Cryptographers' World
 

Colin Boyd


Author's Web Page Link

33 papers and 1 book in database with 1208 citations StarStar

Editor of 1 conference proceedings book

H-number: 17

Books

 
1. Colin BoydAnish MathuriaProtocols for Authentication and Key Establishment. Springer, 2003. ISBN 978-3-540-43107-7.

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

[Cited 219 times Red StarRed Star]


Conference Proceedings

 
1. Colin Boyd, editor, Advances in Cryptology - ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings. Springer, 2001. ISBN 3-540-42987-5.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Juan Manuel González Nieto,  Colin Boyd,  Ed Dawson,  A Public Key Cryptosystem Based On A Subgroup Membership Problem, Designs, Codes and Cryptography, Volume 36(3), pp. 301 - 316, Springer, 2005.

[Electronic Edition][Cited 16 times ]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Yvonne Cliff,  Colin Boyd,  Juan Manuel González Nieto,  How to Extract and Expand Randomness: A Summary and Explanation of Existing Results, pp. 53 - 70, ACNS 2009.

[Electronic Edition][No citation]

2. M. Choudary Gorantla,  Colin Boyd,  Juan Manuel González Nieto,  Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols, pp. 105 - 123, PKC 2009.

[Electronic Edition][Cited 13 times ]

3. Jaimee Brown,  Juan Manuel González Nieto,  Colin Boyd,  Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions, pp. 176 - 190, INDOCRYPT 2006.

[Electronic Edition][Cited 2 times ]

4. Yvonne Cliff,  Yiu Shing Terry Tin,  Colin Boyd,  Password Based Server Aided Key Exchange , pp. 146 - 161, ACNS 2006.

[Electronic Edition][Cited 8 times ]

5. Sherman S. M. Chow,  Colin Boyd,  Juan Manuel González Nieto,  Security-Mediated Certificateless Cryptography, pp. 508 - 524, PKC 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 24 times ]

6. Kim-Kwang Raymond Choo,  Colin Boyd,  Yvonne Hitchcock,  Examining Indistinguishability-Based Proof Models for Key Establishment Protocols, pp. 585 - 604, ASIACRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 84 times Red Star]

7. Kim-Kwang Raymond Choo,  Colin Boyd,  Yvonne Hitchcock,  Errors in Computational Complexity Proofs for Protocols, pp. 624 - 643, ASIACRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 55 times Red Star]

8. Kim-Kwang Raymond Choo,  Colin Boyd,  Yvonne Hitchcock,  On Session Key Construction in Provably-Secure Key Establishment Protocols, pp. 116 - 131, MYCRYPT 2005.

[Electronic Edition][Cited 29 times ]

9. Kun Peng,  Colin Boyd,  Ed Dawson,  Optimization of Electronic First-Bid Sealed-Bid Auction Based on Homomorphic Secret Sharing, pp. 84 - 98, MYCRYPT 2005.

[Electronic Edition][Cited 3 times ]

10. Colin Boyd,  Kim-Kwang Raymond Choo,  Security of Two-Party Identity-Based Key Agreement, pp. 229 - 243, MYCRYPT 2005.

[Electronic Edition][Cited 29 times ]

11. Kun Peng,  Colin Boyd,  Ed Dawson,  Simple and Efficient Shuffling with Provable Correctness and ZK Privacy, pp. 188 - 204, CRYPTO 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 22 times ]

12. Yvonne Hitchcock,  Colin Boyd,  Juan Manuel González Nieto,  Tripartite Key Exchange in the Canetti-Krawczyk Proof Model, pp. 17 - 32, INDOCRYPT 2004.

[Electronic Edition][Cited 11 times ]

13. Colin Boyd,  Design of Secure Key Establishment Protocols: Successes, Failures and Prospects, pp. 1 - 13, INDOCRYPT 2004.

[Electronic Edition][No citation]

14. Kun Peng,  Riza Aditya,  Colin Boyd,  Ed Dawson,  Byoungcheon Lee,  Multiplicative Homomorphic E-Voting, pp. 61 - 72, INDOCRYPT 2004.

