What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Colin Boyd
Google Scholar
94
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/acisp
TEAKEX: TESLA-Authenticated Group Key Exchange.
Qinyi Li
Lise Millerjord
Colin Boyd
2023
conf/acisp
Modular Design of KEM-Based Authenticated Key Exchange.
Colin Boyd
Bor de Kock
Lise Millerjord
2021
journals/joc
Introduction to the Special Issue on TLS 1.3.
Colin Boyd
2021
conf/asiacrypt
Symmetric Key Exchange with Full Forward Security and Robust Synchronization.
Colin Boyd
Gareth T. Davies
Bor de Kock
Kai Gellert
Tibor Jager
Lise Millerjord
2020
conf/crypto
Fast and Secure Updatable Encryption.
Colin Boyd
Gareth T. Davies
Kristian Gjøsteen
Yao Jiang
2020
conf/fc
Vote Selling Resistant Voting.
Colin Boyd
Thomas Haines
Peter B. Rønne
2018
conf/provsec
Security Notions for Cloud Storage and Deduplication.
Colin Boyd
Gareth T. Davies
Kristian Gjøsteen
Håvard Raddum
Mohsen Toorani
2018
conf/esorics
Valuable Puzzles for Proofs-of-Work.
Colin Boyd
Christopher Carr
2017
conf/latincrypt
Secure Channels and Termination: The Last Word on TLS.
Colin Boyd
Britta Hale
2017
conf/ccs
Side Channels in Deduplication: Trade-offs between Leakage and Efficiency.
Frederik Armknecht
Colin Boyd
Gareth T. Davies
Kristian Gjøsteen
Mohsen Toorani
2016
conf/acisp
Fair Client Puzzles from the Bitcoin Blockchain.
Colin Boyd
Christopher Carr
2016
conf/ctrsa
From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS.
Colin Boyd
Britta Hale
Stig Frode Mjølsnes
Douglas Stebila
2015
conf/fc
Protecting Encrypted Cookies from Compression Side-Channel Attacks.
Janaka Alawatugoda
Douglas Stebila
Colin Boyd
2014
conf/ccs
Modelling after-the-fact leakage for key exchange.
Janaka Alawatugoda
Douglas Stebila
Colin Boyd
2014
conf/acisp
Continuous After-the-Fact Leakage-Resilient Key Exchange.
Janaka Alawatugoda
Colin Boyd
Douglas Stebila
2013
conf/esorics
ASICS: Authenticated Key Exchange Security Incorporating Certification Systems.
Colin Boyd
Cas Cremers
Michèle Feltz
Kenneth G. Paterson
Bertram Poettering
Douglas Stebila
2012
conf/ccs
Practical client puzzles in the standard model.
Lakshmi Kuppusamy
Jothi Rangasamy
Douglas Stebila
Colin Boyd
Juan Manuel González Nieto
2012
conf/acisp
Effort-Release Public-Key Encryption from Cryptographic Puzzles.
Jothi Rangasamy
Douglas Stebila
Colin Boyd
Juan Manuel González Nieto
Lakshmi Kuppusamy
2012
conf/acisp
Minimizing Information Leakage of Tree-Based RFID Authentication Protocols Using Alternate Tree-Walking.
Kaleb Lee
Colin Boyd
Juan Manuel González Nieto
2011
conf/ccs
An integrated approach to cryptographic mitigation of denial-of-service attacks.
Jothi Rangasamy
Douglas Stebila
Colin Boyd
Juanma González Nieto
2011
conf/sec
Ceremony Analysis: Strengths and Weaknesses.
Kenneth Radke
Colin Boyd
Juan Manuel González Nieto
Margot Brereton
2011
conf/icisc
Efficient Modular Exponentiation-Based Puzzles for Denial-of-Service Protection.
Jothi Rangasamy
Douglas Stebila
Lakshmi Kuppusamy
Colin Boyd
Juan Manuel González Nieto
2011
conf/ctrsa
Stronger Difficulty Notions for Client Puzzles and Denial-of-Service-Resistant Protocols.
Douglas Stebila
Lakshmi Kuppusamy
Jothi Rangasamy
Colin Boyd
Juan Manuel González Nieto
2010
conf/sec
Delegation in Predicate Encryption Supporting Disjunctive Queries.
