<< 2012-3 >>
Cryptography Group
 

Publications for the Cryptography Group

The following are the research outputs of the security group, for people who have left the group we present work which was carried out whilst they were in Bristol. For others its the work published while they were here.

    2013

    2012

  1. Thorsten Kleinjung, Arjen Lenstra, Daniel Page, Nigel P Smart.
    Using the cloud to determine key strengths.
    Progress in Cryptology - INDOCRYPT 2012, Lecture Notes in Computer Science 7668, pp. 17-39, 2012.
  2. Luke T Mather, M E Oswald.
    Pinpointing Side-Channel Information Leaks in Web Applications.
    Journal of Cryptographic Engineering, Vol. 2, pp. 161--177, 2012.
  3. W Rukpakavong, I Phillips, L Guan, G Oikonomou.
    RPL Router Discovery for Supporting Energy-Efficient Transmission in Single-hop 6LoWPAN.
    Energy Efficiency in Wireless Networks & Wireless Networks for Energy Efficiency - E2NETS 2012, IEEE -, pp. 7264-7268, 2012.
  4. T. A. Butt, I. Phillips, L. Guan, G Oikonomou.
    TRENDY: An Adaptive and Context-Aware Service Discovery Protocol for 6LoWPANs.
    Web of Things - WOT 2012, ACM -, pp. 1-6, 2012.
  5. V Michopoulos, L Guan, G Oikonomou, I Phillips.
    DCCC6: Duty Cycle-Aware Congestion Control for 6LoWPAN Networks.
    Sensor Networks and Systems for Pervasive Computing - PERSENS 2012, IEEE -, pp. 272-277, 2012.
  6. G Oikonomou, I Phillips.
    Stateless Multicast Forwarding with RPL in 6LowPAN Sensor Networks.
    Sensor Networks and Systems for Pervasive Computing - PERSENS 2012, IEEE -, pp. 278-283, 2012.
  7. Dario Fiore, Rosario Gennaro, Nigel Smart.
    Relations between the security models for certificateless encryption and ID-based key agreement.
    International Journal of Information Security, Vol. 11, pp. 1--22, 2012.
  8. Patrick Koeberl, Jiangtao Li, Roel Maes, Anand Rajan, Claire Vishik, Marcin Wojcik, Wei Wu.
    A practical device authentication scheme using SRAM PUFs.
    Journal of Cryptographic Engineering, Vol. 2, pp. 255--269, 2012.
  9. Emre Uzun, Vijayalakshmi Atluri, Shamik Sural, Jaideep Vaidya, Gennaro Parlato, Anna-Lisa Ferrara, Madhusudan P..
    Analyzing Temporal Role Based Access Control Models.
    Symposium on Access Control Models and Technologies - SACMAT 2012, ACM, pp. 177-186, 2012.
  10. Craig Gentry, Shai Halevi, Nigel P. Smart.
    Better Bootstrapping in Fully Homomorphic Encryption.
    Public Key Cryptography - PKC 2012, Lecture Notes in Computer Science 7293, pp. 1-16, 2012.
  11. Ashish Choudhary, Arpita Patra.
    Brief Announcement: Efficient Optimally Resilient Statistical AVSS and its Applications.
    ACM Symposium on Principles of Distributed Computing - PODC 2012, ACM Press / Sheridan, pp. 103-104, 2012.
  12. Ashish Choudhary.
    Brief Announcement: Optimal Amortized Secret Sharing with Cheater Identification.
    ACM Symposium on Principles of Distributed Computing - PODC 2012, ACM Press / Sheridan -, pp. 101-102, 2012.
  13. Dimitar Jetchev, Onur Özen, Martijn Stam.
    Collisions Are Not Incidental: A Compression Function Exploiting Discrete Geometry.
    Theory of Cryptography - TCC 2012, Lecture Notes in Computer Science 7194, pp. 303-320, 2012.
  14. Andrew D Moss, Elisabeth Oswald, Daniel Page, Mike Tunstall.
    Compiler assisted masking.
    Cryptographic Hardware and Embedded Systems - CHES, Lecture Notes in Computer Science 7428, pp. 58-75, 2012.
  15. A Fragkiadakis, E Tragos, T Tryfonas, I Askoxylakis.
    Design and Performance Evaluation of a Lightweight Wireless Early Warning Intrusion Detection Prototype.
    EURASIP Journal on Wireless Communications and Networking, Vol. 2012:73, pp. 1--18, 2012.
  16. Johann Groszschaedl, Daniel Page, Stefan Tillich.
    Efficient Java implementation of elliptic curve cryptography for J2ME-enabled mobile devices.
    Workshop in Information Security Theory and Practice - WISTP 2012, Lecture Notes in Computer Science 7322, pp. 189--207, 2012.
  17. Dario Catalano, Dario Fiore, Bogdan Warinschi.
    Efficient Network Coding Signatures in the Standard Model.
    Public Key Cryptography - PKC 2012, Lecture Notes in Computer Science 7293, pp. 680-696, 2012.
  18. Marcel Keller, Gert Læssøe Mikkelsen, Andy Rupp.
    Efficient Threshold Zero-Knowledge with Applications to User-Centric Protocols.
    Information Theoretic Security - ICITS 2012, Lecture Notes in Computer Science 7412, pp. 147-166, 2012.
  19. Essam Ghadafi, Nigel P. Smart.
    Efficient Two-Move Blind Signatures in the Common Reference String Model.
    Information Security - ISC 2012, Lecture Notes in Computer Science 7483, pp. 274-289, 2012.
  20. Nadia El Mrabet , Daniel Page, Frederik R G Vercauteren.
    Fault attacks on pairing based cryptography: a state of the art.
    Fault Analysis in Cryptography, Springer, pp. 221-236, 2012.
  21. Panos Andriotis, George Oikonomou, Theo Tryfonas.
    Forensic Analysis of Wireless Networking Evidence of Android Smartphones.
    Workshop on Information Forensics and Security - WIFS 2012, IEEE, pp. 109-114, 2012.
  22. Craig Gentry, Shai Halevi, Nigel P. Smart.
    Fully Homomorphic Encryption with Polylog Overhead.
    Advances in Cryptology - EUROCRYPT 2012, Lecture Notes in Computer Science 7237, pp. 465-482, 2012.
  23. Kimmo Järvinen, Celine Blondeau, Daniel Page, Mike Tunstall.
    Harnessing biased faults in attacks on ECC-based signature schemes.
    Fault Diagnosis and Tolerance in Cryptography - FDTC, IEEE, pp. 72-82, 2012.
  24. Craig Gentry, Shai Halevi, Nigel P. Smart.
    Homomorphic Evaluation of the AES Circuit.
    Advances in Cryptology - CRYPTO 2012, Lecture Notes in Computer Science 7417, pp. 850-867, 2012.
  25. Ivan Damgård, Marcel Keller, Enrique Larraia, Christian Miles, Nigel P. Smart.
    Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocol.
    Security and Cryptography for Networks - SCN 2012, Lecture Notes in Computer Science 7485, pp. 241-263, 2012.
  26. Mike Tunstall.
    Improved {"}Partial Sums{"}-based Square Attack on AES.
    International Conference on Security and Cryptography - SECRYPT 2012, INSTICC Press, pp. 25-34, 2012.
  27. Emmanuela A Orsini, Chiara Marcolla, Massimiliano Sala.
    Improved decoding of affine-variety codes.
    Journal of Pure and Applied Algebra, Vol. 216, pp. 1533, 2012.
  28. Gierlichs Benedikt, Jorn-Marc Schmidt, Mike Tunstall.
    Infective Computation and Dummy Rounds: Fault Protection for Block Ciphers without Check-before-Output.
    LATINCRYPT 2012, Lecture Notes in Computer Science 7533, pp. 305-321, 2012.
  29. Gaven Watson, Reihaneh Safavi-Naini, Mohsen Alimomeni, Michael Locasto, Shivaramakrishnan Narayan.
    LoSt: Location Based Storage.
    Cloud Computing Security Workshop - CCSW 2012, ACM -, pp. 59-70, 2012.
  30. David Bernhard, Bogdan Warinschi, Véronique Cortier, Olivier Pereira.
    Measuring Vote Privacy, Revisited.
    Proceedings of the 2012 ACM conference on Computer and communications security, ACM Press / Sheridan, pp. 941--952, 2012.
  31. Ivan Damgård, Valerio Pastro, Nigel P. Smart, Sarah Zakarias.
    Multiparty Computation from Somewhat Homomorphic Encryption.
    Advances in Cryptology - CRYPTO 2012, Lecture Notes in Computer Science 7417, pp. 643-662, 2012.
  32. Jake Loftus, Alexander May, Nigel P. Smart, Frederik Vercauteren.
    On CCA-Secure Somewhat Homomorphic Encryption.
    Selected Areas in Cryptography - SAC 2011, Lecture Notes in Computer Science 7118, pp. 55-72, 2012.
  33. Robert Beat, Philipp Grabher, Daniel Page, Stefan Tillich, Marcin Wojcik.
    On reconfigurable fabrics and generic side-channel countermeasures.
    Field Programmable Logic - FPL, IEEE, pp. 663--66, 2012.
  34. Jean Paul Degabriele, Anja Lehmann, Kenneth G. Paterson, Nigel P. Smart, Mario Strefler.
    On the Joint Security of Encryption and Signature in EMV.
    Topics in Cryptology - CT-RSA 2012, Lecture Notes in Computer Science 7178, pp. 116-135, 2012.
  35. Ashwinkumar Badanidiyuru, Arpita Patra, Ashish Choudhary, Srinathan Kannan, Pandu Rangan Chandrasekaran.
    On the Trade-Off between Network Connectivity, Round Complexity, and Communication Complexity of Reliable Message Transmission.
    Journal of the ACM, Vol. 22, pp. 1--35, 2012.
  36. Sébastien Canard, Georg Fuchsbauer, Aline Gouget, Fabien Laguillaumie.
    Plaintext-Checkable Encryption.
    Topics in Cryptology - CT-RSA 2012, Lecture Notes in Computer Science 7178, pp. 332-348, 2012.
  37. Billy Brumley, Manuel B M Barbosa, Daniel Page, Frederik R G Vercauteren.
    Practical realisation and elimination of an ECC-related software bug attack.
    Topics in Cryptology - CT-RSA 2012, Lecture Notes in Computer Science 7178, pp. 171-186, 2012.
  38. Giuseppe Ateniese, Alfredo De Santis , Anna-Lisa Ferrara, Barbara Masucci.
    Provably-Secure Time-Bound Hierarchical Key Assignment Schemes.
    Journal of Cryptology, Vol. 25, pp. 243--270, 2012.
  39. Bogdan Groza, Bogdan Warinschi.
    Revisiting Difficulty Notions for Client Puzzles and DoS Resilience.
    Information Security Conference - ISC 2012, Lecture Notes in Computer Science 7483, pp. 39-54, 2012.
  40. Craig Gentry, Shai Halevi, Chris Peikert, Nigel P. Smart.
    Ring Switching in BGV-Style Homomorphic Encryption.
    Security and Cryptography for Networks - SCN 2012, Lecture Notes in Computer Science 7485, pp. 19-37, 2012.
  41. Boldyreva Alexandra, Palacio Adriana, B Warinschi.
    Secure Proxy Signatures Schemes for Delegation of Signing Rights.
    Journal of Cryptology, Vol. 25, pp. 57--115, 2012.
  42. Anna-Lisa Ferrara, Gennaro Parlato, Madhusudan P..
    Security Analysis of Role-Based Access Control through Program Verification.
    Computer Security Foundations Symposium - CSF 2012, IEEE Computer Society, pp. 113-125, 2012.
  43. Alexandra Boldyreva, Jean Paul Degabriele, Kenneth G. Paterson, Martijn Stam.
    Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation.
    Advances in Cryptology - EUROCRYPT 2012, Lecture Notes in Computer Science 7237, pp. 682-699, 2012.
  44. Dimitar Jetchev, Onur Özen, Martijn Stam.
    Understanding Adaptivity: Random Systems Revisited.
    Advances in Cryptology - ASIACRYPT 2012, Lecture Notes in Computer Science 7658, pp. 313-330, 2012.
  45. 2011

