A list skipping pre-prints is also available.

  1. Amaury Pouly, Yixin Shen: Provable Dual Attacks on Learning with Errors, IACR Cryptol. ePrint Arch. 2023 preprint dblp

  2. Michael Brand, Gaëtan Pradel: Practical Privacy-Preserving Machine Learning using Fully Homomorphic Encryption, IACR Cryptol. ePrint Arch. 2023 preprint dblp

  3. Jodie Knapp, Elizabeth A. Quaglia: CLUE: Certificateless Updatable Encryption, ITASEC 2023 dblp

  4. Hiroki Okada, Rachel Player, Simon Pohmann: Homomorphic polynomial evaluation using Galois structure and applications to BFV bootstrapping, IACR Cryptol. ePrint Arch. 2023 preprint dblp

  5. Ashley Fraser, Lydia Garms, Elizabeth A. Quaglia: On the Incoercibility of Digital Signatures, CSF 2023 dblp

  6. Liam Medley, Angelique Faye Loe, Elizabeth A. Quaglia: SoK: Delay-Based Cryptography, CSF 2023 dblp

  7. Wouter Castryck, Marc Houben, Simon-Philipp Merz, Marzio Mula, Sam van Buuren, Frederik Vercauteren: Weak Instances of Class Group Action Based Cryptography via Self-pairings, CRYPTO (3) 2023 dblp

  8. Olivier Jeunen, Sean Murphy, Ben Allison: Off-Policy Learning-to-Bid with AuctionGym, KDD 2023 dblp

  9. Angelique Faye Loe, Liam Medley, Christian O’Connell, Elizabeth A. Quaglia: Applications of Timed-Release Encryption with Implicit Authentication, AFRICACRYPT 2023 dblp

  10. Sofía Celi, Alex Davidson, Hamed Haddadi, Gonçalo Pestana, Joe Rowell: DiStefano: Decentralized Infrastructure for Sharing Trusted Encrypted Facts and Nothing More, IACR Cryptol. ePrint Arch. 2023 preprint dblp

  11. Tomer Ashur, Chris J. Mitchell: Special Issue on Failed Approaches and Insightful Losses in Cryptology - Foreword, Comput. J. 2023 dblp

  12. Martin R. Albrecht, Lenka Mareková, Kenneth G. Paterson, Igors Stepanovs: Four Attacks and a Proof for Telegram, IACR Cryptol. ePrint Arch. 2023 preprint dblp

  13. Liam Medley, Angelique Faye Loe, Elizabeth A. Quaglia: SoK: Delay-based Cryptography, IACR Cryptol. ePrint Arch. 2023 preprint dblp

  14. Angelique Faye Loe, Liam Medley, Christian O’Connell, Elizabeth A. Quaglia: Applications of Timed-release Encryption with Implicit Authentication, IACR Cryptol. ePrint Arch. 2023 preprint dblp

  15. Yaniv Ben-Itzhak, Helen Möllering, Benny Pinkas, Thomas Schneider, Ajith Suresh, Oleksandr Tkachenko, Shay Vargaftik, Christian Weinert, Hossein Yalame, Avishay Yanai: ScionFL: Efficient and Robust Secure Quantized Aggregation, IACR Cryptol. ePrint Arch. 2023 preprint dblp

  16. Laura Hetz, Thomas Schneider, Christian Weinert: Scaling Mobile Private Contact Discovery to Billions of Users, IACR Cryptol. ePrint Arch. 2023 preprint dblp

  17. Wouter Castryck, Marc Houben, Simon-Philipp Merz, Marzio Mula, Sam van Buuren, Frederik Vercauteren: Weak instances of class group action based cryptography via self-pairings, IACR Cryptol. ePrint Arch. 2023 preprint dblp

  18. Tabitha Ogilvie: Differential Privacy for Free? Harnessing the Noise in Approximate Homomorphic Encryption, IACR Cryptol. ePrint Arch. 2023 preprint dblp

  19. Mara Cairo, Bevin Eldaphonse, Payam Mousavi, Sahir, Sheikh Jubair, Matthew E. Taylor, Graham Doerksen, Nikolai Kummer, Jordan Maretzki, Gupreet Mohhar, Sean Murphy, Johannes Gunther, Laura Petrich, Talat Syed: Multi-Robot Warehouse Optimization: Leveraging Machine Learning for Improved Performance, AAMAS 2023 dblp

  20. Saqib A. Kakvi, Keith M. Martin, Colin Putman, Elizabeth A. Quaglia: SoK: Anonymous Credentials, SSR 2023 dblp

  21. Luca De Feo, Tako Boris Fouotsa, Péter Kutas, Antonin Leroux, Simon-Philipp Merz, Lorenz Panny, Benjamin Wesolowski: SCALLOP: Scaling the CSI-FiSh, Public Key Cryptography (1) 2023 dblp

  22. Anamaria Costache, Lea Nürnberger, Rachel Player: Optimisations and Tradeoffs for HElib, CT-RSA 2023 dblp

  23. Martin R. Albrecht, Miro Haller, Lenka Mareková, Kenneth G. Paterson: Caveat Implementor! Key Recovery Attacks on MEGA, EUROCRYPT (5) 2023 dblp

  24. Martin R. Albrecht, Miro Haller, Lenka Mareková, Kenneth G. Paterson: Caveat Implementor! Key Recovery Attacks on MEGA, IACR Cryptol. ePrint Arch. 2023 preprint dblp

  25. Anamaria Costache, Lea Nürnberger, Rachel Player: Optimizations and Trade-offs for HElib, IACR Cryptol. ePrint Arch. 2023 preprint dblp

  26. Felix Marx, Thomas Schneider, Ajith Suresh, Tobias Wehrle, Christian Weinert, Hossein Yalame: HyFL: A Hybrid Approach For Private Federated Learning, CoRR 2023 preprint dblp

  27. Mihir Mody, Sean Murphy, Prithvi Shankar, VC Kumar, Mohammad Asif Farooqui, Malav Shah, Nikhil Sangani, Anita Pratti, Shailesh Ghotgalkar, Sriraj Chellappan, Stalin Sm, Shivasharan Nagalikar, Randy Rosales, Rohit Rangan, Tanu Dixit, Wei Ming, Pratheesh Gangadhar, Prasad Johndale, Sanjeev Karaiyan, Ajay Golla: Single Chip Traction Inverter System using High Performance and Real-time AM263 MCU, ICCE 2023 dblp

  28. Shivasharan Nagalikar, Mihir Mody, Ankur Baranwal, VC Kumar, Prithvi Shankar, Mohammad Asif Farooqui, Malav Shah, Nikhil Sangani, Y. C. Rakesh, Abhishek Karkisaval, Sriraj Chellappan, Stalin S. M., Anita Pratti, Randy Rosales, Tanu Dixit, Sean Murphy: Single Chip Radar Processing for Object Detection, ICCE 2023 dblp

  29. Martin Brain, Carlos Cid, Rachel Player, Wrenna Robson: Verifying Classic McEliece: examining the role of formal methods in post-quantum cryptography standardisation, IACR Cryptol. ePrint Arch. 2023 preprint dblp

  30. Ashley Fraser, Lydia Garms, Elizabeth A. Quaglia: On the Incoercibility of Digital Signatures, IACR Cryptol. ePrint Arch. 2023 preprint dblp

  31. Luca De Feo, Tako Boris Fouotsa, Péter Kutas, Antonin Leroux, Simon-Philipp Merz, Lorenz Panny, Benjamin Wesolowski: SCALLOP: scaling the CSI-FiSh, IACR Cryptol. ePrint Arch. 2023 preprint dblp

  32. Christoph Hagen, Christian Weinert, Christoph Sendner, Alexandra Dmitrienko, Thomas Schneider: Contact Discovery in Mobile Messengers: Low-cost Attacks, Quantitative Analyses, and Efficient Mitigations, ACM Trans. Priv. Secur. 2023 dblp

  33. Martin Brain, Carlos Cid, Rachel Player, Wrenna Robson: Verifying Classic McEliece: Examining the Role of Formal Methods in Post-Quantum Cryptography Standardisation, CBCrypto 2022 dblp

  34. Jeroen Pijnenburg, Bertram Poettering: On Secure Ratcheting with Immediate Decryption, ASIACRYPT (3) 2022 dblp

  35. Kevin Carrier, Yixin Shen, Jean-Pierre Tillich: Faster Dual Lattice Attacks by Using Coding Theory, IACR Cryptol. ePrint Arch. 2022 preprint dblp

  36. Olivier Blazy, Saqib A. Kakvi: Identity-Based Encryption in DDH Hard Groups, AFRICACRYPT 2022 dblp

  37. Angelique Faye Loe, Liam Medley, Christian O’Connell, Elizabeth A. Quaglia: TIDE: A Novel Approach to Constructing Timed-Release Encryption, ACISP 2022 dblp

  38. Marcel Armour, Elizabeth A. Quaglia: Subverting Deniability, IACR Cryptol. ePrint Arch. 2022 preprint dblp

  39. Zoltán Ádám Mann, Christian Weinert, Daphnee Chabal, Joppe W. Bos: Towards Practical Secure Neural Network Inference: The Journey So Far and the Road Ahead, IACR Cryptol. ePrint Arch. 2022 preprint dblp

  40. Xavier Bultel, Ashley Fraser, Elizabeth A. Quaglia: Improving the Efficiency of Report and Trace Ring Signatures, SSS 2022 dblp

  41. Marcel Armour, Elizabeth A. Quaglia: Subverting Deniability, ProvSec 2022 dblp

  42. Jodie Knapp, Elizabeth A. Quaglia: Epoch Confidentiality in Updatable Encryption, ProvSec 2022 dblp

  43. Xavier Bultel, Ashley Fraser, Elizabeth A. Quaglia: Improving the Efficiency of Report and Trace Ring Signatures, IACR Cryptol. ePrint Arch. 2022 preprint dblp

  44. Martin R. Albrecht, Valerio Cini, Russell W. F. Lai, Giulio Malavolta, Sri Aravinda Krishnan Thyagarajan: Lattice-Based SNARKs: Publicly Verifiable, Preprocessing, and Recursively Composable - (Extended Abstract), CRYPTO (2) 2022 dblp

  45. Martin R. Albrecht, Raphael Eikenberg, Kenneth G. Paterson: Breaking Bridgefy, again: Adopting libsignal is not enough, USENIX Security Symposium 2022 dblp

  46. Yaniv Ben-Itzhak, Helen Möllering, Benny Pinkas, Thomas Schneider, Ajith Suresh, Oleksandr Tkachenko, Shay Vargaftik, Christian Weinert, Hossein Yalame, Avishay Yanai: ScionFL: Secure Quantized Aggregation for Federated Learning, CoRR 2022 preprint dblp

  47. Marcel Armour, Bertram Poettering: Algorithm substitution attacks against receivers, Int. J. Inf. Sec. 2022 dblp

  48. Martin R. Albrecht, Valerio Cini, Russell W. F. Lai, Giulio Malavolta, Sri Aravinda Krishnan Thyagarajan: Lattice-Based SNARKs: Publicly Verifiable, Preprocessing, and Recursively Composable, IACR Cryptol. ePrint Arch. 2022 preprint dblp

  49. Nick Frymann, Daniel Gardham, Mark Manulis: Unlinkable Delegation of WebAuthn Credentials, ESORICS (3) 2022 dblp

  50. Gareth T. Davies, Jeroen Pijnenburg: PERKS: Persistent and Distributed Key Acquisition for Secure Storage from Passwords, IACR Cryptol. ePrint Arch. 2022 preprint dblp

  51. Christoph Hagen, Christian Weinert, Christoph Sendner, Alexandra Dmitrienko, Thomas Schneider: Contact Discovery in Mobile Messengers: Low-cost Attacks, Quantitative Analyses, and Efficient Mitigations, IACR Cryptol. ePrint Arch. 2022 preprint dblp

  52. Martin R. Albrecht, Lenka Mareková, Kenneth G. Paterson, Igors Stepanovs: Four Attacks and a Proof for Telegram, IEEE Symposium on Security and Privacy 2022 dblp

  53. Chris J. Mitchell, Peter R. Wild: Constructing Orientable Sequences, IEEE Trans. Inf. Theory 2022 dblp

  54. Daniel Gardham, Mark Manulis: Revocable Hierarchical Attribute-Based Signatures from Lattices, ACNS 2022 dblp

  55. Martin R. Albrecht, Yixin Shen: Quantum Augmented Dual Attack, IACR Cryptol. ePrint Arch. 2022 preprint dblp

  56. Marcel Armour, Bertram Poettering: Algorithm Substitution Attacks against Receivers, IACR Cryptol. ePrint Arch. 2022 preprint dblp

  57. Haibat Khan, Benjamin Dowling, Keith M. Martin: Pragmatic authenticated key agreement for IEEE Std 802.15.6, Int. J. Inf. Sec. 2022 dblp

  58. Martin R. Albrecht, Yixin Shen: Quantum Augmented Dual Attack, CoRR 2022 preprint dblp

  59. Jeremy Booher, Ross Bowden, Javad Doliskani, Tako Boris Fouotsa, Steven D. Galbraith, Sabrina Kunzweiler, Simon-Philipp Merz, Christophe Petit, Benjamin Smith, Katherine E. Stange, Yan Bo Ti, Christelle Vincent, José Felipe Voloch, Charlotte Weitkämper, Lukas Zobernig: Failing to hash into supersingular isogeny graphs, IACR Cryptol. ePrint Arch. 2022 preprint dblp

  60. Jeremy Booher, Ross Bowden, Javad Doliskani, Tako Boris Fouotsa, Steven D. Galbraith, Sabrina Kunzweiler, Simon-Philipp Merz, Christophe Petit, Benjamin Smith, Katherine E. Stange, Yan Bo Ti, Christelle Vincent, José Felipe Voloch, Charlotte Weitkämper, Lukas Zobernig: Failing to hash into supersingular isogeny graphs, CoRR 2022 preprint dblp

  61. Daniel Gardham, Mark Manulis: Revocable Hierarchical Attribute-based Signatures from Lattices, IACR Cryptol. ePrint Arch. 2022 preprint dblp

  62. Carlos Cid, Lorenzo Grassi, Aldo Gunsing, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger: Influence of the Linear Layer on the Algebraic Degree in SP-Networks, IACR Trans. Symmetric Cryptol. 2022 dblp

  63. Martin R. Albrecht, Milos Prokop, Yixin Shen, Petros Wallden: Variational quantum solutions to the Shortest Vector Problem, IACR Cryptol. ePrint Arch. 2022 preprint dblp

  64. Anamaria Costache, Benjamin R. Curtis, Erin Hales, Sean Murphy, Tabitha Ogilvie, Rachel Player: On the precision loss in approximate homomorphic encryption, IACR Cryptol. ePrint Arch. 2022 preprint dblp

  65. Nick Frymann, Daniel Gardham, Mark Manulis: Unlinkable Delegation of WebAuthn Credentials, IACR Cryptol. ePrint Arch. 2022 preprint dblp

  66. Tako Boris Fouotsa, Péter Kutas, Simon-Philipp Merz, Yan Bo Ti: On the Isogeny Problem with Torsion Point Information, Public Key Cryptography (1) 2022 dblp

  67. Martin R. Albrecht, Milos Prokop, Yixin Shen, Petros Wallden: Variational quantum solutions to the Shortest Vector Problem, CoRR 2022 preprint dblp

  68. Liqun Chen, Siaw-Lynn Ng: Securing emergent behaviour in swarm robotics, J. Inf. Secur. Appl. 2022 dblp

  69. Lydia Garms, Siaw-Lynn Ng, Elizabeth A. Quaglia, Giulia Traverso: Anonymity and rewards in peer rating systems, J. Comput. Secur. 2022 dblp

  70. Carlos Cid, John Petter Indrøy, Håvard Raddum: FASTA - A Stream Cipher for Fast FHE Evaluation, CT-RSA 2022 dblp

  71. Keitaro Hashimoto, Shuichi Katsumata, Eamonn W. Postlethwaite, Thomas Prest, Bas Westerbaan: A Concrete Treatment of Efficient Continuous Group Key Agreement via Multi-Recipient PKEs, CCS 2021 dblp

