arithmetic in Homomorphic Encryption, CT-RSA 2018 dblp

  100. Haibat Khan, Benjamin Dowling, Keith M. Martin: Identity Confidentiality in 5G Mobile Telephony Systems, SSR 2018 dblp

  101. Angelique Faye Loe, Elizabeth A. Quaglia: Conquering Generals: an NP-Hard Proof of Useful Work, CRYBLOCK@MobiSys 2018 dblp

  102. Martin R. Albrecht, Benjamin R. Curtis, Amit Deo, Alex Davidson, Rachel Player, Eamonn W. Postlethwaite, Fernando Virdia, Thomas Wunderer: Estimate All the {LWE, NTRU} Schemes!, SCN 2018 dblp

  103. Elizabeth A. Quaglia, Ben Smyth: Secret, verifiable auctions from elections, Theor. Comput. Sci. 2018 dblp

  104. Elizabeth A. Quaglia, Ben Smyth: Authentication with Weaker Trust Assumptions for Voting Systems, AFRICACRYPT 2018 dblp

  105. Liqun Chen, Qin Li, Keith M. Martin, Siaw-Lynn Ng: Private reputation retrieval in public - a privacy-aware announcement scheme for VANETs, IET Inf. Secur. 2017 dblp

  106. Sarah Louise Renwick, Keith M. Martin: Practical Architectures for Deployment of Searchable Encryption in a Cloud Environment, Cryptogr. 2017 dblp

  107. Thalia M. Laing, Keith M. Martin, Maura B. Paterson, Douglas R. Stinson: Localised multisecret sharing, Cryptogr. Commun. 2017 dblp

  108. Fatma Al Maqbali, Chris J. Mitchell: AutoPass: An automatic password generator, ICCST 2017 dblp

  109. Carlos Cid, Tao Huang, Thomas Peyrin, Yu Sasaki, Ling Song: A Security Analysis of Deoxys and its Internal Tweakable Block Ciphers, IACR Trans. Symmetric Cryptol. 2017 dblp

  110. Luca Rose, Elizabeth A. Quaglia, Stefan Valentin: Increasing the Security of Wireless Communication through Relaying and Interference Generation, WCNC 2017 dblp

  111. Giovanni Livraga, Chris J. Mitchell: Security and Trust Management - 13th International Workshop, STM 2017, Oslo, Norway, September 14-15, 2017, Proceedings, Springer 2017 dblp

  112. Hao Chen, Kim Laine, Rachel Player: Simple Encrypted Arithmetic Library - SEAL v2.1, Financial Cryptography Workshops 2017 dblp

  113. Lydia Garms, Keith M. Martin, Siaw-Lynn Ng: Reputation Schemes for Pervasive Social Networks with Anonymity (Short Paper), PST 2017 dblp

  114. Christian A. Gorke, Christian Janson, Frederik Armknecht, Carlos Cid: Cloud Storage File Recoverability, SCC@AsiaCCS 2017 dblp

  115. Mohammed Shafiul Alam Khan, Chris J. Mitchell: Trashing IMSI catchers in mobile networks, WISEC 2017 dblp

  116. Jeremie Leguay, Georgios S. Paschos, Elizabeth A. Quaglia, Ben Smyth: CryptoCache: Network caching with confidentiality, ICC 2017 dblp

  117. Carlos Aguilar Melchor, Martin R. Albrecht, Thomas Ricosset: Sampling from Arbitrary Centered Discrete Gaussians for Lattice-Based Cryptography, ACNS 2017 dblp

  118. Martin R. Albrecht, Alex Davidson, Enrique Larraia: Notes on GGH13 Without the Presence of Ideals, IMACC 2017 dblp

  119. Martin R. Albrecht, Amit Deo: Large Modulus Ring-LWE ≥ Module-LWE, ASIACRYPT (1) 2017 dblp

  120. Martin R. Albrecht, Florian Göpfert, Fernando Virdia, Thomas Wunderer: Revisiting the Expected Cost of Solving uSVP and Applications to LWE, ASIACRYPT (1) 2017 dblp

  121. James Alderman, Keith M. Martin, Sarah Louise Renwick: Multi-level Access in Searchable Symmetric Encryption, Financial Cryptography Workshops 2017 dblp

  122. James Alderman, Benjamin R. Curtis, Oriol Farràs, Keith M. Martin, Jordi Ribes-González: Private Outsourced Kriging Interpolation, Financial Cryptography Workshops 2017 dblp

  123. Martin R. Albrecht, Emmanuela Orsini, Kenneth G. Paterson, Guy Peer, Nigel P. Smart: Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts, ESORICS (1) 2017 dblp

  124. Alex Davidson, Carlos Cid: An Efficient Toolkit for Computing Private Set Operations, ACISP (2) 2017 dblp

  125. Martin R. Albrecht: On Dual Lattice Attacks Against Small-Secret LWE and Parameter Choices in HElib and SEAL, EUROCRYPT (2) 2017 dblp

  126. Liqun Chen, Thalia M. Laing, Keith M. Martin: Revisiting and Extending the AONT-RS Scheme: A Robust Computationally Secure Secret Sharing Scheme, AFRICACRYPT 2017 dblp

  127. Johannes Buchmann, Florian Göpfert, Rachel Player, Thomas Wunderer: On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack, AFRICACRYPT 2016 dblp

  128. Martin R. Albrecht, Jean Paul Degabriele, Torben Brandt Hansen, Kenneth G. Paterson: A Surfeit of SSH Cipher Suites, CCS 2016 dblp

  129. Wanpeng Li, Chris J. Mitchell: Analysing the Security of Google’s Implementation of OpenID Connect, DIMVA 2016 dblp

  130. Konstantinos Mersinas, Bjoern Hartig, Keith M. Martin, Andrew Seltzer: Are information security professionals expected value maximizers?: An experiment and survey-based test, J. Cybersecur. 2016 dblp

  131. Dieter Jungnickel, Jennifer D. Key, Chris J. Mitchell, Ronald C. Mullin, Peter R. Wild: Editorial for the 25th anniversary issue, Des. Codes Cryptogr. 2016 dblp

  132. Liqun Chen, Chris J. Mitchell: Message from the guest editors, Int. J. Inf. Sec. 2016 dblp

  133. Mohammed Shafiul Alam Khan, Chris J. Mitchell: Retrofitting Mutual Authentication to GSM Using RAND Hijacking, STM 2016 dblp

  134. Fatma Al Maqbali, Chris J. Mitchell: Password Generators: Old Ideas and New, WISTP 2016 dblp

  135. Chris J. Mitchell: On the Security of 2-Key Triple DES, IEEE Trans. Inf. Theory 2016 dblp

  136. Martin R. Albrecht, Jean-Charles Faugère, Pooya Farshim, Gottfried Herold, Ludovic Perret: Polly Cracker, revisited, Des. Codes Cryptogr. 2016 dblp

  137. Michelle Kendall, Keith M. Martin: Graph-theoretic design and analysis of key predistribution schemes, Des. Codes Cryptogr. 2016 dblp

  138. Siaw-Lynn Ng, Maura B. Paterson: Disjoint difference families and their applications, Des. Codes Cryptogr. 2016 dblp

  139. Lidong Chen, David A. McGrew, Chris J. Mitchell: Security Standardisation Research - Third International Conference, SSR 2016, Gaithersburg, MD, USA, December 5-6, 2016, Proceedings, Springer 2016 dblp

  140. Martin R. Albrecht, Shi Bai, Léo Ducas: A Subfield Lattice Attack on Overstretched NTRU Assumptions - Cryptanalysis of Some FHE and Graded Encoding Schemes, CRYPTO (1) 2016 dblp