  46. S Tillich, Kirschbaum Mario, Szekely Alexander.
    Implementation and Evaluation of an SCA-Resistant Embedded Processor.
    Smart Card Research and Advanced Applications - CARDIS 2011, Lecture Notes in Computer Science 7079, pp. 151 - 165, 2011.
  47. Véronique Cortier, Bogdan Warinschi.
    A Composable Computational Soundness Notion.
    Conference on Computer and Communications Security - CCS 2011, ACM -, pp. 63-74, 2011.
  48. Carolyn A Whitnall, ME Oswald.
    A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework.
    Advances in Cryptology - CRYPTO 2011, Lecture Notes in Computer Science 6841, pp. 316-334, 2011.
  49. C A Whitnall, ME Oswald.
    A Fair Evaluation Framework for Comparing Side-Channel Distinguishers.
    Journal of Cryptographic Engineering, Vol. 1, pp. 145 -- 160, 2011.
  50. I Askoxylakis, T Tryfonas, JHR May, V Siris, A Traganitis.
    A Family of Key Agreement Mechanisms for Mission Critical Communications for Secure Mobile Ad Hoc and Wireless Mesh Internetworking.
    EURASIP Journal on Wireless Communications and Networking, Vol. 2011, pp. 1--17, 2011.
  51. Veronique Cortier, Steve Kremer, Bogdan Warinschi.
    A Survey of Symbolic Methods in Computational Analysis of Cryptographic Systems.
    Journal of Automated Reasoning, Vol. 46, pp. 225--259, 2011.
  52. Tobias Vejda, Johann Groszschaedl, Daniel Page.
    A unified multiply/accumulate unit for pairing-based cryptography over prime, binary and ternary fields.
    Digital System Design, Architectures, Methods and Tools - DSD 2011, IEEE, pp. 658-666, 2011.
  53. Olivier Blazy, Sébastien Canard, Georg Fuchsbauer, Aline Gouget, Hervé Sibert, Jacques Traoré.
    Achieving Optimal Anonymity in Transferable E-Cash with a Judge.
    Progress in Cryptology - AFRICACRYPT 2011, Lecture Notes in Computer Science 6737, pp. 206-223, 2011.
  54. David Bernhard, Véronique Cortier, Olivier Pereira, Ben Smyth, Bogdan Warinschi.
    Adapting Helios for Provable Ballot Privacy.
    European Symposium on Research in Computer Security - ESORICS 2011, Lecture Notes in Computer Science 6879, pp. 335-354, 2011.
  55. Dario Catalano, Dario Fiore, Bogdan Warinschi.
    Adaptive Pseudo-free Groups And Applications.
    Advances in Cryptology - EUROCRYPT 2011, Lecture Notes in Computer Science 6632, pp. 207-223, 2011.
  56. S. Mangard, ME Oswald, F.-X. Standaert.
    All for one-one for all: Unifying univariate DPA attacks.
    IET Information Security, Vol. 5(2), pp. 100 -- 110, 2011.
  57. Carolyn Whitnall, Elisabeth Oswald, Luke Mather.
    An Exploration of the Kolmogorov-Smirnov Test as a Competitor to Mutual Information Analysis.
    Smart Card Research and Advanced Applications - CARDIS 2011, Lecture Notes in Computer Science 7079, pp. 234-251, 2011.
  58. Simon Hoerder, Marcin Wojcik, Stefan Tillich, Daniel Page.
    An evaluation of hash functions on a power analysis resistant processor architecture.
    Workshop in Information Security Theory and Practice - WISTP 2011, Lecture Notes in Computer Science 6633, pp. 160-174, 2011.
  59. Philipp Grabher, Johann Groszschaedl, Simon Hoerder, Kimmo Järvinen, Daniel Page, Stefan Tillich, Marcin Wojcik.
    An exploration of mechanisms for dynamic cryptographic instruction set extension.
    Journal of Cryptographic Engineering, Vol. 2, pp. 1--18, 2011.
  60. Philipp Grabher, Johann Groszschaedl, Simon Hoerder, Kimmo Järvinen, Daniel Page, Stefan Tillich, Marcin Wojcik.
    An exploration of mechanisms for dynamic cryptographic instruction set extension.
    Cryptographic Hardware and Embedded Systems - CHES 2011, Lecture Notes in Computer Science 6917, pp. 1-16, 2011.
  61. Stephen C. Williams.
    Analysis of the SSH Key Exchange Protocol.
    Coding and Cryptography - IMACC2011, Lecture Notes in Computer Science 7089, pp. 356-374, 2011.
  62. Billy Brumley, Daniel Page.
    Bit-sliced binary normal basis multiplication.
    Computer Arithmetic - ARITH 2011, IEEE, pp. 205-212, 2011.
  63. A Amarilli, S Muller, D Naccache, Daniel Page, P Rauzy, Mike Tunstall.
    Can code polymorphism limit information leakage?.
    Workshop in Information Security Theory and Practice - WISTP 2011, Lecture Notes in Computer Science 6633, pp. 1-21, 2011.
  64. Georg Fuchsbauer.
    Commuting Signatures and Verifiable Encryption.
    Advances in Cryptology - EUROCRYPT 2011, Lecture Notes in Computer Science 6632, pp. 224-245, 2011.
  65. Christina Brzuska, Marc Fischlin, Bogdan Warinschi, Stephen C. Williams.
    Composability of Bellare-Rogaway Key Exchange Protocols.
    Conference on Computer and Communications Security - CCS 2011, ACM -, pp. 51-62, 2011.
  66. Veronique Cortier, Steve Kremer, Emmanuel Bresson, Yassine Lacknech, Laurent Mazare, Bogdan Warinschi.
    Computationally Sound Analysis of Encrypting with Diffie Hellman Keys.
    Formal Models and Techniques for Analyzing Security Protocols, IOS Press, pp. 277-303, 2011.
  67. Patrick Koeberl, Jiangtao Li, Anand Rajan, Claire Vishik, Marcin Wojcik.
    Consumerization: Consequences of Fuzzy Work-Home Boundaries.
    ISSE 2011 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2011 Conference, Vieweg+Teubner, pp. 138-153, 2011.
  68. Mike Tunstall, Debdeep Mukhopadhyay, Subidh Ali.
    Differential Fault Analysis of the Advanced Encryption Standard using a Single Fault.
    Workshop in Information Security Theory and Practice - WISTP 2011, Lecture Notes in Computer Science 6633, pp. 224-233, 2011.
  69. Joppe W. Bos, Onur Özen, Martijn Stam.
    Efficient Hashing Using the AES Instruction Set.
    Cryptographic Hardware and Embedded Systems - CHES 2011, Lecture Notes in Computer Science 6917, pp. 507-522, 2011.
  70. Patrick Koeberl, Jiangtao Li, Roel Maes, Anand Rajan, Claire Vishik, Marcin Wójcik.
    Evaluation of a PUF Device Authentication Scheme on a Discrete 0.13um SRAM.
    Trusted Systems - INTRUST 2011, Lecture Notes in Computer Science 7222, pp. 271-288, 2011.
  71. Peter Scholl, Nigel P. Smart.
    Improved Key Generation for Gentry's Fully Homomorphic Encryption Scheme.
    Cryptography and Coding - IMACC 2011, Lecture Notes in Computer Science 7089, pp. 10-22, 2011.
  72. Gallais Jean-François, Kizhvatov Ilya, Mike Tunstall.
    Improved Trace-Driven Cache-Collision Attacks Against Embedded AES Implementations.
    Workshop on Information Security Applications - WISA 2011, Lecture Notes in Computer Science 6513, pp. 243-257, 2011.
  73. A Zaharis, A Martini, T Tryfonas, C Ilioudis, G Pangalos.
    Lightweight Steganalysis based on Image Reconstruction & Lead Digit Distribution Analysis.
    International Journal of Digital Crime and Forensics, Vol. 3, pp. 29 -- 41, 2011.
  74. Jooyoung Lee, Martijn Stam.
    MJH: A Faster Alternative to MDC-2.
    Topics in Cryptology – CT-RSA 2011, Lecture Notes in Computer Science 6558, pp. 213-236, 2011.
  75. Ashish Choudhary, Arpita Patra.
    On the Communication Complexity of Reliable and Secure Message Transmission in Asynchronous Networks.
    Information Security and Cryptology - ICISC 2011, Lecture Notes in Computer Science 7259, pp. 450, 2011.
  76. Kenneth G. Paterson, Jacob C. N. Schuldt, Martijn Stam, Susan Thomson.
    On the Joint Security of Encryption and Signature, Revisited.
    Advances in Cryptology - ASIACRYPT 2011, Lecture Notes in Computer Science 7073, pp. 161-178, 2011.
  77. Mike Tunstall.
    Practical Complexity Differential Cryptanalysis and Fault Analysis of AES.
    Journal of Cryptographic Engineering, Vol. 1, pp. 219--230, 2011.
  78. A Zaharis, A Martini, T Tryfonas, C Ilioudis, G Pangalos.
    Reconstructive Steganalysis by Source Bytes Lead Digit Distribution Examination.
    Digital Forensics and Incident Analysis - WDFIA 2011, Lulu.com -, pp. 55 - 68, 2011.
  79. Jake Loftus, Nigel P. Smart.
    Secure Outsourced Computation.
    Progress in Cryptology - AFRICACRYPT 2011, Lecture Notes in Computer Science 6737, pp. 1-20, 2011.
  80. Steve Kremer, Graham Steel, Bogdan Warinschi.
    Security for Key Management Interfaces.
    Computer Security Foundations Symposium - CSF 2011, IEEE Computer Society -, pp. 266-280, 2011.
  81. Liqun Chen, Ming-Feng Lee, Bogdan Warinschi.
    Security of the Enhanced TCG Privacy-CA Solution.
    Trustworthy Global Computing - TGC 2011, Lecture Notes in Computer Science 7173, pp. 121-141, 2011.
  82. Roberto Maria Avanzi, Simon Hoerder, Daniel Page, Mike Tunstall.
    Side-Channel attacks on the McEliece and Niederreiter public-key cryptosystems.
    Journal of Cryptographic Engineering, Vol. 1, pp. 271--281, 2011.
  83. Olivier Blazy, Georg Fuchsbauer, David Pointcheval, Damien Vergnaud.
    Signatures on Randomizable Ciphertexts.
    Public Key Cryptography - PKC 2011, Lecture Notes in Computer Science 6571, pp. 403-422, 2011.
  84. Joojoung Lee, Martijn Stam, John Steinberger.
    The Collision Security of Tandem-DM in the Ideal Cipher Model.
    Advances in Cryptology - CRYPTO 2011, Lecture Notes in Computer Science 6841, pp. 561-557, 2011.
  85. Frederik Armknecht, Ewan Fleischmann, Matthias Krause, Jooyoung Lee, Martijn Stam, John P. Steinberger.
    The Preimage Security of Double-Block-Length Compression Functions.
    Advances in Cryptology - ASIACRYPT 2011, Lecture Notes in Computer Science 7073, pp. 233-251, 2011.
  86. Elena Andreeva, Martijn Stam.
    The Symbiosis between Collision and Preimage Resistance.
    Coding an Cryptography - IMACC 2011, Lecture Notes in Computer Science 7089, pp. 152-171, 2011.
  87. Manuel B M Barbosa, Andrew D Moss, Daniel Page, N. Rodrigues, P.F. Silva.
    Type checking cryptography implementations.
    Fundamentals of Software Engineering - FSEN 2011, Lecture Notes in Computer Science 7141, pp. 316-334, 2011.
  88. Mike Tunstall, Neil Hanley, William Marnane.
    Using Templates to Distinguish Multiplications from Squaring Operations.
    International Journal of Information Security, Vol. 10, pp. 255--266, 2011.
  89. Michel Abdalla, James Birkett, Dario Catalano, Alexander Dent, John Malone-Lee, Gregory Neven, Jacob Schuldt, Nigel Smart.
    Wildcarded Identity-Based Encryption.
    Journal of Cryptology, Vol. 24, pp. 42--82, 2011.
  90. 2010

