Kenny Paterson
#66,424
Most Influential Person Now
Cryptographer
Kenny Paterson's AcademicInfluence.com Rankings
Kenny Patersoncomputer-science Degrees
Computer Science
#2684
World Rank
#2808
Historical Rank
Information Security
#8
World Rank
#8
Historical Rank
Kenny Patersonmathematics Degrees
Mathematics
#5615
World Rank
#7886
Historical Rank
Measure Theory
#1308
World Rank
#1651
Historical Rank
Download Badge
Computer Science Mathematics
Kenny Paterson's Degrees
- PhD Cryptography Royal Holloway, University of London
- Masters Information Security Royal Holloway, University of London
Why Is Kenny Paterson Influential?
(Suggest an Edit or Addition)According to Wikipedia, Kenneth G. "Kenny" Paterson is a professor in the Institute of Information Security at ETH Zurich, where he leads the Applied Cryptography Group. Before joining ETH Zurich in April 2019, he was a professor in the Information Security Group at Royal Holloway, University of London and an EPSRC Leadership Fellow. He is a cryptographer with a focus on bridging the gap between theory and practice and recently became the Editor in Chief for the IACR's Journal of Cryptology and a 2017 fellow of the IACR.
Kenny Paterson's Published Works
Published Works
- Certificateless Public Key Cryptography (2003) (2023)
- Pairings for Cryptographers (2008) (827)
- ID-based Signatures from Pairings on Elliptic Curves (2002) (474)
- Generalized Reed-Muller codes and power control in OFDM modulation (1998) (437)
- Lucky Thirteen: Breaking the TLS and DTLS Record Protocols (2013) (356)
- Evaluation of the safety and immunogenicity of synthetic Aβ42 (AN1792) in patients with AD (2005) (347)
- Efficient Identity-Based Signatures Secure in the Standard Model (2006) (306)
- On the existence and construction of good codes with low peak-to-average power ratios (2000) (298)
- Decentralized Privacy-Preserving Proximity Tracing (2020) (279)
- Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings (2011) (250)
- On the Security of RC4 in TLS (2013) (210)
- On the Security of the TLS Protocol: A Systematic Analysis (2013) (209)
- CBE from CL-PKE: A Generic Construction and Efficient Schemes (2005) (172)
- Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation (2012) (154)
- Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model (2012) (149)
- ECRYPT yearly report on algorithms and keysizes (2009) (143)
- Security of Symmetric Encryption against Mass Surveillance (2014) (139)
- Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol (2011) (131)
- Certificateless Encryption Schemes Strongly Secure in the Standard Model (2008) (125)
- Record linkage study of hypokalaemia in hospitalized patients. (1986) (118)
- Effects of HRT on liver enzyme levels in women with type 2 diabetes: a randomized placebo‐controlled trial (2006) (114)
- Plaintext Recovery Attacks against SSH (2009) (113)
- Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage (2018) (110)
- Modular Security Proofs for Key Agreement Protocols (2005) (109)
- Trusted computing: providing security for peer-to-peer networks (2005) (105)
- Golay Complementary Sequences (2003) (104)
- Efficient One-Round Key Exchange in the Standard Model (2008) (101)
- Key Agreement Using Statically Keyed Authenticators (2004) (98)
- Tripartite Authenticated Key Agreement Protocols from Pairings (2003) (96)
- Personalizing health care: feasibility and future implications (2013) (95)
- Pairing-Based Cryptography - Pairing 2008, Second International Conference, Egham, UK, September 1-3, 2008. Proceedings (2008) (94)
- Concurrent Signatures (2004) (94)
- Dabigatran – a case history demonstrating the need for comprehensive approaches to optimize the use of new drugs (2013) (91)
- Programmable Hash Functions in the Multilinear Setting (2013) (85)
- Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks (2019) (83)
- Comments on "Theory and Applications of Cellular Automata in Cryptography" (1997) (82)
- Pump up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries (2018) (82)
- RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures (2012) (79)
- Non-Interactive Key Exchange (2013) (78)
- Proxy Signatures Secure Against Proxy Key Exposure (2008) (76)
- On the Security of RC4 in TLS and WPA (2013) (75)
- Attacking the IPsec Standards in Encryption-only Configurations (2007) (74)
- Time-Specific Encryption (2010) (74)
- Identity-based cryptography for grid security (2005) (74)
- Acute response to recombinant insulin-like growth factor I in a patient with Mendenhall's syndrome. (1990) (73)
- Mortality study of 18 000 patients treated with omeprazole (2003) (72)
- Cryptography in Theory and Practice: The Case of Encryption in IPsec (2006) (71)
- On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups (2009) (69)
- A comparison between traditional public key infrastructures and identity-based cryptography (2003) (69)
- Imprimitive Permutation Groups and Trapdoors in Iterated Block Ciphers (1999) (68)
- On the (in)security of IPsec in MAC-then-encrypt configurations (2010) (68)
- Plaintext-Recovery Attacks Against Datagram TLS (2012) (68)
- Changes in phagocytic function with glycaemic control in diabetic patients. (1989) (66)
- NewHope Algorithm Specifications and Supporting Documentation (2017) (63)
- Improving the managed entry of new medicines: sharing experiences across Europe (2012) (62)
- Computing the error linear complexity spectrum of a binary sequence of period 2n (2003) (62)
- An Attack on a Certificateless Signature Scheme (2006) (60)
- Coming of Age: A Longitudinal Study of TLS Deployment (2018) (58)
- On the Joint Security of Encryption and Signature in EMV (2012) (56)
- Efficient decoding algorithms for generalized Reed-Muller codes (2000) (55)
- RSA-Based Undeniable Signatures for General Moduli (2002) (54)
- Lucky Microseconds: A Timing Attack on Amazon's s2n Implementation of TLS (2016) (54)
- Postmarketing surveillance of the safety of cimetidine: 10 year mortality report. (1992) (53)
- Perfect Maps (1994) (53)
- Key Rotation for Authenticated Encryption (2017) (53)
- Deniable Authenticated Key Establishment for Internet Protocols (2003) (52)
- A method for constructing decodable de Bruijn sequences (1996) (51)
- Cryptography from Pairings: A Snapshot of Current Research (2008) (51)
- On the Joint Security of Encryption and Signature, Revisited (2011) (49)
- Attacks Only Get Better: Password Recovery Attacks Against RC4 in TLS (2015) (48)
- Advances in Elliptic Curve Cryptography: Cryptography from Pairings (2005) (48)
- Padding Oracle Attacks on the ISO CBC Mode Encryption Standard (2004) (47)
- Why Quantum Cryptography (2004) (47)
- Metabolic, inflammatory and haemostatic effects of a low‐dose continuous combined HRT in women with type 2 diabetes: potentially safer with respect to vascular risk? (2003) (47)
- A Coding-Theoretic Approach to Recovering Noisy RSA Keys (2012) (47)
- Plaintext Recovery Attacks Against WPA/TKIP (2014) (45)
- Padding Oracle Attacks on CBC-Mode Encryption with Secret and Random IVs (2005) (44)
- Authenticated Three Party Key Agreement Protocols from Pairings (2002) (43)
- Provable Security in the Real World (2011) (42)
- One-round key exchange in the standard model (2009) (42)
- Diabetic nephropathy: how effective is treatment in clinical practice? (2002) (41)
- Periodontitis in non-smoking type 1 diabetic adults: a cross-sectional study. (2012) (41)
- One-Time-Password-Authenticated Key Exchange (2010) (41)
- Altered G-protein expression and adenylate cyclase activity in platelets of non-insulin-dependent diabetic (NIDDM) male subjects. (1991) (41)