  141. Elizabeth A. Quaglia, Stefano Tomasin: Geo-specific encryption through implicitly authenticated location for 5G wireless systems, SPAWC 2016 dblp

  142. Martin R. Albrecht, Kenneth G. Paterson: Lucky Microseconds: A Timing Attack on Amazon’s s2n Implementation of TLS, EUROCRYPT (1) 2016 dblp

  143. Liqun Chen, Thalia M. Laing, Keith M. Martin: Efficient, XOR-Based, Ideal (t, n)- threshold Schemes, CANS 2016 dblp

  144. Martin R. Albrecht, Pooya Farshim, Dennis Hofheinz, Enrique Larraia, Kenneth G. Paterson: Multilinear Maps from Obfuscation, TCC (A1) 2016 dblp

  145. James Alderman, Christian Janson, Carlos Cid, Jason Crampton: Hybrid Publicly Verifiable Computation, CT-RSA 2016 dblp

  146. Martin R. Albrecht, Lorenzo Grassi, Christian Rechberger, Arnab Roy, Tyge Tiessen: MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity, ASIACRYPT (1) 2016 dblp

  147. Alex Davidson, Gregory Fenn, Carlos Cid: A Model for Secure and Mutually Beneficial Software Vulnerability Sharing, WISCS@CCS 2016 dblp

  148. Gordon Procter, Carlos Cid: On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes, J. Cryptol. 2015 dblp

  149. Martin R. Albrecht, Rachel Player, Sam Scott: On the concrete hardness of Learning with Errors, J. Math. Cryptol. 2015 dblp

  150. Constantinos Macropoulos, Keith M. Martin: Balancing Privacy and Surveillance in the Cloud, IEEE Cloud Comput. 2015 dblp

  151. Mohammed Shafiul Alam Khan, Chris J. Mitchell: Improving Air Interface User Privacy in Mobile Telephony, SSR 2015 dblp

  152. Mwawi Nyirenda Kayuni, Mohammed Shafiul Alam Khan, Wanpeng Li, Chris J. Mitchell, Po-Wah Yau: Generating Unlinkable IPv6 Addresses, SSR 2015 dblp

  153. Konstantinos Mersinas, Bjoern Hartig, Keith M. Martin, Andrew Seltzer: Experimental Elicitation of Risk Behaviour amongst Information Security Professionals, WEIS 2015 dblp

  154. Siaw-Lynn Ng, S. Owen: A note on an upper bound of traceability codes, Australas. J Comb. 2015 dblp

  155. Martin R. Albrecht, Carlos Cid, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret: Algebraic algorithms for LWE problems, ACM Commun. Comput. Algebra 2015 dblp

  156. Martin R. Albrecht, Catalin Cocis, Fabien Laguillaumie, Adeline Langlois: Implementing Candidate Graded Encoding Schemes from Ideal Lattices, ASIACRYPT (2) 2015 dblp

  157. Javier López, Chris J. Mitchell: Information Security - 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015, Proceedings, Springer 2015 dblp

  158. Martin R. Albrecht, Christian Rechberger, Thomas Schneider, Tyge Tiessen, Michael Zohner: Ciphers for MPC and FHE, EUROCRYPT (1) 2015 dblp

  159. Martin R. Albrecht, Carlos Cid, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret: On the complexity of the BKW algorithm on LWE, Des. Codes Cryptogr. 2015 dblp

  160. Carlos Cid, Christian Rechberger: Fast Software Encryption - 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papers, Springer 2015 dblp

  161. James Alderman, Christian Janson, Carlos Cid, Jason Crampton: Access Control in Publicly Verifiable Outsourced Computation, AsiaCCS 2015 dblp

  162. Wanpeng Li, Chris J. Mitchell: Addressing Threats to Real-World Identity Management Systems, ISSE 2015 dblp

  163. M. H. R. Khouzani, Piotr Mardziel, Carlos Cid, Mudhakar Srivatsa: Picking vs. Guessing Secrets: A Game-Theoretic Analysis, CSF 2015 dblp

  164. Carlos Cid, Loïc Ferreira, Gordon Procter, Matthew J. B. Robshaw: Algebraic Cryptanalysis and RFID Authentication, RFIDSec 2015 dblp

  165. James Alderman, Christian Janson, Keith M. Martin, Sarah Louise Renwick: Extended Functionality in Verifiable Searchable Encryption, BalkanCryptSec 2015 dblp

  166. Wanpeng Li, Chris J. Mitchell: Security Issues in OAuth 2.0 SSO Implementations, ISC 2014 dblp

  167. Amizah Malip, Siaw-Lynn Ng, Qin Li: A certificateless anonymous authenticated announcement scheme in vehicular ad hoc networks, Secur. Commun. Networks 2014 dblp

  168. Martin R. Albrecht, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret, Yosuke Todo, Keita Xagawa: Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions, Public Key Cryptography 2014 dblp

  169. Michelle Kendall, Keith M. Martin, Siaw-Lynn Ng, Maura B. Paterson, Douglas R. Stinson: Broadcast-Enhanced Key Predistribution Schemes, ACM Trans. Sens. Networks 2014 dblp

  170. Martin R. Albrecht, Benedikt Driessen, Elif Bilge Kavun, Gregor Leander, Christof Paar, Tolga Yalçin: Block Ciphers - Focus on the Linear Layer (feat. PRIDE), CRYPTO (1) 2014 dblp

  171. Liqun Chen, Chris J. Mitchell: Security Standardisation Research - First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings, Springer 2014 dblp

  172. Martin R. Albrecht, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret: Lazy Modulus Switching for the BKW Algorithm on LWE, Public Key Cryptography 2014 dblp

  173. Mohammed Shafiul Alam Khan, Chris J. Mitchell: Another Look at Privacy Threats in 3G Mobile Telephony, ACISP 2014 dblp

  174. Adam McCarthy, Ben Smyth, Elizabeth A. Quaglia: Hawk and Aucitas: e-Auction Schemes from the Helios and Civitas e-Voting Schemes, Financial Cryptography 2014 dblp

  175. M. H. R. Khouzani, Viet Pham, Carlos Cid: Strategic Discovery and Sharing of Vulnerabilities in Competitive Environments, GameSec 2014 dblp

  176. Viet Pham, M. H. R. Khouzani, Carlos Cid: Optimal Contracts for Outsourced Computation, GameSec 2014 dblp

  177. Zhiqian Xu, Keith M. Martin: Anonymous User Revocation for Using Attribute-Based Signature in Cloud Computing, CloudCom 2014 dblp

  178. James Alderman, Christian Janson, Carlos Cid, Jason Crampton: Revocation in Publicly Verifiable Outsourced Computation, Inscrypt 2014 dblp

  179. Cagatay Capar, Dennis Goeckel, Kenneth G. Paterson, Elizabeth A. Quaglia, Don Towsley, Murtaza Zafer: Signal-flow-based analysis of wireless security protocols, Inf. Comput. 2013 dblp

  180. Liqun Chen, Qin Li, Keith M. Martin, Siaw-Lynn Ng: A privacy-aware reputation-based announcement scheme for VANETs, WiVeC 2013 dblp

  181. Chunhua Chen, Chris J. Mitchell, Shaohua Tang: Ubiquitous One-Time Password Service Using the Generic Authentication Architecture, Mob. Networks Appl. 2013 dblp

  182. Haitham S. Al-Sinani, Chris J. Mitchell: Enabling interoperation between Shibboleth and Information Card systems, Secur. Commun. Networks 2013 dblp