  91. I Askoxylakis, T Tryfonas, JHR May, A Traganitis.
    A dynamic key agreement mechanism for mission critical mobile ad hoc networking.
    Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Springer 45, pp. 216-228, 2010.
  92. R Evans, A Tsohou, T Tryfonas, T Morgan.
    Architecting Secure Systems with the ISO standards 26702 and 27001.
    System of Systems Engineering - IEEE SoSE 2010, IEEE, pp. 1-6, 2010.
  93. Andrew Moss, Daniel Page.
    Bridging the gap between symbolic and efficient AES implementations.
    Partial Evaluation and Program Manipulation - PEPM 2010, ACM, pp. 101-110, 2010.
  94. Jörn-Marc Schmidt, Michael Tunstall, Roberto Maria Avanzi, Ilya Kizhvatov, Timo Kasper, David Oswald.
    Combined Implementation Attack Resistant Exponentiation.
    Latincrypt 2010, Lecture Notes in Computer Science 6212, pp. 305-322, 2010.
  95. Dario Fiore, Rosario Gennaro, Nigel Smart.
    Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement.
    Pairing-Based Cryptography - Pairing 2010, Lecture Notes in Computer Science 6487, pp. 167-186, 2010.
  96. Michael Tunstall, Marc Joye.
    Coordinate Blinding over Large Prime Fields.
    Cryptographic Hardware and Embedded Systems - CHES 2010, Lecture Notes in Computer Science 6225, pp. 443-455, 2010.
  97. Elisabeth Oswald, Stefan Mangard.
    Counteracting Power Analysis Attacks by Masking.
    Secure Integrated Circuits and Systems, Springer, pp. 159-178, 2010.
  98. Nigel Smart.
    Errors Matter: Breaking RSA-Based PIN Encryption with Thirty Ciphertext Validity Queries.
    Topics in Cryptology - CT-RSA 2010, Lecture Notes in Computer Science 5985, pp. 15-25, 2010.
  99. Nigel Smart, Fre Vercauteren.
    Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes.
    Public Key Cryptography - PKC 2010, Lecture Notes in Computer Science 6056, pp. 420-443, 2010.
  100. Patrik Bichsel, Jan Camenisch, Gregory Neven, Nigel Smart, Bogdan Warinschi.
    Get Shorty via Group Signatures without Encryption.
    Security and Cryptography for Networks - SCN 2010, Lecture Notes in Computer Science 6280, pp. 381-398, 2010.
  101. Essam Ghadafi, Nigel Smart, Bogdan Warinschi.
    Groth–Sahai Proofs Revisited.
    Public Key Cryptography - PKC 2010, Lecture Notes in Computer Science 6056, pp. 177-192, 2010.
  102. Mathieu Baudet, Bogdan Warinschi, Martín Abadi.
    Guessing Attacks and the Computational Soundness of Static Equivalence.
    Journal of Computer Security, Vol. 18, pp. 909--968, 2010.
  103. Stefan Tillich, Martin Feldhofer, Mario Kirschbaum, Thomas Plos, Jörn-Marc Schmidt, Alexander Szekely.
    Hardware Implementations of the Round-Two SHA-3 Candidates: Comparison on a Common Ground.
    Proceedings of Austrochip 2010, Fachhochschule Kärnten -, pp. 43 - 48, 2010.
  104. Jean-François Gallais, Johann Großschädl, Neil Hanley, Markus Kasper, Marcel Medwed, Francesco Regazzoni, Jörn-Marc Schmidt, Stefan Tillich, Marcin Wojcik.
    Hardware Trojans for Inducing or Amplifying Side-Channel Leakage of Cryptographic Software.
    Trusted Systems - INTRUST 2010, Lecture Notes in Computer Science 6802, pp. 253 - 270, 2010.
  105. Christophe Giraud, Eric W. Knudsen, Michael Tunstall.
    Improved Fault Analysis of Signature Schemes.
    Smart Card Research and Advanced Application - CARDIS 2010, Lecture Notes in Computer Science 6035, pp. 164-181, 2010.
  106. T Tryfonas.
    Information Security Management and Standards of Best Practice.
    Handbook of Electronic Security and Digital Forensics, World Scientific -, pp. 207 - 236, 2010.
  107. Francois-Xavier Standaert, Olivier Pereira, Yu Yu, Jean-Jacques Quisquater, Moti Yung, Elisabeth Oswald.
    Leakage Resilient Cryptography in Practice.
    Towards Hardware-Intrinsic Security, Springer, pp. 105-139, 2010.
  108. Onur Aciicmez, Billy Bob Brumley, Philipp Grabher.
    New Results on Instruction Cache Attacks.
    Cryptographic Hardware and Embedded Systems - CHES 2010, Lecture Notes in Computer Science 6225, pp. 110-124, 2010.
  109. Dennis Hofheinz, John Malone-Lee, Martijn Stam.
    Obfuscation for Cryptographic Purposes.
    Journal of Cryptology, Vol. 23, pp. 121--168, 2010.
  110. Liqun Chen, Daniel Page, Nigel Smart.
    On the design and implementation of an efficient DAA scheme.
    Smart Card Research and Advanced Application Conference - CARDIS 2010, Lecture Notes in Computer Science 6035, pp. 223-237, 2010.
  111. Gilles Barthe, Alejandro Hevia, Zhengqin Luo, Tamara Rezk, Bogdan Warinschi.
    Robustness Guarantees for Anonymity.
    IEEE Computer Security Foundations Symposium - CSF 2010, IEEE Computer Society -, pp. 91-106, 2010.
  112. Stefan Tillich, Mario Kirschbaum, Alexander Szekely.
    SCA-Resistant Embedded Processors - The Next Generation.
    Computer Security Applications Conference - ACSAC 2010, ACM -, pp. 211-220, 2010.
  113. Liqun Chen, Bogdan Warinschi.
    Security of the TCG Privacy-CA Solution.
    Embedded and Ubiquitous Computing - EUC 2010, IEEE Computer Society -, pp. 609-616, 2010.
  114. Konstantinos Markantonakis, Keith Mayes, Damien Sauveron, Michael Tunstall.
    Smart Cards.
    Handbook of Technology Management, Wiley 2, pp. 248-264, 2010.
  115. Ming-Feng Lee, Nigel Smart, Bogdan Warinschi.
    The Fiat–Shamir Transform for Group and Ring Signature Schemes.
    Security and Cryptography for Networks - SCN 2010, Lecture Notes in Computer Science 6280, pp. 363-380, 2010.
  116. Paul Morrissey, Nigel Smart, Bogdan Warinschi.
    The TLS Handshake Protocol: A Modular Analysis.
    Journal of Cryptology, Vol. 23, pp. 187--223, 2010.
  117. Standaert François-Xavier, Veyrat-Charvillon Nicolas, Elisabeth Oswald, Gierlichs Benedikt, Medwed Marcel, Kasper Markus, Mangard Stefan.
    The World Is Not Enough: Another Look on Second-Order DPA.
    Advances in Cryptology - ASIACRYPT 2010, Lecture Notes in Computer Science 6477, pp. 112-129, 2010.
  118. Stefan Tillich, Martin Feldhofer, Mario Kirschbaum, Thomas Plos, Jörn-Marc Schmidt, Alexander Szekely.
    Uniform Evaluation of Hardware Implementations of the Round-Two SHA-3 Candidates.
    The Second SHA-3 Candidate Conference, NIST -, pp. -, 2010.
  119. E. Bangerter, M. Barbosa, D.J. Bernstein, I. Damgard, Daniel Page, J.I. Pagter, A.-R. Sadeghi, S. Sovio.
    Using compilers to enhance cryptographic product development.
    Information Security Solutions Europe - ISSE 2010, Vieweg+Teubner, pp. 291-301, 2010.
  120. 2009