- On Symmetric Encryption with Distinguishable Decryption Failures (2013) (41)
- Robust Encryption, Revisited (2013) (40)
- Sequences for OFDM and Multi-Code CDMA: Two Problems in Algebraic Coding Theory (2001) (38)
- Trust management for secure information flows (2008) (38)
- Collecting Urine for Microalbumin Assay (1988) (37)
- Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier (2014) (37)
- Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results (2016) (37)
- Population Screening for Diabetes Mellitus (1993) (36)
- Data Is a Stream: Security of Stream-Based Channels (2015) (36)
- Intensified treatment of patients with type 2 diabetes mellitus and overt nephropathy. (2004) (35)
- Permutation Polynomials, de Bruijn Sequences, and Linear Complexity (1996) (35)
- Challenges for Trusted Computing (2008) (35)
- On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model (2011) (35)
- Some new circuit codes (1997) (33)
- Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR (2010) (33)
- Analyzing Multi-key Security Degradation (2017) (33)
- Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes (2013) (32)
- One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography (2013) (32)
- Big Bias Hunting in Amazonia: Large-Scale Computation and Exploitation of RC4 Biases (Invited Paper) (2014) (32)
- Cold Boot Attacks on Ring and Module LWE Keys Under the NTT (2018) (32)
- Can Price Transparency Contribute to More Affordable Patient Access to Medicines? (2017) (31)
- Securing peer-to-peer networks usingtrusted computing (2005) (31)
- Reactive and Proactive Standardisation of TLS (2016) (31)
- A cryptographic tour of the IPsec standards (2006) (30)
- Properties of the Error Linear Complexity Spectrum (2009) (30)
- Estimating urinary albumin excretion rate of diabetic patients in clinical practice. (1993) (30)
- Post-cimetidine surveillance for up to ten years: incidence of carcinoma of the stomach and oesophagus. (1991) (29)
- Single-track Gray codes (1995) (29)
- Anaemia is common and predicts mortality in diabetic nephropathy. (2007) (29)
- ASICS: authenticated key exchange security incorporating certification systems (2013) (28)
- Certiflcateless Public Key Cryptography (2003) (28)
- Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities (2008) (27)
- Key Refreshing in Identity-Based Cryptography and its Applications in MANETs (2007) (27)
- On codes with low peak-to-average power ratio for multi-code CDMA (2002) (26)
- Do Different Frequencies of Self‐monitoring of Blood Glucose Influence Control in Type 1 Diabetic Patients? (1991) (26)
- Dentist 2:00On codes with low peak-to-average power ratio for multicode CDMA (2002) (26)
- Near optimal single-track Gray codes (1996) (25)
- What can identity-based cryptography offer to web services? (2007) (25)
- Simulation-Based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms (2015) (25)
- A Cryptographic Analysis of the WireGuard Protocol (2018) (25)
- Multilinear Maps from Obfuscation (2016) (25)
- Outcome of pregnancy in insulin-dependent (type 1) diabetic women between 1971 and 1984. (1986) (24)
- e-EMV: emulating EMV for internet payments with trusted computing technologies (2008) (24)
- Remote Side-Channel Attacks on Anonymous Transactions (2020) (24)
- A Surfeit of SSH Cipher Suites (2016) (23)
- Effect of oral verapamil on glibenclamide stimulated insulin secretion. (1986) (22)
- Quantum cryptography: a practical information security perspective (2004) (21)
- Analysing and exploiting the Mantin biases in RC4 (2017) (21)
- Decoding Perfect Maps (1994) (21)
- Limits on Authenticated Encryption Use in TLS (2016) (21)
- Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure (2018) (21)
- Flexible observation: guidelines versus reality. (2007) (20)