  183. Sabrina De Capitani di Vimercati, Chris J. Mitchell: Public Key Infrastructures, Services and Applications - 9th European Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers, Springer 2013 dblp

  184. Seung Geol Choi, Jonathan Katz, Ranjit Kumaresan, Carlos Cid: Multi-Client Non-interactive Verifiable Computation, TCC 2013 dblp

  185. Simone Fischer-Hübner, Elisabeth de Leeuw, Chris J. Mitchell: Policies and Research in Identity Management - Third IFIP WG 11.6 Working Conference, IDMAN 2013, London, UK, April 8-9, 2013. Proceedings, Springer 2013 dblp

  186. Chris J. Mitchell: Analysing the IOBC Authenticated Encryption Mode, ACISP 2013 dblp

  187. Martin R. Albrecht, Robert Fitzpatrick, Florian Göpfert: On the Efficacy of Solving LWE by Reduction to Unique-SVP, ICISC 2013 dblp

  188. Pooya Farshim, Benoît Libert, Kenneth G. Paterson, Elizabeth A. Quaglia: Robust Encryption, Revisited, Public Key Cryptography 2013 dblp

  189. Gordon Procter, Carlos Cid: On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes, FSE 2013 dblp

  190. Zhiqian Xu, Keith M. Martin: A Practical Deployment Framework for Use of Attribute-Based Encryption in Data Protection, HPCC/EUC 2013 dblp

  191. Martin R. Albrecht, Carlos Cid, Jean-Charles Faugère, Ludovic Perret: On the relation between the MXL family of algorithms and Gröbner basis algorithms, J. Symb. Comput. 2012 dblp

  192. Simon R. Blackburn, Carlos Cid, Ciaran Mullan: Cryptanalysis of three matrix-based key establishment protocols, J. Math. Cryptol. 2012 dblp

  193. Sean Murphy: The effectiveness of the linear hull effect, J. Math. Cryptol. 2012 dblp

  194. Qin Li, Amizah Malip, Keith M. Martin, Siaw-Lynn Ng, Jie Zhang: A Reputation-Based Announcement Scheme for VANETs, IEEE Trans. Veh. Technol. 2012 dblp

  195. Qin Li, Jie Zhang, Keith M. Martin: Feedback as “Shadow of the Present”: An Alternative to Reputation Systems for E-marketplaces, TrustCom 2012 dblp

  196. Gina Kounga, Chris J. Mitchell, Thomas Walter: **Generating certification authority authenticated public keys in **, Secur. Commun. Networks 2012 dblp

  197. Martin R. Albrecht, Gregor Leander: An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers, Selected Areas in Cryptography 2012 dblp

  198. Chris J. Mitchell, Allan Tomlinson: Trusted Systems, 4th International Conference, INTRUST 2012, London, UK, December 17-18, 2012. Proceedings, Springer 2012 dblp

  199. Martin R. Albrecht: The M4RIE library for dense linear algebra over small fields with even characteristic, ISSAC 2012 dblp

  200. Benoît Libert, Kenneth G. Paterson, Elizabeth A. Quaglia: Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model, Public Key Cryptography 2012 dblp

  201. Chunhua Chen, Shaohua Tang, Chris J. Mitchell: Building General-Purpose Security Services on EMV Payment Cards, SecureComm 2012 dblp

  202. Yuto Nakano, Carlos Cid, Shinsaku Kiyomoto, Yutaka Miyake: Memory Access Pattern Protection for Resource-Constrained Devices, CARDIS 2012 dblp

  203. Viet Pham, Carlos Cid: Are We Compromised? Modelling Security Assessment Games, GameSec 2012 dblp

  204. Zhiqian Xu, Keith M. Martin: Dynamic User Revocation and Key Refreshing for Attribute-Based Encryption in Cloud Storage, TrustCom 2012 dblp

  205. Qin Li, Keith M. Martin, Jie Zhang: Design of a multiagent-based e-marketplace to secure service trading on the internet, ICEC 2011 dblp

  206. Shinsaku Kiyomoto, Keith M. Martin: Model for a Common Notion of Privacy Leakage on Public Database, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 2011 dblp

  207. Keith M. Martin, Maura B. Paterson, Douglas R. Stinson: Error decodable secret sharing and one-round perfectly secure message transmission for general adversary structures, Cryptogr. Commun. 2011 dblp

  208. Liqun Chen, Siaw-Lynn Ng, Guilin Wang: Threshold Anonymous Announcement in VANETs, IEEE J. Sel. Areas Commun. 2011 dblp

  209. Martin R. Albrecht, Kenneth G. Paterson: Breaking an Identity-Based Encryption Scheme Based on DHIES, IMACC 2011 dblp

  210. Haitham S. Al-Sinani, Chris J. Mitchell: Enhancing CardSpace Authentication Using a Mobile Device, DBSec 2011 dblp

  211. Boyeon Song, Chris J. Mitchell: Scalable RFID security protocols supporting tag ownership transfer, Comput. Commun. 2011 dblp

  212. Martin R. Albrecht, Carlos Cid: Cold Boot Key Recovery by Solving Polynomial Systems with Noise, ACNS 2011 dblp

  213. Yuto Nakano, Carlos Cid, Kazuhide Fukushima, Shinsaku Kiyomoto: Analysis of Message Injection in Stream Cipher-Based Hash Functions, ACNS 2011 dblp

  214. Haitham S. Al-Sinani, Chris J. Mitchell: Extending the Scope of cardspace, SIN 2011 dblp

  215. Martin R. Albrecht, Pooya Farshim, Jean-Charles Faugère, Ludovic Perret: Polly Cracker, Revisited, ASIACRYPT 2011 dblp

  216. Martin R. Albrecht, Pooya Farshim, Kenneth G. Paterson, Gaven J. Watson: On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model, FSE 2011 dblp

  217. Chunhua Chen, Chris J. Mitchell, Shaohua Tang: SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key, WISTP 2011 dblp

  218. Michelle Kendall, Keith M. Martin: On the Role of Expander Graphs in Key Predistribution Schemes for Wireless Sensor Networks, WEWoRC 2011 dblp

  219. Chunhua Chen, Chris J. Mitchell, Shaohua Tang: Building General Purpose Security Services on Trusted Computing, INTRUST 2011 dblp

  220. Haitham S. Al-Sinani, Chris J. Mitchell: Client-Based CardSpace-OpenID Interoperation, ISCIS 2011 dblp

  221. Haitham S. Al-Sinani, Chris J. Mitchell: A Universal Client-Based Identity Management Tool, EuroPKI 2011 dblp

  222. Simon R. Blackburn, Tuvi Etzion, Siaw-Lynn Ng: Traceability codes, J. Comb. Theory, Ser. A 2010 dblp

  223. Qin Li, Keith M. Martin: A Viable Grid Marketplace, ISPA 2010 dblp

  224. Liqun Chen, Chris J. Mitchell: Parsing ambiguities in authentication and key establishment protocols, Int. J. Electron. Secur. Digit. Forensics 2010 dblp

  225. Liqun Chen, Siaw-Lynn Ng: Comments on “Proving Reliability of Anonymous Information in VANETs” by Kounga, IEEE Trans. Veh. Technol. 2010 dblp

  226. Keith Mayes, Carlos Cid: The MIFARE Classic story, Inf. Secur. Tech. Rep. 2010 dblp

  227. Keith M. Martin, Maura B. Paterson, Douglas R. Stinson: Key predistribution for homogeneous wireless sensor networks with group deployment of nodes, ACM Trans. Sens. Networks 2010 dblp

  228. Jason Crampton, Rosli Daud, Keith M. Martin: Constructing Key Assignment Schemes from Chain Partitions, DBSec 2010 dblp