  121. IG Askoxylakis, K Markantonakis, T Tryfonas, John H R May, A Traganitis.
    A face centered cubic key agreement mechanism for mobile ad hoc networks.
    Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Springer 13, pp. 103 - 113, 2009.
  122. P Davies, T Tryfonas.
    A lightweight web-based vulnerability scanner for small-scale computer network security assessment.
    Journal of Network and Computer Applications, Vol. 32, pp. 78 -- 95, 2009.
  123. WM To, T Tryfonas, DW Farthing.
    Audit Log Unification and Review with Log Management Information Bases.
    Frontiers in Artificial Intelligence and Applications, IOS Press 187, pp. 180 - 191, 2009.
  124. Pooya Farshim, Bogdan Warinschi.
    Certified Encryption Revisited.
    Progress in Cryptology - AFRICACRYPT 2009, Lecture Notes in Computer Science 5580, pp. 179-197, 2009.
  125. Manuel B M Barbosa, Andrew D Moss, Daniel Page.
    Constructive and destructive use of compilers in elliptic curve cryptography.
    Journal of Cryptology, Vol. 22, pp. 259--281, 2009.
  126. Frederic Amiel, Benoit Feix, Michael Tunstall, Claire Whelan, William P Marnane.
    Distinguishing Multiplications from Squaring Operations.
    Selected Areas in Cryptography – SAC 2008, Lecture Notes in Computer Science 5381, pp. 346-360, 2009.
  127. Martin Geissler, Nigel Smart.
    Distributing the Key Distribution Centre in Sakai–Kasahara Based Systems.
    Coding and Cryptography - IMACC 2009, Lecture Notes in Computer Science 5921, pp. 252-262, 2009.
  128. Christian Lederer, Roland Mader, Manuel Koschuch, Johann Großschädl, Alexander Szekely, Stefan Tillich.
    Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks.
    Information Security Theory and Practices --- WISTP 2009, Lecture Notes in Computer Science 5746, pp. 112-127, 2009.
  129. Marc Joye, Michael Tunstall.
    Exponent recoding and regular exponentiation algorithms.
    Progress in Cryptology - AfricaCrypt 2009, Lecture Notes in Computer Science 5580, pp. 334-349, 2009.
  130. Alexandra Boldyreva, David Cash, Marc Fischlin, Bogdan Warinschi.
    Foundations of Non-Malleable Hash and One-Way Functions.
    Advances in Cryptology - ASIACRYPT 2009, Lecture Notes in Computer Science 5912, pp. 524-541, 2009.
  131. M. Koschuch, Johann Groszschaedl, Daniel Page, Philipp Grabher, M. Hudler, M. Kruger.
    Hardware/software co-design of public-key cryptography for SSL protocol execution in embedded systems.
    Information and Communication Systems - ICICS 2009, Lecture Notes in Computer Science 5927, pp. 63-79, 2009.
  132. Gregory Neven, Nigel Smart, Bogdan Warinschi.
    Hash Function Requirements for Schnorr Signatures.
    Journal of Mathematical Cryptology, Vol. 3(1), pp. 69--87, 2009.
  133. Nigel Smart, Bogdan Warinschi.
    Identity Based Group Signatures from Hierarchical Identity Based Encryption.
    Pairings 2009, Lecture Notes in Computer Science 5671, pp. 150-170, 2009.
  134. T Tryfonas, P Thomas.
    Integrating Competitor Intelligence Capability within the Software Development Lifecycle.
    Security and Protection of Information - SPI 2009, Brno Defence University -, pp. 115 - 127, 2009.
  135. Robert P McEvoy, Colin C. Murphy, William P. Marnane, Michael Tunstall.
    Isolated WDDL: A Hiding Countermeasure for Differential Power Analysis on FPGAs.
    ACM Transactions on Reconfigurable Technology and Systems (TRETS), Vol. 2(1), pp. 1--23, 2009.
  136. Philipp Grabher, Johann Groszschaedl, Daniel Page.
    Non-deterministic processors: FPGA-based analysis of area, performance and security.
    Workshop on Embedded Systems Security - WESS, ACM, pp. -, 2009.
  137. Essam Ghadafi, Nigel Smart, Bogdan Warinschi.
    Practical Zero-Knowledge Proofs for Circuit Evaluation.
    Coding and Cryptography - IMACC 2009, Lecture Notes in Computer Science 5921, pp. 469-494, 2009.
  138. Andrew Moss, Daniel Page.
    Program interpolation.
    Partial Evaluation and Program Manipulation (PEPM), ACM, pp. 31-40, 2009.
  139. Michael Tunstall.
    Random Order m-ary Exponentiation.
    Australasian Conference on Information Security and Privacy – ACISP 2009, Lecture Notes in Computer Science 5594, pp. 437-451, 2009.
  140. Benny Pinkas, Thomas Schneider, Nigel Smart, Stephen Williams.
    Secure Two-Party Computation Is Practical.
    Advances in Cryptology -- ASIACRYPT 2009, Lecture Notes in Computer Science 5912, pp. 250-267, 2009.
  141. Liqun Chen, Paul Morrissey, Nigel Smart, Bogdan Warinschi.
    Security Notions and Generic Constructions for Client Puzzles.
    Advances in Cryptology - Asiacrypt 2009, Lecture Notes in Computer Science 5912, pp. 505-523, 2009.
  142. Laurent Mazaré, Bogdan Warinschi.
    Separating Trace Mapping and Reactive Simulatability Soundness: The Case of Adaptive Corruption.
    ARSPA-WITS, Lecture Notes in Computer Science 5511, pp. 193-210, 2009.
  143. Johann Groszschaedl, Elisabeth Oswald, Daniel Page, Michael Tunstall.
    Side channel analysis of cryptographic software via early-terminating multiplications.
    International Conference on Information Security and Cryptology - ICISC 2009, Lecture Notes in Computer Science 5984, pp. 176-192, 2009.
  144. Konstantinos Markantonakis, Michael Tunstall, Gerhard Hancke, Ioannis Askoxylakis, Keith Mayes.
    Smart Card Security - Theory and Practice.
    Information Security Technical Report, Vol. 14, pp. 46--56, 2009.
  145. Neil Hanley, Michael Tunstall, William P. Marnane.
    Unknown Plaintext Template Attacks.
    Workshop on Information Security Applications – WISA 2009, Lecture Notes in Computer Science 5932, pp. 148-162, 2009.
  146. S Styles, T Tryfonas.
    Using Penetration Testing Feedback to Cultivate an Atmosphere of Proactive Security amongst End-users.
    Information Management & Computer Security, Vol. 17, pp. 44 -- 52, 2009.
  147. 2008