[Electronic Edition][Cited 15 times ]

15. Riza Aditya,  Kun Peng,  Colin Boyd,  Ed Dawson,  Byoungcheon Lee,  Batch Verification for Equality of Discrete Logarithms and Threshold Decryptions, pp. 494 - 508, ACNS 2004.

[Electronic Edition][Cited 15 times ]

16. Colin Boyd,  Wenbo Mao,  Kenneth G. Paterson,  Key Agreement Using Statically Keyed Authenticators, pp. 248 - 262, ACNS 2004.

[Electronic Edition][Cited 54 times Red Star]

17. Kun Peng,  Colin Boyd,  Ed Dawson,  Kapalee Viswanathan,  A Correct, Private, and Efficient Mix Network, pp. 439 - 454, PKC 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 17 times ]

18. Yvonne Hitchcock,  Yiu Shing Terry Tin,  Juan Manuel González Nieto,  Colin Boyd,  Paul Montague,  A Password-Based Authenticator: Security Proof and Applications, pp. 388 - 401, INDOCRYPT 2003.

[Electronic Edition][Cited 12 times ]

19. Colin Boyd,  Juan Manuel González Nieto,  Round-Optimal Contributory Conference Key Agreement, pp. 161 - 174, PKC 2003.

[Electronic Edition][Cited 115 times Red StarRed Star]

20. Greg Maitland,  Colin Boyd,  A Provably Secure Restrictive Partially Blind Signature Scheme, pp. 99 - 114, PKC 2002.

[Electronic Edition][Cited 45 times ]

21. Greg Maitland,  Colin Boyd,  Co-operatively Formed Group Signatures, pp. 218 - 235, CT-RSA 2002.

[Electronic Edition][Cited 3 times ]

22. Kapalee Viswanathan,  Colin Boyd,  Ed Dawson,  An Analysis of Integrity Services in Protocols, pp. 175 - 187, INDOCRYPT 2001.

[Electronic Edition][Cited 1 times ]

23. Colin Boyd,  Chris Pavlovski,  Attacking and Repairing Batch Verification Schemes, pp. 58 - 71, ASIACRYPT 2000.

[Electronic Edition][Cited 43 times ]

24. Juan Manuel González Nieto,  DongGook Park,  Colin Boyd,  Ed Dawson,  Key Recovery in Third Generation Wireless Communication Systems, pp. 223 - 237, PKC 2000.

[Electronic Edition][Cited 5 times ]

25. DongGook Park,  Colin Boyd,  Sang-Jae Moon,  Forward Secrecy and Its Application to Future Mobile Communications Security, pp. 433 - 445, PKC 2000.

[Electronic Edition][Cited 26 times ]

26. Colin Boyd,  Ernest Foo,  Off-Line Fair Payment Protocols Using Convertible Signatures, pp. 271 - 285, ASIACRYPT 1998.

[Electronic Edition][Cited 122 times Red StarRed Star]

27. Ernest Foo,  Colin Boyd,  A Payment Scheme Using Vouchers, pp. 103 - 121, FC 1998.

[Electronic Edition][Cited 14 times ]

28. Colin Boyd,  Wenbo Mao,  Design and Analysis of Key Exchange Protocols via Secure Channel Identification, pp. 171 - 181, ASIACRYPT 1994.

[Electronic Edition][Cited 13 times ]

29. Colin Boyd,  Wenbo Mao,  On a Limitation of BAN Logic, pp. 240 - 247, EUROCRYPT 1993.

[Electronic Edition][Cited 83 times Red Star]

30. Colin Boyd,  Enhancing Secrecy by Data Compression: Theoretical and Practical Aspects, pp. 266 - 280, EUROCRYPT 1991.

[Electronic Edition][Cited 6 times ]

31. Colin Boyd,  A New Multiple Key Cipher and an Improved Voting Scheme, pp. 617 - 625, EUROCRYPT 1989.

[Electronic Edition][Cited 54 times Red Star]

32. Colin Boyd,  Some Applications of Multiple Key Ciphers, pp. 455 - 467, EUROCRYPT 1988.

[Electronic Edition][Cited 50 times Red Star]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...