  229. Simon R. Blackburn, Tuvi Etzion, Keith M. Martin, Maura B. Paterson: Two-dimensional patterns with distinct differences: constructions, bounds, and maximal anticodes, IEEE Trans. Inf. Theory 2010 dblp

  230. Simon R. Blackburn, Tuvi Etzion, Keith M. Martin, Maura B. Paterson: Distinct difference configurations: multihop paths and key predistribution in sensor networks, IEEE Trans. Inf. Theory 2010 dblp

  231. Martin R. Albrecht, Gregory V. Bard, William Hart: Algorithm 898: Efficient multiplication of dense matrices over GF(2), ACM Trans. Math. Softw. 2010 dblp

  232. Haitham S. Al-Sinani, Waleed A. Alrodhan, Chris J. Mitchell: CardSpace-liberty integration for CardSpace users, IDtrust 2010 dblp

  233. Sondre Rønjom, Carlos Cid: Nonlinear Equivalence of Stream Ciphers, FSE 2010 dblp

  234. Keith M. Martin: The Rise and Fall and Rise of Combinatorial Key Predistribution, Selected Areas in Cryptography 2010 dblp

  235. Haitham S. Al-Sinani, Chris J. Mitchell: Using CardSpace as a Password Manager, IDMAN 2010 dblp

  236. Martin R. Albrecht: Algorithmic algebraic techniques and their application to block cipher cryptanalysis, Royal Holloway, University of London, Egham, UK 2010 dblp

  237. Waleed A. Alrodhan, Chris J. Mitchell: Enhancing user authentication in claim-based identity management, CTS 2010 dblp

  238. Kenneth G. Paterson, Elizabeth A. Quaglia: Time-Specific Encryption, SCN 2010 dblp

  239. Shinsaku Kiyomoto, Keith M. Martin: Towards a Common Notion of Privacy Leakage on Public Database, BWCCA 2010 dblp

  240. Martin R. Albrecht, Carlos Cid, Thomas Dullien, Jean-Charles Faugère, Ludovic Perret: Algebraic Precomputations in Differential and Integral Cryptanalysis, Inscrypt 2010 dblp

  241. Simon R. Blackburn, Carlos Cid, Ciaran Mullan: Cryptanalysis of the MST 3 public key cryptosystem, J. Math. Cryptol. 2009 dblp

  242. Martin R. Albrecht, Craig Gentry, Shai Halevi, Jonathan Katz: Attacking cryptographic schemes based on “perturbation polynomials”, CCS 2009 dblp

  243. Waleed A. Alrodhan, Chris J. Mitchell: Improving the Security of CardSpace, EURASIP J. Inf. Secur. 2009 dblp

  244. Sean Murphy, Maura B. Paterson: Geometric Ideas for Cryptographic Equation Solving in Even Characteristic, IMACC 2009 dblp

  245. Carlos Cid, Shinsaku Kiyomoto, Jun Kurihara: The rakaposhi Stream Cipher, ICICS 2009 dblp

  246. Keith M. Martin, Maura B. Paterson: Ultra-Lightweight Key Predistribution in Wireless Sensor Networks for Monitoring Linear Infrastructure, WISTP 2009 dblp

  247. Carlos Cid, Ralf-Philipp Weinmann: Block Ciphers: Algebraic Cryptanalysis and Gröbner Bases, Gröbner Bases, Coding, and Cryptography 2009 dblp

  248. Thomas Martin, Keith M. Martin, Peter R. Wild: Establishing the broadcast efficiency of the Subset Difference Revocation Scheme, Des. Codes Cryptogr. 2009 dblp

  249. Sihan Qing, Chris J. Mitchell, Guilin Wang: Information and Communications Security, 11th International Conference, ICICS 2009, Beijing, China, December 14-17, 2009. Proceedings, Springer 2009 dblp

  250. Liqun Chen, Chris J. Mitchell, Andrew P. Martin: Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings, Springer 2009 dblp

  251. Olivier Markowitch, Angelos Bilas, Jaap-Henk Hoepman, Chris J. Mitchell, Jean-Jacques Quisquater: Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks, Third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009, Proceedings, Springer 2009 dblp

  252. Shinsaku Kiyomoto, Kazuhide Fukushima, Keith M. Martin: Offline Peer-to-Peer Broadcast with Anonymity, ICETE (Selected Papers) 2009 dblp

  253. Martin R. Albrecht, Carlos Cid: Algebraic Techniques in Differential Cryptanalysis, FSE 2009 dblp

  254. Shinsaku Kiyomoto, Keith M. Martin, Kazuhide Fukushima: Privacy-Aware Location Database Service for Granular Queries, WISTP 2009 dblp

  255. Eimear Gallery, Chris J. Mitchell: Trusted Computing: Security and Applications, Cryptologia 2009 dblp

  256. Boyeon Song, Chris J. Mitchell: Scalable RFID Pseudonym Protocol, NSS 2009 dblp

  257. Chris J. Mitchell: A Novel Stateless Authentication Protocol, Security Protocols Workshop 2009 dblp

  258. Chris J. Mitchell: A Novel Stateless Authentication Protocol, Security Protocols Workshop 2009 dblp

  259. Martin R. Albrecht, Kenneth G. Paterson, Gaven J. Watson: Plaintext Recovery Attacks against SSH, IEEE Symposium on Security and Privacy 2009 dblp

  260. Keith M. Martin: On the Applicability of Combinatorial Designs to Key Predistribution for Wireless Sensor Networks, IWCC 2009 dblp

  261. Fiona Higgins, Allan Tomlinson, Keith M. Martin: Survey on Security Challenges for Swarm Robotics, ICAS 2009 dblp

  262. Geong Sen Poh, Keith M. Martin: Classification Framework for Fair Content Tracing Protocols, IWDW 2009 dblp

  263. Shinsaku Kiyomoto, Kazuhide Fukushima, Keith M. Martin: An Offline Peer-to-peer Broadcasting Scheme with Anonymity, SECRYPT 2009 dblp

  264. Sean Murphy, Maura B. Paterson: A geometric view of cryptographic equation solving, J. Math. Cryptol. 2008 dblp

  265. Keith M. Martin, Maura B. Paterson: An Application-Oriented Framework for Wireless Sensor Network Key Establishment, Electron. Notes Theor. Comput. Sci. 2008 dblp

  266. Simon R. Blackburn, Tuvi Etzion, Siaw-Lynn Ng: Prolific Codes with the Identifiable Parent Property, SIAM J. Discret. Math. 2008 dblp

  267. Shane Balfe, Eimear Gallery, Chris J. Mitchell, Kenneth G. Paterson: Challenges for Trusted Computing, IEEE Secur. Priv. 2008 dblp

  268. Waleed A. Alrodhan, Chris J. Mitchell: A client-side CardSpace-Liberty integration architecture, IDtrust 2008 dblp

  269. Boyeon Song, Chris J. Mitchell: RFID authentication protocol for low-cost tags, WISEC 2008 dblp

  270. Simon R. Blackburn, Tuvi Etzion, Keith M. Martin, Maura B. Paterson: Efficient Key Predistribution for Grid-Based Wireless Sensor Networks, ICITS 2008 dblp

  271. Simon R. Blackburn, Keith M. Martin, Maura B. Paterson, Douglas R. Stinson: Key Refreshing in Wireless Sensor Networks, ICITS 2008 dblp

  272. Geong Sen Poh, Keith M. Martin: On the Design of Buyer-Seller Watermarking Protocols without a Watermark Authority, ICETE (Selected Papers) 2008 dblp

