Rangasamy, Jothi; Stebila, Douglas; Kuppusamy, Lakshmi; Boyd, Colin; Gonzalez Nieto, Juan Efficient modular exponentiation-based puzzles for denial-of-service protection. (English) Zbl 1369.94565 Kim, Howon (ed.), Information security and cryptology – ICISC 2011. 14th international conference, Seoul, Korea, November 30–December 2, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-31911-2/pbk). Lecture Notes in Computer Science 7259, 319-331 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Rangasamy} et al., Lect. Notes Comput. Sci. 7259, 319--331 (2012; Zbl 1369.94565) Full Text: DOI
Lee, Kaleb; Boyd, Colin; González-Nieto, Juan Manule Minimizing information leakage of tree-based RFID authentication protocols using alternate tree-walking. (English) Zbl 1308.94079 Susilo, Willy (ed.) et al., Information security and privacy. 17th Australasian conference, ACISP 2012, Wollongong, NSW, Australia, July 9–11, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31447-6/pbk). Lecture Notes in Computer Science 7372, 434-441 (2012). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{K. Lee} et al., Lect. Notes Comput. Sci. 7372, 434--441 (2012; Zbl 1308.94079) Full Text: DOI Link
Rangasamy, Jothi; Stebila, Douglas; Boyd, Colin; González-Nieto, Juan Manuel; Kuppusamy, Lakshmi Effort-release public-key encryption from cryptographic puzzles. (English) Zbl 1305.94075 Susilo, Willy (ed.) et al., Information security and privacy. 17th Australasian conference, ACISP 2012, Wollongong, NSW, Australia, July 9–11, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31447-6/pbk). Lecture Notes in Computer Science 7372, 194-207 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Rangasamy} et al., Lect. Notes Comput. Sci. 7372, 194--207 (2012; Zbl 1305.94075) Full Text: DOI
Kuppusamy, Lakshmi; Rangasamy, Jothi; Stebila, Douglas; Boyd, Colin; Gonzalez Nieto, Juan Towards a provably secure DoS-resilient key exchange protocol with perfect forward secrecy. (English) Zbl 1291.94115 Bernstein, Daniel J. (ed.) et al., Progress in cryptology – INDOCRYPT 2011. 12th international conference on cryptology in India, Chennai, India, December 11–14, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25577-9/pbk). Lecture Notes in Computer Science 7107, 379-398 (2011). MSC: 94A60 PDFBibTeX XMLCite \textit{L. Kuppusamy} et al., Lect. Notes Comput. Sci. 7107, 379--398 (2011; Zbl 1291.94115) Full Text: DOI Link
Boyd, Colin; González Nieto, Juan On forward secrecy in one-round key exchange. (English) Zbl 1291.94063 Chen, Liqun (ed.), Cryptography and coding. 13th IMA international conference, IMACC 2011, Oxford, UK, December 12–15, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25515-1/pbk). Lecture Notes in Computer Science 7089, 451-468 (2011). MSC: 94A60 PDFBibTeX XMLCite \textit{C. Boyd} and \textit{J. González Nieto}, Lect. Notes Comput. Sci. 7089, 451--468 (2011; Zbl 1291.94063) Full Text: DOI Link
Stebila, Douglas; Kuppusamy, Lakshmi; Rangasamy, Jothi; Boyd, Colin; Gonzalez Nieto, Juan Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols. (English) Zbl 1284.94113 Kiayias, Aggelos (ed.), Topics in cryptology – CT-RSA 2011. The cryptographers’ track at the RSA conference 2011, San Francisco, CA, USA, February 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19073-5/pbk). Lecture Notes in Computer Science 6558, 284-301 (2011). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Stebila} et al., Lect. Notes Comput. Sci. 6558, 284--301 (2011; Zbl 1284.94113) Full Text: DOI Link