  148. Paul Morrissey, Nigel Smart, Bogdan Warinschi.
    A Modular Security Analysis of the TLS Handshake Protocol.
    Advances in Cryptology - Asiacrypt 2008, Lecture Notes in Computer Science 5350, pp. 55-73, 2008.
  149. I Askoxylakis, D Sauveron, K Markantonakis, T Tryfonas, A Traganitis.
    A body-centered cubic method for key agreement in dynamic mobile ad hock networks.
    Emerging Security Information, Systems and Technologies - SECUREWARE 2008, IEEE -, pp. 193 - 202, 2008.
  150. L Shand, T Tryfonas.
    A collaborative distributed virtual platform for forensic analysis of malicious code.
    Information Security South Africa - ISSA 2008, Innovative Minds -, pp. 115 - 132, 2008.
  151. WM To, T Tryfonas, D Farthing.
    A log management inormation base for audit log review and unification.
    Baltic Conference on Databases and Information Systems - Baltic DB&IS 2008, Tallinn University of Technology Research Series -, pp. 375 - 390, 2008.
  152. I Sutherland, J Evans, T Tryfonas, A Blyth.
    Acquiring Volatile Operating System Data Tools and Techniques.
    ACM SIGOPS Operating Systems Review, Vol. 42, pp. 65 -- 73, 2008.
  153. Stefan Tillich, Martin Feldhofer, Thomas Popp, Johann Großschädl.
    Area, Delay, and Power Characteristics of Standard-Cell Implementations of the AES S-Box.
    Journal of Signal Processing Systems, Vol. 50(2), pp. 251--261, 2008.
  154. Manuel Barbosa, Pooya Farshim.
    Certificateless signcryption.
    ACM Symposium on Information, Computer and Communications Security - ASIACCS, ACM, pp. 369-372, 2008.
  155. S Wehner, Jurg Wullschleger.
    Composable security in the bounded quantum storage model.
    Automata, Languages and Programming - ICALP 2008, Lecture Notes in Computer Science 5126, pp. 604-615, 2008.
  156. M Styles, T Tryfonas.
    Cultivating an atmosphere of proactive computer security to mitigate limited end user awareness.
    Human Aspects of Information Security & Assurance - HAISA 2008, Lulu.com -, pp. 48 - 55, 2008.
  157. Övünc Kocabas, Erkay Savas, Johann Großschädl.
    Enhancing an Embedded Processor Core with a Cryptographic Unit for Performance and Security.
    Reconfigurable Computing and FPGAs - ReConFig 2008, IEEE Computer Society, pp. 409-414, 2008.
  158. B Przydatek, Jurg Wullschleger.
    Error-tolerant combiners for oblivious primitives.
    Automata, Languages and Programming - ICALP 2008, Lecture Notes in Computer Science 5126, pp. 461-472, 2008.
  159. Brian Baldwin, Emmanuel Popovici, Mike Tunstall, William Marnane.
    Fault injection platform for block ciphers.
    IET Irish Signals and Systems Conference - ISSC 2008, IET, pp. 10–15, 2008.
  160. Kamel Bentahar, Pooya Farshim, John Malone-Lee, Nigel Smart.
    Generic Constructions of Identity-Based and Certificateless KEMs.
    Journal of Cryptology, Vol. 21(2), pp. 178--199, 2008.
  161. D Jones, I Sutherland, T Tryfonas.
    Global positioning systems: Analysis principles and sources of evidence in user devices.
    Digital Forensics and Incident Analysis - WDFIA 2008, IEEE -, pp. 33 - 39, 2008.
  162. C. Whelan, A. Byrne, Daniel Page, Frederik R G Vercauteren, M. Scott, W. Marnane.
    Implementation attacks, countermeasures & performance evaluation.
    Identity- Based Cryptography, IOS Press, pp. 226-243, 2008.
  163. Yehuda Lindell, Benny Pinkas, Nigel Smart.
    Implementing two-party computation efficiently with security against malicious adversaries.
    Security and Cryptography for Networks - SCN 2008, Lecture Notes in Computer Science 5229, pp. 2-20, 2008.
  164. Philipp Grabher, Johann Groszschaedl, Daniel Page.
    Light-weight instruction set extensions for bit-sliced cryptography.
    Cryptographic Hardware and Embedded Systems - CHES 2008, Lecture Notes in Computer Science 5154, pp. 331-345, 2008.
  165. S Wolf, Jurg E Wullschleger.
    New monotones and lower bounds in unconditional two-party computation.
    IEEE Trans. Info. Theory, Vol. 54, pp. 2792--2795, 2008.
  166. Liqun Chen, Paul Morrissey, Nigel Smart.
    On Proofs of Security for DAA Schemes.
    Provable Security - PROVSEC 2008, Lecture Notes in Computer Science 5324, pp. 167-175, 2008.
  167. Philipp Grabher, Johann Groszschaedl, Daniel Page.
    On software parallel implementation of cryptographic pairings.
    Selected Areas in Cryptography - SAC 2008, Lecture Notes in Computer Science 5381, pp. 34-49, 2008.
  168. Steven Galbraith, Kenneth Paterson, Nigel Smart.
    Pairings for Cryptographers.
    Discrete Applied Mathematics, Vol. 156, pp. 3113--3121, 2008.
  169. Liqun Chen, Paul Morrissey, Nigel Smart.
    Pairings in Trusted Computing.
    Pairings 2008, Lecture Notes in Computer Science 5209, pp. 1-17, 2008.
  170. Elisabeth Oswald, Daniel Page, Nigel Smart.
    Randomised representations.
    IET Proceedings on Information Security, Vol. 2, pp. 19--27, 2008.
  171. Johann Groszschaedl, Vejda Tobias, Daniel Page.
    Reassessing the TCG specifications for trusted computing in mobile and embedded systems.
    Hardware-Oriented Security and Trust - HOST 2008, IEEE, pp. 84--90, 2008.
  172. Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi.
    Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions.
    J. Cryptology, Vol. 21, pp. 350--391, 2008.
  173. Martin Abadi, Bogdan Warinschi.
    Security Analysis of Cryptographically Controlled Access to XML Documents.
    Journal of the ACM, Vol. 55(2), pp. 1--29, 2008.
  174. B Kearney, T Tryfonas.
    Security patterns for automated continuous auditing.
    Information Security Journal: A Global Perspective, Vol. 17, pp. 13 -- 25, 2008.
  175. Mark Hamilton, Mike Tunstall, Emmanuel Popovici, Marnane William P. .
    Side channel analysis of an automotive microprocessor.
    IET Irish Signals and Systems Conference - ISSC 2008, IET, pp. 4-9, 2008.
  176. T Tryfonas, B Kearney.
    Standardising the Audit Automation of Integrated Business Applications with Security Patterns.
    Computer Standards & Interfaces, Vol. 30, pp. 262 -- 270, 2008.
  177. Claude Crepeau, Jurg E Wullschleger.
    Statistical security conditions for two-party secure function evaluation.
    Information Theoretic Security - ICITS 2008, Lecture Notes in Computer Science 5155, pp. 86-99, 2008.
  178. Elisabeth Oswald, Medweb Marcel.
    Template Attacks on ECDSA.
    Information Security Applications - WISA 2008, Lecture Notes in Computer Science 5379, pp. 14-27, 2008.
  179. Manuel Koschuch, Johann Großschädl, Udo Payer, Matthias Hudler, Michael Krüger.
    Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks.
    Cryptology and Network Security --- CANS 2008, Lecture Notes in Computer Science 5339, pp. 349-365, 2008.
  180. 2007