- Single-track circuit codes (2001) (20)
- Root Counting, the DFT and the Linear Complexity of Nonlinear Filtering (1998) (20)
- Perfect factors in the de Bruijn graph (1995) (20)
- Frequency-smoothing encryption: preventing snapshot attacks on deterministically encrypted data (2018) (19)
- On The Plausible Deniability Feature of Internet Protocols (2002) (19)
- Psychological Factors and their Relationship to Diabetes Control (1993) (19)
- Bounds on Partial Correlations of Sequences (1998) (18)
- Diabetic nephropathy: an observational study on patients attending a joint diabetes renal clinic. (1997) (18)
- Undesired effects of the sulphonylurea drugs. (1985) (18)
- Ethics and pharmaceutical medicine – the full report of the Ethical Issues Committee of the Faculty of Pharmaceutical Medicine of the Royal Colleges of Physicians of the UK (2006) (18)
- Provably Secure Key Assignment Schemes from Factoring (2011) (18)
- Expert Review of Pharmacoeconomics & Outcomes Research (2012) (17)
- Anonymous Broadcast Encryption (2011) (17)
- New Classes of Perfect Maps I (1996) (17)
- Comparison of conventional twice daily subcutaneous insulin administration and a multiple injection regimen (using the NovoPen) in insulin-dependent diabetes mellitus. (1988) (17)
- Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts (2017) (16)
- Zero/positive capacities of two-dimensional runlength-constrained arrays (2001) (16)
- Related Randomness Attacks for Public Key Encryption (2014) (16)
- Immunising CBC Mode Against Padding Oracle Attacks: A Formal Security Treatment (2008) (16)
- Message Time of Arrival Codes: A Fundamental Primitive for Secure Distance Measurement (2019) (16)
- e-EMV : Emulating EMV for Internet payments using Trusted Computing technology (2006) (15)
- The Pre-Operative Electrocardiogram: An Assessment (1983) (15)
- Non-interactive Designated Verifier Proofs and Undeniable Signatures (2005) (15)
- Authenticated Encryption with AES-CBC and HMAC-SHA (2009) (14)
- Comparison of Basal and Prandial Insulin Therapy in Patients with Secondary Failure of Sulphonylurea Therapy (1991) (14)
- Generalised Reed-Muller codes and power control in OFDM modulation (1998) (14)
- Binary Sequence Sets with Favorable Correlations from Difference Sets and MDS Codes (1998) (14)
- A weak cipher that generates the symmetric group (1994) (14)
- A Certificate-Free Grid Security Infrastructure Supporting Password-Based User Authentication ∗ (2007) (14)
- Cold Boot Attacks on NTRU (2017) (13)
- New Classes of Perfect Maps II (1996) (13)
- Augmenting Internet-based Card Not Present Transactions with Trusted Computing: An Analysis (2006) (13)
- Signal-flow-based analysis of wireless security protocols (2013) (13)
- Multi-key Hierarchical Identity-Based Signatures (2007) (13)
- Coding techniques for power controlled OFDM (1998) (12)
- Prime and Prejudice: Primality Testing Under Adversarial Conditions (2018) (12)
- A note on the optimality of frequency analysis vs. ℓp-optimization (2015) (12)
- Building Key-Private Public-Key Encryption Schemes (2009) (12)
- Assessment of Past Glycemic Control: Measure Fructosamine, Hemoglobin A1, or Both? (1988) (12)
- On the Existence of de Bruijn Tori with Two by Two Windows (1996) (11)
- Long-Term Performance of the Fructosamine Assay (1988) (11)
- Vascular disease and survival in patients with type 2 diabetes and nephropathy (2002) (11)
- A guide to trust in mobile ad hoc networks (2010) (11)
- Authenticated-Encryption with Padding: A Formal Security Treatment (2012) (11)
- Guiding Principles for Pharmaceutical Physicians from the Ethical Issues Committee of the Faculty of Pharmaceutical Medicine of the Royal Colleges of Physicians of the UK (2006) (11)
- Applications of Exponential Sums in Communications Theory (1999) (11)