  273. Adrian Leung, Liqun Chen, Chris J. Mitchell: On a Possible Privacy Flaw in Direct Anonymous Attestation (DAA), TRUST 2008 dblp

  274. Georgios Kalogridis, Chris J. Mitchell: Using Non-adaptive Group Testing to Construct Spy Agent Routes, ARES 2008 dblp

  275. Adrian Leung, Chris J. Mitchell: A Device Management Framework for Secure Ubiquitous Service Delivery, IAS 2008 dblp

  276. Martin R. Albrecht: Algebraic Attacks on the Courtois Toy Cipher, Cryptologia 2008 dblp

  277. Geong Sen Poh, Keith M. Martin: An Efficient Buyer-Seller Watermarking Protocol Based on Chameleon Encryption, IWDW 2008 dblp

  278. Geong Sen Poh, Keith M. Martin: On the (In)Security of Two Buyer-Seller Watermarking Protocols, SECRYPT 2008 dblp

  279. Keith M. Martin, Siaw-Lynn Ng: The combinatorics of generalised cumulative arrays, J. Math. Cryptol. 2007 dblp

  280. Chris J. Mitchell: Cryptanalysis of the EPBC Authenticated Encryption Mode, IMACC 2007 dblp

  281. Chris J. Mitchell, Fred Piper, Peter R. Wild: ID-based cryptography using symmetric primitives, Des. Codes Cryptogr. 2007 dblp

  282. Imad M. Abbadi, Chris J. Mitchell: Digital rights management using a mobile phone, ICEC 2007 dblp

  283. Eimear Gallery, Chris J. Mitchell: Trusted Mobile Platforms, FOSAD 2007 dblp

  284. Adrian Leung, Chris J. Mitchell: Ninja: Non Identity Based, Privacy Preserving Authentication for Ubiquitous Environments, UbiComp 2007 dblp

  285. Suranjith Ariyapperuma, Chris J. Mitchell: Security vulnerabilities in DNS and DNSSEC, ARES 2007 dblp

  286. Waleed A. Alrodhan, Chris J. Mitchell: Addressing privacy issues in CardSpace, IAS 2007 dblp

  287. Steve Babbage, Carlos Cid, Norbert Pramstaller, Håvard Raddum: An Analysis of the Hermes8 Stream Ciphers, ACISP 2007 dblp

  288. Geong Sen Poh, Keith M. Martin: A Framework for Design and Analysis of Asymmetric Fingerprinting Protocols, IAS 2007 dblp

  289. Miss Laiha Mat Kiah, Keith M. Martin: Host Mobility Protocol for Secure Group Communication in Wireless Mobile Environments, FGCN (1) 2007 dblp

  290. Carlos Cid: Recent developments in cryptographic hash functions: Security implications and future directions, Inf. Secur. Tech. Rep. 2006 dblp

  291. Susan G. Barwick, Wen-Ai Jackson, Keith M. Martin, Christine M. O’Keefe: Optimal updating of ideal threshold schemes, Australas. J Comb. 2006 dblp

  292. Chris J. Mitchell: Mobile Security and Trusted Computing (Mobile Sicherheit und vertrauenswürdiges Rechnen), it Inf. Technol. 2006 dblp

  293. Qiang Tang, Chris J. Mitchell: Cryptanalysis of a hybrid authentication protocol for large mobile networks, J. Syst. Softw. 2006 dblp

  294. Chris J. Mitchell: Using Human Interactive Proofs to Secure Human-Machine Interactions via Untrusted Intermediaries, Security Protocols Workshop 2006 dblp

  295. Chris J. Mitchell: Using Human Interactive Proofs to Secure Human-Machine Interactions via Untrusted Intermediaries, Security Protocols Workshop 2006 dblp

  296. Jason Crampton, Keith M. Martin, Peter R. Wild: On Key Assignment for Hierarchical Access Control, CSFW 2006 dblp

  297. Carlos Cid, Sean Murphy, Matthew J. B. Robshaw: Algebraic aspects of the advanced encryption standard, Springer 2006 dblp

  298. Adrian Leung, Chris J. Mitchell: A Service Discovery Threat Model for Ad Hoc Networks, SECRYPT 2006 dblp

  299. Sharon Nachtigal, Chris J. Mitchell: Modelling E-Business Security Using Business Processes, SECRYPT 2006 dblp

  300. Adil Alsaid, Chris J. Mitchell: A Scanning Tool for PC Root Public Key Stores, WEWoRC 2005 dblp

  301. Konstantinos Rantos, Chris J. Mitchell: Matching key recovery mechanisms to business requirements, Comput. Secur. 2005 dblp

  302. Lars R. Knudsen, Chris J. Mitchell: Partial Key Recovery Attack Against RMAC, J. Cryptol. 2005 dblp

  303. Aline Gouget, Hervé Sibert, Côme Berbain, Nicolas T. Courtois, Blandine Debraize, Chris J. Mitchell: Analysis of the Bit-Search Generator and Sequence Compression Techniques, FSE 2005 dblp

  304. Anand S. Gajparia, Chris J. Mitchell, Chan Yeob Yeun: Supporting User Privacy in Location Based Services, IEICE Trans. Commun. 2005 dblp

  305. Carlos Cid, Sean Murphy, Matthew J. B. Robshaw: An Algebraic Framework for Cipher Embeddings, IMACC 2005 dblp

  306. Chris J. Mitchell: Partial Key Recovery Attacks on XCBC, TMAC and OMAC, IMACC 2005 dblp

  307. Susan G. Barwick, Wen-Ai Jackson, Keith M. Martin: Updating the parameters of a threshold scheme by minimal broadcast, IEEE Trans. Inf. Theory 2005 dblp

  308. Qiang Tang, Chris J. Mitchell: Comments on a cryptographic key assignment scheme, Comput. Stand. Interfaces 2005 dblp

  309. Qiang Tang, Chris J. Mitchell: Comments on two anonymous conference key distribution systems, Comput. Stand. Interfaces 2005 dblp

  310. Qiang Tang, Chris J. Mitchell: Security Properties of Two Authenticated Conference Key Agreement Protocols, ICICS 2005 dblp

  311. Carlos Cid, Gaëtan Leurent: An Analysis of the XSL Algorithm, ASIACRYPT 2005 dblp

  312. Susan G. Barwick, Wen-Ai Jackson, Keith M. Martin: A General Approach to Robust Web Metering, Des. Codes Cryptogr. 2005 dblp

  313. Keith M. Martin, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild: Distributing the Encryption and Decryption of a Block Cipher, Des. Codes Cryptogr. 2005 dblp

  314. Adil Alsaid, Chris J. Mitchell: Dynamic content attacks on digital signatures, Inf. Manag. Comput. Security 2005 dblp

  315. Chris J. Mitchell: Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption?, ISC 2005 dblp

  316. Shenglan Hu, Chris J. Mitchell: Improving IP Address Autoconfiguration Security in MANETs Using Trust Modelling, MSN 2005 dblp

  317. Qiang Tang, Chris J. Mitchell: On the Security of Some Password-Based Key Agreement Schemes, CIS (2) 2005 dblp

  318. Qiang Tang, Chris J. Mitchell: Efficient Compilers for Authenticated Group Key Exchange, CIS (2) 2005 dblp

  319. Geraint Price, Chris J. Mitchell: Interoperation Between a Conventional PKI and an ID-Based Infrastructure, EuroPKI 2005 dblp

  320. Adil Alsaid, Chris J. Mitchell: Installing Fake Root Keys in a PC, EuroPKI 2005 dblp

  321. Arnold K. L. Yau, Kenneth G. Paterson, Chris J. Mitchell: Padding Oracle Attacks on CBC-Mode Encryption with Secret and Random IVs, FSE 2005 dblp

