2006 |
15 | EE | Yvonne Hitchcock,
Colin Boyd,
Juan Manuel González Nieto:
Modular proofs for key exchange: rigorous optimizations in the Canetti-Krawczyk model.
Appl. Algebra Eng. Commun. Comput. 16(6): 405-438 (2006) |
14 | EE | Kim-Kwang Raymond Choo,
Colin Boyd,
Yvonne Hitchcock:
The importance of proofs of security for key establishment protocols: Formal analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, and Yeh-Sun protocols.
Computer Communications 29(15): 2788-2797 (2006) |
2005 |
13 | EE | Kim-Kwang Raymond Choo,
Yvonne Hitchcock:
Security Requirements for Key Establishment Proof Models: Revisiting Bellare-Rogaway and Jeong-Katz-Lee Protocols.
ACISP 2005: 429-442 |
12 | EE | Kim-Kwang Raymond Choo,
Colin Boyd,
Yvonne Hitchcock:
Examining Indistinguishability-Based Proof Models for Key Establishment Protocols.
ASIACRYPT 2005: 585-604 |
11 | EE | Kim-Kwang Raymond Choo,
Colin Boyd,
Yvonne Hitchcock:
Errors in Computational Complexity Proofs for Protocols.
ASIACRYPT 2005: 624-643 |
10 | EE | Kim-Kwang Raymond Choo,
Colin Boyd,
Yvonne Hitchcock:
On Session Key Construction in Provably-Secure Key Establishment Protocols.
Mycrypt 2005: 116-131 |
9 | EE | Sanggon Lee,
Yvonne Hitchcock,
Young-Ho Park,
Sang-Jae Moon:
Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves.
Selected Areas in Cryptography 2005: 205-220 |
2004 |
8 | | Yousef Bani Hammad,
Gary Carter,
Ed Dawson,
Yvonne Hitchcock:
Improvements to the RAK Factoring Algorithm.
Cryptographic Algorithms and their Uses 2004: 152- |
7 | EE | Kim-Kwang Raymond Choo,
Colin Boyd,
Yvonne Hitchcock,
Greg Maitland:
Complementing Computational Protocol Analysis with Formal Specifications.
Formal Aspects in Security and Trust 2004: 129-144 |
6 | EE | Yvonne Hitchcock,
Colin Boyd,
Juan Manuel González Nieto:
Tripartite Key Exchange in the Canetti-Krawczyk Proof Model.
INDOCRYPT 2004: 17-32 |
5 | EE | Kim-Kwang Raymond Choo,
Colin Boyd,
Yvonne Hitchcock,
Greg Maitland:
On Session Identifiers in Provably Secure Protocols: The Bellare-Rogaway Three-Party Key Distribution Protocol Revisited.
SCN 2004: 351-366 |
4 | EE | Yvonne Hitchcock,
Paul Montague,
Gary Carter,
Ed Dawson:
The efficiency of solving multiple discrete logarithm problems and the implications for the security of fixed elliptic curves.
Int. J. Inf. Sec. 3(2): 86-98 (2004) |
2003 |
3 | EE | Yvonne Hitchcock,
Paul Montague,
Gary Carter,
Ed Dawson:
The Security of Fixed versus Random Elliptic Curves in Cryptography.
ACISP 2003: 55-66 |
2 | EE | Yvonne Hitchcock,
Yiu Shing Terry Tin,
Juan Manuel González Nieto,
Colin Boyd,
Paul Montague:
A Password-Based Authenticator: Security Proof and Applications.
INDOCRYPT 2003: 388-401 |
2002 |
1 | EE | Yvonne Hitchcock,
Paul Montague:
A New Elliptic Curve Scalar Multiplication Algorithm to Resist Simple Power Analysis.
ACISP 2002: 214-225 |