  181. YJM Tourigny, NP Smart.
    A multidimensional continued fraction based on a high-order recurrence relation.
    Mathematics of Computation, Vol. 76 (260), pp. 1995 -- 2022, 2007.
  182. Alexandra Boldyreva, Marc Fischlin, Adriana Palacio, Bogdan Warinschi.
    A Closer Look at PKI: Security and Efficiency.
    Public Key Cryptography - PKC 2007, Lecture Notes in Computer Science 4450, pp. 458-475, 2007.
  183. Veronique Cortier, Ralf Kuesters, Bogdan Warinschi.
    A Cryptographic Model for Branching Time Security Properties - The Case of Contract Signing Protocols.
    European Symposium On Research In Computer Security - ESORICS 2007, Lecture Notes in Computer Science 4734, pp. 422-437, 2007.
  184. Emmanuel Bresson, Yassine Lakhnech, Laurent Mazare, Bogdan Warinschi.
    A Generalization of DDH with Applications to Protocol Analysis and Computational Soundness.
    Advances in Cryptology - CRYPTO 2007, Lecture Notes in Computer Science 4622, pp. 482-499, 2007.
  185. Robert Granger, Florian Hess, Roger Oyono, Nicolas Theriault, Fre Vercauteren.
    Ate Pairing on Hyperelliptic Curves.
    Advances in Cryptology - EUROCRYPT 2007, Lecture Notes in Computer Science 4515, pp. 430-447, 2007.
  186. Manuel B M Barbosa, Andrew D Moss, Daniel Page.
    Compiler assisted elliptic curve cryptography.
    Information Security - IS 2007, Lecture Notes in Computer Science 4804, pp. 1785--1802, 2007.
  187. Philipp Grabher, Johann Groszschaedl, Daniel Page.
    Cryptographic side-channels from low-power cache memory.
    Cryptography and Coding - IMACC 2007, Lecture Notes in Computer Science 4887, pp. 170--184, 2007.
  188. Kamel Bentahar, Nigel Smart.
    Efficient 15,360-bit RSA Using Woop-Optimised Montgomery Arithmetic.
    Cryptography and Coding - IMACC 2007, Lecture Notes in Computer Science 4887, pp. 346-363, 2007.
  189. Tor Bjorstad, Alexander Dent, Nigel Smart.
    Efficient KEMs with partial message recovery.
    Cryptography and Coding - IMACC 2007, Lecture Notes in Computer Science 4887, pp. 233-256, 2007.
  190. V Cortier, H. Hordegen, Bogdan Warinschi.
    Explicit Randomness is not Necessary when Modeling Probabilistic Encryption.
    Electr. Notes Theor. Comput. Sci, Vol. 186, pp. 49--65, 2007.
  191. Chen L., Cheng Z., Nigel Smart.
    Identity-based key agreement protocols from pairings.
    International Journal of Information Security, Vol. 6, pp. 213--241, 2007.
  192. Michel Abdalla, Alexander Dent, John Malone-Lee, Gregory Neven, Phan D.H., Nigel Smart.
    Identity-based traitor tracing.
    Public Key Cryptography - PKC 2007, Lecture Notes in Computer Science 4450, pp. 361-367, 2007.
  193. Tobias Vejda, Daniel Page, Johann Groszschaedl.
    Instruction set extensions for pairing-based cryptography.
    Pairing-Based Cryptography --- PAIRING 2007, Lecture Notes in Computer Science 4575, pp. 208-224, 2007.
  194. Peter Leadbitter, Daniel Page, Nigel Smart.
    Non-deterministic multi-threading.
    IEEE Transactions on Computers, Vol. 56, pp. 992--998, 2007.
  195. D. Hofheinz, John Malone-Lee, Martijn Stam.
    Obfuscation for cryptographic purposes.
    Theory of Cryptography Conference - TCC 2007, Lecture Notes in Computer Science 4392, pp. 214-232, 2007.
  196. Nigel Smart, Fre Vercauteren.
    On computable isomorphisms in efficient asymmetric pairing-based systems.
    Discrete Applied Mathematics, Vol. 155(4), pp. 538--547, 2007.
  197. S Mangard, ME Oswald, T Popp.
    Power Analysis Attacks: Revealing the Secrets of Smart Cards.
    Springer, 2007.
  198. Stefan Tillich, Johann Großschädl.
    Power Analysis Resistant AES Implementation with Instruction Set Extensions.
    Cryptographic Hardware and Embedded Systems --- CHES 2007, Lecture Notes in Computer Science 4727, pp. 303-319, 2007.
  199. Popp T., Mangard S., Elisabeth Oswald.
    Power analysis attacks and countermeasures.
    IEEE Design and Test of Computers, Vol. 24(6), pp. 535--543, 2007.
  200. Manuel Barbosa, Pooya Farshim.
    Randomness Reuse: Improvements and Extensions.
    Cryptography and Coding - IMACC 2007, Lecture Notes in Computer Science 4887, pp. 261-280, 2007.
  201. Veronique Cortier, Bogdan Warinschi, Eugen Zalinescu.
    Synthesizing Secure Protocols.
    European Symposium On Research In Computer Security - ESORICS 2007, Lecture Notes in Computer Science 4734, pp. 406-421, 2007.
  202. ME Oswald, S Mangard.
    Template Attacks on Masking --- Resistance is Futile.
    Topics in Cryptology - CTRSA 2007, Lecture Notes in Computer Science 4377, pp. 243 - 256, 2007.
  203. Andrew Moss, Daniel Page, Nigel Smart.
    Toward acceleration of RSA using 3D Graphics hardware.
    Cryptography and Coding - IMACC 2007, Lecture Notes in Computer Science 4887, pp. 369-388, 2007.
  204. 2006

  205. FK Hess, NP Smart, FRG Vercauteren.
    The Eta pairing revisited.
    IEEE Transactions on Information Theory, Vol. 52 (10), pp. 4595 -- 4602, 2006.
  206. L Chen, Z Cheng, J Malone-Lee, NP Smart.
    Efficient ID-KEM based on the Sakai-Kasahara key construction.
    IEE Proceedings: Information Security, Vol. 153 (1), pp. 19 -- 26, 2006.
  207. S Canard, B Schoenmakers, M Stam, J Traoré.
    List signature schemes.
    Discrete Applied Mathematics, Vol. 154 (2), pp. 189 -- 201, 2006.
  208. Daniel Page, Nigel Smart, Frederik R G Vercauteren.
    A comparison of MNT curves and supersingular curves.
    Applicable Algebra in Engineering, Communication and Computing, Vol. 17, pp. 379--392, 2006.
  209. DS Page, Frederik R G Vercauteren.
    A fault attack on pairing-based cryptography.
    IEEE Transactions on Computers, Vol. 55, pp. 1075--1080, 2006.
  210. Denef J., Frederik R G Vercauteren.
    An Extension of Kedlaya's Algorithm to Hyperelliptic Curves in Characteristic 2.
    Journal of Cryptology, Vol. 19, pp. 1--25, 2006.
  211. Jan Denef, Frederik Vercauteren.
    Counting points on C$_ab$ curves using Monsky-Washnitzer cohomology.
    Finite fields and their Applications, Vol. 12, pp. 78--102, 2006.
  212. Arjen Lenstra, Daniel Page, Martijn Stam.
    Discrete logarithm variants of VSH.
    Vietcrypt, Lecture Notes in Computer Science 4341, pp. 229-242, 2006.
  213. Nigel Smart.
    Elliptic curve cryptography.
    Handbook of Information Security, Wiley 2, pp. ???-???, 2006.
  214. Sattam Al-Riyami, John Malone-Lee, Nigel Smart.
    Escrow free encryption supporting cryptographic workflow.
    International Journal of Information Security, Vol. 5(4), pp. 217--230, 2006.
  215. Robert Granger, Daniel Page, Nigel P. Smart.
    High security pairing-based cryptography revisited.
    Algorithmic Number Theory Symposium - ANTS VII, Lecture Notes in Computer Science 4076, pp. 480-494, 2006.
  216. Michel Abdalla, Dario Catalano, Alexander Dent, Malone-Lee John, Nigel Smart.
    Identity-based encryption gone wild.
    Automata, Languages and Programming - ICALP 2006, Lecture Notes in Computer Science 4052, pp. 300-311, 2006.
  217. Kamel Bentahar, Daniel Page, Markku-Juhani O. Saarinen, Joseph H. Silverman, Nigel Smart.
    LASH.
    NIST: The Second Cryptographic Hash Workshop, Online, pp. -, 2006.
  218. Rob Granger, Daniel Page, Martijn Stam.
    On small characteristic algebraic tori in pairing based cryptography.
    LMS Journal of Computation and Mathematics, Vol. 9, pp. 64--85, 2006.
  219. Manuel Barbosa, Pooya Farshim.
    Secure Cryptographic Workflow in the Standard Model.
    Progress in Cryptology - INDOCRYPT 2006, Lecture Notes in Computer Science 4329, pp. 379-393, 2006.
  220. Antoine Joux, Reynauld Lercier, Nigel Smart, Fre Vercauteren.
    The number field sieve in the medium prime case.
    Advances in Cryptology - CRYPTO 2006, Lecture Notes in Computer Science 4117, pp. 326 - 344, 2006.
  221. 2005

