Search results for: Kenneth G. Paterson
Cryptography and Communications > 2018 > 10 > 5 > 777-801
Journal of Cryptology > 2018 > 31 > 4 > 917-964
Designs, Codes and Cryptography > 2018 > 86 > 4 > 743-770
Lecture Notes in Computer Science > Public Key Cryptography - PKC 2005 > Identity-Based Cryptography > 398-415
Lecture Notes in Computer Science > Advances in Cryptology – ASIACRYPT 2011 > Public Key Encryption II > 161-178
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Authenticated Key Exchange > 248-262
Lecture Notes in Computer Science > Advances in Cryptology – EUROCRYPT 2010 > Automated Tools and Formal Methods > 345-361
Lecture Notes in Computer Science > Information Security and Privacy > Public Key Cryptography > 276-292
Lecture Notes in Computer Science > Advances in Cryptology - ASIACRYPT 2005 > Key Agreement > 549-565
Lecture Notes in Computer Science > Topics in Cryptology — CT-RSA 2002 > Digital Signatures > 200-217
Lecture Notes in Computer Science > Public Key Cryptography – PKC 2008 > Session VIII: Public Key Encryption > 344-359