  72. Keitaro Hashimoto, Shuichi Katsumata, Eamonn W. Postlethwaite, Thomas Prest, Bas Westerbaan: A Concrete Treatment of Efficient Continuous Group Key Agreement via Multi-Recipient PKEs, IACR Cryptol. ePrint Arch. 2021 preprint dblp

  73. Gaëtan Pradel, Chris J. Mitchell: Privacy-Preserving Biometric Matching Using Homomorphic Encryption, TrustCom 2021 dblp

  74. Rouzbeh Behnia, Eamonn W. Postlethwaite, Muslum Ozgur Ozmen, Attila Altay Yavuz: Lattice-Based Proof-of-Work for Post-Quantum Blockchains, DPM/CBT@ESORICS 2021 dblp

  75. Chris J. Mitchell: How not to secure wireless sensor networks: a plethora of insecure polynomial-based key pre-distribution schemes, IET Inf. Secur. 2021 dblp

  76. Marcel Armour, Carlos Cid: Partition Oracles from Weak Key Forgeries, CANS 2021 dblp

  77. Ashley Fraser, Elizabeth A. Quaglia: Report and Trace Ring Signatures, CANS 2021 dblp

  78. Andrea Basso, Péter Kutas, Simon-Philipp Merz, Christophe Petit, Antonio Sanso: Cryptanalysis of an Oblivious PRF from Supersingular Isogenies, ASIACRYPT (1) 2021 dblp

  79. Gaëtan Pradel, Chris J. Mitchell: Privacy-Preserving Biometric Matching Using Homomorphic Encryption, CoRR 2021 preprint dblp

  80. Liqun Chen, Chris J. Mitchell, Thanassis Giannetsos, Daniele Sgandurra: CYSARM@CCS ‘21: Proceedings of the 3rd Workshop on Cyber-Security Arms Race, Virtual Event, Republic of Korea, 19 November 2021, ACM 2021 dblp

  81. Maryam Mehrnezhad, Thyla van der Merwe, Chris J. Mitchell: Guest Editorial: Security and Privacy, IEEE Commun. Stand. Mag. 2021 dblp

  82. Liam Medley, Elizabeth A. Quaglia: Collaborative Verifiable Delay Functions, Inscrypt 2021 dblp

  83. Carlos Cid, John Petter Indrøy, Håvard Raddum: FASTA - a stream cipher for fast FHE evaluation, IACR Cryptol. ePrint Arch. 2021 preprint dblp

  84. Marcel Armour, Carlos Cid: Partitioning Oracles from Weak Key Forgeries, IACR Cryptol. ePrint Arch. 2021 preprint dblp

  85. Angelique Faye Loe, Liam Medley, Christian O’Connell, Elizabeth A. Quaglia: A Practical Verifiable Delay Function and Delay Encryption Scheme, IACR Cryptol. ePrint Arch. 2021 preprint dblp

  86. Ashley Fraser, Elizabeth A. Quaglia: Report and Trace Ring Signatures, IACR Cryptol. ePrint Arch. 2021 preprint dblp

  87. Martin R. Albrecht, Jorge Blasco, Rikke Bjerg Jensen, Lenka Mareková: Collective Information Security in Large-Scale Urban Protests: the Case of Hong Kong, USENIX Security Symposium 2021 dblp

  88. Hiroki Okada, Shinsaku Kiyomoto, Carlos Cid: Integer-Wise Functional Bootstrapping on TFHE: Applications in Secure Integer Arithmetics, Inf. 2021 dblp

  89. Marc Sel, Chris J. Mitchell: Automating the Evaluation of Trustworthiness, TrustBus 2021 dblp

  90. Martin R. Albrecht, Russell W. F. Lai: Subtractive Sets over Cyclotomic Rings - Limits of Schnorr-Like Arguments over Lattices, CRYPTO (2) 2021 dblp

  91. Martin R. Albrecht, Shi Bai, Jianwei Li, Joe Rowell: Lattice Reduction with Approximate Enumeration Oracles - Practical Algorithms and Concrete Performance, CRYPTO (2) 2021 dblp

  92. Hiroki Okada, Shinsaku Kiyomoto, Carlos Cid: A Comparison of GKE Protocols based on SIDH, SECRYPT 2021 dblp

  93. Jianwei Li: On the Smallest Ratio Problem of Lattice Bases, ISSAC 2021 dblp

  94. Martin R. Albrecht, Léo Ducas: Lattice Attacks on NTRU and LWE: A History of Refinements, IACR Cryptol. ePrint Arch. 2021 preprint dblp

  95. Martin R. Albrecht, Nadia Heninger: On Bounded Distance Decoding with Predicate: Breaking the “Lattice Barrier” for the Hidden Number Problem, EUROCRYPT (1) 2021 dblp

  96. Péter Kutas, Simon-Philipp Merz, Christophe Petit, Charlotte Weitkämper: One-Way Functions and Malleability Oracles: Hidden Shift Attacks on Isogeny-Based Protocols, EUROCRYPT (1) 2021 dblp

  97. Andrea Basso, Péter Kutas, Simon-Philipp Merz, Christophe Petit, Antonio Sanso: Cryptanalysis of an oblivious PRF from supersingular isogenies, IACR Cryptol. ePrint Arch. 2021 preprint dblp

  98. Martin R. Albrecht, Jorge Blasco, Rikke Bjerg Jensen, Lenka Mareková: Collective Information Security in Large-Scale Urban Protests: the Case of Hong Kong, CoRR 2021 preprint dblp

  99. Martin R. Albrecht, Jorge Blasco, Rikke Bjerg Jensen, Lenka Mareková: Mesh Messaging in Large-Scale Protests: Breaking Bridgefy, CT-RSA 2021 dblp

  100. Martin R. Albrecht, Alex Davidson, Amit Deo, Nigel P. Smart: Round-Optimal Verifiable Oblivious Pseudorandom Functions from Ideal Lattices, Public Key Cryptography (2) 2021 dblp

  101. Eamonn W. Postlethwaite, Fernando Virdia: On the Success Probability of Solving Unique SVP via BKZ, Public Key Cryptography (1) 2021 dblp

  102. Martin R. Albrecht, Russell W. F. Lai: Subtractive Sets over Cyclotomic Rings: Limits of Schnorr-like Arguments over Lattices, IACR Cryptol. ePrint Arch. 2021 preprint dblp

  103. Martin R. Albrecht, Jorge Blasco, Rikke Bjerg Jensen, Lenka Mareková: Mesh Messaging in Large-scale Protests: Breaking Bridgefy, IACR Cryptol. ePrint Arch. 2021 preprint dblp

  104. Péter Kutas, Simon-Philipp Merz, Christophe Petit, Charlotte Weitkämper: One-way functions and malleability oracles: Hidden shift attacks on isogeny-based protocols, IACR Cryptol. ePrint Arch. 2021 preprint dblp

  105. Boris Fouotsa Tako, Péter Kutas, Simon-Philipp Merz: On the Isogeny Problem with Torsion Point Information, IACR Cryptol. ePrint Arch. 2021 preprint dblp

  106. Liqun Chen, Siaw-Lynn Ng: Securing emergent behaviour in swarm robotics, CoRR 2021 preprint dblp

  107. Chris J. Mitchell: Yet another insecure group key distribution scheme using secret sharing, J. Inf. Secur. Appl. 2021 dblp

  108. Chris J. Mitchell: The (in)security of some recently proposed lightweight key distribution schemes, CoRR 2021 preprint dblp

  109. Lan Xu, Jianwei Li, Li Dai, Ningmei Yu: Hardware Trojans detection based on BP neural network, ICTA 2020 dblp

  110. Liqun Chen, Chris J. Mitchell, Thanassis Giannetsos, Daniele Sgandurra: CYSARM@CCS ‘20: Proceedings of the 2nd Workshop on Cyber-Security Arms Race, Virtual Event, USA, November, 2020, ACM 2020 dblp

  111. Jeroen Pijnenburg, Bertram Poettering: Efficiency Improvements for Encrypt-to-Self, CYSARM@CCS 2020 dblp

  112. Sean Murphy, Maura B. Paterson, Christine Swart: Boolean Ring Cryptographic Equation Solving, SAC 2020 dblp

  113. Ashley Fraser, Elizabeth A. Quaglia: Protecting the Privacy of Voters: New Definitions of Ballot Secrecy for E-Voting, SAC 2020 dblp

  114. Steven D. Galbraith, Robert Granger, Simon-Philipp Merz, Christophe Petit: On Index Calculus Algorithms for Subfield Curves, SAC 2020 dblp

  115. Myrto Arapinis, Nikolaos Lamprou, Lenka Mareková, Thomas Zacharias: E-cclesia: Universally Composable Self-Tallying Elections, IACR Cryptol. ePrint Arch. 2020 preprint dblp

  116. Sean Murphy, Rachel Player: Discretisation and Product Distributions in Ring-LWE, J. Math. Cryptol. 2020 dblp

  117. Gaëtan Pradel, Chris J. Mitchell: Post-quantum Certificates for Electronic Travel Documents, DETIPS/DeSECSys/MPS/SPOSE@ESORICS 2020 dblp

  118. Martin R. Albrecht, Nadia Heninger: On Bounded Distance Decoding with Predicate: Breaking the “Lattice Barrier” for the Hidden Number Problem, IACR Cryptol. ePrint Arch. 2020 preprint dblp

  119. Tabitha Ogilvie, Rachel Player, Joe Rowell: Improved privacy-preserving training using fixed-Hessian minimisation, IACR Cryptol. ePrint Arch. 2020 preprint dblp

  120. Martin R. Albrecht, Shi Bai, Pierre-Alain Fouque, Paul Kirchner, Damien Stehlé, Weiqiang Wen: Faster Enumeration-Based Lattice Reduction: Root Hermite Factor k, CRYPTO (2) 2020 dblp

  121. Jan-Pieter D’Anvers, Mélissa Rossi, Fernando Virdia: (One) Failure Is Not an Option: Bootstrapping the Search for Failures in Lattice-Based Encryption Schemes, EUROCRYPT (3) 2020 dblp

  122. Simon-Philipp Merz, Romy Minko, Christophe Petit: Another Look at Some Isogeny Hardness Assumptions, CT-RSA 2020 dblp

  123. Andrea Basso, Péter Kutas, Simon-Philipp Merz, Christophe Petit, Charlotte Weitkämper: On Adaptive Attacks Against Jao-Urbanik’s Isogeny-Based Protocol, AFRICACRYPT 2020 dblp

  124. Andrea Basso, Péter Kutas, Simon-Philipp Merz, Christophe Petit, Charlotte Weitkämper: On Adaptive Attacks against Jao-Urbanik’s Isogeny-Based Protocol, IACR Cryptol. ePrint Arch. 2020 preprint dblp

  125. Martin R. Albrecht, Vlad Gheorghiu, Eamonn W. Postlethwaite, John M. Schanck: Estimating Quantum Speedups for Lattice Sieves, ASIACRYPT (2) 2020 dblp

  126. Carlos Cid, Akinori Hosoyamada, Yunwen Liu, Siang Meng Sim: Quantum Cryptanalysis on Contracting Feistel Structures and Observation on Related-Key Settings, INDOCRYPT 2020 dblp

  127. Rouzbeh Behnia, Eamonn W. Postlethwaite, Muslum Ozgur Ozmen, Attila Altay Yavuz: Lattice-Based Proof-of-Work for Post-Quantum Blockchains, IACR Cryptol. ePrint Arch. 2020 preprint dblp

  128. Hiroki Okada, Shinsaku Kiyomoto, Carlos Cid: Integerwise Functional Bootstrapping on TFHE, ISC 2020 dblp

  129. Thyla van der Merwe, Chris J. Mitchell, Maryam Mehrnezhad: Security Standardisation Research - 6th International Conference, SSR 2020, London, UK, November 30 - December 1, 2020, Proceedings, Springer 2020 dblp

  130. Jodie Knapp, Elizabeth A. Quaglia: Fair and Sound Secret Sharing from Homomorphic Time-Lock Puzzles, ProvSec 2020 dblp

  131. Martin R. Albrecht, Shi Bai, Jianwei Li, Joe Rowell: Lattice Reduction with Approximate Enumeration Oracles: Practical Algorithms and Concrete Performance, IACR Cryptol. ePrint Arch. 2020 preprint dblp

  132. Sean Murphy, Maura B. Paterson, Christine Swart: Boolean Ring Cryptographic Equation Solving, IACR Cryptol. ePrint Arch. 2020 preprint dblp

  133. Jianwei Li, Phong Q. Nguyen: A Complete Analysis of the BKZ Lattice Reduction Algorithm, IACR Cryptol. ePrint Arch. 2020 preprint dblp

  134. Eamonn W. Postlethwaite, Fernando Virdia: On the Success Probability of Solving Unique SVP via BKZ, IACR Cryptol. ePrint Arch. 2020 preprint dblp

  135. Steven D. Galbraith, Robert Granger, Simon-Philipp Merz, Christophe Petit: On Index Calculus Algorithms for Subfield Curves, IACR Cryptol. ePrint Arch. 2020 preprint dblp

  136. Ashley Fraser, Elizabeth A. Quaglia: Protecting the Privacy of Voters: New Definitions of Ballot Secrecy for E-Voting, IACR Cryptol. ePrint Arch. 2020 preprint dblp

  137. Wanpeng Li, Chris J. Mitchell: User Access Privacy in OAuth 2.0 and OpenID Connect, EuroS&P Workshops 2020 dblp

  138. Martin R. Albrecht, Rikke Bjerg Jensen: The Vacuity of the Open Source Security Testing Methodology Manual, CoRR 2020 preprint dblp

  139. Jodie Knapp, Elizabeth A. Quaglia: Fair and Sound Secret Sharing from Homomorphic Time-Lock Puzzles, IACR Cryptol. ePrint Arch. 2020 preprint dblp

  140. Chris J. Mitchell: An insecure noninteractive group key establishment scheme, CoRR 2020 preprint dblp

  141. Jeroen Pijnenburg, Bertram Poettering: Encrypt-to-Self: Securely Outsourcing Storage, ESORICS (1) 2020 dblp

  142. Martin R. Albrecht, Pooya Farshim, Shuai Han, Dennis Hofheinz, Enrique Larraia, Kenneth G. Paterson: Multilinear Maps from Obfuscation, J. Cryptol. 2020 dblp

  143. Jeroen Pijnenburg, Bertram Poettering: Efficiency Improvements for Encrypt-to-Self, CoRR 2020 preprint dblp

  144. Anamaria Costache, Kim Laine, Rachel Player: Evaluating the Effectiveness of Heuristic Worst-Case Noise Analysis in FHE, ESORICS (2) 2020 dblp

  145. Lydia Garms, Siaw-Lynn Ng, Elizabeth A. Quaglia, Giulia Traverso: Anonymity and Rewards in Peer Rating Systems, SCN 2020 dblp

  146. Carlos Cid, Akinori Hosoyamada, Yunwen Liu, Siang Meng Sim: Quantum Cryptanalysis on Contracting Feistel Structures and Observation on Related-key settings, IACR Cryptol. ePrint Arch. 2020 preprint dblp

  147. Divesh Aggarwal, Jianwei Li, Phong Q. Nguyen, Noah Stephens-Davidowitz: Slide Reduction, Revisited - Filling the Gaps in SVP Approximation, CRYPTO (2) 2020 dblp

  148. Jeroen Pijnenburg, Bertram Poettering: Key Assignment Schemes with Authenticated Encryption, revisited, IACR Trans. Symmetric Cryptol. 2020 dblp

  149. Lydia Garms, Siaw-Lynn Ng, Elizabeth A. Quaglia, Giulia Traverso: Anonymity and Rewards in Peer Rating Systems, IACR Cryptol. ePrint Arch. 2020 preprint dblp

  150. Jeroen Pijnenburg, Bertram Poettering: Encrypt-to-self: Securely Outsourcing Storage, IACR Cryptol. ePrint Arch. 2020 preprint dblp

  151. Martin R. Albrecht, Shi Bai, Pierre-Alain Fouque, Paul Kirchner, Damien Stehlé, Weiqiang Wen: Faster Enumeration-based Lattice Reduction: Root Hermite Factor k^(1/(2k)) in Time k^(k/8 + o(k)), IACR Cryptol. ePrint Arch. 2020 preprint dblp