Ngo, Long; Boyd, Colin; González Nieto, Juan Automating computational proofs for public-key-based key exchange. (English) Zbl 1286.94080 Heng, Swee-Huay (ed.) et al., Provable security. 4th international conference, ProvSec 2010, Malacca, Malaysia, October 13–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-16279-4/pbk). Lecture Notes in Computer Science 6402, 53-69 (2010). MSC: 94A60 PDFBibTeX XMLCite \textit{L. Ngo} et al., Lect. Notes Comput. Sci. 6402, 53--69 (2010; Zbl 1286.94080) Full Text: DOI Link
Costello, Craig; Boyd, Colin; Gonzalez Nieto, Juan Manuel; Wong, Kenneth Koon-Ho Delaying mismatched field multiplications in pairing computations. (English) Zbl 1245.11126 Hasan, M. Anwar (ed.) et al., Arithmetic of finite fields. Third international workshop, WAIFI 2010, Istanbul, Turkey, June 27–30, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13796-9/pbk). Lecture Notes in Computer Science 6087, 196-214 (2010). MSC: 11Y16 11T71 94A60 PDFBibTeX XMLCite \textit{C. Costello} et al., Lect. Notes Comput. Sci. 6087, 196--214 (2010; Zbl 1245.11126) Full Text: DOI Link
Lippold, Georg; Boyd, Colin; González Nieto, Juan Manuel Efficient certificateless KEM in the standard model. (English) Zbl 1305.94060 Lee, Donghoon (ed.) et al., Information, security and cryptology – ICISC 2009. 12th international conference, Seoul, Korea, December 2–4, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-14422-6/pbk). Lecture Notes in Computer Science 5984, 34-46 (2010). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{G. Lippold} et al., Lect. Notes Comput. Sci. 5984, 34--46 (2010; Zbl 1305.94060) Full Text: DOI Link
Gorantla, M. Choudary; Boyd, Colin; González Nieto, Juan Manuel; Manulis, Mark Generic one round group key exchange in the standard model. (English) Zbl 1305.94052 Lee, Donghoon (ed.) et al., Information, security and cryptology – ICISC 2009. 12th international conference, Seoul, Korea, December 2–4, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-14422-6/pbk). Lecture Notes in Computer Science 5984, 1-15 (2010). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{M. C. Gorantla} et al., Lect. Notes Comput. Sci. 5984, 1--15 (2010; Zbl 1305.94052) Full Text: DOI Link
Costello, Craig; Boyd, Colin; González Nieto, Juan Manuel; Wong, Kenneth Koon-Ho Avoiding full extension field arithmetic in pairing computations. (English) Zbl 1284.11160 Bernstein, Daniel J. (ed.) et al., Progress in cryptology – AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3–6, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-12677-2/pbk). Lecture Notes in Computer Science 6055, 203-224 (2010). MSC: 11T71 11Y16 12F05 94A60 PDFBibTeX XMLCite \textit{C. Costello} et al., Lect. Notes Comput. Sci. 6055, 203--224 (2010; Zbl 1284.11160) Full Text: DOI Link
Lippold, Georg; Boyd, Colin; Gonzalez Nieto, Juan Strongly secure certificateless key agreement. (English) Zbl 1248.94080 Shacham, Hovav (ed.) et al., Pairing-based cryptography – Pairing 2009. Third international conference Palo Alto, CA, USA, August 12–14, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-03297-4/pbk). Lecture Notes in Computer Science 5671, 206-230 (2009). MSC: 94A60 PDFBibTeX XMLCite \textit{G. Lippold} et al., Lect. Notes Comput. Sci. 5671, 206--230 (2009; Zbl 1248.94080) Full Text: DOI Link