- An Assessment of the Accuracy of NovoPen 1 Delivery After Prolonged Use (1990) (11)
- Population screening for diabetes mellitus. Professional Advisory Committee of the British Diabetic Association. (1993) (10)
- An Analysis of DepenDNS (2010) (9)
- CrowdNotifier: Decentralized Privacy-Preserving Presence Tracing (2021) (9)
- A Comparison of Biosynthetic Human Insulin with Porcine Insulin in the Blood Glucose Control of Diabetic Pregnancy (1986) (9)
- Cluster randomized trials of prescription medicines or prescribing policy: public and general practitioner opinions in Scotland (2012) (9)
- Audit of multiple insulin injection regimens in a large outpatient diabetic population. (1992) (9)
- SWiSSSE: System-Wide Security for Searchable Symmetric Encryption (2020) (9)
- Scottish Medicines Consortium: an Overview of Rapid New Drug Assessment in Scotland. (2007) (8)
- Anonymous, Robust Post-Quantum Public Key Encryption (2021) (8)
- Deformability of leucocyte subpopulations in Type I (insulin-dependent) and Type II (non-insulin-dependent) diabetic patients (1994) (8)
- Codes, Correlations and Power Control in OFDM (1999) (8)
- Crimeware and Trusted Computing (2007) (8)
- A Practical Attack Against the Use of RC4 in the HIVE Hidden Volume Encryption System (2015) (8)
- Enhancement of Fibrinolysis After Insulin Administration in NIDDM (1986) (7)
- Pioneering advanced mobile privacy and security (2004) (7)
- User-friendly and certificate-free grid security infrastructure (2011) (7)
- Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol (2016) (7)
- Many a Mickle Makes a Muckle: A Framework for Provably Quantum-Secure Hybrid Key Exchange (2020) (7)
- New antiplatelet agents: ticlopidine and clopidogrel. Antiplatelet therapy but at what cost? (2001) (6)
- An intervention to reduce the risk of mother-to-infant HIV transmission: results of a pilot toxicity study. (1994) (6)
- Storage efficient decoding for a class of binary be Bruijn sequences (1995) (5)
- Severe transient nephrotic syndrome in diabetic pregnancy. (1985) (5)
- Breaking an Identity-Based Encryption Scheme Based on DHIES (2011) (5)
- Personalizing healthcare: from genetics through payment to improving care? (2013) (5)
- Four Attacks and a Proof for Telegram (2022) (5)
- Value and cancer medicines—A personal view (2017) (5)
- Fatal xylenol self-poisoning. (1986) (5)
- Public-key Cryptography on Smart Cards (1995) (4)
- Augmenting Internet-Based Card Not Present Transactions with Trusted Computing (Extended Abstract) (2008) (4)
- Proceedings of the 30th Annual international conference on Theory and applications of cryptographic techniques: advances in cryptology (2011) (4)
- Lost in translation: theory and practice in cryptography (2006) (4)
- Perfect Factors from Cyclic Codes and Interleaving (1998) (4)
- On the error linear complexity profiles of binary sequences of period 2n (2008) (4)
- HyperLogLog: Exponentially Bad in Adversarial Settings (2022) (4)
- Safety in Numbers: On the Need for Robust Diffie-Hellman Parameter Validation (2019) (4)
- Security Against Related Randomness Attacks via Reconstructive Extractors (2015) (4)
- Undesired effects of biguanide therapy. (1984) (4)
- Factoring 512-bit RSA Moduli for Fun ( and a Profit of $ 9 , 000 ) (2015) (4)
- Can obscure the true risk of certain adverse drug reactions (1995) (4)
- Metabolic, Inflammatory, and Hemostatic Effects of a Low-Dose Continuous Combined HRT in Women With Type 2 Diabetes: Potentially Safer With Respect to Vascular Risk (2004) (4)
- Pen Injectors—The Way Forward? (1992) (4)
- One-time-password-authenticated key exchange (full version) (2010) (4)
- Crest-factor analysis of carrier interferometry MC-CDMA and OFDM systems (2004) (3)
- Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol (2016) (3)
- Aspects of Linear Complexity (1994) (3)