  152. Jeroen Pijnenburg, Bertram Poettering: Key Assignment Schemes with Authenticated Encryption, revisited, IACR Cryptol. ePrint Arch. 2020 preprint dblp

  153. Haibat Khan, Keith M. Martin: A survey of subscription privacy on the 5G radio interface - The past, present and future, J. Inf. Secur. Appl. 2020 dblp

  154. Morten Øygarden, Patrick Felke, Håvard Raddum, Carlos Cid: Cryptanalysis of the Multivariate Encryption Scheme EFLASH, CT-RSA 2020 dblp

  155. Carlos Cid, Lorenzo Grassi, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger: Higher-Order Differentials of Ciphers with Low-Degree S-Boxes, IACR Cryptol. ePrint Arch. 2020 preprint dblp

  156. Chris J. Mitchell: The impact of quantum computing on real-world security: A 5G case study, Comput. Secur. 2020 dblp

  157. Chris J. Mitchell: How not to secure wireless sensor networks revisited: Even if you say it twice it’s still not secure, CoRR 2020 preprint dblp

  158. Chris J. Mitchell: Provably insecure group authentication: Not all security proofs are what they claim to be, CoRR 2020 preprint dblp

  159. Haibat Khan, Benjamin Dowling, Keith M. Martin: Pragmatic Authenticated Key Agreement for IEEE Std 802.15.6, IACR Cryptol. ePrint Arch. 2020 preprint dblp

  160. Haibat Khan, Keith M. Martin: A Survey of Subscription Privacy on the 5G Radio Interface - The Past, Present and Future, IACR Cryptol. ePrint Arch. 2020 preprint dblp

  161. Chris J. Mitchell: Who Needs Trust for 5G?, CoRR 2020 preprint dblp

  162. Samuel Jaques, Michael Naehrig, Martin Roetteler, Fernando Virdia: Implementing Grover Oracles for Quantum Key Search on AES and LowMC, EUROCRYPT (2) 2020 dblp

  163. Craig Costello, Patrick Longa, Michael Naehrig, Joost Renes, Fernando Virdia: Improved Classical Cryptanalysis of SIKE in Practice, Public Key Cryptography (2) 2020 dblp

  164. Chris J. Mitchell: How not to secure wireless sensor networks: A plethora of insecure polynomial-based key pre-distribution schemes, CoRR 2020 preprint dblp

  165. Chris J. Mitchell: Yet another insecure group key distribution scheme using secret sharing, CoRR 2020 preprint dblp

  166. Wanpeng Li, Chris J. Mitchell, Thomas M. Chen: OAuthGuard: Protecting User Security and Privacy with OAuth 2.0 and OpenID Connect, SSR 2019 dblp

  167. Wanpeng Li, Chris J. Mitchell, Thomas M. Chen: OAuthGuard: Protecting User Security and Privacy with OAuth 2.0 and OpenID Connect, CoRR 2019 preprint dblp

  168. Martin R. Albrecht, Léo Ducas, Gottfried Herold, Elena Kirshanova, Eamonn W. Postlethwaite, Marc Stevens: The General Sieve Kernel and New Records in Lattice Reduction, EUROCRYPT (2) 2019 dblp

  169. Martin R. Albrecht, Léo Ducas, Gottfried Herold, Elena Kirshanova, Eamonn W. Postlethwaite, Marc Stevens: The General Sieve Kernel and New Records in Lattice Reduction, IACR Cryptol. ePrint Arch. 2019 preprint dblp

  170. Elena Kirshanova, Erik Mårtensson, Eamonn W. Postlethwaite, Subhayan Roy Moulik: Quantum Algorithms for the Approximate k-List Problem and Their Application to Lattice Sieving, ASIACRYPT (1) 2019 dblp

  171. Simon-Philipp Merz, Christophe Petit: Factoring Products of Braids via Garside Normal Form, Public Key Cryptography (2) 2019 dblp

  172. Liqun Chen, Chris J. Mitchell, Thanassis Giannetsos, Daniele Sgandurra: Proceedings of the 1st ACM Workshop on Workshop on Cyber-Security Arms Race, CYSARM@CCS 2019, London, UK, November 15, 2019, ACM 2019 dblp

  173. Angelique Faye Loe, Elizabeth A. Quaglia: You Shall Not Join: A Measurement Study of Cryptocurrency Peer-to-Peer Bootstrapping Techniques, CCS 2019 dblp

  174. Marcel Armour, Bertram Poettering: Substitution Attacks against Message Authentication, IACR Trans. Symmetric Cryptol. 2019 dblp

  175. Marcel Armour, Bertram Poettering: Subverting Decryption in AEAD, IMACC 2019 dblp

  176. Martin R. Albrecht, Torben Brandt Hansen, Kenneth G. Paterson: libInterMAC: Beyond Confidentiality and Integrity in Practice, IACR Cryptol. ePrint Arch. 2019 preprint dblp

  177. Martin R. Albrecht, Lorenzo Grassi, Léo Perrin, Sebastian Ramacher, Christian Rechberger, Dragos Rotaru, Arnab Roy, Markus Schofnegger: Feistel Structures for MPC, and More, IACR Cryptol. ePrint Arch. 2019 preprint dblp

  178. Martin R. Albrecht, Carlos Cid, Lorenzo Grassi, Dmitry Khovratovich, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger: Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC, IACR Cryptol. ePrint Arch. 2019 preprint dblp

  179. Martin R. Albrecht, Melissa Chase, Hao Chen, Jintai Ding, Shafi Goldwasser, Sergey Gorbunov, Shai Halevi, Jeffrey Hoffstein, Kim Laine, Kristin E. Lauter, Satya Lokam, Daniele Micciancio, Dustin Moody, Travis Morrison, Amit Sahai, Vinod Vaikuntanathan: Homomorphic Encryption Standard, IACR Cryptol. ePrint Arch. 2019 preprint dblp

  180. Martin R. Albrecht, Benjamin R. Curtis, Thomas Wunderer: Exploring Trade-offs in Batch Bounded Distance Decoding, IACR Cryptol. ePrint Arch. 2019 preprint dblp

  181. Martin R. Albrecht, Vlad Gheorghiu, Eamonn W. Postlethwaite, John M. Schanck: Quantum speedups for lattice sieves are tenuous at best, IACR Cryptol. ePrint Arch. 2019 preprint dblp

  182. Martin R. Albrecht, Alex Davidson, Amit Deo, Nigel P. Smart: Round-optimal Verifiable Oblivious Pseudorandom Functions From Ideal Lattices, IACR Cryptol. ePrint Arch. 2019 preprint dblp

  183. Morten Øygarden, Patrick Felke, Håvard Raddum, Carlos Cid: Cryptanalysis of the Multivariate Encryption Scheme EFLASH, IACR Cryptol. ePrint Arch. 2019 preprint dblp

  184. Sean Murphy, Rachel Player: A Central Limit Framework for Ring-LWE Decryption, IACR Cryptol. ePrint Arch. 2019 preprint dblp

  185. Sean Murphy, Rachel Player: Discretisation and Product Distributions in Ring-LWE, IACR Cryptol. ePrint Arch. 2019 preprint dblp

  186. Sauvik Bhattacharya, Óscar García-Morchón, Rachel Player, Ludo Tolhuizen: Achieving secure and efficient lattice-based public-key encryption: the impact of the secret-key distribution, IACR Cryptol. ePrint Arch. 2019 preprint dblp

  187. Anamaria Costache, Kim Laine, Rachel Player: Homomorphic noise growth in practice: comparing BGV and FV, IACR Cryptol. ePrint Arch. 2019 preprint dblp

  188. Benjamin R. Curtis, Rachel Player: On the Feasibility and Impact of Standardising Sparse-secret LWE Parameter Sets for Homomorphic Encryption, IACR Cryptol. ePrint Arch. 2019 preprint dblp

  189. Craig Costello, Patrick Longa, Michael Naehrig, Joost Renes, Fernando Virdia: Improved Classical Cryptanalysis of the Computational Supersingular Isogeny Problem, IACR Cryptol. ePrint Arch. 2019 preprint dblp

  190. Samuel Jaques, Michael Naehrig, Martin Roetteler, Fernando Virdia: Implementing Grover oracles for quantum key search on AES and LowMC, IACR Cryptol. ePrint Arch. 2019 preprint dblp

  191. Jan-Pieter D’Anvers, Mélissa Rossi, Fernando Virdia: (One) failure is not an option: Bootstrapping the search for failures in lattice-based encryption schemes, IACR Cryptol. ePrint Arch. 2019 preprint dblp

  192. Elena Kirshanova, Erik Mårtensson, Eamonn W. Postlethwaite, Subhayan Roy Moulik: Quantum Algorithms for the Approximate k-List Problem and their Application to Lattice Sieving, IACR Cryptol. ePrint Arch. 2019 preprint dblp

  193. Simon-Philipp Merz, Romy Minko, Christophe Petit: Another look at some isogeny hardness assumptions, IACR Cryptol. ePrint Arch. 2019 preprint dblp

  194. Marcel Armour, Bertram Poettering: Subverting Decryption in AEAD, IACR Cryptol. ePrint Arch. 2019 preprint dblp

  195. Marcel Armour, Bertram Poettering: Substitution Attacks against Message Authentication, IACR Cryptol. ePrint Arch. 2019 preprint dblp

  196. Ashley Fraser, Elizabeth A. Quaglia, Ben Smyth: A critique of game-based definitions of receipt-freeness for voting, IACR Cryptol. ePrint Arch. 2019 preprint dblp

  197. Lydia Garms, Elizabeth A. Quaglia: A New Approach to Modelling Centralised Reputation Systems, IACR Cryptol. ePrint Arch. 2019 preprint dblp

  198. Haibat Khan, Keith M. Martin: On the Efficacy of New Privacy Attacks against 5G AKA, ICETE (2) 2019 dblp

  199. Martin R. Albrecht, Christian Hanser, Andrea Höller, Thomas Pöppelmann, Fernando Virdia, Andreas Wallner: Implementing RLWE-based Schemes Using an RSA Co-Processor, IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019 dblp

  200. Martin R. Albrecht, Torben Brandt Hansen, Kenneth G. Paterson: libInterMAC: Beyond Confidentiality and Integrity in Practice, IACR Trans. Symmetric Cryptol. 2019 dblp

  201. Martin R. Albrecht, Benjamin R. Curtis, Thomas Wunderer: Exploring Trade-offs in Batch Bounded Distance Decoding, SAC 2019 dblp

  202. Benjamin R. Curtis, Rachel Player: On the Feasibility and Impact of Standardising Sparse-secret LWE Parameter Sets for Homomorphic Encryption, WAHC@CCS 2019 dblp

  203. Chris J. Mitchell: The impact of quantum computing on real-world security: A 5G case study, CoRR 2019 preprint dblp

  204. Martin R. Albrecht, Carlos Cid, Lorenzo Grassi, Dmitry Khovratovich, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger: Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC, ASIACRYPT (3) 2019 dblp

  205. Martin R. Albrecht, Lorenzo Grassi, Léo Perrin, Sebastian Ramacher, Christian Rechberger, Dragos Rotaru, Arnab Roy, Markus Schofnegger: Feistel Structures for MPC, and More, ESORICS (2) 2019 dblp

  206. Siaw-Lynn Ng, Maura B. Paterson: Functional repair codes: a view from projective geometry, Des. Codes Cryptogr. 2019 dblp

  207. Samuel Jaques, Michael Naehrig, Martin Roetteler, Fernando Virdia: Implementing Grover oracles for quantum key search on AES and LowMC, CoRR 2019 preprint dblp

  208. Ashley Fraser, Elizabeth A. Quaglia, Ben Smyth: A Critique of Game-Based Definitions of Receipt-Freeness for Voting, ProvSec 2019 dblp

  209. Carlos Cid, Michael J. Jacobson Jr.: Selected Areas in Cryptography - SAC 2018 - 25th International Conference, Calgary, AB, Canada, August 15-17, 2018, Revised Selected Papers, Springer 2019 dblp

  210. Divesh Aggarwal, Jianwei Li, Phong Q. Nguyen, Noah Stephens-Davidowitz: Slide Reduction, Revisited - Filling the Gaps in SVP Approximation, CoRR 2019 preprint dblp

  211. Jianwei Li, Phong Q. Nguyen: Computing a Lattice Basis Revisited, ISSAC 2019 dblp

  212. Lydia Garms, Elizabeth A. Quaglia: A New Approach to Modelling Centralised Reputation Systems, AFRICACRYPT 2019 dblp

  213. Chris J. Mitchell: The Saeed-Liu-Tian-Gao-Li authenticated key agreement protocol is insecure, CoRR 2019 preprint dblp

  214. Sean Murphy, Rachel Player: \delta -subgaussian Random Variables in Cryptography, ACISP 2019 dblp

  215. Maxime Meyer, Elizabeth A. Quaglia, Ben Smyth: An Overview of GSMA’s M2M Remote Provisioning Specification, CoRR 2019 preprint dblp

  216. Nasser Mohammed Al-Fannah, Wanpeng Li, Chris J. Mitchell: Beyond Cookie Monster Amnesia: Real World Persistent Online Tracking, CoRR 2019 preprint dblp

  217. Chris J. Mitchell: Security issues in a group key establishment protocol, Comput. J. 2019 dblp

  218. Rachel Player: Parameter selection in lattice-based cryptography, Royal Holloway, University of London, Egham, UK 2018 dblp

  219. Wanpeng Li, Chris J. Mitchell, Thomas M. Chen: Mitigating CSRF attacks on OAuth 2.0 Systems, PST 2018 dblp

  220. Wanpeng Li, Chris J. Mitchell, Thomas M. Chen: Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations, Security Protocols Workshop 2018 dblp

  221. Wanpeng Li, Chris J. Mitchell, Thomas M. Chen: Mitigating CSRF attacks on OAuth 2.0 and OpenID Connect, CoRR 2018 preprint dblp

  222. Jorge Blasco, Elizabeth A. Quaglia: InfoSec Cinema: Using Films for Information Security Teaching, ASE @ USENIX Security Symposium 2018 dblp

  223. Martin R. Albrecht, Jake Massimo, Kenneth G. Paterson, Juraj Somorovsky: Prime and Prejudice: Primality Testing Under Adversarial Conditions, CCS 2018 dblp

  224. Babak Daghighi, Miss Laiha Mat Kiah, Salman Iqbal, Muhammad Habib Ur Rehman, Keith M. Martin: Host mobility key management in dynamic secure group communication, Wirel. Networks 2018 dblp

  225. Martin R. Albrecht, Benjamin R. Curtis, Amit Deo, Alex Davidson, Rachel Player, Eamonn W. Postlethwaite, Fernando Virdia, Thomas Wunderer: Estimate all the {LWE, NTRU} schemes!, IACR Cryptol. ePrint Arch. 2018 preprint dblp

  226. Martin R. Albrecht, Christian Hanser, Andrea Höller, Thomas Pöppelmann, Fernando Virdia, Andreas Wallner: Learning with Errors on RSA Co-Processors, IACR Cryptol. ePrint Arch. 2018 preprint dblp

  227. Martin R. Albrecht, Amit Deo, Kenneth G. Paterson: Cold Boot Attacks on Ring and Module LWE Keys Under the NTT, IACR Cryptol. ePrint Arch. 2018 preprint dblp

  228. Martin R. Albrecht, Jake Massimo, Kenneth G. Paterson, Juraj Somorovsky: Prime and Prejudice: Primality Testing Under Adversarial Conditions, IACR Cryptol. ePrint Arch. 2018 preprint dblp

  229. Carlos Cid, Tao Huang, Thomas Peyrin, Yu Sasaki, Ling Song: Boomerang Connectivity Table: A New Cryptanalysis Tool, IACR Cryptol. ePrint Arch. 2018 preprint dblp

  230. Haibat Khan, Benjamin Dowling, Keith M. Martin: Identity Confidentiality in 5G Mobile Telephony Systems, IACR Cryptol. ePrint Arch. 2018 preprint dblp

  231. Simon-Philipp Merz, Christophe Petit: On the (non) obfuscating power of Garside Normal Forms, IACR Cryptol. ePrint Arch. 2018 preprint dblp