Dongdong Sun
Colin Boyd
Juan Manuel González Nieto
2010
conf/acisp
Attribute-Based Authenticated Key Exchange.
M. Choudary Gorantla
Colin Boyd
Juan Manuel González Nieto
2010
conf/provsec
Automating Computational Proofs for Public-Key-Based Key Exchange.
Long Ngo
Colin Boyd
Juan Manuel González Nieto
2010
conf/africacrypt
Avoiding Full Extension Field Arithmetic in Pairing Computations.
Craig Costello
Colin Boyd
Juan Manuel González Nieto
Kenneth Koon-Ho Wong
2009
conf/ccs
Universally composable contributory group key exchange.
M. Choudary Gorantla
Colin Boyd
Juan Manuel González Nieto
2009
conf/acns
How to Extract and Expand Randomness: A Summary and Explanation of Existing Results.
Yvonne Cliff
Colin Boyd
Juan Manuel González Nieto
2009
conf/icisc
Generic One Round Group Key Exchange in the Standard Model.
M. Choudary Gorantla
Colin Boyd
Juan Manuel González Nieto
Mark Manulis
2009
conf/icisc
Efficient Certificateless KEM in the Standard Model.
Georg Lippold
Colin Boyd
Juan Manuel González Nieto
2009
conf/pkc
Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols.
M. Choudary Gorantla
Colin Boyd
Juan Manuel González Nieto
2008
conf/acisp
Efficient One-Round Key Exchange in the Standard Model.
Colin Boyd
Yvonne Cliff
Juan Manuel González Nieto
Kenneth G. Paterson
2007
conf/cans
Toward Non-parallelizable Client Puzzles.
Suratose Tritilanunt
Colin Boyd
Ernest Foo
Juan Manuel González Nieto
2006
conf/sec
Sealed-Bid Micro Auctions.
Kun Peng
Colin Boyd
Ed Dawson
2006
conf/acisp
An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys.
Colin Boyd
Kim-Kwang Raymond Choo
Anish Mathuria
2006
conf/acisp
A Novel Range Test.
Kun Peng
Colin Boyd
Ed Dawson
Eiji Okamoto
2006
conf/acns
Password Based Server Aided Key Exchange .
Yvonne Cliff
Yiu Shing Terry Tin
Colin Boyd
2006
conf/pkc
Security-Mediated Certificateless Cryptography.
Sherman S. M. Chow
Colin Boyd
Juan Manuel González Nieto
2006
conf/cans
Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems.
Jaimee Brown
Juan Manuel González Nieto
Colin Boyd
2005
conf/crypto
Simple and Efficient Shuffling with Provable Correctness and ZK Privacy.
Kun Peng
Colin Boyd
Ed Dawson
2005
conf/icics
Ciphertext Comparison, a New Solution to the Millionaire Problem.
Kun Peng
Colin Boyd
Ed Dawson
Byoungcheon Lee
2005
conf/asiacrypt
Examining Indistinguishability-Based Proof Models for Key Establishment Protocols.
Kim-Kwang Raymond Choo
Colin Boyd
Yvonne Hitchcock
2005
conf/asiacrypt
Errors in Computational Complexity Proofs for Protocols.
Kim-Kwang Raymond Choo
Colin Boyd
Yvonne Hitchcock
2004
conf/acisp
Protocols with Security Proofs for Mobile Applications.
Yiu Shing Terry Tin
Harikrishna Vasanta
Colin Boyd
Juan Manuel González Nieto
2004
conf/acns
Batch Verification for Equality of Discrete Logarithms and Threshold Decryptions.
Riza Aditya
Kun Peng
Colin Boyd
Ed Dawson
Byoungcheon Lee
2004
conf/acns
Key Agreement Using Statically Keyed Authenticators.
Colin Boyd
Wenbo Mao
Kenneth G. Paterson
2004
conf/icisc
An Efficient and Verifiable Solution to the Millionaire Problem.
Kun Peng
Colin Boyd
Ed Dawson
Byoungcheon Lee
2004
conf/pkc
A Correct, Private, and Efficient Mix Network.
Kun Peng
Colin Boyd
Ed Dawson
Kapalee Viswanathan
2003
conf/acisp
Provably Secure Mobile Key Exchange: Applying the Canetti-Krawczyk Approach.