Costello, Craig; Hisil, Huseyin; Boyd, Colin; Gonzalez Nieto, Juan; Wong, Kenneth Koon-Ho Faster pairings on special Weierstrass curves. (English) Zbl 1248.94062 Shacham, Hovav (ed.) et al., Pairing-based cryptography – Pairing 2009. Third international conference Palo Alto, CA, USA, August 12–14, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-03297-4/pbk). Lecture Notes in Computer Science 5671, 89-101 (2009). MSC: 94A60 14G50 PDFBibTeX XMLCite \textit{C. Costello} et al., Lect. Notes Comput. Sci. 5671, 89--101 (2009; Zbl 1248.94062) Full Text: DOI Link
Boyd, Colin (ed.); González Nieto, Juan (ed.) Information security and privacy. 14th Australasian conference, ACISP 2009, Brisbane, Australia, July 1–3, 2009. Proceedings. (English) Zbl 1165.94302 Lecture Notes in Computer Science 5594. Berlin: Springer (ISBN 978-3-642-02619-5/pbk). xi, 470 p. (2009). MSC: 94-06 94A60 94A62 00B25 PDFBibTeX XMLCite \textit{C. Boyd} (ed.) and \textit{J. González Nieto} (ed.), Information security and privacy. 14th Australasian conference, ACISP 2009, Brisbane, Australia, July 1--3, 2009. Proceedings. Berlin: Springer (2009; Zbl 1165.94302) Full Text: DOI
Boyd, Colin; Cliff, Yvonne; Nieto, Juan M. González; Paterson, Kenneth G. One-round key exchange in the standard model. (English) Zbl 1159.94376 Int. J. Appl. Cryptogr. 1, No. 3, 181-199 (2009). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{C. Boyd} et al., Int. J. Appl. Cryptogr. 1, No. 3, 181--199 (2009; Zbl 1159.94376) Full Text: DOI
Gorantla, M. Choudary; Boyd, Colin; González Nieto, Juan Manuel Modeling key compromise impersonation attacks on group key exchange protocols. (English) Zbl 1227.94046 Jarecki, Stanisław (ed.) et al., Public key cryptography – PKC 2009. 12th international conference on practice and theory in public key cryptography, Irvine, CA, USA, March 18–20, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-00467-4/pbk). Lecture Notes in Computer Science 5443, 105-123 (2009). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{M. C. Gorantla} et al., Lect. Notes Comput. Sci. 5443, 105--123 (2009; Zbl 1227.94046) Full Text: DOI
Boyd, Colin; Cliff, Yvonne; Gonzalez Nieto, Juan; Paterson, Kenneth G. Efficient one-round key exchange in the standard model. (English) Zbl 1279.94057 Mu, Yi (ed.) et al., Information security and privacy. 13th Australasian conference, ACISP 2008, Wollongong, Australia, July 7–9, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-69971-2/pbk). Lecture Notes in Computer Science 5107, 69-83 (2008). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{C. Boyd} et al., Lect. Notes Comput. Sci. 5107, 69--83 (2008; Zbl 1279.94057) Full Text: DOI Link
Tso, Raylin; Gonzàlez Nieto, Juan Manuel; Okamoto, Takeshi; Boyd, Colin; Okamoto, Eiji Verifier-key-flexible universal designated-verifier signatures. (English) Zbl 1154.94473 Galbraith, Steven D. (ed.), Cryptography and coding. 11th IMA international conference, Cirencester, UK, December 18–20, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-77271-2/pbk). Lecture Notes in Computer Science 4887, 403-421 (2007). MSC: 94A62 PDFBibTeX XMLCite \textit{R. Tso} et al., Lect. Notes Comput. Sci. 4887, 403--421 (2007; Zbl 1154.94473) Full Text: DOI