  232. Elizabeth A. Quaglia, Ben Smyth: Authentication with weaker trust assumptions for voting systems, IACR Cryptol. ePrint Arch. 2018 preprint dblp

  233. Carlos Cid, Tao Huang, Thomas Peyrin, Yu Sasaki, Ling Song: Boomerang Connectivity Table: A New Cryptanalysis Tool, EUROCRYPT (2) 2018 dblp

  234. Hiroki Okada, Carlos Cid, Seira Hidano, Shinsaku Kiyomoto: Linear Depth Integer-Wise Homomorphic Division, WISTP 2018 dblp

  235. Fatma Al Maqbali, Chris J. Mitchell: Email-based Password Recovery - Risking or Rescuing Users?, ICCST 2018 dblp

  236. Nasser Mohammed Al-Fannah, Wanpeng Li, Chris J. Mitchell: Beyond Cookie Monster Amnesia: Real World Persistent Online Tracking, ISC 2018 dblp

  237. Martin R. Albrecht, Amit Deo, Kenneth G. Paterson: Cold Boot Attacks on Ring and Module LWE Keys Under the NTT, IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018 dblp

  238. Haibat Khan, Benjamin Dowling, Keith M. Martin: Highly Efficient Privacy-Preserving Key Agreement for Wireless Body Area Networks, TrustCom/BigDataSE 2018 dblp

  239. Liqun Chen, Jinguang Han, Chris J. Mitchell: Message from the Guest Editors, Int. J. Inf. Sec. 2018 dblp

  240. Maxime Meyer, Elizabeth A. Quaglia, Ben Smyth: Attacks Against GSMA’s M2M Remote Provisioning (Short Paper), Financial Cryptography 2018 dblp

  241. Rémi Bricout, Sean Murphy, Kenneth G. Paterson, Thyla van der Merwe: Analysing and exploiting the Mantin biases in RC4, Des. Codes Cryptogr. 2018 dblp

  242. Hao Chen, Kim Laine, Rachel Player, Yuhou Xia: High-Precision Arithmetic in Homomorphic Encryption, CT-RSA 2018 dblp

  243. Haibat Khan, Benjamin Dowling, Keith M. Martin: Identity Confidentiality in 5G Mobile Telephony Systems, SSR 2018 dblp

  244. Angelique Faye Loe, Elizabeth A. Quaglia: Conquering Generals: an NP-Hard Proof of Useful Work, CRYBLOCK@MobiSys 2018 dblp

  245. Siaw-Lynn Ng, Maura B. Paterson: Functional repair codes: a view from projective geometry, CoRR 2018 preprint dblp

  246. Chatdanai Dorkson, Siaw-Lynn Ng: Multi-Message Private Information Retrieval using Product-Matrix MSR and MBR Codes, CoRR 2018 preprint dblp

  247. Martin R. Albrecht, Benjamin R. Curtis, Amit Deo, Alex Davidson, Rachel Player, Eamonn W. Postlethwaite, Fernando Virdia, Thomas Wunderer: Estimate All the {LWE, NTRU} Schemes!, SCN 2018 dblp

  248. Fatma Al Maqbali, Chris J. Mitchell: Web password recovery - a necessary evil?, CoRR 2018 preprint dblp

  249. Chris J. Mitchell: Security issues in a group key establishment protocol, CoRR 2018 preprint dblp

  250. Chris J. Mitchell: The Hsu-Harn-Mu-Zhang-Zhu group key establishment protocol is insecure, CoRR 2018 preprint dblp

  251. Chatdanai Dorkson, Siaw-Lynn Ng: Private Information Retrieval using Product-Matrix Minimum Storage Regenerating Codes, CoRR 2018 preprint dblp

  252. Elizabeth A. Quaglia, Ben Smyth: Secret, verifiable auctions from elections, Theor. Comput. Sci. 2018 dblp

  253. Elizabeth A. Quaglia, Ben Smyth: Authentication with Weaker Trust Assumptions for Voting Systems, AFRICACRYPT 2018 dblp

  254. Liqun Chen, Qin Li, Keith M. Martin, Siaw-Lynn Ng: Private reputation retrieval in public - a privacy-aware announcement scheme for VANETs, IET Inf. Secur. 2017 dblp

  255. Sarah Louise Renwick, Keith M. Martin: Practical Architectures for Deployment of Searchable Encryption in a Cloud Environment, Cryptogr. 2017 dblp

  256. Martin R. Albrecht: On dual lattice attacks against small-secret LWE and parameter choices in HElib and SEAL, IACR Cryptol. ePrint Arch. 2017 preprint dblp

  257. Martin R. Albrecht, Emmanuela Orsini, Kenneth G. Paterson, Guy Peer, Nigel P. Smart: Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts, IACR Cryptol. ePrint Arch. 2017 preprint dblp

  258. Martin R. Albrecht, Amit Deo: Large Modulus Ring-LWE >= Module-LWE, IACR Cryptol. ePrint Arch. 2017 preprint dblp

  259. Martin R. Albrecht, Florian Göpfert, Fernando Virdia, Thomas Wunderer: Revisiting the Expected Cost of Solving uSVP and Applications to LWE, IACR Cryptol. ePrint Arch. 2017 preprint dblp

  260. Martin R. Albrecht, Alex Davidson, Enrique Larraia, Alice Pellet-Mary: Notes On GGH13 Without The Presence Of Ideals, IACR Cryptol. ePrint Arch. 2017 preprint dblp

  261. Christian A. Gorke, Christian Janson, Frederik Armknecht, Carlos Cid: Cloud Storage File Recoverability, IACR Cryptol. ePrint Arch. 2017 preprint dblp

  262. Carlos Cid, Tao Huang, Thomas Peyrin, Yu Sasaki, Ling Song: Cryptanalysis of Deoxys and its Internal Tweakable Block Ciphers, IACR Cryptol. ePrint Arch. 2017 preprint dblp

  263. James Alderman, Keith M. Martin, Sarah Louise Renwick: Multi-level Access in Searchable Symmetric Encryption, IACR Cryptol. ePrint Arch. 2017 preprint dblp

  264. Sean Murphy, Rachel Player: Noise Distributions in Homomorphic Ring-LWE, IACR Cryptol. ePrint Arch. 2017 preprint dblp

  265. Hao Chen, Kim Laine, Rachel Player: Simple Encrypted Arithmetic Library - SEAL v2.1, IACR Cryptol. ePrint Arch. 2017 preprint dblp

  266. Hao Chen, Kim Laine, Rachel Player, Yuhou Xia: High-Precision Arithmetic in Homomorphic Encryption, IACR Cryptol. ePrint Arch. 2017 preprint dblp

  267. Thalia M. Laing, Keith M. Martin, Maura B. Paterson, Douglas R. Stinson: Localised multisecret sharing, Cryptogr. Commun. 2017 dblp

  268. Fatma Al Maqbali, Chris J. Mitchell: AutoPass: An automatic password generator, ICCST 2017 dblp

  269. Carlos Cid, Tao Huang, Thomas Peyrin, Yu Sasaki, Ling Song: A Security Analysis of Deoxys and its Internal Tweakable Block Ciphers, IACR Trans. Symmetric Cryptol. 2017 dblp

  270. Luca Rose, Elizabeth A. Quaglia, Stefan Valentin: Increasing the Security of Wireless Communication through Relaying and Interference Generation, WCNC 2017 dblp

  271. Giovanni Livraga, Chris J. Mitchell: Security and Trust Management - 13th International Workshop, STM 2017, Oslo, Norway, September 14-15, 2017, Proceedings, Springer 2017 dblp

  272. Hao Chen, Kim Laine, Rachel Player: Simple Encrypted Arithmetic Library - SEAL v2.1, Financial Cryptography Workshops 2017 dblp

  273. Lydia Garms, Keith M. Martin, Siaw-Lynn Ng: Reputation Schemes for Pervasive Social Networks with Anonymity (Short Paper), PST 2017 dblp

  274. Christian A. Gorke, Christian Janson, Frederik Armknecht, Carlos Cid: Cloud Storage File Recoverability, SCC@AsiaCCS 2017 dblp

  275. Mohammed Shafiul Alam Khan, Chris J. Mitchell: Trashing IMSI catchers in mobile networks, WISEC 2017 dblp

  276. Jeremie Leguay, Georgios S. Paschos, Elizabeth A. Quaglia, Ben Smyth: CryptoCache: Network caching with confidentiality, ICC 2017 dblp

  277. Fatma Al Maqbali, Chris J. Mitchell: AutoPass: An Automatic Password Generator, CoRR 2017 preprint dblp

  278. Elizabeth A. Quaglia, Ben Smyth: A short introduction to secrecy and verifiability for elections, CoRR 2017 preprint dblp

  279. Carlos Aguilar Melchor, Martin R. Albrecht, Thomas Ricosset: Sampling from Arbitrary Centered Discrete Gaussians for Lattice-Based Cryptography, ACNS 2017 dblp

  280. Martin R. Albrecht, Alex Davidson, Enrique Larraia: Notes on GGH13 Without the Presence of Ideals, IMACC 2017 dblp

  281. Martin R. Albrecht, Amit Deo: Large Modulus Ring-LWE ≥ Module-LWE, ASIACRYPT (1) 2017 dblp

  282. Martin R. Albrecht, Florian Göpfert, Fernando Virdia, Thomas Wunderer: Revisiting the Expected Cost of Solving uSVP and Applications to LWE, ASIACRYPT (1) 2017 dblp

  283. James Alderman, Keith M. Martin, Sarah Louise Renwick: Multi-level Access in Searchable Symmetric Encryption, Financial Cryptography Workshops 2017 dblp

  284. James Alderman, Benjamin R. Curtis, Oriol Farràs, Keith M. Martin, Jordi Ribes-González: Private Outsourced Kriging Interpolation, Financial Cryptography Workshops 2017 dblp

  285. Martin R. Albrecht, Emmanuela Orsini, Kenneth G. Paterson, Guy Peer, Nigel P. Smart: Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts, ESORICS (1) 2017 dblp

  286. Alex Davidson, Carlos Cid: An Efficient Toolkit for Computing Private Set Operations, ACISP (2) 2017 dblp

  287. Martin R. Albrecht: On Dual Lattice Attacks Against Small-Secret LWE and Parameter Choices in HElib and SEAL, EUROCRYPT (2) 2017 dblp

  288. Liqun Chen, Thalia M. Laing, Keith M. Martin: Revisiting and Extending the AONT-RS Scheme: A Robust Computationally Secure Secret Sharing Scheme, AFRICACRYPT 2017 dblp

  289. Johannes Buchmann, Florian Göpfert, Rachel Player, Thomas Wunderer: On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack, AFRICACRYPT 2016 dblp

  290. Johannes Buchmann, Florian Göpfert, Rachel Player, Thomas Wunderer: On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack, IACR Cryptol. ePrint Arch. 2016 preprint dblp

  291. Martin R. Albrecht, Jean Paul Degabriele, Torben Brandt Hansen, Kenneth G. Paterson: A Surfeit of SSH Cipher Suites, CCS 2016 dblp

  292. Wanpeng Li, Chris J. Mitchell: Analysing the Security of Google’s Implementation of OpenID Connect, DIMVA 2016 dblp

  293. Konstantinos Mersinas, Bjoern Hartig, Keith M. Martin, Andrew Seltzer: Are information security professionals expected value maximizers?: An experiment and survey-based test, J. Cybersecur. 2016 dblp

  294. Martin R. Albrecht, Shi Bai, Léo Ducas: A subfield lattice attack on overstretched NTRU assumptions: Cryptanalysis of some FHE and Graded Encoding Schemes, IACR Cryptol. ePrint Arch. 2016 preprint dblp

  295. Martin R. Albrecht, Lorenzo Grassi, Christian Rechberger, Arnab Roy, Tyge Tiessen: MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity, IACR Cryptol. ePrint Arch. 2016 preprint dblp

  296. Martin R. Albrecht, Christian Rechberger, Thomas Schneider, Tyge Tiessen, Michael Zohner: Ciphers for MPC and FHE, IACR Cryptol. ePrint Arch. 2016 preprint dblp

  297. Alex Davidson, Carlos Cid: Computing Private Set Operations with Linear Complexities, IACR Cryptol. ePrint Arch. 2016 preprint dblp

  298. Liqun Chen, Thalia M. Laing, Keith M. Martin: Revisiting and Extending the AONT-RS scheme: a Robust Computationally Secure Secret Sharing Scheme, IACR Cryptol. ePrint Arch. 2016 preprint dblp

  299. Rémi Bricout, Sean Murphy, Kenneth G. Paterson, Thyla van der Merwe: Analysing and Exploiting the Mantin Biases in RC4, IACR Cryptol. ePrint Arch. 2016 preprint dblp

  300. Steven D. Galbraith, Shishay W. Gebregiyorgis, Sean Murphy: Algorithms for the Approximate Common Divisor Problem, IACR Cryptol. ePrint Arch. 2016 preprint dblp

  301. Dieter Jungnickel, Jennifer D. Key, Chris J. Mitchell, Ronald C. Mullin, Peter R. Wild: Editorial for the 25th anniversary issue, Des. Codes Cryptogr. 2016 dblp

  302. Liqun Chen, Chris J. Mitchell: Message from the guest editors, Int. J. Inf. Sec. 2016 dblp

  303. Mohammed Shafiul Alam Khan, Chris J. Mitchell: Retrofitting Mutual Authentication to GSM Using RAND Hijacking, STM 2016 dblp

  304. Fatma Al Maqbali, Chris J. Mitchell: Password Generators: Old Ideas and New, WISTP 2016 dblp

  305. Chris J. Mitchell: On the Security of 2-Key Triple DES, IEEE Trans. Inf. Theory 2016 dblp

  306. Martin R. Albrecht, Jean-Charles Faugère, Pooya Farshim, Gottfried Herold, Ludovic Perret: Polly Cracker, revisited, Des. Codes Cryptogr. 2016 dblp

  307. Michelle Kendall, Keith M. Martin: Graph-theoretic design and analysis of key predistribution schemes, Des. Codes Cryptogr. 2016 dblp

  308. Siaw-Lynn Ng, Maura B. Paterson: Disjoint difference families and their applications, Des. Codes Cryptogr. 2016 dblp

  309. Lidong Chen, David A. McGrew, Chris J. Mitchell: Security Standardisation Research - Third International Conference, SSR 2016, Gaithersburg, MD, USA, December 5-6, 2016, Proceedings, Springer 2016 dblp

  310. Chris J. Mitchell: On the security of 2-key triple DES, CoRR 2016 preprint dblp

  311. Mohammed Shafiul Alam Khan, Chris J. Mitchell: Retrofitting mutual authentication to GSM using RAND hijacking, CoRR 2016 preprint dblp

  312. Fatma Al Maqbali, Chris J. Mitchell: Password Generators: Old Ideas and New, CoRR 2016 preprint dblp

  313. Martin R. Albrecht, Shi Bai, Léo Ducas: A Subfield Lattice Attack on Overstretched NTRU Assumptions - Cryptanalysis of Some FHE and Graded Encoding Schemes, CRYPTO (1) 2016 dblp

  314. Elizabeth A. Quaglia, Stefano Tomasin: Geo-specific encryption through implicitly authenticated location for 5G wireless systems, SPAWC 2016 dblp

  315. Martin R. Albrecht, Kenneth G. Paterson: Lucky Microseconds: A Timing Attack on Amazon’s s2n Implementation of TLS, EUROCRYPT (1) 2016 dblp

  316. Liqun Chen, Thalia M. Laing, Keith M. Martin: Efficient, XOR-Based, Ideal (t, n)- threshold Schemes, CANS 2016 dblp

  317. Martin R. Albrecht, Pooya Farshim, Dennis Hofheinz, Enrique Larraia, Kenneth G. Paterson: Multilinear Maps from Obfuscation, TCC (A1) 2016 dblp

  318. James Alderman, Christian Janson, Carlos Cid, Jason Crampton: Hybrid Publicly Verifiable Computation, CT-RSA 2016 dblp

  319. Martin R. Albrecht, Lorenzo Grassi, Christian Rechberger, Arnab Roy, Tyge Tiessen: MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity, ASIACRYPT (1) 2016 dblp