- PING and REJECT: The Impact of Side-Channels on Zcash Privacy (2019) (3)
- Serum fructosamine/haemoglobin A1 ratio predicts the future changes in haemoglobin A1 in type 2 (non-insulin dependent) diabetic patients. (1991) (3)
- Low molecular weight heparins--a safer option than unfractionated heparin? (2001) (3)
- Flexible and secure communications in an identity-based coalition environment (2008) (3)
- Urinary albumin excretion: Authors' reply (1993) (3)
- Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan (2004) (3)
- Bounds on Envelope Power of Trace Codes for OFDM (1998) (2)
- Standardisation is essential (1994) (2)
- Diabetes epidemiology: present and future (1999) (2)
- Experience of temporary cardiac pacing in a district general hospital. (1983) (2)
- A Performant, Misuse-Resistant API for Primality Testing (2020) (2)
- Extensions to Chaum ’ s Blind Signature Scheme and OpenCoin Requirements (2008) (2)
- Management through pregnancy of a patient with an implantable programmable insulin infusion pump (1994) (2)
- Cryptography and coding : 9th IMA International Conference, Cirencester, UK, December 16-18, 2003 : proceedings (2003) (2)
- Fast Sofware Encryption - FSE 2013 (2014) (2)
- Practical (Post-Quantum) Key Combiners from One-Wayness and Applications to TLS (2022) (2)
- Diabetes—A Model for Health Care Management by W. Laing and R. Williams (1990) (2)
- The Security of ChaCha20-Poly1305 in the Multi-User Setting (2021) (1)
- 09311 Abstracts Collection - Classical and Quantum Information Assurance Foundations and Practice (2009) (1)
- Cryptography and Coding (2003) (1)
- Topics in Cryptology – CT-RSA 2012 (2012) (1)
- Health economic aspects of treating cardiovascular disease in diabetes (2012) (1)
- Scottish collaboration to integrate medicine therapy between out-patient and in-patient sectors (2015) (1)
- Insulin Pump Therapy: Indication, Method, Technology (1991) (1)
- Statistical attacks on cookie masking for RC4 (2018) (1)
- Seasonal weight variation in people with diabetes - fact or fiction? (1997) (1)
- Convertible Undeniable Standard RSA Signatures (2000) (1)
- Towards a European harmonization of health technology assessment recommendations executive paper of European regulatory conference focused on the EU commission proposal to harmonize HTA (2022) (1)
- Promoting science over serendipity in prescribing anti-TNF therapy. (2009) (1)
- Scotland v England deal on prescribed drugs (2006) (1)
- The safety and tolerability of the β2‐agonist salbutamol in an event monitoring study of an oral controlled release formulation (‘Volmax’) (1993) (1)
- Leakage Perturbation is Not Enough: Breaking Structured Encryption Using Simulated Annealing (2021) (1)
- Scottish Medicines Consortium (2007) (1)
- Scottish collaboration to integrate medicine therapy between out-patient and in-patient sectors (2015) (1)
- Alternative Security Architectures for e-Science∗ (2006) (1)
- A Practical Attack Against the HIVE Hidden Volume Encryption System (2014) (1)
- Implanted Insulin Infusion Pumps: the Eagle has Yet to Land (1990) (1)
- New binary sequence sets with favourable correlations (1997) (1)
- Zero/positive capacities of two-dimensional runlength constrained arrays (2001) (1)
- Living With Depression: Resisting Labels and Constructing Pathways to Empowerment. (2009) (1)
- Attack on some multi-party key agreement protocols (2006) (0)
- Discussion: Perspective of an HTA Appraisal Committee Chair (2017) (0)
- Can a health professional represent patient views: HTA response (2011) (0)
- PP154—Personalising Health Care: Feasibility and Future Implications for All Stakeholder Groups Including Authorities, Physicians and Patients (2013) (0)
- Building a Community of Real-World Cryptographers (2016) (0)
- How this works effectively in practice (2018) (0)