  222. M Stam.
    A Key Encapsulation Mechanism for NTRU.
    Cryptography and Coding - IMACC 2005, Lecture Notes in Computer Science 3796, pp. 410 - 427, 2005.
  223. Chris Dods, Nigel Smart, Martijn Stam.
    Hash Based Digital Signature Schemes..
    Cryptography and Coding - IMACC 2005, Lecture Notes in Computer Science 3796, pp. 96 - 115, 2005.
  224. John C Malone-Lee, AW Dent.
    The Physically Observable Security of Signature Schemes.
    Coding and Cryptography - IMACC 2005, Lecture Notes in Computer Science 3796, pp. 220-232, 2005.
  225. R Cramer, S Fehr, M Stam.
    Black-Box Secret Sharing from Primitive Sets in Number Fields.
    Advances in Cryptology - CRYPTO 2005, Lecture Notes in Computer Science 3621, pp. 344 - 360, 2005.
  226. Nigel Smart, Fre Vercauteren, Joe Silverman.
    An algebraic approach to NTRU (q = 2^n) via Witt vectors and overdetermined systems of nonlinear equations..
    Security and Cryptography for Networks - SCN 2006, Lecture Notes in Computer Science 3352, pp. 278 - 298, 2005.
  227. NP Smart.
    Efficient key encapsulation to multiple parties.
    Security and Cryptography for Networks - SCN 2006, Lecture Notes in Computer Science 3352, pp. 208 - 219, 2005.
  228. J. Mueller-Quade, A. Nascimento, Andreas Winter, Pim Tuyls, H. Imai.
    An information theoretic model for quantum secret sharing schemes.
    Quantum Inf. Comput, Vol. 5, pp. 69--80, 2005.
  229. Manuel Barbosa, Pooya Farshim.
    Efficient Identity-Based Key Encapsulation to Multiple Parties.
    Coding and Cryptography - IMACC 2005, Lecture Notes in Computer Science 3796, pp. 428-441, 2005.
  230. P. J. Green, Richard Noad, Nigel P. Smart.
    Further Hidden Markov Model Cryptanalysis.
    Cryptographic Hardware and Embedded Systems - CHES 2005, Lecture Notes in Computer Science 3659, pp. 61-74, 2005.
  231. P Grabher, Daniel Page.
    Hardware acceleration of the Tate pairing in characteristic three.
    Cryptographic Hardware and Embedded Systems - CHES 2005, Lecture Notes in Computer Science 3659, pp. 398-411, 2005.
  232. R Granger, Daniel Page, M Stam.
    Hardware and software normal basis arithmetic for pairing-based cryptography in characteristic three.
    IEEE Transactions on Computers, Vol. 54, pp. 852--860, 2005.
  233. Manuel B M Barbosa, Daniel Page.
    On the automatic construction of indistinguishable operations.
    Cryptography And Coding - IMACC 2005, Lecture Notes in Computer Science 3796, pp. 233-247, 2005.
  234. Florian K Hess, I Shparlinksi.
    On the linear complexity and multidimensional distribution of congruential generators over elliptic curves.
    Designs, Codes and Cryptography, Vol. 35, pp. 111--117, 2005.
  235. M van Dijk , R Granger, Daniel Page, K Rubin, A Silverberg, M Stam, D Woodruff.
    Practical cryptography in high dimensional tori.
    Advances in Cryptology - EUROCRYPT 2005, Lecture Notes in Computer Science 3494, pp. 234-250, 2005.
  236. Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi.
    Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions.
    Advances in Cryptology - CRYPTO 2005, Lecture Notes in Computer Science 3621, pp. 205-222, 2005.
  237. Eike Kiltz, Gregor Leander, John Malone-Lee.
    Secure Computation of the Mean and Related Statistics.
    Theory of Cryptography Conference - TCC 2005, Lecture Notes in Computer Science 3378, pp. 283-302, 2005.
  238. John Malone-Lee.
    Signcryption with Non-Interactive Non-Repudiation.
    Designs, Codes and Cryptography, Vol. 37, pp. 81--109, 2005.
  239. 2004

  240. NP Smart, A Menezes.
    Security of signature schemes in a multi-user setting.
    Designs, Codes and Cryptography, Vol. 33, pp. 261 -- 274, 2004.
  241. D Naccache, NP Smart, J Stern.
    Projective Coordinates Leak.
    Advances in Cryptology - EUROCRYPT 2004, Lecture Notes in Computer Science 3027, pp. 257 - 267, 2004.
  242. NP Smart, F Vercauteren, A Muzereau.
    The equivalence between the DHP and DLP for elliptic curves used in practical applications.
    LMS Journal of Computation and Mathematics, Vol. 7, pp. 50 -- 72, 2004.
  243. Rob Granger, Daniel Page, Martijn Stam.
    A comparison of CEILIDH and XTR.
    Algorithmic Number Theory Symposium - ANTS-VI, Lecture Notes in Computer Science 3076, pp. 235-249, 2004.
  244. Florian K Hess.
    A note on the Tate pairing of curves over finite fields.
    Arch. Math, Vol. 82, pp. 28--32, 2004.
  245. Peter J Leadbitter, Daniel Page, Nigel P Smart.
    Attacking DSA under a repeated bits assumption.
    Cryptographic Hardware and Embedded Systems - CHES 2004, Lecture Notes in Computer Science 3156, pp. 428-440, 2004.
  246. Rob Granger, A.J. Holt, Daniel Page, Nigel P Smart, Frederik R G Vercauteren.
    Function field sieve in characteristic three.
    Algorithmic Number Theory Symposium - ANTS-VI, Lecture Notes in Computer Science 3076, pp. 223-234, 2004.
  247. Florian K Hess.
    Generalising the GHS attack on the elliptic curve discrete logarithm problem.
    LMS Journal of Computation and Mathematics, Vol. 7, pp. 167--192, 2004.
  248. J Mueller-Quade, A Otsuka, G Hanaoka, H Imai, A Nascimento, Winter Andreas.
    Information theoretic secure oblivious polynomial evaluation: Model, bounds and constructions.
    Information Security and Privacy - ACIPS 2004, Lecture Notes in Computer Science 3108, pp. 62-73, 2004.
  249. Daniel Page, Martijn Stam.
    On XTR and side-channel analysis.
    Selected Areas in Cryptography - SAC 2004, Lecture Notes in Computer Science 3357, pp. 54-68, 2004.
  250. Florian Hess.
    On the security of the verifiably-encrypted signature scheme of Boneh, Gentry, Lynn and Shacham.
    Information Processing Letters, Vol. 89, pp. 111--114, 2004.
  251. Daniel Page, Nigel P Smart.
    Parallel cryptographic arithmetic using a redundant Montgomery representation.
    IEEE Transactions on Computers, Vol. 53, pp. 1474--1482, 2004.
  252. 2003