  320. Alex Davidson, Gregory Fenn, Carlos Cid: A Model for Secure and Mutually Beneficial Software Vulnerability Sharing, WISCS@CCS 2016 dblp

  321. Liqun Chen, Qin Li, Keith M. Martin, Siaw-Lynn Ng: Private reputation retrieval in public - a privacy-aware announcement scheme for VANETs, CoRR 2015 preprint dblp

  322. Gordon Procter, Carlos Cid: On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes, J. Cryptol. 2015 dblp

  323. Martin R. Albrecht, Rachel Player, Sam Scott: On the concrete hardness of Learning with Errors, J. Math. Cryptol. 2015 dblp

  324. Martin R. Albrecht, Rachel Player, Sam Scott: On the concrete hardness of Learning with Errors, IACR Cryptol. ePrint Arch. 2015 preprint dblp

  325. Martin R. Albrecht, Pooya Farshim, Dennis Hofheinz, Enrique Larraia, Kenneth G. Paterson: Multilinear Maps from Obfuscation, IACR Cryptol. ePrint Arch. 2015 preprint dblp

  326. Martin R. Albrecht, Kenneth G. Paterson: Lucky Microseconds: A Timing Attack on Amazon’s s2n Implementation of TLS, IACR Cryptol. ePrint Arch. 2015 preprint dblp

  327. Seung Geol Choi, Jonathan Katz, Ranjit Kumaresan, Carlos Cid: Multi-Client Non-Interactive Verifiable Computation, IACR Cryptol. ePrint Arch. 2015 preprint dblp

  328. James Alderman, Christian Janson, Carlos Cid, Jason Crampton: Hybrid Publicly Verifiable Computation, IACR Cryptol. ePrint Arch. 2015 preprint dblp

  329. Thalia M. Laing, Keith M. Martin, Maura B. Paterson, Douglas R. Stinson: Localised Multisecret Sharing, IACR Cryptol. ePrint Arch. 2015 preprint dblp

  330. James Alderman, Christian Janson, Keith M. Martin, Sarah Louise Renwick: Extended Functionality in Verifiable Searchable Encryption, IACR Cryptol. ePrint Arch. 2015 preprint dblp

  331. Elizabeth A. Quaglia, Ben Smyth: Constructing secret, verifiable auction schemes from election schemes, IACR Cryptol. ePrint Arch. 2015 preprint dblp

  332. Constantinos Macropoulos, Keith M. Martin: Balancing Privacy and Surveillance in the Cloud, IEEE Cloud Comput. 2015 dblp

  333. Mohammed Shafiul Alam Khan, Chris J. Mitchell: Improving Air Interface User Privacy in Mobile Telephony, SSR 2015 dblp

  334. Mwawi Nyirenda Kayuni, Mohammed Shafiul Alam Khan, Wanpeng Li, Chris J. Mitchell, Po-Wah Yau: Generating Unlinkable IPv6 Addresses, SSR 2015 dblp

  335. Konstantinos Mersinas, Bjoern Hartig, Keith M. Martin, Andrew Seltzer: Experimental Elicitation of Risk Behaviour amongst Information Security Professionals, WEIS 2015 dblp

  336. Siaw-Lynn Ng, S. Owen: A note on an upper bound of traceability codes, Australas. J Comb. 2015 dblp

  337. Martin R. Albrecht, Carlos Cid, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret: Algebraic algorithms for LWE problems, ACM Commun. Comput. Algebra 2015 dblp

  338. Martin R. Albrecht, Catalin Cocis, Fabien Laguillaumie, Adeline Langlois: Implementing Candidate Graded Encoding Schemes from Ideal Lattices, ASIACRYPT (2) 2015 dblp

  339. Siaw-Lynn Ng, Maura B. Paterson: Disjoint difference families and their applications, CoRR 2015 preprint dblp

  340. Javier López, Chris J. Mitchell: Information Security - 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015, Proceedings, Springer 2015 dblp

  341. Martin R. Albrecht, Christian Rechberger, Thomas Schneider, Tyge Tiessen, Michael Zohner: Ciphers for MPC and FHE, EUROCRYPT (1) 2015 dblp

  342. Martin R. Albrecht, Carlos Cid, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret: On the complexity of the BKW algorithm on LWE, Des. Codes Cryptogr. 2015 dblp

  343. Carlos Cid, Christian Rechberger: Fast Software Encryption - 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papers, Springer 2015 dblp

  344. James Alderman, Christian Janson, Carlos Cid, Jason Crampton: Access Control in Publicly Verifiable Outsourced Computation, AsiaCCS 2015 dblp

  345. M. H. R. Khouzani, Piotr Mardziel, Carlos Cid, Mudhakar Srivatsa: Picking vs. Guessing Secrets: A Game-Theoretic Analysis (Technical Report), CoRR 2015 preprint dblp

  346. Mwawi M. Nyirenda, Siaw-Lynn Ng, Keith M. Martin: A Combinatorial Model of Interference in Frequency Hopping Schemes, CoRR 2015 preprint dblp

  347. Mohammed Shafiul Alam Khan, Chris J. Mitchell: Improving Air Interface User Privacy in Mobile Telephony, CoRR 2015 preprint dblp

  348. Wanpeng Li, Chris J. Mitchell: Analysing the Security of Google’s implementation of OpenID Connect, CoRR 2015 preprint dblp

  349. Wanpeng Li, Chris J. Mitchell: Addressing Threats to Real-World Identity Management Systems, ISSE 2015 dblp

  350. M. H. R. Khouzani, Piotr Mardziel, Carlos Cid, Mudhakar Srivatsa: Picking vs. Guessing Secrets: A Game-Theoretic Analysis, CSF 2015 dblp

  351. Carlos Cid, Loïc Ferreira, Gordon Procter, Matthew J. B. Robshaw: Algebraic Cryptanalysis and RFID Authentication, RFIDSec 2015 dblp

  352. James Alderman, Christian Janson, Keith M. Martin, Sarah Louise Renwick: Extended Functionality in Verifiable Searchable Encryption, BalkanCryptSec 2015 dblp

  353. Wanpeng Li, Chris J. Mitchell: Security Issues in OAuth 2.0 SSO Implementations, ISC 2014 dblp

  354. Amizah Malip, Siaw-Lynn Ng, Qin Li: A certificateless anonymous authenticated announcement scheme in vehicular ad hoc networks, Secur. Commun. Networks 2014 dblp

  355. Martin R. Albrecht, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret, Yosuke Todo, Keita Xagawa: Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions, Public Key Cryptography 2014 dblp

  356. Michelle Kendall, Keith M. Martin, Siaw-Lynn Ng, Maura B. Paterson, Douglas R. Stinson: Broadcast-Enhanced Key Predistribution Schemes, ACM Trans. Sens. Networks 2014 dblp

  357. Martin R. Albrecht, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret: Lazy Modulus Switching for the BKW Algorithm on LWE, IACR Cryptol. ePrint Arch. 2014 preprint dblp

  358. Martin R. Albrecht, Benedikt Driessen, Elif Bilge Kavun, Gregor Leander, Christof Paar, Tolga Yalçin: Block Ciphers - Focus On The Linear Layer (feat. PRIDE): Full Version, IACR Cryptol. ePrint Arch. 2014 preprint dblp

  359. Martin R. Albrecht, Catalin Cocis, Fabien Laguillaumie, Adeline Langlois: Improved Parameters and an Implementation of Graded Encoding Schemes from Ideal Lattices, IACR Cryptol. ePrint Arch. 2014 preprint dblp

  360. Martin R. Albrecht, Carlos Cid, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret: Algebraic Algorithms for LWE Problems, IACR Cryptol. ePrint Arch. 2014 preprint dblp

  361. Viet Pham, M. H. R. Khouzani, Carlos Cid: Optimal Contracts for Outsourced Computation, IACR Cryptol. ePrint Arch. 2014 preprint dblp

  362. James Alderman, Carlos Cid, Jason Crampton, Christian Janson: Revocation in Publicly Verifiable Outsourced Computation, IACR Cryptol. ePrint Arch. 2014 preprint dblp

  363. James Alderman, Carlos Cid, Jason Crampton, Christian Janson: Access Control in Publicly Verifiable Outsourced Computation, IACR Cryptol. ePrint Arch. 2014 preprint dblp

  364. Michelle Kendall, Keith M. Martin: Graph-theoretic design and analysis of key predistribution schemes, IACR Cryptol. ePrint Arch. 2014 preprint dblp

  365. Martin R. Albrecht, Benedikt Driessen, Elif Bilge Kavun, Gregor Leander, Christof Paar, Tolga Yalçin: Block Ciphers - Focus on the Linear Layer (feat. PRIDE), CRYPTO (1) 2014 dblp

  366. Liqun Chen, Chris J. Mitchell: Security Standardisation Research - First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings, Springer 2014 dblp

  367. James Alderman, Carlos Cid, Jason Crampton, Christian Janson: Publicly Verifiable Outsourced Computation with a Key Distribution Centre, CoRR 2014 preprint dblp

  368. Martin R. Albrecht, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret: Lazy Modulus Switching for the BKW Algorithm on LWE, Public Key Cryptography 2014 dblp

  369. Mohammed Shafiul Alam Khan, Chris J. Mitchell: Another Look at Privacy Threats in 3G Mobile Telephony, ACISP 2014 dblp

  370. Adam McCarthy, Ben Smyth, Elizabeth A. Quaglia: Hawk and Aucitas: e-Auction Schemes from the Helios and Civitas e-Voting Schemes, Financial Cryptography 2014 dblp

  371. M. H. R. Khouzani, Viet Pham, Carlos Cid: Strategic Discovery and Sharing of Vulnerabilities in Competitive Environments, GameSec 2014 dblp

  372. Viet Pham, M. H. R. Khouzani, Carlos Cid: Optimal Contracts for Outsourced Computation, GameSec 2014 dblp

  373. Zhiqian Xu, Keith M. Martin: Anonymous User Revocation for Using Attribute-Based Signature in Cloud Computing, CloudCom 2014 dblp

  374. James Alderman, Christian Janson, Carlos Cid, Jason Crampton: Revocation in Publicly Verifiable Outsourced Computation, Inscrypt 2014 dblp

  375. Cagatay Capar, Dennis Goeckel, Kenneth G. Paterson, Elizabeth A. Quaglia, Don Towsley, Murtaza Zafer: Signal-flow-based analysis of wireless security protocols, Inf. Comput. 2013 dblp

  376. Liqun Chen, Qin Li, Keith M. Martin, Siaw-Lynn Ng: A privacy-aware reputation-based announcement scheme for VANETs, WiVeC 2013 dblp

  377. Chunhua Chen, Chris J. Mitchell, Shaohua Tang: Ubiquitous One-Time Password Service Using the Generic Authentication Architecture, Mob. Networks Appl. 2013 dblp

  378. Haitham S. Al-Sinani, Chris J. Mitchell: Enabling interoperation between Shibboleth and Information Card systems, Secur. Commun. Networks 2013 dblp

  379. Martin R. Albrecht, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret: Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions, IACR Cryptol. ePrint Arch. 2013 preprint dblp

  380. Martin R. Albrecht, Robert Fitzpatrick, Florian Göpfert: On the Efficacy of Solving LWE by Reduction to Unique-SVP, IACR Cryptol. ePrint Arch. 2013 preprint dblp

  381. Gordon Procter, Carlos Cid: On Weak Keys and Forgery Attacks against Polynomial-based MAC Schemes, IACR Cryptol. ePrint Arch. 2013 preprint dblp

  382. Sabrina De Capitani di Vimercati, Chris J. Mitchell: Public Key Infrastructures, Services and Applications - 9th European Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers, Springer 2013 dblp

  383. Seung Geol Choi, Jonathan Katz, Ranjit Kumaresan, Carlos Cid: Multi-Client Non-interactive Verifiable Computation, TCC 2013 dblp

  384. Simone Fischer-Hübner, Elisabeth de Leeuw, Chris J. Mitchell: Policies and Research in Identity Management - Third IFIP WG 11.6 Working Conference, IDMAN 2013, London, UK, April 8-9, 2013. Proceedings, Springer 2013 dblp

  385. Chris J. Mitchell: Analysing the IOBC Authenticated Encryption Mode, ACISP 2013 dblp

  386. Martin R. Albrecht, Robert Fitzpatrick, Florian Göpfert: On the Efficacy of Solving LWE by Reduction to Unique-SVP, ICISC 2013 dblp

  387. Pooya Farshim, Benoît Libert, Kenneth G. Paterson, Elizabeth A. Quaglia: Robust Encryption, Revisited, Public Key Cryptography 2013 dblp

  388. Gordon Procter, Carlos Cid: On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes, FSE 2013 dblp

  389. Zhiqian Xu, Keith M. Martin: A Practical Deployment Framework for Use of Attribute-Based Encryption in Data Protection, HPCC/EUC 2013 dblp

  390. Martin R. Albrecht, Carlos Cid, Jean-Charles Faugère, Ludovic Perret: On the relation between the MXL family of algorithms and Gröbner basis algorithms, J. Symb. Comput. 2012 dblp

  391. Simon R. Blackburn, Carlos Cid, Ciaran Mullan: Cryptanalysis of three matrix-based key establishment protocols, J. Math. Cryptol. 2012 dblp

  392. Sean Murphy: The effectiveness of the linear hull effect, J. Math. Cryptol. 2012 dblp

  393. Qin Li, Amizah Malip, Keith M. Martin, Siaw-Lynn Ng, Jie Zhang: A Reputation-Based Announcement Scheme for VANETs, IEEE Trans. Veh. Technol. 2012 dblp

  394. Qin Li, Jie Zhang, Keith M. Martin: Feedback as “Shadow of the Present”: An Alternative to Reputation Systems for E-marketplaces, TrustCom 2012 dblp

  395. Gina Kounga, Chris J. Mitchell, Thomas Walter: **Generating certification authority authenticated public keys in **, Secur. Commun. Networks 2012 dblp

  396. Martin R. Albrecht, Pooya Farshim, Jean-Charles Faugère, Gottfried Herold, Ludovic Perret: Polly Cracker, Revisited, Electron. Colloquium Comput. Complex. 2012 preprint dblp

  397. Martin R. Albrecht, Gregor Leander: An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers, IACR Cryptol. ePrint Arch. 2012 preprint dblp

  398. Martin R. Albrecht, Carlos Cid, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret: On the Complexity of the BKW Algorithm on LWE, IACR Cryptol. ePrint Arch. 2012 preprint dblp

  399. Viet Pham, Carlos Cid: Are We Compromised? Modelling Security Assessment Games, IACR Cryptol. ePrint Arch. 2012 preprint dblp

  400. Michelle Kendall, Keith M. Martin, Siaw-Lynn Ng, Maura B. Paterson, Douglas R. Stinson: Broadcast-enhanced Key Predistribution Schemes, IACR Cryptol. ePrint Arch. 2012 preprint dblp

  401. Pooya Farshim, Benoît Libert, Kenneth G. Paterson, Elizabeth A. Quaglia: Robust Encryption, Revisited, IACR Cryptol. ePrint Arch. 2012 preprint dblp

  402. Martin R. Albrecht, Gregor Leander: An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers, Selected Areas in Cryptography 2012 dblp

  403. Chris J. Mitchell, Allan Tomlinson: Trusted Systems, 4th International Conference, INTRUST 2012, London, UK, December 17-18, 2012. Proceedings, Springer 2012 dblp

  404. Martin R. Albrecht: The M4RIE library for dense linear algebra over small fields with even characteristic, ISSAC 2012 dblp

  405. Benoît Libert, Kenneth G. Paterson, Elizabeth A. Quaglia: Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model, Public Key Cryptography 2012 dblp

  406. Chunhua Chen, Shaohua Tang, Chris J. Mitchell: Building General-Purpose Security Services on EMV Payment Cards, SecureComm 2012 dblp

  407. Yuto Nakano, Carlos Cid, Shinsaku Kiyomoto, Yutaka Miyake: Memory Access Pattern Protection for Resource-Constrained Devices, CARDIS 2012 dblp