  322. Chris J. Mitchell: Cryptanalysis of Two Variants of PCBC Mode When Used for Message Integrity, ACISP 2005 dblp

  323. Carlos Cid, Sean Murphy, Matthew J. B. Robshaw: Small Scale Variants of the AES, FSE 2005 dblp

  324. Keith M. Martin: Dynamic access policies for unconditionally secure secret sharing schemes, ICITS 2005 dblp

  325. Georgios Kalogridis, Chris J. Mitchell, Gary Clemo: Spy Agents: Evaluating Trust in Remote Environments, Security and Management 2005 dblp

  326. Miss Laiha Mat Kiah, Keith M. Martin: Group Communication: Design Challenges in the Development of Key Management Frameworks in Wireless Mobile Environments, Security and Management 2005 dblp

  327. John A. MacDonald, William G. Sirett, Chris J. Mitchell: Overcoming Channel Bandwidth Constraints in Secure SIM Applications, SEC 2005 dblp

  328. Siaw-Lynn Ng, Chris J. Mitchell: Comments on mutual authentication and key exchange protocols for low power wireless communications, IEEE Commun. Lett. 2004 dblp

  329. Andreas Pashalidis, Chris J. Mitchell: Limits to Anonymity When Using Credentials, Security Protocols Workshop 2004 dblp

  330. Chris J. Mitchell: Limits to Anonymity When Using Credentials (Transcript of Discussion), Security Protocols Workshop 2004 dblp

  331. Andreas Pashalidis, Chris J. Mitchell: A Security Model for Anonymous Credential Systems, International Information Security Workshops 2004 dblp

  332. Andreas Pashalidis, Chris J. Mitchell: Using EMV Cards for Single Sign-On, EuroPKI 2004 dblp

  333. Carlos Cid: Some Algebraic Aspects of the Advanced Encryption Standard, AES Conference 2004 dblp

  334. Andreas Pashalidis, Chris J. Mitchell: Impostor: a single sign-on system for use from untrusted devices, GLOBECOM 2004 dblp

  335. Siaw-Lynn Ng: A Characterisation of Posets that Are nearly Antichains, Order 2004 dblp

  336. Lars R. Knudsen, Chris J. Mitchell: Analysis of 3gpp-MAC and Two-key 3gpp-MAC, Discret. Appl. Math. 2003 dblp

  337. Siaw-Lynn Ng: Posets and protocols-picking the right three-party protocol, IEEE J. Sel. Areas Commun. 2003 dblp

  338. Chris J. Mitchell: Remote User Authentication Using Public Information, IMACC 2003 dblp

  339. Chien-Lung Hsu, Tzong-Sun Wu, Tzong-Chen Wu, Chris J. Mitchell: Improvement of modified authenticated key agreement protocol, Appl. Math. Comput. 2003 dblp

  340. Mida Guillermo, Keith M. Martin, Christine M. O’Keefe: Providing Anonymity in Unconditionally Secure Secret Sharing Schemes, Des. Codes Cryptogr. 2003 dblp

  341. Siaw-Lynn Ng: A Representation of a Family of Secret Sharing Matroids, Des. Codes Cryptogr. 2003 dblp

  342. Paulo S. Pagliusi, Chris J. Mitchell: PANA/IKEv2: An Internet Authentication Protocol for Heterogeneous Access, WISA 2003 dblp

  343. Andreas Pashalidis, Chris J. Mitchell: Single Sign-On Using Trusted Platforms, ISC 2003 dblp

  344. Mansour A. Al-Meaither, Chris J. Mitchell: A Secure Electronic Payment Scheme for Charity Donations, EC-Web 2003 dblp

  345. Vorapranee Khu-smith, Chris J. Mitchell: Enhancing E-commerce Security Using GSM Authentication, EC-Web 2003 dblp

  346. Andreas Pashalidis, Chris J. Mitchell: A Taxonomy of Single Sign-On Systems, ACISP 2003 dblp

  347. Luciano Rila, Chris J. Mitchell: Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards, ACNS 2003 dblp

  348. Mansour A. Al-Meaither, Chris J. Mitchell: A Secure Electronic Murabaha Transaction, Bled eConference 2003 dblp

  349. Niklas Borselius, Chris J. Mitchell: Securing FIPA Agent Communication, Security and Management 2003 dblp

  350. Chez Ciechanowicz, Keith M. Martin, Fred Piper, Matthew J. B. Robshaw: Ten Years of Information Security Masters Programmes, World Conference on Information Security Education 2003 dblp

  351. Siaw-Lynn Ng: Some Properties of the Yoshiara Family of Planes, Eur. J. Comb. 2002 dblp

  352. Niklas Borselius, Chris J. Mitchell, Aaron Wilson: A pragmatic alternative to undetachable signatures, ACM SIGOPS Oper. Syst. Rev. 2002 dblp

  353. Niklas Borselius, Chris J. Mitchell, Aaron Wilson: On the value of threshold signatures, ACM SIGOPS Oper. Syst. Rev. 2002 dblp

  354. Günther Horn, Keith M. Martin, Chris J. Mitchell: Authentication protocols for mobile network environment value-added services, IEEE Trans. Veh. Technol. 2002 dblp

  355. Chris J. Mitchell, Namhyun Hur: On the security of a structural proven signer ordering multisignature scheme, Communications and Multimedia Security 2002 dblp

  356. Sattam S. Al-Riyami, Chris J. Mitchell: Renewing crytographic timestamps, Communications and Multimedia Security 2002 dblp

  357. Sean Murphy, Matthew J. B. Robshaw: Key-Dependent S-Boxes and Differential Cryptanalysis, Des. Codes Cryptogr. 2002 dblp

  358. Sean Murphy, Matthew J. B. Robshaw: Essential Algebraic Structure within the AES, CRYPTO 2002 dblp

  359. Vorapranee Khu-smith, Chris J. Mitchell: Using GSM to enhance e-commerce security, Workshop Mobile Commerce 2002 dblp

  360. Chris J. Mitchell, Paulo S. Pagliusi: Is Entity Authentication Necessary?, Security Protocols Workshop 2002 dblp

  361. Vorapranee Khu-smith, Chris J. Mitchell: Using EMV Cards to Protect E-commerce Transactions, EC-Web 2002 dblp

  362. Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild: Threshold MACs, ICISC 2002 dblp

  363. Susan G. Barwick, Wen-Ai Jackson, Keith M. Martin, Peter R. Wild: Size of Broadcast in Threshold Schemes with Disenrollment, ACISP 2002 dblp

  364. Luciano Rila, Chris J. Mitchell: Security Analysis of Smartcard to Card Reader Communications for Biometric Cardholder Authentication, CARDIS 2002 dblp

  365. Pita Jarupunphol, Chris J. Mitchell: E-commerce and the Media - Influences on Security Risk Perceptions, WITASI 2002 dblp

  366. Pita Jarupunphol, Chris J. Mitchell: Implementation Aspects of SET/EMV, I3E 2002 dblp

  367. Konstantinos Rantos, Chris J. Mitchell: Key Recovery Scheme Interoperability - A Protocol for Mechanism Negotiation, IMACC 2001 dblp

  368. Siaw-Lynn Ng: Comments on “Dynamic participation in a secure conference scheme for mobile communications”, IEEE Trans. Veh. Technol. 2001 dblp

  369. Karl Brincat, Chris J. Mitchell: Key Recovery Attacks on MACs Based on Properties of Cryptographic APIs, IMACC 2001 dblp

