QUT ePrints

Browse By Person: Hitchcock, Yvonne

 Up a level
Export as [feed] RSS 1.0 [feed] Atom [feed] RSS 2.0 [feed] RSS 2.0
Group by: Item Type | Date
Number of items: 15.

Journal Article

Choo, Kim-Kwang R., Boyd, Colin A., & Hitchcock, Yvonne (2006) The Importance of Proofs of Security for Key Establishment Protocols: Formal Analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, and Yeh-Sun Protocols. Computer Communications, 29(15), pp. 2788-2797.
Number of full-text downloads 544
Number of citations in Scopus 13
Number of citations in Web of Science® 10

Choo, Kim-Kwang R., Boyd, Colin A., & Hitchcock, Yvonne (2005) Errors in Computational Complexity Proofs for Protocols. Lecture Notes in Computer Science, 3788/2005.
Number of full-text downloads 448
Number of citations in Scopus 37
Number of citations in Web of Science® 42

Choo, Kim-Kwang R., Boyd, Colin A., & Hitchcock, Yvonne (2005) Examining Indistinguishability-Based Proof Models for Key Establishment Protocols. Lecture Notes in Computer Science, 3788/2005, pp. 585-604.
Number of full-text downloads 589
Number of citations in Scopus 68
Number of citations in Web of Science® 59

Boyd, Colin, Gonzalez-Nieto, Juan, & Hitchcock, Yvonne (2005) Modular Proofs for Key Exchange: Rigorous Optimizations n the Canetti-Krawczyk Model. Applicable Algebra in Engineering, Communications and Computing, 2005(1), pp. 1-34.
Number of full-text downloads 41
Number of citations in Scopus 1

Choo, Kim-Kwang R., Boyd, Colin, Hitchcock, Yvonne, & Maitland, Greg M. (2005) On Session Identifiers in Provably Secure Protocols: The Bellare-Rogaway Three-Party Key Distribution Protocol Revisited. Lecture Notes in Computer Science, 3352, pp. 352-367.
Number of full-text downloads 347
Number of citations in Scopus 3
Number of citations in Web of Science® 8

Choo, Kim-Kwang R., Boyd, Colin A., & Hitchcock, Yvonne (2005) On Session Key Construction in Provably-Secure Key Establishment Protocols. Lecture Notes in Computer Science, 3715, pp. 116-131.
Number of full-text downloads 146
Number of citations in Scopus 13
Number of citations in Web of Science® 16

Hitchcock, Yvonne R., Montague, Paul, Carter, Gary P., & Dawson, Edward P. (2004) The efficiency of solving multiple discrete logarithm problems and the implications for the security of fixed elliptic curves. International Journal of Information Security, 3(2), pp. 86-98.

Clark, Andrew, Dawson, Edward, Hitchcock, Yvonne, & Montague, Paul (2003) Implementing an Efficient Elliptic Curve Cryptosystem over $GF(p)$ on a Smart Card. The ANZIAM Journal, 44(April 2003), pp. 354-377.

Conference Paper

Choo, Kim-Kwang R., Boyd, Colin A., Hitchcock, Yvonne, & Maitland, Greg M. (2005) Complementing Computational Protocol Analysis with Formal Specifications. In Dimitrakos, Theo & Martinelli, Fabio (Eds.) IFIP TC1 WG1.7 Second International Workshop on Formal Aspects in Security and Trust - FAST 2004, 26 - 27 August, Toulouse, France.
Number of full-text downloads 177

Choo, Kim-Kwang R. & Hitchcock, Yvonne (2005) Security Requirement for Key Establishment Proof Models: Revisiting Bellare-Rogaway and Jeong-Katz-Lee Protocols. In Boyd, Colin & Gonzalez-Nieto, Juan Manuel (Eds.) 10th Australasian Conference on Information Security and Privacy - ACISP 2005, 4-6 July 2005, Brisbane, Australia.
Number of full-text downloads 429
Number of citations in Scopus 3

Bani Hammad, Yousef, Carter, Gary, Dawson, Edward, & Hitchcock, Yvonne (2004) Improvements to the RAK Factoring Algorithm. In Dawson, E & Klemm, W (Eds.) Cryptographic Algorithms and Their Uses, 5-6 July 2004, Gold Coast, Queensland.

Boyd, Colin, Gonzalez-Nieto, Juan, & Hitchcock, Yvonne (2004) Tripartite Key Exchange in the Cannetti-Krawczyk Proof Model. In Canteaut, A & Viswanathan, K (Eds.) Progress in Cryptology - INDOCRYPT 2004. Fifth International Conference on Cryptology in India., 20-22 December 2004, Chennai, India.
Number of full-text downloads 63

Hitchcock, Yvonne, Tin, Yiu S., Gonzalez Nieto, Juan M., Boyd, Colin A., & Montague, Paul S. (2003) A Password-Based AUthenticator: Security Proof Applications. In Johansson, T. & Maitra, S. (Eds.) Progress in Cryptology - INDOCRYPT 2003, 8-10 December, New Delhi, India.
Number of full-text downloads 109

Carter, Gary, Dawson, Edward, Hitchcock, Yvonne, & Montague, Paul (2003) The Security of Fixed versus Random Elliptic Curves in Cryptography. In Safavi-Naini, R & Seberry, J (Eds.) Information Security and Privacy - ACISP 2003 (LNCS 2727), 9-11 July 2003, Wollongong, New South Wales.

Hitchcock, Yvonne & Montague, Paul (2002) A New Elliptic Curve Scalar Multiplication Algorithm to Resist Simple Power Analysis. In Batten, L & Seberry, J (Eds.) Information Security and Privacy (ACISP'02), 3-5 July, 2002, Melbourne, Australia.
Number of citations in Web of Science® 7

This list was generated on Sat Aug 2 06:39:21 2014 EST.