  408. Viet Pham, Carlos Cid: Are We Compromised? Modelling Security Assessment Games, GameSec 2012 dblp

  409. Zhiqian Xu, Keith M. Martin: Dynamic User Revocation and Key Refreshing for Attribute-Based Encryption in Cloud Storage, TrustCom 2012 dblp

  410. Qin Li, Keith M. Martin, Jie Zhang: Design of a multiagent-based e-marketplace to secure service trading on the internet, ICEC 2011 dblp

  411. Shinsaku Kiyomoto, Keith M. Martin: Model for a Common Notion of Privacy Leakage on Public Database, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 2011 dblp

  412. Martin R. Albrecht, Carlos Cid: Cold Boot Key Recovery by Solving Polynomial Systems with Noise, IACR Cryptol. ePrint Arch. 2011 preprint dblp

  413. Martin R. Albrecht, Carlos Cid, Jean-Charles Faugère, Ludovic Perret: On the Relation Between the Mutant Strategy and the Normal Selection Strategy in Gröbner Basis Algorithms, IACR Cryptol. ePrint Arch. 2011 preprint dblp

  414. Martin R. Albrecht, Pooya Farshim, Kenneth G. Paterson, Gaven J. Watson: On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model, IACR Cryptol. ePrint Arch. 2011 preprint dblp

  415. Martin R. Albrecht, Pooya Farshim, Jean-Charles Faugère, Ludovic Perret: Polly Cracker, Revisited, IACR Cryptol. ePrint Arch. 2011 preprint dblp

  416. Simon R. Blackburn, Carlos Cid, Ciaran Mullan: Cryptanalysis of three matrix-based key establishment protocols, IACR Cryptol. ePrint Arch. 2011 preprint dblp

  417. Michelle Kendall, Keith M. Martin: On the Role of Expander Graphs in Key Predistribution Schemes for Wireless Sensor Networks, IACR Cryptol. ePrint Arch. 2011 preprint dblp

  418. Benoît Libert, Kenneth G. Paterson, Elizabeth A. Quaglia: Anonymous Broadcast Encryption, IACR Cryptol. ePrint Arch. 2011 preprint dblp

  419. Keith M. Martin, Maura B. Paterson, Douglas R. Stinson: Error decodable secret sharing and one-round perfectly secure message transmission for general adversary structures, Cryptogr. Commun. 2011 dblp

  420. Liqun Chen, Siaw-Lynn Ng, Guilin Wang: Threshold Anonymous Announcement in VANETs, IEEE J. Sel. Areas Commun. 2011 dblp

  421. Martin R. Albrecht, Kenneth G. Paterson: Breaking an Identity-Based Encryption Scheme Based on DHIES, IMACC 2011 dblp

  422. Haitham S. Al-Sinani, Chris J. Mitchell: Enhancing CardSpace Authentication Using a Mobile Device, DBSec 2011 dblp

  423. Boyeon Song, Chris J. Mitchell: Scalable RFID security protocols supporting tag ownership transfer, Comput. Commun. 2011 dblp

  424. Martin R. Albrecht, Carlos Cid: Cold Boot Key Recovery by Solving Polynomial Systems with Noise, ACNS 2011 dblp

  425. Yuto Nakano, Carlos Cid, Kazuhide Fukushima, Shinsaku Kiyomoto: Analysis of Message Injection in Stream Cipher-Based Hash Functions, ACNS 2011 dblp

  426. Haitham S. Al-Sinani, Chris J. Mitchell: Extending the Scope of cardspace, SIN 2011 dblp

  427. Martin R. Albrecht, Gregory V. Bard, Clément Pernet: Efficient Dense Gaussian Elimination over the Finite Field with Two Elements, CoRR 2011 preprint dblp

  428. Martin R. Albrecht: The M4RIE library for dense linear algebra over small fields with even characteristic, CoRR 2011 preprint dblp

  429. Simon R. Blackburn, Carlos Cid, Ciaran Mullan: Cryptanalysis of three matrix-based key establishment protocols, CoRR 2011 preprint dblp

  430. Martin R. Albrecht, Pooya Farshim, Jean-Charles Faugère, Ludovic Perret: Polly Cracker, Revisited, ASIACRYPT 2011 dblp

  431. Martin R. Albrecht, Pooya Farshim, Kenneth G. Paterson, Gaven J. Watson: On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model, FSE 2011 dblp

  432. Chunhua Chen, Chris J. Mitchell, Shaohua Tang: SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key, WISTP 2011 dblp

  433. Michelle Kendall, Keith M. Martin: On the Role of Expander Graphs in Key Predistribution Schemes for Wireless Sensor Networks, WEWoRC 2011 dblp

  434. Chunhua Chen, Chris J. Mitchell, Shaohua Tang: Building General Purpose Security Services on Trusted Computing, INTRUST 2011 dblp

  435. Haitham S. Al-Sinani, Chris J. Mitchell: Client-Based CardSpace-OpenID Interoperation, ISCIS 2011 dblp

  436. Haitham S. Al-Sinani, Chris J. Mitchell: A Universal Client-Based Identity Management Tool, EuroPKI 2011 dblp

  437. Simon R. Blackburn, Tuvi Etzion, Siaw-Lynn Ng: Traceability codes, J. Comb. Theory, Ser. A 2010 dblp

  438. Qin Li, Keith M. Martin: A Viable Grid Marketplace, ISPA 2010 dblp

  439. Liqun Chen, Chris J. Mitchell: Parsing ambiguities in authentication and key establishment protocols, Int. J. Electron. Secur. Digit. Forensics 2010 dblp

  440. Liqun Chen, Siaw-Lynn Ng: Comments on “Proving Reliability of Anonymous Information in VANETs” by Kounga, IEEE Trans. Veh. Technol. 2010 dblp

  441. Keith Mayes, Carlos Cid: The MIFARE Classic story, Inf. Secur. Tech. Rep. 2010 dblp

  442. Keith M. Martin, Maura B. Paterson, Douglas R. Stinson: Key predistribution for homogeneous wireless sensor networks with group deployment of nodes, ACM Trans. Sens. Networks 2010 dblp

  443. Martin R. Albrecht, Kenneth G. Paterson: Breaking An Identity-Based Encryption Scheme based on DHIES, IACR Cryptol. ePrint Arch. 2010 preprint dblp

  444. Kenneth G. Paterson, Elizabeth A. Quaglia: Time-Specific Encryption, IACR Cryptol. ePrint Arch. 2010 preprint dblp

  445. Jason Crampton, Rosli Daud, Keith M. Martin: Constructing Key Assignment Schemes from Chain Partitions, DBSec 2010 dblp

  446. Simon R. Blackburn, Tuvi Etzion, Keith M. Martin, Maura B. Paterson: Two-dimensional patterns with distinct differences: constructions, bounds, and maximal anticodes, IEEE Trans. Inf. Theory 2010 dblp

  447. Simon R. Blackburn, Tuvi Etzion, Keith M. Martin, Maura B. Paterson: Distinct difference configurations: multihop paths and key predistribution in sensor networks, IEEE Trans. Inf. Theory 2010 dblp

  448. Martin R. Albrecht, Gregory V. Bard, William Hart: Algorithm 898: Efficient multiplication of dense matrices over GF(2), ACM Trans. Math. Softw. 2010 dblp

  449. Haitham S. Al-Sinani, Waleed A. Alrodhan, Chris J. Mitchell: CardSpace-liberty integration for CardSpace users, IDtrust 2010 dblp

  450. Martin R. Albrecht, Clément Pernet: Efficient Decomposition of Dense Matrices over GF(2), CoRR 2010 preprint dblp

  451. Sondre Rønjom, Carlos Cid: Nonlinear Equivalence of Stream Ciphers, FSE 2010 dblp

  452. Keith M. Martin: The Rise and Fall and Rise of Combinatorial Key Predistribution, Selected Areas in Cryptography 2010 dblp

  453. Haitham S. Al-Sinani, Chris J. Mitchell: Using CardSpace as a Password Manager, IDMAN 2010 dblp

  454. Martin R. Albrecht: Algorithmic algebraic techniques and their application to block cipher cryptanalysis, Royal Holloway, University of London, Egham, UK 2010 dblp

  455. Waleed A. Alrodhan, Chris J. Mitchell: Enhancing user authentication in claim-based identity management, CTS 2010 dblp

  456. Kenneth G. Paterson, Elizabeth A. Quaglia: Time-Specific Encryption, SCN 2010 dblp

  457. Shinsaku Kiyomoto, Keith M. Martin: Towards a Common Notion of Privacy Leakage on Public Database, BWCCA 2010 dblp

  458. Martin R. Albrecht, Carlos Cid, Thomas Dullien, Jean-Charles Faugère, Ludovic Perret: Algebraic Precomputations in Differential and Integral Cryptanalysis, Inscrypt 2010 dblp

  459. Simon R. Blackburn, Carlos Cid, Ciaran Mullan: Cryptanalysis of the MST 3 public key cryptosystem, J. Math. Cryptol. 2009 dblp

  460. Martin R. Albrecht, Craig Gentry, Shai Halevi, Jonathan Katz: Attacking cryptographic schemes based on “perturbation polynomials”, CCS 2009 dblp

  461. Waleed A. Alrodhan, Chris J. Mitchell: Improving the Security of CardSpace, EURASIP J. Inf. Secur. 2009 dblp

  462. Martin R. Albrecht, Craig Gentry, Shai Halevi, Jonathan Katz: Attacking Cryptographic Schemes Based on “Perturbation Polynomials”, IACR Cryptol. ePrint Arch. 2009 preprint dblp

  463. Simon R. Blackburn, Carlos Cid, Ciaran Mullan: Cryptanalysis of the MST, IACR Cryptol. ePrint Arch. 2009 preprint dblp

  464. Simon R. Blackburn, Tuvi Etzion, Keith M. Martin, Maura B. Paterson: Key Predistribution Techniques for Grid-Based Wireless Sensor Networks, IACR Cryptol. ePrint Arch. 2009 preprint dblp

  465. Keith M. Martin, Maura B. Paterson, Douglas R. Stinson: Error Decodable Secret Sharing and One-Round Perfectly Secure Message Transmission for General Adversary Structures, IACR Cryptol. ePrint Arch. 2009 preprint dblp

  466. Simon R. Blackburn, Tuvi Etzion, Siaw-Lynn Ng: Traceability Codes, IACR Cryptol. ePrint Arch. 2009 preprint dblp

  467. Sean Murphy, Maura B. Paterson: Geometric Ideas for Cryptographic Equation Solving in Even Characteristic, IMACC 2009 dblp

  468. Carlos Cid, Shinsaku Kiyomoto, Jun Kurihara: The rakaposhi Stream Cipher, ICICS 2009 dblp

  469. Keith M. Martin, Maura B. Paterson: Ultra-Lightweight Key Predistribution in Wireless Sensor Networks for Monitoring Linear Infrastructure, WISTP 2009 dblp

  470. Carlos Cid, Ralf-Philipp Weinmann: Block Ciphers: Algebraic Cryptanalysis and Gröbner Bases, Gröbner Bases, Coding, and Cryptography 2009 dblp

  471. Thomas Martin, Keith M. Martin, Peter R. Wild: Establishing the broadcast efficiency of the Subset Difference Revocation Scheme, Des. Codes Cryptogr. 2009 dblp

  472. Sihan Qing, Chris J. Mitchell, Guilin Wang: Information and Communications Security, 11th International Conference, ICICS 2009, Beijing, China, December 14-17, 2009. Proceedings, Springer 2009 dblp

  473. Liqun Chen, Chris J. Mitchell, Andrew P. Martin: Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings, Springer 2009 dblp

  474. Olivier Markowitch, Angelos Bilas, Jaap-Henk Hoepman, Chris J. Mitchell, Jean-Jacques Quisquater: Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks, Third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009, Proceedings, Springer 2009 dblp

  475. Shinsaku Kiyomoto, Kazuhide Fukushima, Keith M. Martin: Offline Peer-to-Peer Broadcast with Anonymity, ICETE (Selected Papers) 2009 dblp

  476. Keith M. Martin: On the Applicability of Combinatorial Designs to Key Predistribution for Wireless Sensor Networks, CoRR 2009 preprint dblp

  477. Martin R. Albrecht, Carlos Cid: Algebraic Techniques in Differential Cryptanalysis, FSE 2009 dblp

  478. Shinsaku Kiyomoto, Keith M. Martin, Kazuhide Fukushima: Privacy-Aware Location Database Service for Granular Queries, WISTP 2009 dblp

  479. Eimear Gallery, Chris J. Mitchell: Trusted Computing: Security and Applications, Cryptologia 2009 dblp

  480. Boyeon Song, Chris J. Mitchell: Scalable RFID Pseudonym Protocol, NSS 2009 dblp

  481. Chris J. Mitchell: A Novel Stateless Authentication Protocol, Security Protocols Workshop 2009 dblp

  482. Chris J. Mitchell: A Novel Stateless Authentication Protocol, Security Protocols Workshop 2009 dblp

  483. Martin R. Albrecht, Kenneth G. Paterson, Gaven J. Watson: Plaintext Recovery Attacks against SSH, IEEE Symposium on Security and Privacy 2009 dblp

  484. Keith M. Martin: On the Applicability of Combinatorial Designs to Key Predistribution for Wireless Sensor Networks, IWCC 2009 dblp

  485. Fiona Higgins, Allan Tomlinson, Keith M. Martin: Survey on Security Challenges for Swarm Robotics, ICAS 2009 dblp

  486. Geong Sen Poh, Keith M. Martin: Classification Framework for Fair Content Tracing Protocols, IWDW 2009 dblp

  487. Shinsaku Kiyomoto, Kazuhide Fukushima, Keith M. Martin: An Offline Peer-to-peer Broadcasting Scheme with Anonymity, SECRYPT 2009 dblp

  488. Sean Murphy, Maura B. Paterson: A geometric view of cryptographic equation solving, J. Math. Cryptol. 2008 dblp

  489. Keith M. Martin, Maura B. Paterson: An Application-Oriented Framework for Wireless Sensor Network Key Establishment, Electron. Notes Theor. Comput. Sci. 2008 dblp

  490. Martin R. Albrecht, Carlos Cid: Algebraic Techniques in Differential Cryptanalysis, IACR Cryptol. ePrint Arch. 2008 preprint dblp

  491. Keith M. Martin, Maura B. Paterson, Douglas R. Stinson: Key Predistribution for Homogeneous Wireless Sensor Networks with Group Deployment of Nodes, IACR Cryptol. ePrint Arch. 2008 preprint dblp

  492. Liqun Chen, Chris J. Mitchell: Parsing ambiguities in authentication and key establishment protocols, IACR Cryptol. ePrint Arch. 2008 preprint dblp

  493. Simon R. Blackburn, Tuvi Etzion, Siaw-Lynn Ng: Prolific Codes with the Identifiable Parent Property, SIAM J. Discret. Math. 2008 dblp

  494. Shane Balfe, Eimear Gallery, Chris J. Mitchell, Kenneth G. Paterson: Challenges for Trusted Computing, IEEE Secur. Priv. 2008 dblp

  495. Waleed A. Alrodhan, Chris J. Mitchell: A client-side CardSpace-Liberty integration architecture, IDtrust 2008 dblp

  496. Boyeon Song, Chris J. Mitchell: RFID authentication protocol for low-cost tags, WISEC 2008 dblp

  497. Simon R. Blackburn, Tuvi Etzion, Keith M. Martin, Maura B. Paterson: Efficient Key Predistribution for Grid-Based Wireless Sensor Networks, ICITS 2008 dblp

  498. Simon R. Blackburn, Keith M. Martin, Maura B. Paterson, Douglas R. Stinson: Key Refreshing in Wireless Sensor Networks, ICITS 2008 dblp

  499. Geong Sen Poh, Keith M. Martin: On the Design of Buyer-Seller Watermarking Protocols without a Watermark Authority, ICETE (Selected Papers) 2008 dblp

  500. Martin R. Albrecht, Gregory V. Bard, William Hart: Efficient Multiplication of Dense Matrices over GF(2), CoRR 2008 preprint dblp

  501. Adrian Leung, Liqun Chen, Chris J. Mitchell: On a Possible Privacy Flaw in Direct Anonymous Attestation (DAA), TRUST 2008 dblp