  253. E Kiltz, John C Malone-Lee.
    A General Construction of IND-CCA2 Secure Public Key Encryption.
    Cryptography and Coding - IMACC 2003, Lecture Notes in Computer Science 2898, pp. 152 - 166, 2003.
  254. Nigel Smart, Katharina Geissler.
    Computing the $M = U U^t$ integer matrix decomposition.
    Cryptography and Coding - IMACC 2003, Lecture Notes in Computer Science 2898, pp. 223 - 233, 2003.
  255. Nigel Smart, Adam Barnett.
    Mental Poker Revisited.
    Cryptography and Coding - IMACC 2003, Lecture Notes in Computer Science 2898, pp. 370 - 383, 2003.
  256. Nigel Smart.
    An Analysis of Goubin's Refined Power Analysis Attack.
    Cryptographic Hardware and Embedded Systems - CHES 2003, Lecture Notes in Computer Science 2779, pp. 281 - 290, 2003.
  257. NP Smart, P Leadbitter.
    Analysis of the insecurity of ECMQV with partially known nonces.
    Information Security Conference - ISC 2003, Lecture Notes in Computer Science 2851, pp. 240 - 251, 2003.
  258. NP Smart, J Westwood.
    Point multiplication on ordinary elliptic curves over fields of characteristic three..
    Applicable Algebra in Engineering, Communication and Computing, Vol. 13, pp. 485 -- 497, 2003.
  259. NP Smart.
    Access control using pairing based cryptography.
    Topics in Cryptology - CT-RSA 2003, Lecture Notes in Computer Science 2612, pp. 111 - 121, 2003.
  260. Daniel Page.
    Defending against cache based side-channel attacks.
    Information Security Technical Report, Vol. 8(1), pp. 30 -- 44, 2003.
  261. John C Malone-Lee, Wenbo Mao.
    Two Birds One Stone: Signcryption Using RSA.
    Topics in Cryptology - CT-RSA 2003, Lecture Notes in Computer Science 2612, pp. 211 - 225, 2003.
  262. F Hess.
    Efficient Identity based Signature Schemes based on Pairings..
    Selected Areas in Cryptography -- SAC 2002, Lecture Notes in Computer Science 2595, pp. 310 - 324, 2003.
  263. John Malone-Lee, Nigel Smart.
    Modifications of ECDSA.
    Selected Areas in Cryptography - SAC 2002, Lecture Notes in Computer Science 2595, pp. 1 - 12, 2003.
  264. Nascimento A.C.A., Imai H., Winter Andreas.
    Commitment capacity of discrete memoryless channels.
    Cryptography and Coding - IMACC 2003, Lecture Notes in Computer Science 2898, pp. 35-51, 2003.
  265. Florian Hess, Pauli S., Pohst M.E..
    Computing the multiplicative group of residue class rings.
    Math. Comp, Vol. 72, pp. 1531--1548, 2003.
  266. Robert Granger.
    Estimates for Discrete Logarithm Computations in Finite Fields of Small Characteristic.
    Cryptography and Coding - IMACC 2003, Lecture Notes in Computer Science 2898, pp. 190-206, 2003.
  267. Florian Hess.
    The GHS attack revisited.
    Advances in Cryptology - EUROCRYPT 2003, Lecture Notes in Computer Science 2656, pp. 374-387, 2003.
  268. Daniel Page, James P J Irwin.
    Using media processors for low-memory AES implementation.
    Application-specific Systems, Architectures and Processors - ASAP 2003, IEEE, pp. 144--154, 2003.
  269. 2002

  270. L Chen, K Harrison, N Smart, D Soldera.
    Applications of Multiple Trust Authorities in Pairing Based Cryptosystems.
    InfraSec 2002, Lecture Notes in Computer Science 2437, pp. 260 - 275, 2002.
  271. L Chen, K Harrison, A Moss, NP Smart, D Soldera.
    Certification of Public Keys within an Identity Based System.
    Information Security - ISC 2002, Lecture Notes in Computer Science 2443, pp. 322 - 333, 2002.
  272. F Vercauteren.
    Computing zeta functions of hyperelliptic curves over finite fields of characteristic 2.
    Advances in Cryptology -- CRYPTO 2002, Lecture Notes in Computer Science 2442, pp. 369 - 384, 2002.
  273. J Stern, D Pointcheval, J Malone-Lee, NP Smart.
    Flaws in Applying Proof Methodologies to Signature Schemes.
    Advances in Cryptology - CRYPTO 2002, Lecture Notes in Computer Science 2442, pp. 93 - 110, 2002.
  274. F Hess.
    An Algorithm for Computing Weierstrass Points.
    Algorithmic Number Theory - ANTS 2002, Lecture Notes in Computer Science 2369, pp. 357 - 371, 2002.
  275. J Denef, F Vercauteren.
    An extension of Kedlaya's algorithm to Artin-Schreier curves in characteristic 2.
    Algorithmic Number Theory - ANTS 2002, Lecture Notes in Computer Science 2369, pp. 369 - 384, 2002.
  276. NP Smart.
    An identity based authenticated key agreement protocol based on the Weil pairing.
    Electronics Letters, Vol. 38 (13), pp. 630 -- 632, 2002.
  277. SD Galbraith, J Malone-Lee, NP Smart.
    Public key signatures in the multi-user setting.
    Information Processing Letters, Vol. 83 (5), pp. 263 -- 266, 2002.
  278. Steven Galbraith, Florian Hess, Nigel Smart.
    Extending the GHS Weil descent attack.
    Advances in Cryptology - EUROCRYPT 2002, Lecture Notes in Computer Science 2332, pp. 29 - 44, 2002.
  279. F Hess.
    Computing Riemann-Roch Spaces in Algebraic Function Fields and Related Topics.
    Journal of Symbolic Computation, Vol. 33 (4), pp. 425 -- 445, 2002.
  280. P Gaudry, FK Hess, NP Smart.
    Constructive and Destructive Facets of Weil Descent on Elliptic Curves.
    Journal of Cryptology, Vol. 15 (1), pp. 19 -- 46, 2002.
  281. Steven D Galbraith.
    Elliptic curve Paillier schemes.
    Journal of Cryptology, Vol. 15, pp. 129--138, 2002.
  282. Daniel Page, Nigel P Smart.
    Hardware implementation of finite fields of characteristic three.
    Cryptographic Hardware and Embedded Systems - CHES 2002, Lecture Notes in Computer Science 2523, pp. 529-539, 2002.
  283. James P J Irwin, Daniel Page, Nigel P Smart.
    Instruction stream mutation for non-deterministic processors.
    Application-specific Systems, Architectures and Processors - ASAP 2002, IEEE, pp. 286-295, 2002.
  284. Keith Harrison, Daniel Page, Nigel P Smart.
    Software implementation of finite fields of characteristic three, for use in pairing based cryptosystems.
    LMS Journal of Computation and Mathematics, Vol. 5, pp. 181----193, 2002.
  285. 2001

  286. NP Smart.
    The Exact Security of ECIES in the Generic Group Model.
    Cryptography and Coding - IMACC 2001, Lecture Notes in Computer Science 2260, pp. 73 - 84, 2001.
  287. F Hess, G Seroussi, NP Smart.
    Two topics in hyperelliptic cryptography.
    Selected Areas in Cryptography - SAC 2001, Lecture Notes in Computer Science 2259, pp. 181 - 189, 2001.
  288. NP Smart.
    A comparison of different finite fields for use in Elliptic Curve Cryptosystems.
    Computers and Mathematics with Applications, Vol. 42 (?), pp. 91 -- 100, 2001.
  289. NP Smart.
    A note on the x-coordinate of points on an elliptic curve in characteristic two.
    Information Processing Letters, Vol. 80 (?), pp. 261 -- 263, 2001.
  290. N Howgrave-Graham, NP Smart.
    Lattice attacks on digital signature schemes.
    Designs, Codes and Cryptography, Vol. 23 (3), pp. 283 -- 290, 2001.
  291. David May, Henk Muller, Nigel Smart.
    Non-deterministic Processors.
    Information, Security and Privacy - ACISP 2001, Lecture Notes in Computer Science 2119, pp. 115 - 129, 2001.
  292. NP Smart.
    How secure are elliptic curves over composite extension fields?.
    Advances in Cryptology - EUROCRYPT2001, Lecture Notes in Computer Science 2045, pp. 30 - 39, 2001.
  293. NP Smart, P-Y Liardet.
    Preventing SPA/DPA in ECC systems using the Jacobi Form..
    Cryptographic Hardware and Embedded Systems - CHES 2001, Lecture Notes in Computer Science 2162, pp. 391 - 401, 2001.
  294. David May, Henk Muller, Nigel Smart.
    Random Register Renaming to Foil DPA.
    Cryptographic Hardware and Embedded Systems - CHES 2001, Lecture Notes in Computer Science 2162, pp. 28 - 38, 2001.
  295. NP Smart.
    The Hessian form of an elliptic curve.
    Cryptographic Hardware and Embedded Systems - CHES 2001, Lecture Notes in Computer Science 2162, pp. 118 - 125, 2001.
  296. SD Galbraith, S Paulus, NP Smart.
    Arithmetic on superelliptic curves.
    Mathematics of Computation, Vol. 71 (?), pp. 393 -- 405, 2001.
  297. Steven Galbraith.
    Limitations of constructive Weil descent.
    Cryptography and Computational Number Theory, De Gruyter, pp. 59-70, 2001.
  298. Steven Galbraith.
    Supersingular curves in cryptography.
    Advances in Cryptology - ASIACRYPT 2001, Lecture Notes in Computer Science 2248, pp. 495-513, 2001.
  299. Steven Galbraith.
    Weil descent of Jacobians.
    Proc. WCC2001, Electronic Notes in Discrete Math 6, pp. 459-468, 2001.
  300. 2000

  301. NP Smart, HL Muller.
    A wearable public key infrastructure (WPKI).
    Proceedings IEEE International Symposium on Wearable Computers, Vol. -, pp. 127 -- 133, 2000.
  302. NP Smart.
    Physical side channel attacks on cryptographic systems.
    Software Focus, Vol. 1, pp. 5 -- 13, 2000.
© 1995-2013 University of Bristol  |  Terms and Conditions  |  Use of Cookies
About this Page