Gorantla, M. Choudary; Boyd, Colin; González Nieto, Juan Manuel On the connection between signcryption and one-pass key establishment. (English) Zbl 1154.94389 Galbraith, Steven D. (ed.), Cryptography and coding. 11th IMA international conference, Cirencester, UK, December 18–20, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-77271-2/pbk). Lecture Notes in Computer Science 4887, 277-301 (2007). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{M. C. Gorantla} et al., Lect. Notes Comput. Sci. 4887, 277--301 (2007; Zbl 1154.94389) Full Text: DOI Link
Brown, Jaimee; Nieto, Juan Manuel González; Boyd, Colin Concrete chosen-ciphertext secure encryption from subgroup membership problems. (English) Zbl 1307.94043 Pointcheval, David (ed.) et al., Cryptology and network security. 5th international conference, CANS 2006, Suzhou, China, December 8–10, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49462-1/pbk). Lecture Notes in Computer Science 4301, 1-18 (2006). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Brown} et al., Lect. Notes Comput. Sci. 4301, 1--18 (2006; Zbl 1307.94043) Full Text: DOI
Brown, Jaimee; Nieto, Juan Manuel González; Boyd, Colin Efficient CCA-secure public-key encryption schemes from RSA-related assumptions. (English) Zbl 1175.94067 Barua, Rana (ed.) et al., Progress in cryptology – INDOCRYPT 2006. 7th international conference on cryptology in India, Kolkata, India, December 11-13, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49767-7/pbk). Lecture Notes in Computer Science 4329, 176-190 (2006). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Brown} et al., Lect. Notes Comput. Sci. 4329, 176--190 (2006; Zbl 1175.94067) Full Text: DOI
Chow, Sherman S. M.; Boyd, Colin; Nieto, Juan Manuel González Security-mediated certificateless cryptography. (English) Zbl 1151.94496 Yung, Moti (ed.) et al., Public key cryptography – PKC 2006. 9th international conference on theory and practice of public-key cryptography, New York, NY, USA, April 24–26, 2006. Proceedings. Berlin: Springer (ISBN 3-540-33851-9/pbk). Lecture Notes in Computer Science 3958, 508-524 (2006). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{S. S. M. Chow} et al., Lect. Notes Comput. Sci. 3958, 508--524 (2006; Zbl 1151.94496) Full Text: DOI
Hitchcock, Yvonne; Boyd, Colin; González Nieto, Juan Manuel Modular proofs for key exchange: rigorous optimizations in the Canetti-Krawczyk model. (English) Zbl 1099.94027 Appl. Algebra Eng. Commun. Comput. 16, No. 6, 405-438 (2006). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{Y. Hitchcock} et al., Appl. Algebra Eng. Commun. Comput. 16, No. 6, 405--438 (2006; Zbl 1099.94027) Full Text: DOI
Boyd, Colin (ed.); González Nieto, Juan M. (ed.) Information security and privacy. 10th Australasian conference, ACISP 2005, Brisbane, Australia, July 4–6, 2005. Proceedings. (English) Zbl 1076.94001 Lecture Notes in Computer Science 3574. Berlin: Springer (ISBN 3-540-26547-3/pbk). xiii, 586 p. (2005). MSC: 94-06 68-06 94A60 94A62 68P25 00B25 PDFBibTeX XMLCite \textit{C. Boyd} (ed.) and \textit{J. M. González Nieto} (ed.), Information security and privacy. 10th Australasian conference, ACISP 2005, Brisbane, Australia, July 4--6, 2005. Proceedings. Berlin: Springer (2005; Zbl 1076.94001) Full Text: DOI
Gonzalez Nieto, Juan Manuel; Boyd, Colin; Dawson, Ed A public key cryptosystem based on a subgroup membership problem. (English) Zbl 1136.94319 Des. Codes Cryptography 36, No. 3, 301-316 (2005). MSC: 94A60 PDFBibTeX XMLCite \textit{J. M. Gonzalez Nieto} et al., Des. Codes Cryptography 36, No. 3, 301--316 (2005; Zbl 1136.94319) Full Text: DOI