  502. Georgios Kalogridis, Chris J. Mitchell: Using Non-adaptive Group Testing to Construct Spy Agent Routes, ARES 2008 dblp

  503. Adrian Leung, Chris J. Mitchell: A Device Management Framework for Secure Ubiquitous Service Delivery, IAS 2008 dblp

  504. Martin R. Albrecht: Algebraic Attacks on the Courtois Toy Cipher, Cryptologia 2008 dblp

  505. Geong Sen Poh, Keith M. Martin: An Efficient Buyer-Seller Watermarking Protocol Based on Chameleon Encryption, IWDW 2008 dblp

  506. Geong Sen Poh, Keith M. Martin: On the (In)Security of Two Buyer-Seller Watermarking Protocols, SECRYPT 2008 dblp

  507. Keith M. Martin, Siaw-Lynn Ng: The combinatorics of generalised cumulative arrays, J. Math. Cryptol. 2007 dblp

  508. Simon R. Blackburn, Tuvi Etzion, Siaw-Lynn Ng: Prolific Codes with the Identifiable Parent Property, IACR Cryptol. ePrint Arch. 2007 preprint dblp

  509. Chris J. Mitchell: Cryptanalysis of the EPBC Authenticated Encryption Mode, IMACC 2007 dblp

  510. Chris J. Mitchell, Fred Piper, Peter R. Wild: ID-based cryptography using symmetric primitives, Des. Codes Cryptogr. 2007 dblp

  511. Imad M. Abbadi, Chris J. Mitchell: Digital rights management using a mobile phone, ICEC 2007 dblp

  512. Eimear Gallery, Chris J. Mitchell: Trusted Mobile Platforms, FOSAD 2007 dblp

  513. Adrian Leung, Chris J. Mitchell: Ninja: Non Identity Based, Privacy Preserving Authentication for Ubiquitous Environments, UbiComp 2007 dblp

  514. Suranjith Ariyapperuma, Chris J. Mitchell: Security vulnerabilities in DNS and DNSSEC, ARES 2007 dblp

  515. Waleed A. Alrodhan, Chris J. Mitchell: Addressing privacy issues in CardSpace, IAS 2007 dblp

  516. Steve Babbage, Carlos Cid, Norbert Pramstaller, Håvard Raddum: An Analysis of the Hermes8 Stream Ciphers, ACISP 2007 dblp

  517. Geong Sen Poh, Keith M. Martin: A Framework for Design and Analysis of Asymmetric Fingerprinting Protocols, IAS 2007 dblp

  518. Miss Laiha Mat Kiah, Keith M. Martin: Host Mobility Protocol for Secure Group Communication in Wireless Mobile Environments, FGCN (1) 2007 dblp

  519. Carlos Cid: Recent developments in cryptographic hash functions: Security implications and future directions, Inf. Secur. Tech. Rep. 2006 dblp

  520. Steve Babbage, Carlos Cid, Norbert Pramstaller, Håvard Raddum: An Analysis of the Hermes8 Stream Ciphers, IACR Cryptol. ePrint Arch. 2006 preprint dblp

  521. Susan G. Barwick, Wen-Ai Jackson, Keith M. Martin, Christine M. O’Keefe: Optimal updating of ideal threshold schemes, Australas. J Comb. 2006 dblp

  522. Chris J. Mitchell: Mobile Security and Trusted Computing (Mobile Sicherheit und vertrauenswürdiges Rechnen), it Inf. Technol. 2006 dblp

  523. Qiang Tang, Chris J. Mitchell: Cryptanalysis of a hybrid authentication protocol for large mobile networks, J. Syst. Softw. 2006 dblp

  524. Chris J. Mitchell: Using Human Interactive Proofs to Secure Human-Machine Interactions via Untrusted Intermediaries, Security Protocols Workshop 2006 dblp

  525. Chris J. Mitchell: Using Human Interactive Proofs to Secure Human-Machine Interactions via Untrusted Intermediaries, Security Protocols Workshop 2006 dblp

  526. Jason Crampton, Keith M. Martin, Peter R. Wild: On Key Assignment for Hierarchical Access Control, CSFW 2006 dblp

  527. Carlos Cid, Sean Murphy, Matthew J. B. Robshaw: Algebraic aspects of the advanced encryption standard, Springer 2006 dblp

  528. Adrian Leung, Chris J. Mitchell: A Service Discovery Threat Model for Ad Hoc Networks, SECRYPT 2006 dblp

  529. Sharon Nachtigal, Chris J. Mitchell: Modelling E-Business Security Using Business Processes, SECRYPT 2006 dblp

  530. Adil Alsaid, Chris J. Mitchell: A Scanning Tool for PC Root Public Key Stores, WEWoRC 2005 dblp

  531. Konstantinos Rantos, Chris J. Mitchell: Matching key recovery mechanisms to business requirements, Comput. Secur. 2005 dblp

  532. Lars R. Knudsen, Chris J. Mitchell: Partial Key Recovery Attack Against RMAC, J. Cryptol. 2005 dblp

  533. Aline Gouget, Hervé Sibert, Côme Berbain, Nicolas T. Courtois, Blandine Debraize, Chris J. Mitchell: Analysis of the Bit-Search Generator and Sequence Compression Techniques, FSE 2005 dblp

  534. Qiang Tang, Chris J. Mitchell: Cryptanalysis of an anonymous wireless authentication and conference key distribution scheme, IACR Cryptol. ePrint Arch. 2005 preprint dblp

  535. Qiang Tang, Chris J. Mitchell: Cryptanalysis of two identification schemes based on an ID-based cryptosystem, IACR Cryptol. ePrint Arch. 2005 preprint dblp

  536. Qiang Tang, Chris J. Mitchell: Enhanced password-based key establishment protocol, IACR Cryptol. ePrint Arch. 2005 preprint dblp

  537. Qiang Tang, Chris J. Mitchell: On the security of some password-based key agreement schemes, IACR Cryptol. ePrint Arch. 2005 preprint dblp

  538. Qiang Tang, Chris J. Mitchell: Weaknesses in a leakage-resilient authenticated key transport protocol, IACR Cryptol. ePrint Arch. 2005 preprint dblp

  539. Qiang Tang, Chris J. Mitchell: Security properties of two provably secure conference key agreement protocols, IACR Cryptol. ePrint Arch. 2005 preprint dblp

  540. Qiang Tang, Chris J. Mitchell: Efficient Compilers for Authenticated Group Key Exchange, IACR Cryptol. ePrint Arch. 2005 preprint dblp

  541. Anand S. Gajparia, Chris J. Mitchell, Chan Yeob Yeun: Supporting User Privacy in Location Based Services, IEICE Trans. Commun. 2005 dblp

  542. Carlos Cid, Sean Murphy, Matthew J. B. Robshaw: An Algebraic Framework for Cipher Embeddings, IMACC 2005 dblp

  543. Chris J. Mitchell: Partial Key Recovery Attacks on XCBC, TMAC and OMAC, IMACC 2005 dblp

  544. Susan G. Barwick, Wen-Ai Jackson, Keith M. Martin: Updating the parameters of a threshold scheme by minimal broadcast, IEEE Trans. Inf. Theory 2005 dblp

  545. Qiang Tang, Chris J. Mitchell: Comments on a cryptographic key assignment scheme, Comput. Stand. Interfaces 2005 dblp

  546. Qiang Tang, Chris J. Mitchell: Comments on two anonymous conference key distribution systems, Comput. Stand. Interfaces 2005 dblp

  547. Qiang Tang, Chris J. Mitchell: Security Properties of Two Authenticated Conference Key Agreement Protocols, ICICS 2005 dblp

  548. Carlos Cid, Gaëtan Leurent: An Analysis of the XSL Algorithm, ASIACRYPT 2005 dblp

  549. Susan G. Barwick, Wen-Ai Jackson, Keith M. Martin: A General Approach to Robust Web Metering, Des. Codes Cryptogr. 2005 dblp

  550. Keith M. Martin, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild: Distributing the Encryption and Decryption of a Block Cipher, Des. Codes Cryptogr. 2005 dblp

  551. Adil Alsaid, Chris J. Mitchell: Dynamic content attacks on digital signatures, Inf. Manag. Comput. Security 2005 dblp

  552. Chris J. Mitchell: Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption?, ISC 2005 dblp

  553. Shenglan Hu, Chris J. Mitchell: Improving IP Address Autoconfiguration Security in MANETs Using Trust Modelling, MSN 2005 dblp

  554. Qiang Tang, Chris J. Mitchell: On the Security of Some Password-Based Key Agreement Schemes, CIS (2) 2005 dblp

  555. Qiang Tang, Chris J. Mitchell: Efficient Compilers for Authenticated Group Key Exchange, CIS (2) 2005 dblp

  556. Geraint Price, Chris J. Mitchell: Interoperation Between a Conventional PKI and an ID-Based Infrastructure, EuroPKI 2005 dblp

  557. Adil Alsaid, Chris J. Mitchell: Installing Fake Root Keys in a PC, EuroPKI 2005 dblp

  558. Arnold K. L. Yau, Kenneth G. Paterson, Chris J. Mitchell: Padding Oracle Attacks on CBC-Mode Encryption with Secret and Random IVs, FSE 2005 dblp

  559. Chris J. Mitchell: Cryptanalysis of Two Variants of PCBC Mode When Used for Message Integrity, ACISP 2005 dblp

  560. Carlos Cid, Sean Murphy, Matthew J. B. Robshaw: Small Scale Variants of the AES, FSE 2005 dblp

  561. Keith M. Martin: Dynamic access policies for unconditionally secure secret sharing schemes, ICITS 2005 dblp

  562. Georgios Kalogridis, Chris J. Mitchell, Gary Clemo: Spy Agents: Evaluating Trust in Remote Environments, Security and Management 2005 dblp

  563. Miss Laiha Mat Kiah, Keith M. Martin: Group Communication: Design Challenges in the Development of Key Management Frameworks in Wireless Mobile Environments, Security and Management 2005 dblp

  564. John A. MacDonald, William G. Sirett, Chris J. Mitchell: Overcoming Channel Bandwidth Constraints in Secure SIM Applications, SEC 2005 dblp

  565. Siaw-Lynn Ng, Chris J. Mitchell: Comments on mutual authentication and key exchange protocols for low power wireless communications, IEEE Commun. Lett. 2004 dblp

  566. Susan G. Barwick, Wen-Ai Jackson, Keith M. Martin: Updating the Parameters of a Threshold Scheme by Minimal Broadcast, IACR Cryptol. ePrint Arch. 2004 preprint dblp

  567. Susan G. Barwick, Wen-Ai Jackson, Keith M. Martin, Christine M. O’Keefe: Optimal Updating of Ideal Threshold Schemes, IACR Cryptol. ePrint Arch. 2004 preprint dblp

  568. Qiang Tang, Chris J. Mitchell: Rethinking the security of some authenticated group key agreement schemes, IACR Cryptol. ePrint Arch. 2004 preprint dblp

  569. Andreas Pashalidis, Chris J. Mitchell: Limits to Anonymity When Using Credentials, Security Protocols Workshop 2004 dblp

  570. Chris J. Mitchell: Limits to Anonymity When Using Credentials (Transcript of Discussion), Security Protocols Workshop 2004 dblp

  571. Andreas Pashalidis, Chris J. Mitchell: A Security Model for Anonymous Credential Systems, International Information Security Workshops 2004 dblp

  572. Andreas Pashalidis, Chris J. Mitchell: Using EMV Cards for Single Sign-On, EuroPKI 2004 dblp

  573. Carlos Cid: Some Algebraic Aspects of the Advanced Encryption Standard, AES Conference 2004 dblp

  574. Andreas Pashalidis, Chris J. Mitchell: Impostor: a single sign-on system for use from untrusted devices, GLOBECOM 2004 dblp

  575. Siaw-Lynn Ng: A Characterisation of Posets that Are nearly Antichains, Order 2004 dblp

  576. Lars R. Knudsen, Chris J. Mitchell: Analysis of 3gpp-MAC and Two-key 3gpp-MAC, Discret. Appl. Math. 2003 dblp

  577. Simon R. Blackburn, Carlos Cid, Steven D. Galbraith: Cryptanalysis of a Cryptosystem based on Drinfeld modules, IACR Cryptol. ePrint Arch. 2003 preprint dblp

  578. Keith M. Martin, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild: Distributing the Encryption and Decryption of a Block Cipher, IACR Cryptol. ePrint Arch. 2003 preprint dblp

  579. Siaw-Lynn Ng: Posets and protocols-picking the right three-party protocol, IEEE J. Sel. Areas Commun. 2003 dblp

  580. Chris J. Mitchell: Remote User Authentication Using Public Information, IMACC 2003 dblp

  581. Chien-Lung Hsu, Tzong-Sun Wu, Tzong-Chen Wu, Chris J. Mitchell: Improvement of modified authenticated key agreement protocol, Appl. Math. Comput. 2003 dblp

  582. Mida Guillermo, Keith M. Martin, Christine M. O’Keefe: Providing Anonymity in Unconditionally Secure Secret Sharing Schemes, Des. Codes Cryptogr. 2003 dblp

  583. Siaw-Lynn Ng: A Representation of a Family of Secret Sharing Matroids, Des. Codes Cryptogr. 2003 dblp

  584. Paulo S. Pagliusi, Chris J. Mitchell: PANA/IKEv2: An Internet Authentication Protocol for Heterogeneous Access, WISA 2003 dblp

  585. Andreas Pashalidis, Chris J. Mitchell: Single Sign-On Using Trusted Platforms, ISC 2003 dblp

  586. Mansour A. Al-Meaither, Chris J. Mitchell: A Secure Electronic Payment Scheme for Charity Donations, EC-Web 2003 dblp

  587. Vorapranee Khu-smith, Chris J. Mitchell: Enhancing E-commerce Security Using GSM Authentication, EC-Web 2003 dblp

  588. Andreas Pashalidis, Chris J. Mitchell: A Taxonomy of Single Sign-On Systems, ACISP 2003 dblp

  589. Luciano Rila, Chris J. Mitchell: Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards, ACNS 2003 dblp

  590. Mansour A. Al-Meaither, Chris J. Mitchell: A Secure Electronic Murabaha Transaction, Bled eConference 2003 dblp

  591. Niklas Borselius, Chris J. Mitchell: Securing FIPA Agent Communication, Security and Management 2003 dblp

  592. Chez Ciechanowicz, Keith M. Martin, Fred Piper, Matthew J. B. Robshaw: Ten Years of Information Security Masters Programmes, World Conference on Information Security Education 2003 dblp

  593. Siaw-Lynn Ng: Some Properties of the Yoshiara Family of Planes, Eur. J. Comb. 2002 dblp

  594. Niklas Borselius, Chris J. Mitchell, Aaron Wilson: A pragmatic alternative to undetachable signatures, ACM SIGOPS Oper. Syst. Rev. 2002 dblp

  595. Niklas Borselius, Chris J. Mitchell, Aaron Wilson: On the value of threshold signatures, ACM SIGOPS Oper. Syst. Rev. 2002 dblp

  596. Günther Horn, Keith M. Martin, Chris J. Mitchell: Authentication protocols for mobile network environment value-added services, IEEE Trans. Veh. Technol. 2002 dblp

  597. Chris J. Mitchell, Namhyun Hur: On the security of a structural proven signer ordering multisignature scheme, Communications and Multimedia Security 2002 dblp

  598. Sattam S. Al-Riyami, Chris J. Mitchell: Renewing crytographic timestamps, Communications and Multimedia Security 2002 dblp

  599. Sean Murphy, Matthew J. B. Robshaw: Key-Dependent S-Boxes and Differential Cryptanalysis, Des. Codes Cryptogr. 2002 dblp

  600. Sean Murphy, Matthew J. B. Robshaw: Essential Algebraic Structure within the AES, CRYPTO 2002 dblp

  601. Vorapranee Khu-smith, Chris J. Mitchell: Using GSM to enhance e-commerce security, Workshop Mobile Commerce 2002 dblp

  602. Chris J. Mitchell, Paulo S. Pagliusi: Is Entity Authentication Necessary?, Security Protocols Workshop 2002 dblp

  603. Vorapranee Khu-smith, Chris J. Mitchell: Using EMV Cards to Protect E-commerce Transactions, EC-Web 2002 dblp

  604. Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild: Threshold MACs, ICISC 2002 dblp