  370. Niklas Borselius, Chris J. Mitchell, Aaron Wilson: Undetachable Threshold Signatures, IMACC 2001 dblp

  371. Lars R. Knudsen, Chris J. Mitchell: An analysis of the 3gpp-MAC scheme, Electron. Notes Discret. Math. 2001 dblp

  372. Siaw-Lynn Ng, Michael Walker: On the Composition of Matroids and Ideal Secret Sharing Schemes, Des. Codes Cryptogr. 2001 dblp

  373. Niklas Borselius, Chris J. Mitchell, Aaron Wilson: On Mobile Agent Based Transactions in Moderately Hostile Environments, Network Security 2001 dblp

  374. Vorapranee Khu-smith, Chris J. Mitchell: Enhancing the Security of Cookies, ICISC 2001 dblp

  375. Karl Brincat, Chris J. Mitchell: New CBC-MAC Forgery Attacks, ACISP 2001 dblp

  376. Siaw-Lynn Ng, Peter R. Wild: On k-arcs Covering a Line in Finite Projective Planes, Ars Comb. 2001 dblp

  377. Siaw-Lynn Ng, Peter R. Wild: A New Family of Extended Generalized Quadrangles of Order (, Eur. J. Comb. 2000 dblp

  378. Chris J. Mitchell: Making serial number based authentication robust against loss of state, ACM SIGOPS Oper. Syst. Rev. 2000 dblp

  379. Chris J. Mitchell: PKI standards, Inf. Secur. Tech. Rep. 2000 dblp

  380. Don Coppersmith, Lars R. Knudsen, Chris J. Mitchell: Key Recovery and Forgery Attacks on the MacDES MAC Algorithm, CRYPTO 2000 dblp

  381. Chris J. Mitchell, Konstantinos Rantos: A fair certification protocol, Comput. Commun. Rev. 1999 dblp

  382. Siaw-Lynn Ng: Comments on “On the Security of Three-Party Cryptographic Protocs” by Xu, Zhang and Zhu, ACM SIGOPS Oper. Syst. Rev. 1999 dblp

  383. Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang: Changing Thresholds in the Absence of Secure Channels, Aust. Comput. J. 1999 dblp

  384. Sean Murphy: The Advanced Encryption Standard (AES), Inf. Secur. Tech. Rep. 1999 dblp

  385. Keith M. Martin, Chris J. Mitchell: Comments on an optimized protocol for mobile network authentication and security, ACM SIGMOBILE Mob. Comput. Commun. Rev. 1999 dblp

  386. Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang: Changing Thresholds in the Absence of Secure Channels, ACISP 1999 dblp

  387. Keith M. Martin, Reihaneh Safavi-Naini, Huaxiong Wang: Bounds and Techniques for Efficient Redistribution of Secret Shares to New Access Structures, Comput. J. 1999 dblp

  388. Keith M. Martin, Bart Preneel, Chris J. Mitchell, Hans-Joachim Hitz, Günther Horn, Alla Poliakova, Peter Howard: Secure Billing for Mobile Information Services in UMTS, IS&N 1998 dblp

  389. L. Rey A. Casse, Keith M. Martin, Peter R. Wild: Bounds and Characterizations of Authentication/Secrecy Schemes, Des. Codes Cryptogr. 1998 dblp

  390. Sean Murphy: An Analysis of SAFER, J. Cryptol. 1998 dblp

  391. Chris J. Mitchell, Chan Yeob Yeun: Fixing a Problem in the Helsinki Protocol, ACM SIGOPS Oper. Syst. Rev. 1998 dblp

  392. Lars R. Knudsen, Keith M. Martin: In Search of Multiple Domain Key Recovery, J. Comput. Secur. 1998 dblp

  393. Chris J. Mitchell, Kenneth G. Paterson: Perfect Factors from Cyclic Codes and Interleaving, SIAM J. Discret. Math. 1998 dblp

  394. Chris J. Mitchell: On Integer-Valued Rational Polynomials and Depth Distributions of Binary Codes, IEEE Trans. Inf. Theory 1998 dblp

  395. Peter Y. A. Ryan, Dieter Gollmann, Li Gong, Günter Karjoth, Chris J. Mitchell: Panel Introduction: The Security Impact of Distributed Computing Technologies, CSFW 1998 dblp

  396. Marten van Dijk, Wen-Ai Jackson, Keith M. Martin: A General Decomposition Construction for Incomplete Secret Sharing Schemes, Des. Codes Cryptogr. 1998 dblp

  397. Wen-Ai Jackson, Keith M. Martin, Christine M. O’Keefe: Mutually Trusted Authority-Free Secret Sharing Schemes, J. Cryptol. 1997 dblp

  398. Liqun Chen, Dieter Gollmann, Chris J. Mitchell: Authentication Using Minimally Trusted Servers, ACM SIGOPS Oper. Syst. Rev. 1997 dblp

  399. Chris J. Mitchell: Authentication using cryptography, Inf. Secur. Tech. Rep. 1997 dblp

  400. Sean Murphy: The difficulty of attacking cryptosystems, Inf. Secur. Tech. Rep. 1997 dblp

  401. Chris J. Mitchell: De Bruijn Sequences and Perfect Factors, SIAM J. Discret. Math. 1997 dblp

  402. Yongfei Han, Chris J. Mitchell, Dieter Gollmann: A fast modular exponentiation for rsa on systolic arrays, Int. J. Comput. Math. 1997 dblp

  403. Keith M. Martin: Increasing Efficiency of International Key Escrow in Mutually Mistrusting Domains, IMACC 1997 dblp

  404. Diane Erdmann, Sean Murphy: An Approximate Distribution for the Maximum Order Complexity, Des. Codes Cryptogr. 1997 dblp

  405. Liqun Chen, Dieter Gollmann, Chris J. Mitchell, Peter R. Wild: Secret Sharing with Reusable Polynomials, ACISP 1997 dblp

  406. Liqun Chen, Chris J. Mitchell: An anonymous and undeniable payment scheme, ICICS 1997 dblp

  407. Mark P. Hoyle, Chris J. Mitchell: On Solutions to the Key Escrow Problem, State of the Art in Applied Cryptography 1997 dblp

  408. Chris Charnes, Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini: Secret sharing in hierarchical groups, ICICS 1997 dblp

  409. Keith M. Martin, Reihaneh Safavi-Naini: Multisender authentication systems with unconditional security, ICICS 1997 dblp

  410. Simon R. Blackburn, Sean Murphy, Kenneth G. Paterson: Comments on “Theory and Applications of Cellular Automata in Cryptography”, IEEE Trans. Computers 1997 dblp

  411. Glenn Hurlbert, Chris J. Mitchell, Kenneth G. Paterson: On the Existence of de Bruijn Tori with Two by Two Windows, J. Comb. Theory, Ser. A 1996 dblp

  412. Wen-Ai Jackson, Keith M. Martin, Christine M. O’Keefe: Ideal Secret Sharing Schemes with Multiple Secrets, J. Cryptol. 1996 dblp

  413. Chris J. Mitchell, Liqun Chen: Comments on the S/KEY User Authentication Scheme, ACM SIGOPS Oper. Syst. Rev. 1996 dblp

  414. Chris J. Mitchell: The royal holloway TTP-based key escrow scheme, Inf. Secur. Tech. Rep. 1996 dblp

  415. Chris J. Mitchell, Tuvi Etzion, Kenneth G. Paterson: A method for constructing decodable de Bruijn sequences, IEEE Trans. Inf. Theory 1996 dblp

  416. Liqun Chen, Dieter Gollmann, Chris J. Mitchell: Tailoring authentication protocols to match underlying mechanisms, ACISP 1996 dblp