Hitchcock, Yvonne; Boyd, Colin; González Nieto, Juan Manuel Tripartite key exchange in the Canetti-Krawczyk proof model. (English) Zbl 1113.94325 Canteaut, Anne (ed.) et al., Progress in cryptology – INDOCRYPT 2004. 5th international conference on cryptology in India, Chennai, India, December 20-22, 2004. Berlin: Springer (ISBN 3-540-24130-2/pbk). Lecture Notes in Computer Science 3348, 17-32 (2004). MSC: 94A62 PDFBibTeX XMLCite \textit{Y. Hitchcock} et al., Lect. Notes Comput. Sci. 3348, 17--32 (2004; Zbl 1113.94325) Full Text: DOI
Tin, Yiu Shing Terry; Vasanta, Harikrishna; Boyd, Colin; Nieto, Juan Manuel González Protocols with security proofs for mobile applications. (English) Zbl 1098.94631 Wang, Huaxiong (ed.) et al., Information security and privacy. 9th Australasian conference, ACISP 2004, Sydney, Australia, July 13–15, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22379-7/pbk). Lecture Notes in Computer Science 3108, 358-369 (2004). MSC: 94A60 94A62 68P25 PDFBibTeX XMLCite \textit{Y. S. T. Tin} et al., Lect. Notes Comput. Sci. 3108, 358--369 (2004; Zbl 1098.94631) Full Text: DOI
Hitchcock, Yvonne; Tin, Yiu Shing Terry; Gonzalez-Nieto, Juan Manuel; Boyd, Colin; Montague, Paul A password-based authenticator: security proof and applications. (English) Zbl 1123.94343 Johansson, Thomas (ed.) et al., Progress in cryptology – INDOCRYPT 2003. 4th international conference on cryptology in India, New Delhi, India, December 8–10, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20609-4/pbk). Lect. Notes Comput. Sci. 2904, 388-401 (2003). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{Y. Hitchcock} et al., Lect. Notes Comput. Sci. 2904, 388--401 (2003; Zbl 1123.94343) Full Text: DOI
Tin, Yiu Shing Terry; Boyd, Colin; Nieto, Juan Manuel González Provably secure mobile key exchange: Applying the Canetti-Krawczyk approach. (English) Zbl 1044.94547 Safavi-Naini, Rei (ed.) et al., Information security and privacy. 8th Australasian conference, ACISP 2003, Wollongong, Australia, July 9–11, 2003. Proceedings. Berlin: Springer (ISBN 3-540-40515-1/pbk). Lect. Notes Comput. Sci. 2727, 166-179 (2003). MSC: 94A62 94A05 68M12 PDFBibTeX XMLCite \textit{Y. S. T. Tin} et al., Lect. Notes Comput. Sci. 2727, 166--179 (2003; Zbl 1044.94547) Full Text: Link
Boyd, Colin; González Nieto, Juan Manuel Round-optimal contributory conference key agreement. (English) Zbl 1033.94512 Desmedt, Yvo G. (ed.) et al., Public key cryptography – PKC 2003. 6th international workshop on practice and theory in public key cryptography, Miami, FL, USA, January 6–8, 2003. Proceedings. Berlin: Springer (ISBN 3-540-00324-X/pbk). Lect. Notes Comput. Sci. 2567, 161-174 (2002). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{C. Boyd} and \textit{J. M. González Nieto}, Lect. Notes Comput. Sci. 2567, 161--174 (2002; Zbl 1033.94512) Full Text: DOI
González Nieto, Juan Manuel; Boyd, Colin; Dawson, Ed A public key cryptosystem based on the subgroup membership problem. (English) Zbl 1050.94522 Qing, Sihan (ed.) et al., Information and communications security. 3rd international conference, ICICS 2001, Xian, China, November 13–16, 2001. Proceedings. Berlin: Springer (ISBN 3-540-42880-1). Lect. Notes Comput. Sci. 2229, 352-363 (2001). MSC: 94A60 PDFBibTeX XMLCite \textit{J. M. González Nieto} et al., Lect. Notes Comput. Sci. 2229, 352--363 (2001; Zbl 1050.94522) Full Text: Link