dblp.uni-trier.dewww.uni-trier.de

Yvonne Hitchcock

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2006
15EEYvonne Hitchcock, Colin Boyd, Juan Manuel González Nieto: Modular proofs for key exchange: rigorous optimizations in the Canetti-Krawczyk model. Appl. Algebra Eng. Commun. Comput. 16(6): 405-438 (2006)
14EEKim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock: The importance of proofs of security for key establishment protocols: Formal analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, and Yeh-Sun protocols. Computer Communications 29(15): 2788-2797 (2006)
2005
13EEKim-Kwang Raymond Choo, Yvonne Hitchcock: Security Requirements for Key Establishment Proof Models: Revisiting Bellare-Rogaway and Jeong-Katz-Lee Protocols. ACISP 2005: 429-442
12EEKim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock: Examining Indistinguishability-Based Proof Models for Key Establishment Protocols. ASIACRYPT 2005: 585-604
11EEKim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock: Errors in Computational Complexity Proofs for Protocols. ASIACRYPT 2005: 624-643
10EEKim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock: On Session Key Construction in Provably-Secure Key Establishment Protocols. Mycrypt 2005: 116-131
9EESanggon Lee, Yvonne Hitchcock, Young-Ho Park, Sang-Jae Moon: Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves. Selected Areas in Cryptography 2005: 205-220
2004
8 Yousef Bani Hammad, Gary Carter, Ed Dawson, Yvonne Hitchcock: Improvements to the RAK Factoring Algorithm. Cryptographic Algorithms and their Uses 2004: 152-
7EEKim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock, Greg Maitland: Complementing Computational Protocol Analysis with Formal Specifications. Formal Aspects in Security and Trust 2004: 129-144
6EEYvonne Hitchcock, Colin Boyd, Juan Manuel González Nieto: Tripartite Key Exchange in the Canetti-Krawczyk Proof Model. INDOCRYPT 2004: 17-32
5EEKim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock, Greg Maitland: On Session Identifiers in Provably Secure Protocols: The Bellare-Rogaway Three-Party Key Distribution Protocol Revisited. SCN 2004: 351-366
4EEYvonne Hitchcock, Paul Montague, Gary Carter, Ed Dawson: The efficiency of solving multiple discrete logarithm problems and the implications for the security of fixed elliptic curves. Int. J. Inf. Sec. 3(2): 86-98 (2004)
2003
3EEYvonne Hitchcock, Paul Montague, Gary Carter, Ed Dawson: The Security of Fixed versus Random Elliptic Curves in Cryptography. ACISP 2003: 55-66
2EEYvonne Hitchcock, Yiu Shing Terry Tin, Juan Manuel González Nieto, Colin Boyd, Paul Montague: A Password-Based Authenticator: Security Proof and Applications. INDOCRYPT 2003: 388-401
2002
1EEYvonne Hitchcock, Paul Montague: A New Elliptic Curve Scalar Multiplication Algorithm to Resist Simple Power Analysis. ACISP 2002: 214-225

Coauthor Index

1Colin Boyd [2] [5] [6] [7] [10] [11] [12] [14] [15]
2Gary Carter [3] [4] [8]
3Kim-Kwang Raymond Choo [5] [7] [10] [11] [12] [13] [14]
4Ed Dawson [3] [4] [8]
5Yousef Bani Hammad [8]
6Sanggon Lee [9]
7Greg Maitland [5] [7]
8Paul Montague [1] [2] [3] [4]
9Sang-Jae Moon [9]
10Juan Manuel González Nieto (Juanma González Nieto) [2] [6] [15]
11Young-Ho Park [9]
12Yiu Shing Terry Tin [2]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)