Yiu Shing Terry Tin
Colin Boyd
Juan Manuel González Nieto
2003
conf/icisc
Providing Receipt-Freeness in Mixnet-Based Voting Protocols.
Byoungcheon Lee
Colin Boyd
Ed Dawson
Kwangjo Kim
Jeongmo Yang
Seungjae Yoo
2003
conf/wisa
Efficient Implementation of Relative Bid Privacy in Sealed-Bid Auction.
Kun Peng
Colin Boyd
Ed Dawson
Kapalee Viswanathan
2003
conf/pkc
Round-Optimal Contributory Conference Key Agreement.
Colin Boyd
Juan Manuel González Nieto
2002
journals/compsec
Hybrid Key Escrow: A New Paradigm.
Kapali Viswanathan
Colin Boyd
Ed Dawson
2002
conf/icisc
Non-interactive Auction Schemewith Strong Privacy.
Kun Peng
Colin Boyd
Ed Dawson
Kapali Viswanathan
2002
conf/pkc
A Provably Secure Restrictive Partially Blind Signature Scheme.
Greg Maitland
Colin Boyd
2002
conf/icics
Robust, Privacy Protecting and Publicly Verifiable Sealed-Bid Auction.
Kun Peng
Colin Boyd
Ed Dawson
Kapali Viswanathan
2002
conf/ctrsa
Co-operatively Formed Group Signatures.
Greg Maitland
Colin Boyd
2001
conf/acisp
Attacks Based on Small Factors in Various Group Structures.
Chris Pavlovski
Colin Boyd
2001
conf/acisp
Cryptographic Salt: A Countermeasure against Denial-of-Service Attacks.
DongGook Park
JungJoon Kim
Colin Boyd
Ed Dawson
2001
conf/acisp
Elliptic Curve Based Password Authenticated Key Exchange Protocols.
Colin Boyd
Paul Montague
Khanh Quoc Nguyen
2001
conf/icics
Fair Electronic Cash Based on a Group Signature Scheme.
Greg Maitland
Colin Boyd
2001
conf/icics
A Public Key Cryptosystem Based on the Subgroup Membership Problem.
Juan Manuel González Nieto
Colin Boyd
Ed Dawson
2000
conf/acisp
A Three Phased Schema for Sealed Bid Auction System Design.
Kapali Viswanathan
Colin Boyd
Ed Dawson
2000
conf/acisp
Passive Entities: A Strategy for Electronic Payment Design.
Ernest Foo
Colin Boyd
2000
conf/acisp
Key Recovery System for the Commercial Environment.
Juanma González Nieto
Kapali Viswanathan
Colin Boyd
Ed Dawson
2000
conf/icisc
Micropayments for Wireless Communications.
DongGook Park
Colin Boyd
Ed Dawson
2000
conf/pkc
Forward Secrecy and Its Application to Future Mobile Communications Security.
DongGook Park
Colin Boyd
Sang-Jae Moon
2000
conf/pkc
Key Recovery in Third Generation Wireless Communication Systems.
Juanma González Nieto
DongGook Park
Colin Boyd
Ed Dawson
2000
conf/asiacrypt
Attacking and Repairing Batch Verification Schemes.
Colin Boyd
Chris Pavlovski
1999
conf/acisp
Publicly Verifiable Key Escrow with Limited Time Span.
Kapali Viswanathan
Colin Boyd
Ed Dawson
1999
conf/acisp
Efficient Electronic Cash Using Batch Signatures.
Colin Boyd
Ernest Foo
Chris Pavlovski
1999
conf/icisc
Secure Selection Protocols.
Kapali Viswanathan
Colin Boyd
Ed Dawson
1999
conf/icics
Signature Scheme for Controlled Environments.
Kapali Viswanathan
Colin Boyd
Ed Dawson
1999
conf/icics
Detachable Electronic Coins.
Chris Pavlovski
Colin Boyd
Ernest Foo
1998
conf/acisp
Key Establishment Protocols for Secure Mobile Communications: A Selective Survey.
Colin Boyd
Anish Mathuria
1998
conf/fc
A Payment Scheme Using Vouchers.
Ernest Foo
Colin Boyd
1998
conf/icisc
Public key protocols for wireless communications.
Colin Boyd
DongGook Park
1998
conf/icisc
A security architecture for third generation wireless systems.