  605. Susan G. Barwick, Wen-Ai Jackson, Keith M. Martin, Peter R. Wild: Size of Broadcast in Threshold Schemes with Disenrollment, ACISP 2002 dblp

  606. Luciano Rila, Chris J. Mitchell: Security Analysis of Smartcard to Card Reader Communications for Biometric Cardholder Authentication, CARDIS 2002 dblp

  607. Pita Jarupunphol, Chris J. Mitchell: E-commerce and the Media - Influences on Security Risk Perceptions, WITASI 2002 dblp

  608. Pita Jarupunphol, Chris J. Mitchell: Implementation Aspects of SET/EMV, I3E 2002 dblp

  609. Konstantinos Rantos, Chris J. Mitchell: Key Recovery Scheme Interoperability - A Protocol for Mechanism Negotiation, IMACC 2001 dblp

  610. Siaw-Lynn Ng: Comments on “Dynamic participation in a secure conference scheme for mobile communications”, IEEE Trans. Veh. Technol. 2001 dblp

  611. Karl Brincat, Chris J. Mitchell: Key Recovery Attacks on MACs Based on Properties of Cryptographic APIs, IMACC 2001 dblp

  612. Niklas Borselius, Chris J. Mitchell, Aaron Wilson: Undetachable Threshold Signatures, IMACC 2001 dblp

  613. Lars R. Knudsen, Chris J. Mitchell: An analysis of the 3gpp-MAC scheme, Electron. Notes Discret. Math. 2001 dblp

  614. Siaw-Lynn Ng, Michael Walker: On the Composition of Matroids and Ideal Secret Sharing Schemes, Des. Codes Cryptogr. 2001 dblp

  615. Niklas Borselius, Chris J. Mitchell, Aaron Wilson: On Mobile Agent Based Transactions in Moderately Hostile Environments, Network Security 2001 dblp

  616. Vorapranee Khu-smith, Chris J. Mitchell: Enhancing the Security of Cookies, ICISC 2001 dblp

  617. Karl Brincat, Chris J. Mitchell: New CBC-MAC Forgery Attacks, ACISP 2001 dblp

  618. Siaw-Lynn Ng, Peter R. Wild: On k-arcs Covering a Line in Finite Projective Planes, Ars Comb. 2001 dblp

  619. Siaw-Lynn Ng, Peter R. Wild: A New Family of Extended Generalized Quadrangles of Order (, Eur. J. Comb. 2000 dblp

  620. Chris J. Mitchell: Making serial number based authentication robust against loss of state, ACM SIGOPS Oper. Syst. Rev. 2000 dblp

  621. Chris J. Mitchell: PKI standards, Inf. Secur. Tech. Rep. 2000 dblp

  622. Don Coppersmith, Lars R. Knudsen, Chris J. Mitchell: Key Recovery and Forgery Attacks on the MacDES MAC Algorithm, CRYPTO 2000 dblp

  623. Chris J. Mitchell, Konstantinos Rantos: A fair certification protocol, Comput. Commun. Rev. 1999 dblp

  624. Siaw-Lynn Ng: Comments on “On the Security of Three-Party Cryptographic Protocs” by Xu, Zhang and Zhu, ACM SIGOPS Oper. Syst. Rev. 1999 dblp

  625. Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang: Changing Thresholds in the Absence of Secure Channels, Aust. Comput. J. 1999 dblp

  626. Sean Murphy: The Advanced Encryption Standard (AES), Inf. Secur. Tech. Rep. 1999 dblp

  627. Keith M. Martin, Chris J. Mitchell: Comments on an optimized protocol for mobile network authentication and security, ACM SIGMOBILE Mob. Comput. Commun. Rev. 1999 dblp

  628. Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang: Changing Thresholds in the Absence of Secure Channels, ACISP 1999 dblp

  629. Keith M. Martin, Reihaneh Safavi-Naini, Huaxiong Wang: Bounds and Techniques for Efficient Redistribution of Secret Shares to New Access Structures, Comput. J. 1999 dblp

  630. Keith M. Martin, Bart Preneel, Chris J. Mitchell, Hans-Joachim Hitz, Günther Horn, Alla Poliakova, Peter Howard: Secure Billing for Mobile Information Services in UMTS, IS&N 1998 dblp

  631. L. Rey A. Casse, Keith M. Martin, Peter R. Wild: Bounds and Characterizations of Authentication/Secrecy Schemes, Des. Codes Cryptogr. 1998 dblp

  632. Sean Murphy: An Analysis of SAFER, J. Cryptol. 1998 dblp

  633. Chris J. Mitchell, Chan Yeob Yeun: Fixing a Problem in the Helsinki Protocol, ACM SIGOPS Oper. Syst. Rev. 1998 dblp

  634. Lars R. Knudsen, Keith M. Martin: In Search of Multiple Domain Key Recovery, J. Comput. Secur. 1998 dblp

  635. Chris J. Mitchell, Kenneth G. Paterson: Perfect Factors from Cyclic Codes and Interleaving, SIAM J. Discret. Math. 1998 dblp

  636. Chris J. Mitchell: On Integer-Valued Rational Polynomials and Depth Distributions of Binary Codes, IEEE Trans. Inf. Theory 1998 dblp

  637. Peter Y. A. Ryan, Dieter Gollmann, Li Gong, Günter Karjoth, Chris J. Mitchell: Panel Introduction: The Security Impact of Distributed Computing Technologies, CSFW 1998 dblp

  638. Marten van Dijk, Wen-Ai Jackson, Keith M. Martin: A General Decomposition Construction for Incomplete Secret Sharing Schemes, Des. Codes Cryptogr. 1998 dblp

  639. Wen-Ai Jackson, Keith M. Martin, Christine M. O’Keefe: Mutually Trusted Authority-Free Secret Sharing Schemes, J. Cryptol. 1997 dblp

  640. Liqun Chen, Dieter Gollmann, Chris J. Mitchell: Authentication Using Minimally Trusted Servers, ACM SIGOPS Oper. Syst. Rev. 1997 dblp

  641. Chris J. Mitchell: Authentication using cryptography, Inf. Secur. Tech. Rep. 1997 dblp

  642. Sean Murphy: The difficulty of attacking cryptosystems, Inf. Secur. Tech. Rep. 1997 dblp

  643. Chris J. Mitchell: De Bruijn Sequences and Perfect Factors, SIAM J. Discret. Math. 1997 dblp

  644. Yongfei Han, Chris J. Mitchell, Dieter Gollmann: A fast modular exponentiation for rsa on systolic arrays, Int. J. Comput. Math. 1997 dblp

  645. Keith M. Martin: Increasing Efficiency of International Key Escrow in Mutually Mistrusting Domains, IMACC 1997 dblp

  646. Diane Erdmann, Sean Murphy: An Approximate Distribution for the Maximum Order Complexity, Des. Codes Cryptogr. 1997 dblp

  647. Liqun Chen, Dieter Gollmann, Chris J. Mitchell, Peter R. Wild: Secret Sharing with Reusable Polynomials, ACISP 1997 dblp

  648. Liqun Chen, Chris J. Mitchell: An anonymous and undeniable payment scheme, ICICS 1997 dblp

  649. Mark P. Hoyle, Chris J. Mitchell: On Solutions to the Key Escrow Problem, State of the Art in Applied Cryptography 1997 dblp

  650. Chris Charnes, Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini: Secret sharing in hierarchical groups, ICICS 1997 dblp

  651. Keith M. Martin, Reihaneh Safavi-Naini: Multisender authentication systems with unconditional security, ICICS 1997 dblp

  652. Simon R. Blackburn, Sean Murphy, Kenneth G. Paterson: Comments on “Theory and Applications of Cellular Automata in Cryptography”, IEEE Trans. Computers 1997 dblp

  653. Glenn Hurlbert, Chris J. Mitchell, Kenneth G. Paterson: On the Existence of de Bruijn Tori with Two by Two Windows, J. Comb. Theory, Ser. A 1996 dblp

  654. Wen-Ai Jackson, Keith M. Martin, Christine M. O’Keefe: Ideal Secret Sharing Schemes with Multiple Secrets, J. Cryptol. 1996 dblp

  655. Chris J. Mitchell, Liqun Chen: Comments on the S/KEY User Authentication Scheme, ACM SIGOPS Oper. Syst. Rev. 1996 dblp

  656. Chris J. Mitchell: The royal holloway TTP-based key escrow scheme, Inf. Secur. Tech. Rep. 1996 dblp

  657. Chris J. Mitchell, Tuvi Etzion, Kenneth G. Paterson: A method for constructing decodable de Bruijn sequences, IEEE Trans. Inf. Theory 1996 dblp

  658. Liqun Chen, Dieter Gollmann, Chris J. Mitchell: Tailoring authentication protocols to match underlying mechanisms, ACISP 1996 dblp

  659. Wen-Ai Jackson, Keith M. Martin: A combinatorial interpretation of ramp schemes, Australas. J Comb. 1996 dblp

  660. Wen-Ai Jackson, Keith M. Martin: Efficient constructions for one sharing of many secrets, Australas. J Comb. 1996 dblp

  661. Chris J. Mitchell, Fred Piper, Michael Walker, Peter R. Wild: Authentication Schemes, Perfect Local Randomizers, Perfect Secrecy and Secret Sharing Schemes, Des. Codes Cryptogr. 1996 dblp

  662. Wen-Ai Jackson, Keith M. Martin: Perfect Secret Sharing Schemes on Five Participants, Des. Codes Cryptogr. 1996 dblp

  663. Wen-Ai Jackson, Keith M. Martin, Christine M. O’Keefe: A Construction for Multisecret Threshold Schemes, Des. Codes Cryptogr. 1996 dblp

  664. Dieter Gollmann, Yongfei Han, Chris J. Mitchell: Redundant Integer Representations and Fast Exponentiation, Des. Codes Cryptogr. 1996 dblp

  665. Liqun Chen, Dieter Gollmann, Chris J. Mitchell: Key Escrow in Mutually Mistrusting Domains, Security Protocols Workshop 1996 dblp

  666. Donald W. Davies, Sean Murphy: Pairs and Triplets of DES S-Boxes, J. Cryptol. 1995 dblp

  667. Simon R. Blackburn, Sean Murphy, Jacques Stern: The Cryptanalysis of a Public-Key Implementation of Finite Group Mappings, J. Cryptol. 1995 dblp

  668. Liqun Chen, Dieter Gollmann, Chris J. Mitchell: Distributing Trust Amongst Multiple Authentication Servers, J. Comput. Secur. 1995 dblp

  669. Chris J. Mitchell: Aperiodic and semi-periodic perfect maps, IEEE Trans. Inf. Theory 1995 dblp

  670. Chris J. Mitchell: A Storage Complexity Based Analogue of Maurer Key Establishment Using Public Channels, IMACC 1995 dblp

  671. Yongfei Han, Dieter Gollmann, Chris J. Mitchell: Minimal Weight k-SR Representations, IMACC 1995 dblp

  672. Nigel Jefferies, Chris J. Mitchell, Michael Walker: A Proposed Architecture for Trusted Third Party Services, Cryptography: Policy and Algorithms 1995 dblp

  673. Wen-Ai Jackson, Keith M. Martin, Christine M. O’Keefe: Efficient Secret Sharing Without a Mutually Trusted Authority (Extended Abstract), EUROCRYPT 1995 dblp

  674. Liqun Chen, Dieter Gollmann, Chris J. Mitchell: Key distribution without individual trusted authentification servers, CSFW 1995 dblp

  675. Jonathan Jedwab, Chris J. Mitchell, Fred Piper, Peter R. Wild: Perfect binary arrays and difference sets, Discret. Math. 1994 dblp

  676. Sean Murphy, Kenneth G. Paterson, Peter R. Wild: A Weak Cipher that Generates the Symmetric Group, J. Cryptol. 1994 dblp

  677. Chris J. Mitchell, Michael Walker, Peter R. Wild: The Combinatorics of Perfect Authentication Schemes, SIAM J. Discret. Math. 1994 dblp

  678. John Burns, Chris J. Mitchell: Parameter Selection for Server-Aided RSA Computation Schemes, IEEE Trans. Computers 1994 dblp

  679. Wen-Ai Jackson, Keith M. Martin: Geometric Secret Sharing Schemes and Their Duals, Des. Codes Cryptogr. 1994 dblp

  680. Chris J. Mitchell, Kenneth G. Paterson: Decoding Perfect Maps, Des. Codes Cryptogr. 1994 dblp

  681. Chris J. Mitchell: Constructing c-ary Perfect Factors, Des. Codes Cryptogr. 1994 dblp

  682. Wen-Ai Jackson, Keith M. Martin, Christine M. O’Keefe: On Sharing Many Secrets (Extended Abstract), ASIACRYPT 1994 dblp

  683. Chris J. Mitchell, Andy Thomas: Standardising Authentication Protocols Based on Public-Key Techniques, J. Comput. Secur. 1993 dblp

  684. Wen-Ai Jackson, Keith M. Martin, Christine M. O’Keefe: Multisecret Threshold Schemes, CRYPTO 1993 dblp

  685. Simon R. Blackburn, Sean Murphy, Jacques Stern: Weakness of a Public-Key Cryptosystem Based on Factorizations of Finite Groups, EUROCRYPT 1993 dblp

  686. Chris J. Mitchell: Authenticating Multicast Internet Electronic Mail Messages Using a Bidirectional MAC is Insecure, IEEE Trans. Computers 1992 dblp

  687. Wen-Ai Jackson, Keith M. Martin: Cumulative Arrays and Geometric Secret Sharing Schemes, AUSCRYPT 1992 dblp

  688. Chris J. Mitchell, Vijay Varadharajan: Modified forms of cipher block chaining, Comput. Secur. 1991 dblp

  689. Xuejia Lai, James L. Massey, Sean Murphy: Markov Ciphers and Differential Cryptanalysis, EUROCRYPT 1991 dblp

  690. Colin I’Anson, Chris J. Mitchell: Security defects in CCITT recommendation X.509: the directory authentication framework, Comput. Commun. Rev. 1990 dblp

  691. Chris J. Mitchell: Enumerating Boolean Functions of Cryptographic Significance, J. Cryptol. 1990 dblp

  692. Philippe Godlewski, Chris J. Mitchell: Key-Minimal Crytosystems for Unconditional Secrecy, J. Cryptol. 1990 dblp

  693. Sean Murphy: The Cryptanalysis of FEAL-4 with 20 Chosen Plaintexts, J. Cryptol. 1990 dblp

  694. John Burns, Chris J. Mitchell: A security scheme for resource sharing over a network, Comput. Secur. 1990 dblp

  695. Chris J. Mitchell, Dave Rush, Michael Walker: A Secure Messaging Architecture Implementing the X.400-1988 Security Features, Comput. J. 1990 dblp

  696. Martin Anthony, Keith M. Martin, Jennifer Seberry, Peter R. Wild: Some Remarks on Authentication Systems, AUSCRYPT 1990 dblp

  697. Chris J. Mitchell, Peter R. Wild: One-stage one-sided rearrangeable switching networks, IEEE Trans. Commun. 1989 dblp

  698. Chris J. Mitchell, Dave Rush, Michael Walker: A remark on hash functions for message authentication, Comput. Secur. 1989 dblp

  699. Philippe Godlewski, Chris J. Mitchell: Key Minimal Authentication Systems for Unconditional Secrecy, EUROCRYPT 1989 dblp

  700. Chris J. Mitchell: Multi-Destination Secure Electronic Mail, Comput. J. 1989 dblp

  701. Chris J. Mitchell: Another Postage Stamp Problem, Comput. J. 1989 dblp

  702. Chris J. Mitchell, Fred Piper: Key storage in secure networks, Discret. Appl. Math. 1988 dblp

  703. Chris J. Mitchell, Michael Walker: Solutions to the multidestination secure electronic mail problem, Comput. Secur. 1988 dblp

  704. Chris J. Mitchell, Fred Piper: The cost of reducing key-storage requirements in secure networks, Comput. Secur. 1987 dblp

This list is generated automatically from DBLP using group-publications. If you spot any errors – e.g. papers wrongly attributed, missing papers, etc – please let us know.