  417. Wen-Ai Jackson, Keith M. Martin: A combinatorial interpretation of ramp schemes, Australas. J Comb. 1996 dblp

  418. Wen-Ai Jackson, Keith M. Martin: Efficient constructions for one sharing of many secrets, Australas. J Comb. 1996 dblp

  419. Chris J. Mitchell, Fred Piper, Michael Walker, Peter R. Wild: Authentication Schemes, Perfect Local Randomizers, Perfect Secrecy and Secret Sharing Schemes, Des. Codes Cryptogr. 1996 dblp

  420. Wen-Ai Jackson, Keith M. Martin: Perfect Secret Sharing Schemes on Five Participants, Des. Codes Cryptogr. 1996 dblp

  421. Wen-Ai Jackson, Keith M. Martin, Christine M. O’Keefe: A Construction for Multisecret Threshold Schemes, Des. Codes Cryptogr. 1996 dblp

  422. Dieter Gollmann, Yongfei Han, Chris J. Mitchell: Redundant Integer Representations and Fast Exponentiation, Des. Codes Cryptogr. 1996 dblp

  423. Liqun Chen, Dieter Gollmann, Chris J. Mitchell: Key Escrow in Mutually Mistrusting Domains, Security Protocols Workshop 1996 dblp

  424. Donald W. Davies, Sean Murphy: Pairs and Triplets of DES S-Boxes, J. Cryptol. 1995 dblp

  425. Simon R. Blackburn, Sean Murphy, Jacques Stern: The Cryptanalysis of a Public-Key Implementation of Finite Group Mappings, J. Cryptol. 1995 dblp

  426. Liqun Chen, Dieter Gollmann, Chris J. Mitchell: Distributing Trust Amongst Multiple Authentication Servers, J. Comput. Secur. 1995 dblp

  427. Chris J. Mitchell: Aperiodic and semi-periodic perfect maps, IEEE Trans. Inf. Theory 1995 dblp

  428. Chris J. Mitchell: A Storage Complexity Based Analogue of Maurer Key Establishment Using Public Channels, IMACC 1995 dblp

  429. Yongfei Han, Dieter Gollmann, Chris J. Mitchell: Minimal Weight k-SR Representations, IMACC 1995 dblp

  430. Nigel Jefferies, Chris J. Mitchell, Michael Walker: A Proposed Architecture for Trusted Third Party Services, Cryptography: Policy and Algorithms 1995 dblp

  431. Wen-Ai Jackson, Keith M. Martin, Christine M. O’Keefe: Efficient Secret Sharing Without a Mutually Trusted Authority (Extended Abstract), EUROCRYPT 1995 dblp

  432. Liqun Chen, Dieter Gollmann, Chris J. Mitchell: Key distribution without individual trusted authentification servers, CSFW 1995 dblp

  433. Jonathan Jedwab, Chris J. Mitchell, Fred Piper, Peter R. Wild: Perfect binary arrays and difference sets, Discret. Math. 1994 dblp

  434. Sean Murphy, Kenneth G. Paterson, Peter R. Wild: A Weak Cipher that Generates the Symmetric Group, J. Cryptol. 1994 dblp

  435. Chris J. Mitchell, Michael Walker, Peter R. Wild: The Combinatorics of Perfect Authentication Schemes, SIAM J. Discret. Math. 1994 dblp

  436. John Burns, Chris J. Mitchell: Parameter Selection for Server-Aided RSA Computation Schemes, IEEE Trans. Computers 1994 dblp

  437. Wen-Ai Jackson, Keith M. Martin: Geometric Secret Sharing Schemes and Their Duals, Des. Codes Cryptogr. 1994 dblp

  438. Chris J. Mitchell, Kenneth G. Paterson: Decoding Perfect Maps, Des. Codes Cryptogr. 1994 dblp

  439. Chris J. Mitchell: Constructing c-ary Perfect Factors, Des. Codes Cryptogr. 1994 dblp

  440. Wen-Ai Jackson, Keith M. Martin, Christine M. O’Keefe: On Sharing Many Secrets (Extended Abstract), ASIACRYPT 1994 dblp

  441. Chris J. Mitchell, Andy Thomas: Standardising Authentication Protocols Based on Public-Key Techniques, J. Comput. Secur. 1993 dblp

  442. Wen-Ai Jackson, Keith M. Martin, Christine M. O’Keefe: Multisecret Threshold Schemes, CRYPTO 1993 dblp

  443. Simon R. Blackburn, Sean Murphy, Jacques Stern: Weakness of a Public-Key Cryptosystem Based on Factorizations of Finite Groups, EUROCRYPT 1993 dblp

  444. Chris J. Mitchell: Authenticating Multicast Internet Electronic Mail Messages Using a Bidirectional MAC is Insecure, IEEE Trans. Computers 1992 dblp

  445. Wen-Ai Jackson, Keith M. Martin: Cumulative Arrays and Geometric Secret Sharing Schemes, AUSCRYPT 1992 dblp

  446. Chris J. Mitchell, Vijay Varadharajan: Modified forms of cipher block chaining, Comput. Secur. 1991 dblp

  447. Xuejia Lai, James L. Massey, Sean Murphy: Markov Ciphers and Differential Cryptanalysis, EUROCRYPT 1991 dblp

  448. Colin I’Anson, Chris J. Mitchell: Security defects in CCITT recommendation X.509: the directory authentication framework, Comput. Commun. Rev. 1990 dblp

  449. Chris J. Mitchell: Enumerating Boolean Functions of Cryptographic Significance, J. Cryptol. 1990 dblp

  450. Philippe Godlewski, Chris J. Mitchell: Key-Minimal Crytosystems for Unconditional Secrecy, J. Cryptol. 1990 dblp

  451. Sean Murphy: The Cryptanalysis of FEAL-4 with 20 Chosen Plaintexts, J. Cryptol. 1990 dblp

  452. John Burns, Chris J. Mitchell: A security scheme for resource sharing over a network, Comput. Secur. 1990 dblp

  453. Chris J. Mitchell, Dave Rush, Michael Walker: A Secure Messaging Architecture Implementing the X.400-1988 Security Features, Comput. J. 1990 dblp

  454. Martin Anthony, Keith M. Martin, Jennifer Seberry, Peter R. Wild: Some Remarks on Authentication Systems, AUSCRYPT 1990 dblp

  455. Chris J. Mitchell, Peter R. Wild: One-stage one-sided rearrangeable switching networks, IEEE Trans. Commun. 1989 dblp

  456. Chris J. Mitchell, Dave Rush, Michael Walker: A remark on hash functions for message authentication, Comput. Secur. 1989 dblp

  457. Philippe Godlewski, Chris J. Mitchell: Key Minimal Authentication Systems for Unconditional Secrecy, EUROCRYPT 1989 dblp

  458. Chris J. Mitchell: Multi-Destination Secure Electronic Mail, Comput. J. 1989 dblp

  459. Chris J. Mitchell: Another Postage Stamp Problem, Comput. J. 1989 dblp

  460. Chris J. Mitchell, Fred Piper: Key storage in secure networks, Discret. Appl. Math. 1988 dblp

  461. Chris J. Mitchell, Michael Walker: Solutions to the multidestination secure electronic mail problem, Comput. Secur. 1988 dblp

  462. Chris J. Mitchell, Fred Piper: The cost of reducing key-storage requirements in secure networks, Comput. Secur. 1987 dblp

This list is generated automatically from DBLP using group-publications. If you spot any errors – e.g. papers wrongly attributed, missing papers, etc – please let us know.