Gary Gaskell
Mark Looi
Ed Dawson
Colin Boyd
Selwyn Russell
1998
conf/asiacrypt
Off-Line Fair Payment Protocols Using Convertible Signatures.
Colin Boyd
Ernest Foo
1997
conf/sec
A taxonomy of electronic cash schemes.
Ernest Foo
Colin Boyd
William J. Caelli
Ed Dawson
1997
conf/acisp
Cryptanalysis of Adaptive Arithmetic Coding Encryption Schemes.
Jen Lim
Colin Boyd
Ed Dawson
1997
conf/acisp
On Key Agreement and Conference Key Agreement.
Colin Boyd
1997
conf/icics
Digital signature and public key cryptosystems in a prime order subgroup of Z<sub>n</sub><sup>*</sup>.
Colin Boyd
1997
conf/icics
Enforcing traceability in software.
Colin Boyd
1996
conf/acisp
A Framework for Design of Key Establishment Protocols.
Colin Boyd
1994
conf/esorics
On Strengthening Authentication Protocols to Foil Cryptanalysis.
Wenbo Mao
Colin Boyd
1994
conf/esorics
Designing Secure Key Exchange Protocols.
Colin Boyd
Wenbo Mao
1994
conf/asiacrypt
Design and Analysis of Key Exchange Protocols via Secure Channel Identification.
Colin Boyd
Wenbo Mao
1993
conf/eurocrypt
On a Limitation of BAN Logic.
Colin Boyd
Wenbo Mao
1992
conf/esorics
A Formal Framework for Authentication.
Colin Boyd
1991
conf/eurocrypt
Enhancing Secrecy by Data Compression: Theoretical and Practical Aspects.
Colin Boyd
1989
conf/eurocrypt
A New Multiple Key Cipher and an Improved Voting Scheme.
Colin Boyd
1988
conf/eurocrypt
Some Applications of Multiple Key Ciphers.
Colin Boyd
Coauthors
Anish Mathuria
(2)
Bertram Poettering
(1)
Bor de Kock
(2)
Britta Hale
(2)
Byoungcheon Lee
(4)
Cas Cremers
(1)
Chris Pavlovski
(4)
Christopher Carr
(2)
Colin Boyd
(94)
Craig Costello
(1)
Dongdong Sun
(1)
DongGook Park
(5)
Douglas Stebila
(10)
Ed Dawson
(24)
Eiji Okamoto
(1)
Ernest Foo
(7)
Frederik Armknecht
(1)
Gareth T. Davies
(4)
Gary Gaskell
(1)
Georg Lippold
(1)
Greg Maitland
(3)
Harikrishna Vasanta
(1)
Håvard Raddum
(1)
Jaimee Brown
(1)
Janaka Alawatugoda
(3)
Jen Lim
(1)
Jeongmo Yang
(1)
Jothi Rangasamy
(5)
Juan Manuel González Nieto
(23)
Juanma González Nieto
(3)
JungJoon Kim
(1)
Kai Gellert
(1)
Kaleb Lee
(1)
Kapalee Viswanathan
(2)
Kapali Viswanathan
(8)
Kenneth G. Paterson
(3)
Kenneth Koon-Ho Wong
(1)
Kenneth Radke
(1)
Khanh Quoc Nguyen
(1)
Kim-Kwang Raymond Choo
(3)
Kristian Gjøsteen
(3)
Kun Peng
(10)
Kwangjo Kim
(1)
Lakshmi Kuppusamy
(4)
Lise Millerjord
(3)
Long Ngo
(1)
M. Choudary Gorantla
(4)
Margot Brereton
(1)
Mark Looi
(1)
Mark Manulis
(1)
Michèle Feltz
(1)
Mohsen Toorani
(2)
Paul Montague
(1)
Peter B. Rønne
(1)
Qinyi Li
(1)
Riza Aditya
(1)
Sang-Jae Moon
(1)
Selwyn Russell
(1)
Seungjae Yoo
(1)
Sherman S. M. Chow
(1)
Stig Frode Mjølsnes
(1)
Suratose Tritilanunt
(1)
Thomas Haines
(1)
Tibor Jager
(1)
Wenbo Mao
(5)
William J. Caelli
(1)
Yao Jiang
(1)
Yiu Shing Terry Tin
(3)
Yvonne Cliff
(3)
Yvonne Hitchcock
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to