- Insulin--adverse reactions and clinical problems. (1996) (0)
- Implications of a district scheme to provide plastic insulin syringes to diabetics. (1986) (0)
- Hyperglycaemia and Hypoglycaemia (1990) (0)
- Non-insulin-dependent diabetes in the nineties (1990) (0)
- A century of insulin: from lifesaving discovery to a journey of scientific evolution! (2021) (0)
- High Speed Design of FPGA based Golay Encoder and Decoder (2017) (0)
- Identity crisis: on the problem of namespace design for ID-PKC and MANETs (2010) (0)
- Hyperosmolar non-ketotic diabetic decompensation. (1990) (0)
- GERHARD KRAMER, Publications Editor ADRIAAN J. VAN WIJNGAARDEN, Publications Editor (2005) (0)
- TREATMENT OF SUBCUTANEOUS INSULIN RESISTANCE WITH IMPLANTED INSULIN INFUSION PUMPS (2008) (0)
- Points: Predictive value of rectal bleeding in screening for rectal and sigmoid polyps (1985) (0)
- NewHope Round 2 Cover Sheet (2019) (0)
- Applications of Exponential Sums in Communications Theory (Invited Paper) (1999) (0)
- POPULATION SCREENING FOR DIABETES. AUTHOR'S REPLY (1994) (0)
- Management of Intercurrent Illness (1990) (0)
- Selected Areas in Cryptography – SAC 2019: 26th International Conference, Waterloo, ON, Canada, August 12–16, 2019, Revised Selected Papers (2020) (0)
- de Bruijn Sequences , and Linear Complexity (1996) (0)
- libInterMAC: Beyond Confidentiality and Integrity in Practice (2019) (0)
- Experience oftemporary cardiac pacing inadistrict general hospital (1983) (0)
- Rapid Health Technology Assessment Of New Medicines: Lessons From 15 Years Experience In Scotland. (2016) (0)
- Time-Specific Encryption and Its Applications (2010) (0)
- Differential Detection of MSK in a Dispersive Channel and Correlated Noise (1999) (0)
- A reply: Ethics and Pharmaceutical Medicine (2006) (0)
- European postmarketing surveillance of ramipril in hypertension (1995) (0)
- The Authors Reply Below (1990) (0)
- Emergency medical care: updated experience in a district hospital medical unit. (1983) (0)
- A comment on "A new public-key cipher system based upon the Diophantine equations" (1997) (0)
- Session details: Session 5B: Secure Computation 2 (2018) (0)
- Preliminary Report on Chaum’s Online E-Cash Architecture (2008) (0)
- Chapter 12 Health economic aspects of treating cardiovascular disease in diabetes (2006) (0)
- Existence of Good Codes with Low Peak-to-Average Power Ratios for Multicarrier Communications (2002) (0)
- On the Cryptographic Fragility of the Telegram Ecosystem (2022) (0)
- Ethics, data and the pharmaceutical physician. Author's reply (2006) (0)
- Technical perspective: On heartbleed: a hard beginnyng makth a good endyng (2018) (0)
- [Treatment of resistance to subcutaneous insulin with implanted insulin infusion pumps]. (1988) (0)
- Proceedings of the 2nd international conference on Pairing-Based Cryptography (2008) (0)
- Parkinsonian Tremor and Waldenstrom's Macroglobulinaemia (1990) (0)
- Diabetes information in cardiovascular trials published in general medical journals (2007) (0)
- Views sought on Health and Social Care partnership Strategic Plan (2015) (0)
- Monitoring the introduction of new drugs (2008) (0)
- Arrangement and method for transmitting data over a plurality of channels (1997) (0)
- Access Through Partnership A Stakeholder Dialogue (2012) (0)
- Monitoring the introduction of new drugs: Methods focusing on safety, costs, and appropriate use (2008) (0)
- from genetics through payment to improving care (2013) (0)
- Deniable authenticated Key establishment for Internet protocols. Commentary. Authors' reply (2005) (0)
This paper list is powered by the following services:
Other Resources About Kenny Paterson
What Schools Are Affiliated With Kenny Paterson?
Kenny Paterson is affiliated with the following schools: