Publications for the Cryptography Group

The following are the research outputs of the security group, for people who have left the group we present work which was carried out whilst they were in Bristol. For others its the work published while they were here.

If you want to see them in graphical form try our Publication Graph.

    2017

  1. David Leslie, Chris Sherfield, Nigel Smart.
    Multi-Rate Threshold FlipThem.
    European Symposium on Research in Computer Security: ESORICS 2017, Lecture Notes in Computer Science 10493, pp. 174--190, 2017.
  2. Martin Albrecht, Emmanuela Orsini, Kenneth G Patterson, Guy Peer, Nigel P Smart.
    Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts.
    European Symposium on Research in Computer Security, Lecture Notes in Computer Science 10492, pp. 29--46, 2017.
  3. Dragos Rotaru, Nigel Smart, Martijn Stam.
    Modes of operation suitable for computing on encrypted data.
    Transactions on Symmetric Cryptology, Vol. 3, XXXX(Pages)XXXX, 2017.
  4. Véronique Cortier, Constantin Catalin Dragan, François Dupressoir, Benedikt Schmidt, Pierre-Yves Strub, Bogdan Warinschi.
    Machine-Checked Proofs of Privacy for Electronic Voting Protocols.
    2017 IEEE 38th IEEE Symposium on Security and Privacy (SP 2017), Institute of Electrical and Electronics Engineers (IEEE), pp. 993--1008, 2017.
    DOI: http://dx.doi.org/10.1109/SP.2017.28.
  5. David Bernhard, Ngoc Khanh Nguyen, Bogdan Warinschi.
    Adaptive Proofs Have Straightline Extractors (in the Random Oracle Model).
    Applied Cryptography and Network Security, Lecture Notes in Computer Science, pp. 336--353, 2017.
    DOI: http://dx.doi.org/10.1007/978-3-319-61204-1_17.
  6. Fabrizio Caruso, Emmanuela Orsini, Massimiliano Sala, Claudia Tinnirello.
    On the Shape of the General Error Locator Polynomial for Cyclic Codes.
    IEEE Transactions on Information Theory, Vol. 63, pp. 3641--3557, 2017.
    DOI: http://dx.doi.org/10.1109/TIT.2017.2692213.
  7. George Margelis, Robert Piechocki, Theo Tryfonas, Paul Thomas.
    Smart Attacks on the Integrity of the Internet of Things: Avoiding Detection by Employing Game Theory.
    2016 IEEE Global Communications Conference (GLOBECOM 2016), Institute of Electrical and Electronics Engineers (IEEE), XXXX(Pages)XXXX, 2017.
    DOI: http://dx.doi.org/10.1109/GLOCOM.2016.7842270.
  8. Bernardo Portela, Manuel B M Barbosa, Ferdinand Brasser, Bernardo Portela, Ahmad-Reza Sadeghi, Guillaume Scerri, Bogdan Warinschi.
    Secure Multiparty Computation from SGX.
    Financial Cryptography and Data Security 2017, International Financial Cryptography Association, XXXX(Pages)XXXX, 2017.
  9. Jooyoung Lee, Martijn Stam, John Steinberger.
    The Security of Tandem-DM in the Ideal Cipher Model.
    Journal of Cryptology, Vol. 30, pp. 495--518, 2017.
    DOI: http://dx.doi.org/10.1007/s00145-016-9230-z.
  10. Alexandros Mavromatis, Georgios Papadopoulos, Xenofon Fafoutis, Angelos Goulianos, George Oikonomou, Periklis Chatzimisios, Theo Tryfonas.
    Link quality and path based clustering in IEEE 802.15.4-2015 TSCH networks.
    Proceedings of the 22nd IEEE Symposium on Computers and Communications (ISCC), Institute of Electrical and Electronics Engineers (IEEE), XXXX(Pages)XXXX, 2017.
  11. Simon Duquennoy, Atis Elsts, Beshr Al Nahas , George Oikonomou.
    TSCH and 6TiSCH for Contiki: challenges, design and evaluation.
    2017 International Conference on Distributed Computing in Sensor Systems (DCOSS 2017), Institute of Electrical and Electronics Engineers (IEEE), XXXX(Pages)XXXX, 2017.
  12. Yan Yan, Elisabeth Oswald, Theo Tryfonas.
    Cryptographic randomness on a CC2538: a case study.
    8th IEEE International Workshop on Information Forensics and Security, WIFS 2016, International Workshops on Information Forensics and Security, XXXX(Pages)XXXX, 2017.
    DOI: http://dx.doi.org/10.1109/WIFS.2016.7823912.
  13. George Margelis, Xenofon Fafoutis, Robert J. Piechocki, George Oikonomou, Theo Tryfonas, Paul Thomas.
    Practical limits of the secret key-capacity for IoT physical layer security.
    2016 IEEE 3rd World Forum on Internet of Things (WF-IoT 2016), Institute of Electrical and Electronics Engineers Inc., pp. 311--316, 2017.
    DOI: http://dx.doi.org/10.1109/WF-IoT.2016.7845415.
  14. Vijay Kumar, George Oikonomou, Theo Tryfonas.
    Traffic Forensics for IPv6-Based Wireless Sensor Networks and the Internet of Things.
    2016 IEEE 3rd World Forum on Internet of Things (WF-IoT 2016), Institute of Electrical and Electronics Engineers (IEEE), XXXX(Pages)XXXX, 2017.
    DOI: http://dx.doi.org/10.1109/WF-IoT.2016.7845515.
  15. Xenofon Fafoutis, Letizia Marchegiani, Georgios Z. Papadopoulos, Robert Piechocki, Theo Tryfonas, George Oikonomou.
    Privacy Leakage of Physical Activity Levels in Wireless Embedded Wearable Systems.
    Signal Processing Letters, IEEE, Vol. 24, pp. 136--140, 2017.
    DOI: http://dx.doi.org/10.1109/LSP.2016.2642300.
  16. Ana Costache, Nigel Smart, Srinivas Vivek.
    Faster Homomorphic Evaluation of Discrete Fourier Transforms.
    Financial Cryptography - FC 2017, Lecture Notes in Computer Science, XXXX(Pages)XXXX, 2017.
  17. George Margelis, Xenofon Fafoutis, George Oikonomou, Robert Piechocki, Theo Tryfonas, Paul Thomas.
    Physical layer secret-key generation with discreet cosine transform for the internet of things.
    2017 IEEE International Conference on Communications (ICC 2017), Institute of Electrical and Electronics Engineers (IEEE), XXXX(Pages)XXXX, 2017.
  18. Ryan Stanley-Oakes.
    A Provably Secure PKCS#11 Conguration Without Authenticated Attributes.
    Financial Cryptography and Data Security, Lecture Notes in Computer Science, XXXX(Pages)XXXX, 2017.
  19. Michele Orrù, Emmanuela Orsini, Peter Scholl.
    Actively Secure 1-out-of-N OT Extension with Application to Private Set Intersection.
    Topics in Cryptology - CT-RSA 2017, Lecture Notes in Computer Science, pp. 381--396, 2017.
    DOI: http://dx.doi.org/10.1007/978-3-319-52153-4_22.
  20. Marcel Keller, Emmanuela Orsini, Dragos Rotaru, Peter Scholl, Eduardo Soria-Vazquez, Srinivas Vivek.
    Faster secure multi-party computation of AES and DES using lookup tables.
    Applied Cryptography and Network Security - ACNS 2017, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 10355 LNCS, pp. 229--249, 2017.
    DOI: http://dx.doi.org/10.1007/978-3-319-61204-1_12.
  21. 2016

  22. Guido Bertoni, Marco Martinoli.
    A Methodology for the Characterisation of Leakages in Combinatorial Logic.
    Security, Privacy, and Applied Cryptography Engineering, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 363--382, 2016.
    DOI: http://dx.doi.org/10.1007/978-3-319-49445-6_21.
  23. Daniel Martin, Luke Mather, Elisabeth Oswald, Martijn Stam.
    Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations.
    Advances in Cryptology - ASIACRYPT 2016, Lecture Notes in Computer Science, pp. 548--572, 2016.
    DOI: http://dx.doi.org/10.1007/978-3-662-53887-6_20.
  24. Bin Liu, Bogdan Warinschi.
    Universally Composable Cryptographic Role-Based Access Control.
    Provable Security - ProvSec 2016, Lecture Notes in Computer Science, pp. 61--80, 2016.
    DOI: http://dx.doi.org/10.1007/978-3-319-47422-9_4.
  25. David Bernhard, Marc Fischlin, Bogdan Warinschi.
    Adaptive proofs of knowledge in the random oracle model.
    IET Information Security, Vol. 10, pp. 319--331, 2016.
    DOI: http://dx.doi.org/10.1049/iet-ifs.2015.0506.
  26. Yehuda Lindell, Nigel Smart, Eduardo Soria-Vázquez.
    More Efficient Constant-Round Multi-Party Computation from BMR and SHE.
    Theory of Cryptography, Lecture Notes in Computer Science, pp. 554--581, 2016.
    DOI: http://dx.doi.org/10.1007/978-3-662-53641-4_21.
  27. Emmanuela A Orsini, Nigel P Smart, Joop van de Pol .
    Bootstrapping BGV Ciphertexts with a Wider Choice of p and q.
    IET Information Security, Vol. 10, pp. 348--357, 2016.
    DOI: http://dx.doi.org/10.1049/iet-ifs.2015.0505.
  28. Marcel Keller, Emmanuela Orsini, Peter Scholl.
    MASCOT: Faster Malicious Arithmetic Secure Computation with Oblivious Transfer.
    CCS '16, Association for Computing Machinery 24-28-October-2016, pp. 830--842, 2016.
    DOI: http://dx.doi.org/10.1145/2976749.2978357.
  29. Lorenzo Grassi, Christian Rechberger, Dragos Rotaru, Peter Scholl, Nigel Smart.
    MPC-Friendly Symmetric Key Primitives.
    ACM Conference on Computer and Communications Security - CCS 2016, Association for Computing Machinery (ACM), pp. 430--443, 2016.
    DOI: http://dx.doi.org/10.1145/2976749.2978332.
  30. Emmanuela A Orsini, Peter Scholl, Carsten Baum.
    Efficient Secure Multiparty Computation with Identifiable Abort.
    Theory of Cryptography, Lectures Notes in Computer Science, pp. 461--490, 2016.
    DOI: http://dx.doi.org/10.1007/978-3-662-53641-4.
  31. Theo Tryfonas.
    An intelligent hot-desking model harnessing the power of occupancy sensing.
    Facilities, XXXX(Volume No)XXXX, XXXX(Pages)XXXX, 2016.
  32. Thomas Allan, Brumley Billy Bob , Katrina Falkner, Joop Van De Pol , Yuval Yarom.
    Amplifying Side Channels Through Performance Degradation.
    Annual Computer Security Applications Conference - ACSAC 2016, Association for Computing Machinery (ACM), XXXX(Pages)XXXX, 2016.
  33. Konstantinos Maraslis, Peter Cooper, Theo Tryfonas, George Oikonomou.
    An Intelligent Hot-Desking Model Based on Occupancy Sensor Data and Its Potential for Social Impact.
    Transactions on Large-Scale Data- and Knowledge-Centered Systems XXVII, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 9860 LNCS, pp. 142--158, 2016.
    DOI: http://dx.doi.org/10.1007/978-3-662-53416-8_9.
  34. Ana Costache, Nigel Smart, Srinivas Vivek, Adrian Waller.
    Fixed Point Arithmetic in SHE Scheme.
    Selected Areas in Cryptography - SAC 2016, Lecture Notes in Computer Science, XXXX(Pages)XXXX, 2016.
  35. David Galindo, Johann Großschädl, Zhe Liu, Praveen Kumar Vadnala, Srinivas Vivek.
    Implementation of a leakage-resilient ElGamal key encapsulation mechanism.
    Journal of Cryptographic Engineering, Vol. 6, pp. 229--238, 2016.
    DOI: http://dx.doi.org/10.1007/s13389-016-0121-x.
  36. Alexandra Boldyreva, Taesoo Kim, Richard Lipton, Bogdan Warinschi.
    Provably-Secure Remote Memory Attestation for Heap Overflow Protection.
    Security and Cryptography for Networks, Lecture Notes in Computer Science, XXXX(Pages)XXXX, 2016.
    DOI: http://dx.doi.org/10.1007/978-3-319-44618-9_5.
  37. Panagiotis Andriotis, George Oikonomou, Theo Tryfonas, Shancang Li.
    Highlighting Relationships of a Smartphone's Social Ecosystem in Potentially Large Investigations.
    IEEE Transactions on Cybernetics, Vol. 46, pp. 1974--1985, 2016.
    DOI: http://dx.doi.org/10.1109/TCYB.2015.2454733.
  38. Jürgen Pulkus, Srinivas Vivek.
    Reducing the Number of Non-linear Multiplications in Masking Schemes.
    Cryptographic Hardware and Embedded Systems ? CHES 2016, Lecture Notes in Computer Science, pp. 479--497, 2016.
    DOI: http://dx.doi.org/10.1007/978-3-662-53140-2_23.
  39. Guillaume Scerri, Ryan W Stanley-Oakes.
    Analysis of Key Wrapping APIs: Generic Policies, Computational Security.
    2016 IEEE 28th Computer Security Foundations Symposium (CSF 2016), Proceedings of the IEEE Computer Security Foundations Symposium, pp. 281--295, 2016.
    DOI: http://dx.doi.org/10.1109/CSF.2016.27.
  40. Marc Fischlin, Felix Günther, Benedikt Schmidt, Bogdan Warinschi.
    Key Confirmation in Key Exchange Protocols: Formal Definitions and Implications for TLS 1.3.
    2016 IEEE Symposium on Security and Privacy (S&P 2016), 2016 IEEE Symposium on Security and Privacy (SP), pp. 452--469, 2016.
    DOI: http://dx.doi.org/10.1109/SP.2016.34.
  41. Shancang Li, Theo Tryfonas, Gordon Russell, Panagiotis Andriotis.
    Risk Assessment for Mobile Systems Through a Multilayered Hierarchical Bayesian Network.
    IEEE Transactions on Cybernetics, Vol. 46, pp. 1749--1759, 2016.
    DOI: http://dx.doi.org/10.1109/TCYB.2016.2537649.
  42. Sergiu Costea, Bogdan Warinschi.
    Secure Software Licensing: Models, Constructions, and Proofs.
    2016 IEEE 29th Computer Security Foundations Symposium (CSF 2016), Institute of Electrical and Electronics Engineers (IEEE), pp. 31--44, 2016.
    DOI: http://dx.doi.org/10.1109/CSF.2016.10.
  43. Thomas Shrimpton, Martijn Stam, Bogdan Warinschi.
    A Modular Treatment of Cryptographic APIs: The Symmetric-Key Case.
    Advances in Cryptology - CRYPTO 2016, Lecture Notes in Computer Science (LNCS), pp. 277--307, 2016.
    DOI: http://dx.doi.org/10.1007/978-3-662-53018-4_11.
  44. Theo Tryfonas, Michael Carter, Tom Crick, Panos Andriotis.
    Mass surveillance in cyberspace and the lost art of keeping a secret: Policy Lessons for Government After the Snowden Leaks.
    Human Aspects of Information Security, Privacy, and Trust, Lecture Notes in Computer Science, pp. 174--185, 2016.
    DOI: http://dx.doi.org/10.1007/978-3-319-39381-0_16.
  45. Tesleem H Fagade, Theo Tryfonas.
    Security by Compliance? A Study of Insider Threat Implications for Nigerian Banks.
    Human Aspects of Information Security, Privacy, and Trust, Lecture Notes in Computer Science, pp. 128--139, 2016.
    DOI: http://dx.doi.org/10.1007/978-3-319-39381-0_12.
  46. Manuel Barbosa, Bernardo Portela, Guillaume Scerri, Bogdan Warinschi.
    Foundations of Hardware-Based Attested Computation and Application to SGX.
    2016 IEEE European Symposium on Security and Privacy (EuroS&P 2016), Institute of Electrical and Electronics Engineers (IEEE), pp. 245--260, 2016.
    DOI: http://dx.doi.org/10.1109/EuroSP.2016.28.
  47. Yevgeniy Dodis, Martijn Stam, John Steinberger, Tianren Liu.
    Indifferentiability of Confusion-Diffusion Networks.
    Advances in Cryptology - EUROCRYPT 2016, Lecture Notes in Computer Science, pp. 679--704, 2016.
    DOI: http://dx.doi.org/10.1007/978-3-662-49896-5_24.
  48. Shancang Li, Theo Tryfonas, Honglei Li.
    The Internet of Things: A Security Point of View.
    Internet Research, Vol. 26, pp. 337--359, 2016.
    DOI: http://dx.doi.org/10.1108/IntR-07-2014-0173.
  49. Panos Andriotis, George Oikonomou, Alexios Mylonas, Theo Tryfonas.
    A Study on Usability and Security Features of the Android Pattern Lock Screen.
    Information and Computer Security, Vol. 24, pp. 53--72, 2016.
    DOI: http://dx.doi.org/10.1108/ICS-01-2015-0001.
  50. David A J McCann, Kerstin I Eder, M Elisabeth Oswald.
    Characterising and Comparing the Energy Consumption of Side Channel Attack Countermeasures and Lightweight Cryptography on Embedded Devices.
    Proceedings of 2015 International Workshop on Secure Internet of Things (SIoT), Institute of Electrical and Electronics Engineers (IEEE), pp. 65--71, 2016.
    DOI: http://dx.doi.org/10.1109/SIOT.2015.11.
  51. Ana Costache, Nigel P Smart.
    Which Ring Based Somewhat Homomorphic Encryption Scheme is Best?.
    Topics in Cryptology - CT-RSA 2016, Lecture Notes in Computer Science, pp. 325--340, 2016.
    DOI: http://dx.doi.org/10.1007/978-3-319-29485-8_19.
  52. David Bernhard, Marc Fischlin, Bogdan Warinschi.
    On the Hardness of Proving CCA-Security of Signed ElGamal.
    Public-Key Cryptography ? PKC 2016, Lecture Notes in Computer Science, pp. 47--69, 2016.
    DOI: http://dx.doi.org/10.1007/978-3-662-49384-7_3.
  53. Tore K Frederiksen, Marcel K S Keller, Emmanuela a Orsini, Peter Scholl.
    A Unified Approach to MPC with Preprocessing Using OT.
    Advances in Cryptology -- Asiacrypt 2015, Lecture Notes in Computer Science, pp. 711--735, 2016.
    DOI: http://dx.doi.org/10.1007/978-3-662-48797-6_29.
  54. Nigel P. Smart.
    Cryptography Made Simple.
    Springer, 2016.
    DOI: http://dx.doi.org/10.1007/978-3-319-21936-3.
  55. Ashish Choudhury, Emmanuela Orsini, Arpita Patra, Nigel Smart.
    Linear Overhead Optimally-resilient Robust MPC Using Preprocessing.
    Security and Cryptography for Networks - SCN 2016, Lecture Notes in Computer Science 9841, pp. 147--168, 2016.
    DOI: http://dx.doi.org/10.1007/978-3-319-44618-9_8.
  56. 2015

  57. Theodoros Spyridopoulos, Konstantinos Maraslis, Alexios Mylonas, Theo Tryfonas, George Oikonomou.
    A Game Theoretical Method for Cost-Benefit Analysis of Malware Dissemination Prevention.
    Information Security Journal, Vol. 24, pp. 164--176, 2015.
    DOI: http://dx.doi.org/10.1080/19393555.2015.1092186.
  58. Daniel Martin, Elisabeth Oswald, Martijn Stam, Marcin Wójcik.
    A Leakage Resilient MAC.
    Cryptography and Coding - IMACC 2015, Lecture Notes in Computer Science 9496, pp. 295--310, 2015.
    DOI: http://dx.doi.org/10.1007/978-3-319-27239-9_18.
  59. Daniel Martin, Jonathan O'Connell, Elisabeth Oswald, Martijn Stam.
    Counting Keys in Parallel After a Side Channel Attack.
    Advances in Cryptology - ASIACRYPT 2015, Lecture Notes in Computer Science 9453, pp. 313--337, 2015.
    DOI: http://dx.doi.org/10.1007/978-3-662-48800-3_13.
  60. Thijs Laarhoven, Michele Mosca, Joop Van De Pol .
    Finding shortest lattice vectors faster using quantum search.
    Designs, Codes and Cryptography, Vol. 77, pp. 375--400, 2015.
    DOI: http://dx.doi.org/10.1007/s10623-015-0067-5.
  61. Guy Barwell, Daniel Page, Martijn Stam.
    Rogue Decryption Failures: Reconciling AE Robustness Notions.
    Cryptography and Coding - IMACC 2015, Lecture Notes in Computer Science 9496, pp. 94--111, 2015.
    DOI: http://dx.doi.org/10.1007/978-3-319-27239-9_6.
  62. David Leslie, Chris Sherfield, Nigel Smart.
    Threshold FlipThem: When the winner does not need to take all.
    Decision and Game Theory for Security - GameSec 2015, Lecture Notes in Computer Science 9406, pp. 74--92, 2015.
    DOI: http://dx.doi.org/10.1007/978-3-319-25594-1_5.
  63. Olivier Pereira, Francois-Xavier Standaert, Srinivas Vivek.
    Leakage-Resilient Authentication and Encryption from Symmetric Cryptographic Primitives.
    Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Association for Computing Machinery (ACM), pp. 96--108, 2015.
    DOI: http://dx.doi.org/10.1145/2810103.2813626.
  64. Jake Longo, Elke De Mulder , Daniel Page, Mike Tunstall.
    SoC It to EM: ElectroMagnetic Side-Channel Attacks on a Complex System-on-Chip.
    Cryptographic Hardware and Embedded Systems - CHES 2015, Lecture Notes in Computer Science 9293, pp. 620--640, 2015.
    DOI: http://dx.doi.org/10.1007/978-3-662-48324-4_31.
  65. Marcel Keller, Emmanuela Orsini, Peter Scholl.
    Actively Secure OT Extension with Optimal Overhead.
    Advances in Cryptology - CRYPTO 2015, Lecture Notes in Computer Science 9215, pp. 724--741, 2015.
    DOI: http://dx.doi.org/10.1007/978-3-662-47989-6_35.
  66. Yehuda Lindell, Benny Pinkas, Nigel Smart, Avishay Yanai.
    Efficient Constant Round Multi-Party Computation Combining BMR and SPDZ.
    Advances in Cryptology - CRYPTO 2015, Lecture Notes in Computer Science 9216, pp. 319--338, 2015.
    DOI: http://dx.doi.org/10.1007/978-3-662-48000-7_16.
  67. Jooyoung Lee, Martijn Stam.
    MJH: a faster alternative to MDC-2.
    Designs, Codes and Cryptography, Vol. 76, pp. 179--205, 2015.
    DOI: http://dx.doi.org/10.1007/s10623-014-9936-6.
  68. Konstantinos Maraslis, Theodoros Spyridopoulos, George Oikonomou, Theo Tryfonas, Mo Haghighi.
    Application of a Game Theoretic Approach in Smart Sensor Data Trustworthiness Problems.
    ICT Systems Security and Privacy Protection, IFIP Advances in Information and Communication Technology 455, pp. 601--615, 2015.
    DOI: http://dx.doi.org/10.1007/978-3-319-18467-8_40.
  69. Joop van de Pol , Nigel P Smart, Yuval Yarom.
    Just a Little Bit More.
    Topics in Cryptology - CT-RSA 2015, Lecture Notes in Computer Science 9048, pp. 3--21, 2015.
    DOI: http://dx.doi.org/10.1007/978-3-319-16715-2_1.
  70. Emmanuela A Orsini, Joop van de Pol , Nigel P Smart.
    Bootstrapping BGV ciphertexts with a wider choice of p and q.
    Public-Key Cryptography - PKC 2015, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 673--698, 2015.
    DOI: http://dx.doi.org/10.1007/978-3-662-46447-2_30.
  71. Arpita Patra, Ashish Choudhury, C. Pandu Rangan.
    Efficient Asynchronous Verifiable Secret Sharing and Multiparty Computation.
    Journal of Cryptology, Vol. 28, pp. 49--109, 2015.
    DOI: http://dx.doi.org/10.1007/s00145-013-9172-7.
  72. Panagiotis Andriotis, Theo Tryfonas, George Oikonomou, Irwin King.
    A framework for describing multimedia circulation in the smartphone ecosystem.
    Advances in Digital Forensics XI, IFIP Advances in Information and Communication Technology 462, pp. 251--267, 2015.
    DOI: http://dx.doi.org/10.1007/978-3-319-24123-4_15.
  73. David Bernhard, Marc Fischlin, Bogdan Warinschi.
    Adaptive Proofs of Knowledge in the Random Oracle Model.
    Public-Key Cryptography - PKC 2015, Lecture Notes in Computer Science, pp. 629--649, 2015.
    DOI: http://dx.doi.org/10.1007/978-3-662-46447-2_28.
  74. Valentina Banciu, Elisabeth Oswald, Carolyn Whitnall.
    Exploring the Resilience of Some Lightweight Ciphers Against Profiled Single Trace Attacks.
    Constructive Side-Channel Analysis and Secure Design - 6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14, 2015. Revised Selected Papers., Lecture Notes in Computer Science, pp. 51--63, 2015.
    DOI: http://dx.doi.org/10.1007/978-3-319-21476-4_4.
  75. Abhishek Banerjee, Georg Fuchsbauer, Chris Peikert, Krzysztof Pietrzak, Sophie Stevens.
    Key-Homomorphic Constrained Pseudorandom Functions.
    Theory of Cryptography - TCC 2015, Lecture Notes in Computer Science 9015, pp. 31--60, 2015.
    DOI: http://dx.doi.org/10.1007/978-3-662-46497-7_2.
  76. Panagiotis Andriotis, George Oikonomou.
    Messaging Activity Reconstruction with Sentiment Polarity Identification.
    Human Aspects of Information Security, Privacy, and Trust - HAS 2015, Lecture Notes in Computer Science 9190, pp. 475--486, 2015.
    DOI: http://dx.doi.org/10.1007/978-3-319-20376-8_42.
  77. Anna Lisa Ferrara, Georg Fuchsbauer, B Liu, Bogdan Warinschi.
    Policy Privacy in Cryptographic Access Control.
    IEEE 28th Computer Security Foundations Symposium - CSF 2015, Institute of Electrical and Electronics Engineers (IEEE), pp. 46--60, 2015.
    DOI: http://dx.doi.org/10.1109/CSF.2015.11.
  78. Shancang Li, Junhua Chen, Theodoros Spyridopoulos, Panos Andriotis, Robert Ludwiniak, Gordon Russell.
    Real-time Monitoring of Privacy Abuses and Intrusion Detection in Android System.
    3rd International Conference on Human Aspects of Information Security, Privacy and Trust, Lecture Notes in Computer Science 9190, pp. 379--390, 2015.
    DOI: http://dx.doi.org/10.1007/978-3-319-20376-8_34.
  79. Valentina Banciu, Elisabeth Oswald, Carolyn Whitnall.
    Reliable Information Extraction for Single Trace Attacks.
    Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition, DATE 2015, Grenoble, France, March 9-13, 2015., Association for Computing Machinery (ACM), pp. 133--138, 2015.
    DOI: http://dx.doi.org/10.7873/DATE.2015.0135.
  80. Carolyn Whitnall, Elisabeth Oswald.
    Robust Profiling for DPA-Style Attacks.
    Cryptographic Hardware and Embedded Systems - CHES 2015, Lecture Notes in Computer Science 9293, pp. 3--21, 2015.
    DOI: http://dx.doi.org/10.1007/978-3-662-48324-4_1.
  81. Carmit Hazay, Arpita Patra, Bogdan Warinschi.
    Selective Opening Security for Receivers.
    Advances in Cryptology - ASIACRYPT 2015, Lecture Notes in Computer Science 9452, pp. 443--469, 2015.
    DOI: http://dx.doi.org/10.1007/978-3-662-48797-6_19.
  82. David Bernhard, Véronique Cortier, David Galindo, Olivier Pereira, Bogdan Warinschi.
    SoK: A Comprehensive Analysis of Game-Based Ballot Privacy Definitions.
    2015 IEEE Symposium on Security and Privacy - S&P 2015, Institute of Electrical and Electronics Engineers (IEEE), pp. 499--516, 2015.
    DOI: http://dx.doi.org/10.1109/SP.2015.37.
  83. Essam Ghadafi.
    Stronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient Constructions.
    Topics in Cryptology - CT-RSA 2015, The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings, Lecture Notes in Computer Science 9048, pp. 391--409, 2015.
    DOI: http://dx.doi.org/10.1007/978-3-319-16715-2_21.
  84. 2014

  85. Jake Longo, Daniel P Martin, M E Oswald, Daniel Page, Martijn Stam, Mike Tunstall.
    Simulatable Leakage: Analysis, Pitfalls, and New Constructions.
    Advances in Cryptology - ASIACRYPT 2014, Lecture Notes in Computer Science 8873, pp. 223--242, 2014.
    DOI: http://dx.doi.org/10.1007/978-3-662-45611-8_12.
  86. Marcel K S Keller, Peter Scholl.
    Efficient, Oblivious Data Structures for MPC.
    Advances in Cryptology - ASIACRYPT 2014, Lecture Notes in Computer Science 8874, pp. 506--525, 2014.
    DOI: http://dx.doi.org/10.1007/978-3-662-45608-8_27.
  87. Sergiu Bursuc, Hubert Comon-Lundh, Stephanie Delaune.
    Deducibility constraints and blind signatures.
    Information and Computation, Vol. 238, pp. 106--127, 2014.
    DOI: http://dx.doi.org/10.1016/j.ic.2014.07.006.
  88. Naomi Benger, Joop van de Pol , Nigel P Smart, Yuval Yarom.
    'Ooh Aah... Just a Little Bit' : A Small Amount of Side Channel Can Go a Long Way.
    Cryptographic Hardware and Embedded Systems - CHES 2014, Lecture Notes in Computer Science 8731, pp. 75--92, 2014.
    DOI: http://dx.doi.org/10.1007/978-3-662-44709-3_5.
  89. Regazzoni Francesco, Tim Guneysu, Pascal Sasdrich, Marcin Wojcik.
    THOR - The hardware onion router.
    Field Programmable Logic and Applications (FPL), Institute of Electrical and Electronics Engineers (IEEE), pp. 1--4, 2014.
  90. Ashish Choudhary, Arpita Patra, Nigel P Smart.
    Reducing the Overhead of MPC over a Large Population.
    Security and Cryptography for Networks - SCN 2014, Lecture Notes in Computer Science 8642, pp. 197--217, 2014.
    DOI: http://dx.doi.org/10.1007/978-3-319-10879-7_12.
  91. V Kumar, George Oikonomou, Theo Tryfonas, Daniel Page, Iain Phillips.
    Digital Investigations for IPv6-Based Wireless Sensor Networks.
    Digital Investigation, Vol. 11, pp. S66--S75, 2014.
    DOI: http://dx.doi.org/10.1016/j.diin.2014.05.005.
  92. Shancang Li, Hongjian Sun, Arrumugam Nallanathan, LI Xu, Shanshan Zhao, Qindong Sun.
    Industrial Wireless Sensor Networks.
    International Journal of Distributed Sensor Networks, Vol. 10, XXXX(Pages)XXXX, 2014.
    DOI: http://dx.doi.org/10.1155/2014/218050.
  93. Robert P. McEvoy, Mike Tunstall, Claire Whelan, Colin C. Murphy, William P. Marnane.
    All-or-Nothing Transforms as a countermeasure to differential side-channel analysis.
    International Journal of Information Security, Vol. 13, pp. 291--304, 2014.
    DOI: http://dx.doi.org/10.1007/s10207-013-0212-y.
  94. Nigel P Smart, Frederik R G Vercauteren.
    Fully homomorphic SIMD operations.
    Designs, Codes and Cryptography, Vol. 71, pp. 57--81, 2014.
    DOI: http://dx.doi.org/10.1007/s10623-012-9720-4.
  95. Arpita Patra, Ashish Choudhury, C. Pandu Rangan.
    Asynchronous Byzantine Agreement with optimal resilience.
    Distributed computing, Vol. 27, pp. 111--146, 2014.
    DOI: http://dx.doi.org/10.1007/s00446-013-0200-5.
  96. Essam M O Ghadafi, Ali El Kaafarani , Dalia Khader.
    Decentralized Traceable Attribute-Based Signatures.
    Topics in Cryptology ? CT-RSA 2014, Springer 8366, pp. 327--348, 2014.
    DOI: http://dx.doi.org/10.1007/978-3-319-04852-9_17.
  97. Theodoros Spyridopoulos, Ioanna Topa, Maria Karyda, Theo Tryfonas.
    A holistic approach for Cyber Assurance of Critical Infrastructure with the Viable System Model.
    ICT Systems Security and Privacy Protection, IFIP Advances in Information and Communication Technology 428, pp. 438--445, 2014.
    DOI: http://dx.doi.org/10.1007/978-3-642-55415-5_37.
  98. Richard Craig, Theo Tryfonas, John May.
    A viable systems approach towards cyber situational awareness.
    Conference Proceedings - IEEE International Conference on Systems, Man and Cybernetics, Institute of Electrical and Electronics Engineers (IEEE) 2014-January, pp. 1405--1411, 2014.
    DOI: http://dx.doi.org/10.1109/SMC.2014.6974112.
  99. Payman Mohassel, Seyed Saeed Sadeghian, Nigel P. Smart.
    Actively Secure Private Function Evaluation.
    Advances in Cryptology - ASIACRYPT 2014, Lecture Notes in Computer Science 8874, pp. 486--505, 2014.
    DOI: http://dx.doi.org/10.1007/978-3-662-45608-8_26.
  100. Ming-Feng Lee, Nigel P. Smart, Bogdan Warinschi, Gaven J. Watson.
    Anonymity guarantees of the UMTS/LTE authentication and connection protocol.
    International Journal of Information Security, Vol. 13, pp. 513--527, 2014.
    DOI: http://dx.doi.org/10.1007/s10207-014-0231-3.
  101. Essam M O Ghadafi, Ali El Kaafarani , Chen Liqun, James Davenport.
    Attribute-Based Signatures with User-Controlled Linkability.
    Cryptology and Network Security, CANS 2014, Lecture Notes in Computer Science 8813, pp. 256--269, 2014.
    DOI: http://dx.doi.org/10.1007/978-3-319-12280-9_17.
  102. Panagiotis Andriotis, Theo Tryfonas, George Oikonomou.
    Complexity metrics and user strength perceptions of the pattern-lock graphical authentication method.
    Human Aspects of Information Security, Privacy, and Trust - HAS 2014, Lecture Notes in Computer Science 8533, pp. 115--126, 2014.
    DOI: http://dx.doi.org/10.1007/978-3-319-07620-1.
  103. Bogdan Groza, Bogdan Warinschi.
    Cryptographic puzzles and DoS resilience, revisited..
    Designs, Codes and Cryptography, Vol. 73, pp. 177--207, 2014.
    DOI: http://dx.doi.org/10.1007/s10623-013-9816-5.
  104. Enrique Larraia De Vega , Emmanuela Orsini, Nigel P. Smart.
    Dishonest Majority Multi-Party Computation for Binary Circuits.
    Advances in Cryptology - CRYPTO 2014, Lecture Notes in Computer Science 8617, pp. 495--512, 2014.
    DOI: http://dx.doi.org/10.1007/978-3-662-44381-1_28.
  105. Essam Ghadafi.
    Efficient Distributed Tag-Based Encryption and Its Application to Group Signatures with Efficient Distributed Traceability.
    Progress in Cryptology - LATINCRYPT 2014, Lecture Notes in Computer Science 8895, pp. 327--347, 2014.
    DOI: http://dx.doi.org/10.1007/978-3-319-16295-9_18.
  106. Florian Böhl, Gareth T. Davies, Dennis Hofheinz.
    Encryption Schemes Secure under Related-Key and Key-Dependent Message Attacks.
    Public Key Cryptography - PKC 2014, Lecture Notes in Computer Science 8383, pp. 483--500, 2014.
    DOI: http://dx.doi.org/10.1007/978-3-642-54631-0_28.
  107. Dario Catalano, Dario Fiore, Bogdan Warinschi.
    Homomorphic Signatures with Efficient Verification for Polynomial Functions..
    Advances in Cryptology - CRYPTO 2014, Lecture Notes in Computer Science 8617, pp. 371--389, 2014.
    DOI: http://dx.doi.org/10.1007/978-3-662-44371-2_21.
  108. Pawel Morawiecki, Kris Gaj, Ekwat Homsirikamol, Krystian Matusiewicz, Josef Pieprzyk, Marcin Rogawski, Marian Srebrny, Marcin Wojcik.
    ICEPOLE: High-Speed, Hardware-Oriented Authenticated Encryption.
    Cryptographic Hardware and Embedded Systems ? CHES 2014, Lecture Notes in Computer Science 8731, pp. 392--413, 2014.
  109. Gareth T. Davies, Martijn Stam.
    KDM Security in the Hybrid Framework.
    Topics in Cryptology - CT-RSA 2014, Lecture Notes in Computer Science 8366, pp. 461--480, 2014.
    DOI: http://dx.doi.org/10.1007/978-3-319-04852-9_24.
  110. Mihir Bellare, Sarah Meiklejohn, Susan Thomson.
    Key-Versatile Signatures and Applications: RKA, KDM and Joint Enc/Sig.
    Advances in Cryptology - EUROCRYPT 2014, Lecture Notes in Computer Science 8441, pp. 496--513, 2014.
    DOI: http://dx.doi.org/10.1007/978-3-642-55220-5_28.
  111. Theodoros Spyridopoulos, Konstantinos Maraslis, Theo Tryfonas, George Oikonomou, Shancang Li.
    Managing Cyber Security Risks in Industrial Control Systems with Game Theory and Viable System Modelling.
    IEEE 9th International Conference on System of Systems Engineering (SoSE), 2014, Institute of Electrical and Electronics Engineers (IEEE), pp. 266--271, 2014.
    DOI: http://dx.doi.org/10.1109/SYSOSE .2014.6892499.
  112. Mike Tunstall, Carolyn A Whitnall, M E Oswald.
    Masking Tables?An Underestimated Security Risk.
    Fast Software Encryption 2013, Lecture Notes in Computer Science 8424, pp. 425--444, 2014.
    DOI: http://dx.doi.org/10.1007/978-3-662-43933-3_22.
  113. Luke T Mather, M E Oswald, Carolyn A Whitnall.
    Multi-target DPA Attacks: Pushing DPA Beyond the Limits of a Desktop Computer.
    Advances in Cryptology - ASIACRYPT 2014, Lecture Notes in Computer Science 8873, pp. 243--261, 2014.
    DOI: http://dx.doi.org/10.1007/978-3-662-45611-8_13.
  114. Alexandra Boldyreva, Jean Paul Degabriele, Kenneth G. Paterson, Martijn Stam.
    On Symmetric Encryption with Distinguishable Decryption Failures.
    Fast Sofware Encryption - FSE 2013, Lecture Notes in Computer Science 8424, pp. 367--390, 2014.
    DOI: http://dx.doi.org/10.1007/978-3-662-43933-3.
  115. Ronald Cramer, Ivan Damgård, Marcel Keller.
    On the Amortized Complexity of Zero-Knowledge Protocols.
    J. Cryptology, Vol. 27, pp. 284--316, 2014.
    DOI: http://dx.doi.org/10.1007/s00145-013-9145-x.
  116. Panagiotis Andriotis, Theo Tryfonas, George Oikonomou, Shancang Li, Zacharias Tzermias, Konstantinos Xynos, Huw Read, Vassilis Prevelakis.
    On the Development of Automated Forensic Analysis Methods for Mobile Devices.
    Trust and Trustworthy Computing - TRUST 2014, Lecture Notes in Computer Science 8564, pp. 212--213, 2014.
    DOI: http://dx.doi.org/10.1007/978-3-319-08593-7.
  117. Carmit Hazay, Arpita Patra.
    One-Sided Adaptively Secure Two-Party Computation.
    Theory of Cryptography - TCC 2014, Lecture Notes in Computer Science 8349, pp. 368--393, 2014.
    DOI: http://dx.doi.org/10.1007/978-3-642-54242-8_16.
  118. Valentina Banciu, Elisabeth Oswald.
    Pragmatism vs. Elegance: Comparing Two Approaches to Simple Power Attacks on AES.
    Constructive Side-Channel Analysis and Secure Design - 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers., Lecture Notes in Computer Science 8622, pp. 29--40, 2014.
    DOI: http://dx.doi.org/10.1007/978-3-319-10175-0_3.
  119. Panagiotis Andriotis, Atsuhiro Takasu, Theo Tryfonas.
    Smartphone Message Sentiment Analysis.
    Advances in Digital Forensics X, IFIP Advances in Information and Communication Technology, pp. 253--265, 2014.
    DOI: http://dx.doi.org/10.1007/978-3-662-44952-3_17.
  120. Richard Craig, Theodoros Spyridopoulos, Theo Tryfonas, John H R May.
    Soft systems methodology in net-centric cyber defence system development.
    Conference Proceedings - IEEE International Conference on Systems, Man and Cybernetics, Institute of Electrical and Electronics Engineers (IEEE) 2014-January, pp. 672--677, 2014.
    DOI: http://dx.doi.org/10.1109/SMC.2014.6973986.
  121. Carolyn Whitnall, Elisabeth Oswald, François-Xavier Standaert.
    The Myth of Generic DPA...and the Magic of Learning.
    Topics in Cryptology - CT-RSA 2014, Lecture Notes in Computer Science 8366, pp. 183--205, 2014.
    DOI: http://dx.doi.org/10.1007/978-3-319-04852-9_10.
  122. Anna-Lisa Ferrara, Truc Nguyen Lam, P Madhusudan, Gennaro Parlato.
    Vac - Verifier of Administrative Role-Based Access Control Policies.
    Computer Aided Verification, Lecture Notes in Computer Science 8559, pp. 184--191, 2014.
  123. Daniel Page, Nigel Smart.
    What is Computer Science? An Information Security Perspective.
    Springer Verlag, 2014.
  124. 2013

  125. Ashish Choudhury, Jacob J Loftus, Emmanuela A Orsini, Arpita Patra, Nigel P Smart.
    Between a Rock and a Hard Place: Interpolating between MPC and FHE.
    Advances in Cryptology - ASIACRYPT 2013, Lecture Notes in Computer Science 8270, pp. 221--240, 2013.
    DOI: http://dx.doi.org/10.1007/978-3-642-42045-0_12.
  126. Joop van de Pol , Nigel P Smart.
    Estimating Key Sizes for High Dimensional Lattice-Based Systems.
    Proc. Cryptography and Coding, Lecture Notes in Computer Science 8308, pp. 290--303, 2013.
    DOI: http://dx.doi.org/10.1007/978-3-642-45239-0_17.
  127. Joppe W. Bos, Kristin Lauter, Jake Loftus, Michael Naehrig.
    Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme.
    Proc. Cryptography and Coding, Lecture Notes in Computer Science 8308, pp. 45--64, 2013.
    DOI: http://dx.doi.org/10.1007/978-3-642-45239-0_4.
  128. Christina Brzuska, Nigel P Smart, Bogdan Warinschi, Gaven Watson.
    An Analysis of the EMV Channel Establishment Protocol.
    ACM CCS 2013, Association for Computing Machinery (ACM), pp. 373--386, 2013.
    DOI: http://dx.doi.org/10.1145/2508859.2516748..
  129. Marcel K S Keller, Peter Scholl, Nigel P Smart.
    An Architecture for Practical Actively Secure MPC with Dishonest Majority.
    ACM CCS 2013, Association for Computing Machinery (ACM), pp. 549--560, 2013.
    DOI: http://dx.doi.org/10.1145/2508859.2516744.
  130. Florian Bohl, Veronique Cortier, Bogdan Warinschi.
    Deduction Soundness: Prove One, Get Five for Free.
    ACM CCS 2013, Association for Computing Machinery (ACM), pp. 1261--1272, 2013.
    DOI: http://dx.doi.org/10.1145/2508859.2516711.
  131. Theodoros Spyridopoulos, George Karanikas, Theo Tryfonas, George Oikonomou.
    A Game Theoretic Defence Framework Against DoS/DDoS Cyber Attacks.
    Computers & Security, Vol. 38, pp. 39--50, 2013.
    DOI: http://dx.doi.org/10.1016/j.cose.2013.03.014.
  132. Theodoros Spyridopoulos, Theo Tryfonas, John H R May.
    Incident Analysis & Digital Forensics in SCADA and Industrial Control Systems.
    System Safety Conference incorporating the Cyber Security Conference 2013, 8th IET International, Institution of Engineering and Technology, pp. 1--6, 2013.
    DOI: http://dx.doi.org/10.1049/cp.2013.1720.
  133. M E Oswald, Carolyn A Whitnall.
    Profiling DPA: Efficacy and efficiency trade-offs.
    Cryptographic Hardware and Embedded Systems - CHES 2013, Lecture Notes in Computer Science 8086, pp. 37--54, 2013.
    DOI: http://dx.doi.org/10.1007/978-3-642-40349-1_3.
  134. David Bernhard, Bogdan Warinschi, Georg Fuchsbauer, Essam M O Ghadafi, Nigel P Smart.
    Anonymous Attestation with User-Controlled Linkability.
    International Journal of Information Security, Vol. 12, pp. 219--249, 2013.
    DOI: http://dx.doi.org/10.1007/s10207-013-0191-z.
  135. Panagiotis Andriotis, Theo Tryfonas, George Oikonomou, Theodoros Spyridopoulos, Alex Zaharis, Adamantini Martini, I Askoxylakis.
    On Two Different Methods for Steganography Detection in JPEG Images with Benford's Law.
    Proc. 7th Scientific NATO Conference in Security and Protection of Information (SPI 2013), Brno University of Defence, pp. 3--14, 2013.
  136. Panagiotis Andriotis, George Oikonomou, Theo Tryfonas.
    JPEG Steganography Detection with Benford's Law.
    Digital Investigation, Vol. 9, pp. 246--257, 2013.
    DOI: http://dx.doi.org/10.1016/j.diin.2013.01.005.
  137. Panagiotis Andriotis, Theo Tryfonas, George Oikonomou, Can Yildiz.
    A Pilot Study on the Security of Pattern Screen-Lock Methods and Soft Side Channel Attacks.
    Security and Privacy in Wireless and Mobile Networks - WiSec 13, Association for Computing Machinery (ACM), pp. 1--6, 2013.
    DOI: http://dx.doi.org/10.1145/2462096.2462098.
  138. Dana Polatin-Reuben, Richard Craig, Theodoros Spyridopoulos, Theo Tryfonas.
    A System Dynamics Model of Cyber Conflict.
    Systems, Man, and Cybernetics - IEEE SMC 2013, Institute of Electrical and Electronics Engineers (IEEE), pp. 303--308, 2013.
    DOI: http://dx.doi.org/10.1109/SMC.2013.58.
  139. Giuseppe Ateniese, Alfredo De Santis, Anna-Lisa Ferrara, Barbara Masucci.
    A note on time-bound hierarchical key assignment schemes.
    Inf. Process. Lett., Vol. 113, pp. 151--155, 2013.
  140. Ashish Choudhury, Martin Hirt, Arpita Patra.
    Asynchronous Multiparty Computation with Linear Communication Complexity.
    DISC 2013, Lecture Notes in Computer Science 8205, pp. 388--402, 2013.
  141. Ben Smyth, David Bernhard.
    Ballot Secrecy and Ballot Independence Coincide.
    Computer Security - ESORICS 2013, Lecture Notes in Computer Science 8134, pp. 463--480, 2013.
  142. Ashish Choudhary.
    Breaking the O(n|C|) Barrier for Unconditionally Secure Asynchronous Multiparty Computation.
    Topics in Cryptology - INDOCRYPT 2013, Lecture Notes in Computer Science 8250, pp. 19--37, 2013.
  143. Panagiotis Ilia, George Oikonomou, Theo Tryfonas.
    Cryptographic Key Exchange in IPv6-Based Low Power, Lossy Networks.
    Information Security Theory and Practice - WISTP 2013, Lecture Notes in Computer Science 7886, pp. 34--49, 2013.
    DOI: http://dx.doi.org/10.1007/978-3-642-38530-8_3.
  144. David Bernhard, Bogdan Warinschi.
    Cryptographic Voting - A Gentle Introduction..
    Foundations of Security Analysis and Design VII - FOSAD 2012/2013, Lecture Notes in Computer Science 8604, pp. 167--211, 2013.
    DOI: http://dx.doi.org/10.1007/978-3-319-10082-1_7.
  145. Anna-Lisa Ferrara, Georg Fuchsbauer, Bogdan Warinschi.
    Cryptographically Enforced RBAC.
    IEEE CSF 2013, IEEE Computer Society, pp. 115, 2013.
  146. Theodoros Spyridopoulos, Vasilios Katos.
    Data Recovery Strategies for Cloud Environments.
    Cybercrime and Cloud Forensics: Applications for Investigation Processes, IGI Global, pp. 251--265, 2013.
    DOI: http://dx.doi.org/10.4018/978-1-4666-2662-1.ch010.
  147. Sk Subidh Ali, Debdeep Mukhopadhyay, Mike Tunstall.
    Differential Fault Analysis of AES: Towards Reaching its Limits.
    Journal of Cryptographic Engineering, Vol. 3, pp. 73, 2013.
  148. Luke T Mather, M E Oswald, Joe Bandenburg, Marcin Wojcik.
    Does My Device Leak Information? An a priori Statistical Power Analysis of Leakage Detection Tests.
    Advances in Cryptology - ASIACRYPT 2013, Lecture Notes in Computer Science 8269, pp. 486--505, 2013.
    DOI: http://dx.doi.org/10.1007/978-3-642-42033-7_25.
  149. David Bernhard, Essam M O Ghadafi, Georg Fuchsbauer.
    Efficient Signatures of Knowledge and DAA in the Standard Model.
    Applied Cryptography and Network Security -- ACNS 2013, Lecture Notes in Computer Science 7954, pp. 518--533, 2013.
    DOI: http://dx.doi.org/10.1007/978-3-642-38980-1_33.
  150. Craig Gentry, Shai Halevi, Chris Peikert, Nigel P Smart.
    Field switching in BGV-style homomorphic encryption.
    Journal of Computer Security, Vol. 21, pp. 663--684, 2013.
    DOI: http://dx.doi.org/10.3233/JCS-130480.
  151. Essam M O Ghadafi.
    Formalizing Group Blind Signatures and Practical Constructions without Random Oracles..
    Information Security and Privacy - ACISP 2013., Lecture Notes in Computer Science 7959, pp. 330--346, 2013.
    DOI: http://dx.doi.org/10.1007/978-3-642-39059-3_23.
  152. Theodoros Spyridopoulos, George Oikonomou, Theo Tryfonas, Mengmeng Ge.
    Game Theoretic Approach for Cost-Benefit Analysis of Malware Proliferation Prevention.
    Information Security and Privacy - SEC 2013, IFIP Advances in Information and Communication Technology 405, pp. 28--41, 2013.
    DOI: http://dx.doi.org/10.1007/978-3-642-39218-4_3.
  153. Paul Baecher, Pooya Farshim, Marc Fischlin, Martijn Stam.
    Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions.
    Advances in Cryptology - EUROCRYPT 2013, Lecture Notes in Computer Science 7881, pp. 426--443, 2013.
    DOI: http://dx.doi.org/10.1007/978-3-642-38348-9_26.
  154. Christina Brzuska, Marc Fischlin, Nigel P Smart, Bogdan Warinschi, Stephen C Williams.
    Less is more: relaxed yet composable security notions for key exchange.
    International Journal of Information Security, Vol. 12, pp. 267--297, 2013.
    DOI: http://dx.doi.org/10.1007/s10207-013-0192-y.
  155. Valentina Banciu, Simon Hoerder, Daniel Page.
    Light-weight primitive, feather-weight security: a cryptanalytic knock-out.
    Workshop on Embedded Systems Security - WESS 2013, Association for Computing Machinery (ACM), pp. 1----10, 2013.
  156. Panagiotis Andriotis, Zacharias Tzermias, Anthi Mparmpaki, Sotiris Ioannidis, George Oikonomou.
    Multilevel Visualization Using Enhanced Social Network Analysis with Smartphone Data.
    International Journal of Digital Crime and Forensics, Vol. 5, pp. 34--54, 2013.
    DOI: http://dx.doi.org/10.4018/ijdcf.2013100103.
  157. Simon Hoerder, Kimmo Järvinen, Daniel Page.
    On secure embedded token design: Quasi-looped Yao circuits and bounded leakage.
    Workshop in Information Security Theory and Practice - WISTP 2013, Lecture Notes in Computer Science 7886, pp. 112--128, 2013.
    DOI: http://dx.doi.org/10.1007/978-3-642-38530-8_8.
  158. Anna-Lisa Ferrara, P. Madhusudan, Gennaro Parlato.
    Policy Analysis for Self-administrated Role-Based Access Control.
    Tools and Algorithms for the Construction and Analysis of Systems - TACAS 2013, Lecture Notes in Computer Science 7795, pp. 432--447, 2013.
  159. Ivan Damgård, Marcel Keller, Enrique Larraia, Valerio Pastro, Peter Scholl, Nigel P. Smart.
    Practical Covertly Secure MPC for Dishonest Majority - Or: Breaking the SPDZ Limits.
    Computer Security - ESORICS 2013, Lecture Notes in Computer Science 8134, pp. 1--18, 2013.
  160. Myrto Arapinis, Sergiu Bursuc, Mark Ryan.
    Privacy-supporting cloud computing by in-browser key translation.
    Journal of Computer Security, Vol. 21, pp. 846, 2013.
    DOI: http://dx.doi.org/10.3233/JCS-130489.
  161. Thijs Laarhoven, Michele Mosca, Joop van de Pol .
    Solving the Shortest Vector Problem in Lattices Faster Using Quantum Search.
    Post-Quantum Cryptography - PQC 2013, Lecture Notes in Computer Science 7932, pp. 83--101, 2013.
    DOI: http://dx.doi.org/10.1007/978-3-642-38616-9_6.
  162. Kalliopi Anastasopoulou, Theo Tryfonas, S Kokolakis.
    Strategic Interaction Analysis of Privacy-Sensitive End-Users of Cloud-Based Mobile Apps.
    Human Aspects of Information Security, Privacy, and Trust - HAS 2013, Lecture Notes in Computer Science 8030, pp. 209--216, 2013.
    DOI: http://dx.doi.org/10.1007/978-3-642-39345-7_22.
  163. Essam M O Ghadafi.
    Sub-linear Blind Ring Signatures without Random Oracles.
    Coding and Cryptography - IMACC 2013, Lecture Notes in Computer Science 8308, pp. 304--323, 2013.
    DOI: http://dx.doi.org/10.1007/978-3-642-45239-0_18.
  164. Mike Bond, George French, Nigel P. Smart, Gaven J. Watson.
    The Low-Call Diet: Authenticated Encryption for Call Counting HSM Users.
    Topics in Cryptology - CT-RSA 2013, Lecture Notes in Computer Science 7779, pp. 359--374, 2013.
  165. David Bernhard, Stephan Neumann, Melanie Volkamer.
    Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs.
    E-Voting and Identify - VOTE-ID 2013, Lecture Notes in Computer Science 7985, pp. 176--192, 2013.
  166. 2012

  167. Stefan Tillich, Marcin Wojcik.
    Security Analysis of an Open Car Immobilizer Protocol Stack.
    Trusted Systems - INTRUST 2012, Lecture Notes in Computer Science 7711, pp. 83--94, 2012.
  168. Luke T Mather, M E Oswald.
    Pinpointing Side-Channel Information Leaks in Web Applications.
    Journal of Cryptographic Engineering, Vol. 2, pp. 161--177, 2012.
    DOI: http://dx.doi.org/10.1007/s13389-012-0036-0.
  169. Dario Fiore, Rosario Gennaro, Nigel Smart.
    Relations between the security models for certificateless encryption and ID-based key agreement.
    International Journal of Information Security, Vol. 11, pp. 1--22, 2012.
    DOI: http://dx.doi.org/10.1007/s10207-011-0149-y.
  170. Boldyreva Alexandra, Palacio Adriana, B Warinschi.
    Secure Proxy Signatures Schemes for Delegation of Signing Rights.
    Journal of Cryptology, Vol. 25, pp. 57--115, 2012.
    DOI: http://dx.doi.org/10.1007/s00145-010-9082-x.
  171. Patrick Koeberl, Jiangtao Li, Roel Maes, Anand Rajan, Claire Vishik, Marcin Wojcik, Wei Wu.
    A practical device authentication scheme using SRAM PUFs.
    Journal of Cryptographic Engineering, Vol. 2, pp. 255--269, 2012.
  172. Emre Uzun, Vijayalakshmi Atluri, Shamik Sural, Jaideep Vaidya, Gennaro Parlato, Anna-Lisa Ferrara, Madhusudan P..
    Analyzing Temporal Role Based Access Control Models.
    Symposium on Access Control Models and Technologies - SACMAT 2012, Association for Computing Machinery (ACM), pp. 177--186, 2012.
  173. Craig Gentry, Shai Halevi, Nigel P. Smart.
    Better Bootstrapping in Fully Homomorphic Encryption.
    Public Key Cryptography - PKC 2012, Lecture Notes in Computer Science 7293, pp. 1--16, 2012.
  174. Ashish Choudhary, Arpita Patra.
    Brief Announcement: Efficient Optimally Resilient Statistical AVSS and its Applications.
    ACM Symposium on Principles of Distributed Computing - PODC 2012, ACM Press / Sheridan, pp. 103--104, 2012.
  175. Ashish Choudhary.
    Brief Announcement: Optimal Amortized Secret Sharing with Cheater Identification.
    ACM Symposium on Principles of Distributed Computing - PODC 2012, ACM Press / Sheridan -, pp. 101--102, 2012.
  176. Dimitar Jetchev, Onur Özen, Martijn Stam.
    Collisions Are Not Incidental: A Compression Function Exploiting Discrete Geometry.
    Theory of Cryptography - TCC 2012, Lecture Notes in Computer Science 7194, pp. 303--320, 2012.
    DOI: http://dx.doi.org/10.1007/978-3-642-28914-9_17.
  177. Andrew D Moss, Elisabeth Oswald, Daniel Page, Mike Tunstall.
    Compiler assisted masking.
    Cryptographic Hardware and Embedded Systems - CHES, Lecture Notes in Computer Science 7428, pp. 58--75, 2012.
    DOI: http://dx.doi.org/10.1007/978-3-642-33027-8_4.
  178. A Fragkiadakis, E Tragos, T Tryfonas, I Askoxylakis.
    Design and Performance Evaluation of a Lightweight Wireless Early Warning Intrusion Detection Prototype.
    EURASIP Journal on Wireless Communications and Networking, Vol. 2012:73, pp. 1--18, 2012.
    DOI: http://dx.doi.org/10.1186/1687-1499-2012-73.
  179. Johann Groszschaedl, Daniel Page, Stefan Tillich.
    Efficient Java implementation of elliptic curve cryptography for J2ME-enabled mobile devices.
    Workshop in Information Security Theory and Practice - WISTP 2012, Lecture Notes in Computer Science 7322, pp. 189----207, 2012.
  180. Dario Catalano, Dario Fiore, Bogdan Warinschi.
    Efficient Network Coding Signatures in the Standard Model.
    Public Key Cryptography - PKC 2012, Lecture Notes in Computer Science 7293, pp. 680--696, 2012.
  181. Marcel Keller, Gert Læssøe Mikkelsen, Andy Rupp.
    Efficient Threshold Zero-Knowledge with Applications to User-Centric Protocols.
    Information Theoretic Security - ICITS 2012, Lecture Notes in Computer Science 7412, pp. 147--166, 2012.
  182. Essam Ghadafi, Nigel P. Smart.
    Efficient Two-Move Blind Signatures in the Common Reference String Model.
    Information Security - ISC 2012, Lecture Notes in Computer Science 7483, pp. 274--289, 2012.
  183. Nadia El Mrabet , Daniel Page, Frederik R G Vercauteren.
    Fault attacks on pairing based cryptography: a state of the art.
    Fault Analysis in Cryptography, Springer, pp. 221--236, 2012.
  184. Panagiotis Andriotis, George Oikonomou, Theo Tryfonas.
    Forensic Analysis of Wireless Networking Evidence of Android Smartphones.
    Workshop on Information Forensics and Security - WIFS 2012, Institute of Electrical and Electronics Engineers (IEEE), pp. 109--114, 2012.
    DOI: http://dx.doi.org/10.1109/WIFS.2012.6412634.
  185. Craig Gentry, Shai Halevi, Nigel P. Smart.
    Fully Homomorphic Encryption with Polylog Overhead.
    Advances in Cryptology - EUROCRYPT 2012, Lecture Notes in Computer Science 7237, pp. 465--482, 2012.
  186. Kimmo Järvinen, Celine Blondeau, Daniel Page, Mike Tunstall.
    Harnessing biased faults in attacks on ECC-based signature schemes.
    Fault Diagnosis and Tolerance in Cryptography - FDTC 2012, Institute of Electrical and Electronics Engineers (IEEE), pp. 72--82, 2012.
  187. Craig Gentry, Shai Halevi, Nigel P. Smart.
    Homomorphic Evaluation of the AES Circuit.
    Advances in Cryptology - CRYPTO 2012, Lecture Notes in Computer Science 7417, pp. 850--867, 2012.
    DOI: http://dx.doi.org/10.1007/978-3-642-32009-5_49.
  188. David Bernhard, Bogdan Warinschi, Olivier Pereira.
    How Not to Prove Yourself: Pitfalls of Fiat-Shamir and Applications to Helios.
    Advances in Cryptology - ASIACRYPT 2012, Lecture Notes in Computer Science 7658, pp. 626--643, 2012.
    DOI: http://dx.doi.org/10.1007/978-3-642-34961-4_38.
  189. Ivan Damgård, Marcel Keller, Enrique Larraia, Christian Miles, Nigel P. Smart.
    Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocol.
    Security and Cryptography for Networks - SCN 2012, Lecture Notes in Computer Science 7485, pp. 241--263, 2012.
  190. Mike Tunstall.
    Improved {"}Partial Sums{"}-based Square Attack on AES.
    International Conference on Security and Cryptography - SECRYPT 2012, INSTICC Press, pp. 25--34, 2012.
  191. Emmanuela A Orsini, Chiara Marcolla, Massimiliano Sala.
    Improved decoding of affine-variety codes.
    Journal of Pure and Applied Algebra, Vol. 216, pp. 1533, 2012.
  192. Gierlichs Benedikt, Jorn-Marc Schmidt, Mike Tunstall.
    Infective Computation and Dummy Rounds: Fault Protection for Block Ciphers without Check-before-Output.
    LATINCRYPT 2012, Lecture Notes in Computer Science 7533, pp. 305--321, 2012.
  193. Nikolaos E. Petroulakis, Ioannis G. Askoxylakis, Theo Tryfonas.
    Life-logging in smart environments: Challenges and security threats.
    IEEE International Conference on Communications, Institute of Electrical and Electronics Engineers (IEEE), pp. 5680--5684, 2012.
    DOI: http://dx.doi.org/10.1109/ICC.2012.6364934.
  194. Gaven Watson, Reihaneh Safavi-Naini, Mohsen Alimomeni, Michael Locasto, Shivaramakrishnan Narayan.
    LoSt: Location Based Storage.
    Cloud Computing Security Workshop - CCSW 2012, Association for Computing Machinery (ACM) -, pp. 59--70, 2012.
    DOI: http://dx.doi.org/10.1145/2381913.2381926.
  195. David Bernhard, Bogdan Warinschi, Véronique Cortier, Olivier Pereira.
    Measuring Vote Privacy, Revisited.
    Proceedings of the 2012 ACM conference on Computer and communications security, ACM Press / Sheridan, pp. 941----952, 2012.
    DOI: http://dx.doi.org/10.1145/2382196.2382295.
  196. Ivan Damgård, Valerio Pastro, Nigel P. Smart, Sarah Zakarias.
    Multiparty Computation from Somewhat Homomorphic Encryption.
    Advances in Cryptology - CRYPTO 2012, Lecture Notes in Computer Science 7417, pp. 643--662, 2012.
  197. Jake Loftus, Alexander May, Nigel P. Smart, Frederik Vercauteren.
    On CCA-Secure Somewhat Homomorphic Encryption.
    Selected Areas in Cryptography - SAC 2011, Lecture Notes in Computer Science 7118, pp. 55--72, 2012.
  198. Robert Beat, Philipp Grabher, Daniel Page, Stefan Tillich, Marcin Wojcik.
    On reconfigurable fabrics and generic side-channel countermeasures.
    Field Programmable Logic - FPL 2012, Institute of Electrical and Electronics Engineers (IEEE), pp. 663----66, 2012.
  199. Jean Paul Degabriele, Anja Lehmann, Kenneth G. Paterson, Nigel P. Smart, Mario Strefler.
    On the Joint Security of Encryption and Signature in EMV.
    Topics in Cryptology - CT-RSA 2012, Lecture Notes in Computer Science 7178, pp. 116--135, 2012.
  200. Ashwinkumar Badanidiyuru, Arpita Patra, Ashish Choudhary, Srinathan Kannan, Pandu Rangan Chandrasekaran.
    On the Trade-Off between Network Connectivity, Round Complexity, and Communication Complexity of Reliable Message Transmission.
    Journal of the ACM, Vol. 22, pp. 1--35, 2012.
  201. Sébastien Canard, Georg Fuchsbauer, Aline Gouget, Fabien Laguillaumie.
    Plaintext-Checkable Encryption.
    Topics in Cryptology - CT-RSA 2012, Lecture Notes in Computer Science 7178, pp. 332--348, 2012.
  202. Billy Brumley, Manuel B M Barbosa, Daniel Page, Frederik R G Vercauteren.
    Practical realisation and elimination of an ECC-related software bug attack.
    Topics in Cryptology - CT-RSA 2012, Lecture Notes in Computer Science 7178, pp. 171--186, 2012.
    DOI: http://dx.doi.org/10.1007/978-3-642-27954-6_11.
  203. Giuseppe Ateniese, Alfredo De Santis , Anna-Lisa Ferrara, Barbara Masucci.
    Provably-Secure Time-Bound Hierarchical Key Assignment Schemes.
    Journal of Cryptology, Vol. 25, pp. 243--270, 2012.
  204. Bogdan Groza, Bogdan Warinschi.
    Revisiting Difficulty Notions for Client Puzzles and DoS Resilience.
    Information Security Conference - ISC 2012, Lecture Notes in Computer Science 7483, pp. 39--54, 2012.
  205. Craig Gentry, Shai Halevi, Chris Peikert, Nigel P. Smart.
    Ring Switching in BGV-Style Homomorphic Encryption.
    Security and Cryptography for Networks - SCN 2012, Lecture Notes in Computer Science 7485, pp. 19--37, 2012.
  206. Anna-Lisa Ferrara, Gennaro Parlato, Madhusudan P..
    Security Analysis of Role-Based Access Control through Program Verification.
    Computer Security Foundations Symposium - CSF 2012, IEEE Computer Society, pp. 113--125, 2012.
  207. Alexandra Boldyreva, Jean Paul Degabriele, Kenneth G. Paterson, Martijn Stam.
    Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation.
    Advances in Cryptology - EUROCRYPT 2012, Lecture Notes in Computer Science 7237, pp. 682--699, 2012.
    DOI: http://dx.doi.org/10.1007/978-3-642-29011-4_40.
  208. Dimitar Jetchev, Onur Özen, Martijn Stam.
    Understanding Adaptivity: Random Systems Revisited.
    Advances in Cryptology - ASIACRYPT 2012, Lecture Notes in Computer Science 7658, pp. 313--330, 2012.
    DOI: http://dx.doi.org/10.1007/978-3-642-34961-4_20.
  209. Thorsten Kleinjung, Arjen Lenstra, Daniel Page, Nigel P Smart.
    Using the cloud to determine key strengths.
    Progress in Cryptology - INDOCRYPT 2012, Lecture Notes in Computer Science 7668, pp. 17--39, 2012.
  210. 2011

  211. S Tillich, Kirschbaum Mario, Szekely Alexander.
    Implementation and Evaluation of an SCA-Resistant Embedded Processor.
    Smart Card Research and Advanced Applications - CARDIS 2011, Lecture Notes in Computer Science 7079, pp. 151 -- 165, 2011.
    DOI: http://dx.doi.org/10.1007/978-3-642-27257-8_10.
  212. Carolyn A Whitnall, M E Oswald.
    A fair evaluation framework for comparing side-channel distinguishers.
    Journal of Cryptographic Engineering, Vol. 1, pp. 145--160, 2011.
    DOI: http://dx.doi.org/10.1007/s13389-011-0011-1.
  213. Véronique Cortier, Bogdan Warinschi.
    A Composable Computational Soundness Notion.
    Conference on Computer and Communications Security - CCS 2011, Association for Computing Machinery (ACM) -, pp. 63--74, 2011.
  214. Carolyn A Whitnall, ME Oswald.
    A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework.
    Advances in Cryptology - CRYPTO 2011, Lecture Notes in Computer Science 6841, pp. 316--334, 2011.
    DOI: http://dx.doi.org/10.1007/978-3-642-22792-9_18.
  215. I Askoxylakis, T Tryfonas, JHR May, V Siris, A Traganitis.
    A Family of Key Agreement Mechanisms for Mission Critical Communications for Secure Mobile Ad Hoc and Wireless Mesh Internetworking.
    EURASIP Journal on Wireless Communications and Networking, Vol. 2011, pp. 1--17, 2011.
    DOI: http://dx.doi.org/10.1155/2011/807684.
  216. Veronique Cortier, Steve Kremer, Bogdan Warinschi.
    A Survey of Symbolic Methods in Computational Analysis of Cryptographic Systems.
    Journal of Automated Reasoning, Vol. 46, pp. 225--259, 2011.
  217. Tobias Vejda, Johann Groszschaedl, Daniel Page.
    A unified multiply/accumulate unit for pairing-based cryptography over prime, binary and ternary fields.
    Digital System Design, Architectures, Methods and Tools - DSD 2011, Institute of Electrical and Electronics Engineers (IEEE), pp. 658--666, 2011.
  218. Olivier Blazy, Sébastien Canard, Georg Fuchsbauer, Aline Gouget, Hervé Sibert, Jacques Traoré.
    Achieving Optimal Anonymity in Transferable E-Cash with a Judge.
    Progress in Cryptology - AFRICACRYPT 2011, Lecture Notes in Computer Science 6737, pp. 206--223, 2011.
  219. David Bernhard, Véronique Cortier, Olivier Pereira, Ben Smyth, Bogdan Warinschi.
    Adapting Helios for Provable Ballot Privacy.
    European Symposium on Research in Computer Security - ESORICS 2011, Lecture Notes in Computer Science 6879, pp. 335--354, 2011.
  220. Dario Catalano, Dario Fiore, Bogdan Warinschi.
    Adaptive Pseudo-free Groups And Applications.
    Advances in Cryptology - EUROCRYPT 2011, Lecture Notes in Computer Science 6632, pp. 207--223, 2011.
  221. S. Mangard, ME Oswald, F.-X. Standaert.
    All for one-one for all: Unifying univariate DPA attacks.
    IET Information Security, Vol. 5(2), pp. 100 -- 110, 2011.
  222. Carolyn A Whitnall, M E Oswald, Luke T Mather.
    An Exploration of the Kolmogorov-Smirnov Test as a Competitor to Mutual Information Analysis.
    Smart Card Research and Advanced Applications, Lecture Notes in Computer Science, pp. 234--251, 2011.
    DOI: http://dx.doi.org/10.1007/978-3-642-27257-8_15.
  223. Simon Hoerder, Marcin Wojcik, Stefan Tillich, Daniel Page.
    An evaluation of hash functions on a power analysis resistant processor architecture.
    Workshop in Information Security Theory and Practice - WISTP 2011, Lecture Notes in Computer Science 6633, pp. 160--174, 2011.
  224. Philipp Grabher, Johann Groszschaedl, Simon Hoerder, Kimmo Järvinen, Daniel Page, Stefan Tillich, Marcin Wojcik.
    An exploration of mechanisms for dynamic cryptographic instruction set extension.
    Journal of Cryptographic Engineering, Vol. 2, pp. 1--18, 2011.
  225. Philipp Grabher, Johann Groszschaedl, Simon Hoerder, Kimmo Järvinen, Daniel Page, Stefan Tillich, Marcin Wojcik.
    An exploration of mechanisms for dynamic cryptographic instruction set extension.
    Cryptographic Hardware and Embedded Systems - CHES 2011, Lecture Notes in Computer Science 6917, pp. 1--16, 2011.
  226. Stephen C. Williams.
    Analysis of the SSH Key Exchange Protocol.
    Coding and Cryptography - IMACC2011, Lecture Notes in Computer Science 7089, pp. 356--374, 2011.
  227. Billy Brumley, Daniel Page.
    Bit-sliced binary normal basis multiplication.
    Computer Arithmetic - ARITH 2011, Institute of Electrical and Electronics Engineers (IEEE), pp. 205--212, 2011.
  228. A Amarilli, S Muller, D Naccache, Daniel Page, P Rauzy, Mike Tunstall.
    Can code polymorphism limit information leakage?.
    Workshop on Information Security Theory and Practice - WISTP 2011, Lecture Notes in Computer Science 6633, pp. 1--21, 2011.
  229. Georg Fuchsbauer.
    Commuting Signatures and Verifiable Encryption.
    Advances in Cryptology - EUROCRYPT 2011, Lecture Notes in Computer Science 6632, pp. 224--245, 2011.
  230. Christina Brzuska, Marc Fischlin, Bogdan Warinschi, Stephen C. Williams.
    Composability of Bellare-Rogaway Key Exchange Protocols.
    Conference on Computer and Communications Security - CCS 2011, Association for Computing Machinery (ACM) -, pp. 51--62, 2011.
  231. Veronique Cortier, Steve Kremer, Emmanuel Bresson, Yassine Lacknech, Laurent Mazare, Bogdan Warinschi.
    Computationally Sound Analysis of Encrypting with Diffie Hellman Keys.
    Formal Models and Techniques for Analyzing Security Protocols, IOS Press, pp. 277--303, 2011.
  232. Patrick Koeberl, Jiangtao Li, Anand Rajan, Claire Vishik, Marcin Wojcik.
    Consumerization: Consequences of Fuzzy Work-Home Boundaries.
    ISSE 2011 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2011 Conference, Vieweg+Teubner, pp. 138--153, 2011.
  233. Mike Tunstall, Debdeep Mukhopadhyay, Subidh Ali.
    Differential Fault Analysis of the Advanced Encryption Standard using a Single Fault.
    Workshop in Information Security Theory and Practice - WISTP 2011, Lecture Notes in Computer Science 6633, pp. 224--233, 2011.
  234. Joppe W. Bos, Onur Özen, Martijn Stam.
    Efficient Hashing Using the AES Instruction Set.
    Cryptographic Hardware and Embedded Systems - CHES 2011, Lecture Notes in Computer Science 6917, pp. 507--522, 2011.
    DOI: http://dx.doi.org/10.1007/978-3-642-23951-9_33.
  235. Patrick Koeberl, Jiangtao Li, Roel Maes, Anand Rajan, Claire Vishik, Marcin Wojcik.
    Evaluation of a PUF Device Authentication Scheme on a Discrete 0.13um SRAM.
    Trusted Systems - INTRUST 2011, Lecture Notes in Computer Science 7222, pp. 271--288, 2011.
  236. Peter Scholl, Nigel P. Smart.
    Improved Key Generation for Gentry's Fully Homomorphic Encryption Scheme.
    Cryptography and Coding - IMACC 2011, Lecture Notes in Computer Science 7089, pp. 10--22, 2011.
  237. Gallais Jean-François, Kizhvatov Ilya, Mike Tunstall.
    Improved Trace-Driven Cache-Collision Attacks Against Embedded AES Implementations.
    Workshop on Information Security Applications - WISA 2011, Lecture Notes in Computer Science 6513, pp. 243--257, 2011.
  238. A Zaharis, A Martini, T Tryfonas, C Ilioudis, G Pangalos.
    Lightweight Steganalysis based on Image Reconstruction & Lead Digit Distribution Analysis.
    International Journal of Digital Crime and Forensics, Vol. 3, pp. 29 -- 41, 2011.
  239. Jooyoung Lee, Martijn Stam.
    MJH: A Faster Alternative to MDC-2.
    Topics in Cryptology ? CT-RSA 2011, Lecture Notes in Computer Science 6558, pp. 213--236, 2011.
  240. Ashish Choudhary, Arpita Patra.
    On the Communication Complexity of Reliable and Secure Message Transmission in Asynchronous Networks.
    Information Security and Cryptology - ICISC 2011, Lecture Notes in Computer Science 7259, pp. 450, 2011.
  241. Kenneth G. Paterson, Jacob C. N. Schuldt, Martijn Stam, Susan Thomson.
    On the Joint Security of Encryption and Signature, Revisited.
    Advances in Cryptology - ASIACRYPT 2011, Lecture Notes in Computer Science 7073, pp. 161--178, 2011.
    DOI: http://dx.doi.org/10.1007/978-3-642-25385-0_9.
  242. Mike Tunstall.
    Practical Complexity Differential Cryptanalysis and Fault Analysis of AES.
    Journal of Cryptographic Engineering, Vol. 1, pp. 219--230, 2011.
  243. A Zaharis, A Martini, T Tryfonas, C Ilioudis, G Pangalos.
    Reconstructive Steganalysis by Source Bytes Lead Digit Distribution Examination.
    Digital Forensics and Incident Analysis - WDFIA 2011, University of Plymouth -, pp. 55 -- 68, 2011.
  244. Theodoros Spyridopoulos, Vasilios Katos.
    Requirements for a Forensically Ready Cloud Storage Service.
    International Journal of Digital Crime and Forensics, Vol. 3, pp. 19--36, 2011.
    DOI: http://dx.doi.org/10.4018/jdcf.2011070102.
  245. Jacob J Loftus, Nigel P. Smart.
    Secure Outsourced Computation.
    Progress in Cryptology - AFRICACRYPT 2011, Lecture Notes in Computer Science 6737, pp. 1--20, 2011.
  246. Steve Kremer, Graham Steel, Bogdan Warinschi.
    Security for Key Management Interfaces.
    Computer Security Foundations Symposium - CSF 2011, IEEE Computer Society -, pp. 266--280, 2011.
    DOI: http://dx.doi.org/10.1109/CSF.2011.25.
  247. Liqun Chen, Ming-Feng Lee, Bogdan Warinschi.
    Security of the Enhanced TCG Privacy-CA Solution.
    Trustworthy Global Computing - TGC 2011, Lecture Notes in Computer Science 7173, pp. 121--141, 2011.
  248. Roberto Maria Avanzi, Simon Hoerder, Daniel Page, Mike Tunstall.
    Side-channel attacks on the McEliece and Niederreiter public-key cryptosystems.
    Journal of Cryptographic Engineering, Vol. 1, pp. 271--281, 2011.
  249. Olivier Blazy, Georg Fuchsbauer, David Pointcheval, Damien Vergnaud.
    Signatures on Randomizable Ciphertexts.
    Public Key Cryptography - PKC 2011, Lecture Notes in Computer Science 6571, pp. 403--422, 2011.
  250. Joojoung Lee, Martijn Stam, John Steinberger.
    The Collision Security of Tandem-DM in the Ideal Cipher Model.
    Advances in Cryptology - CRYPTO 2011, Lecture Notes in Computer Science 6841, pp. 561--557, 2011.
  251. Frederik Armknecht, Ewan Fleischmann, Matthias Krause, Jooyoung Lee, Martijn Stam, John P. Steinberger.
    The Preimage Security of Double-Block-Length Compression Functions.
    Advances in Cryptology - ASIACRYPT 2011, Lecture Notes in Computer Science 7073, pp. 233--251, 2011.
    DOI: http://dx.doi.org/10.1007/978-3-642-25385-0_13.
  252. Elena Andreeva, Martijn Stam.
    The Symbiosis between Collision and Preimage Resistance.
    Coding an Cryptography - IMACC 2011, Lecture Notes in Computer Science 7089, pp. 152--171, 2011.
  253. Manuel B M Barbosa, Andrew D Moss, Daniel Page, N. Rodrigues, P.F. Silva.
    Type checking cryptography implementations.
    Fundamentals of Software Engineering - FSEN 2011, Lecture Notes in Computer Science 7141, pp. 316--334, 2011.
  254. Mike Tunstall, Neil Hanley, William Marnane.
    Using Templates to Distinguish Multiplications from Squaring Operations.
    International Journal of Information Security, Vol. 10, pp. 255--266, 2011.
  255. Michel Abdalla, James Birkett, Dario Catalano, Alexander Dent, John Malone-Lee, Gregory Neven, Jacob Schuldt, Nigel Smart.
    Wildcarded Identity-Based Encryption.
    Journal of Cryptology, Vol. 24, pp. 42--82, 2011.
  256. 2010

  257. Paul Morrissey, Nigel Smart, Bogdan Warinschi.
    The TLS Handshake Protocol: A Modular Analysis.
    Journal of Cryptology, Vol. 23, pp. 187--223, 2010.
    DOI: http://dx.doi.org/10.1007/s00145-009-9052-3.
  258. I Askoxylakis, T Tryfonas, JHR May, A Traganitis.
    A dynamic key agreement mechanism for mission critical mobile ad hoc networking.
    Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Springer 45, pp. 216--228, 2010.
  259. Andrew Moss, Daniel Page.
    Bridging the gap between symbolic and efficient AES implementations.
    Partial Evaluation and Program Manipulation - PEPM 2010, Association for Computing Machinery (ACM), pp. 101--110, 2010.
  260. Jörn-Marc Schmidt, Michael Tunstall, Roberto Maria Avanzi, Ilya Kizhvatov, Timo Kasper, David Oswald.
    Combined Implementation Attack Resistant Exponentiation.
    Latincrypt 2010, Lecture Notes in Computer Science 6212, pp. 305--322, 2010.
  261. Dario Fiore, Rosario Gennaro, Nigel Smart.
    Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement.
    Pairing-Based Cryptography - Pairing 2010, Lecture Notes in Computer Science 6487, pp. 167--186, 2010.
  262. Michael Tunstall, Marc Joye.
    Coordinate Blinding over Large Prime Fields.
    Cryptographic Hardware and Embedded Systems - CHES 2010, Lecture Notes in Computer Science 6225, pp. 443--455, 2010.
  263. Elisabeth Oswald, Stefan Mangard.
    Counteracting Power Analysis Attacks by Masking.
    Secure Integrated Circuits and Systems, Springer, pp. 159--178, 2010.
  264. Rhys Evans, Aggeliki Tsohou, Theo Tryfonas, Thea Morgan.
    Engineering secure systems with ISO 26702 and 27001.
    2010 5th International Conference on System of Systems Engineering, SoSE 2010, Institute of Electrical and Electronics Engineers (IEEE), pp. 1--6, 2010.
    DOI: http://dx.doi.org/10.1109/SYSOSE.2010.5544065.
  265. Nigel Smart.
    Errors Matter: Breaking RSA-Based PIN Encryption with Thirty Ciphertext Validity Queries.
    Topics in Cryptology - CT-RSA 2010, Lecture Notes in Computer Science 5985, pp. 15--25, 2010.
  266. Nigel Smart, Fre Vercauteren.
    Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes.
    Public Key Cryptography - PKC 2010, Lecture Notes in Computer Science 6056, pp. 420--443, 2010.
  267. Patrik Bichsel, Jan Camenisch, Gregory Neven, Nigel Smart, Bogdan Warinschi.
    Get Shorty via Group Signatures without Encryption.
    Security and Cryptography for Networks - SCN 2010, Lecture Notes in Computer Science 6280, pp. 381--398, 2010.
  268. Essam Ghadafi, Nigel Smart, Bogdan Warinschi.
    Groth?Sahai Proofs Revisited.
    Public Key Cryptography - PKC 2010, Lecture Notes in Computer Science 6056, pp. 177--192, 2010.
  269. Mathieu Baudet, Bogdan Warinschi, Martín Abadi.
    Guessing Attacks and the Computational Soundness of Static Equivalence.
    Journal of Computer Security, Vol. 18, pp. 909--968, 2010.
  270. Stefan Tillich, Martin Feldhofer, Mario Kirschbaum, Thomas Plos, Jörn-Marc Schmidt, Alexander Szekely.
    Hardware Implementations of the Round-Two SHA-3 Candidates: Comparison on a Common Ground.
    Proceedings of Austrochip 2010, Fachhochschule Kärnten -, pp. 43 -- 48, 2010.
  271. Jean-François Gallais, Johann Großschädl, Neil Hanley, Markus Kasper, Marcel Medwed, Francesco Regazzoni, Jörn-Marc Schmidt, Stefan Tillich, Marcin Wojcik.
    Hardware Trojans for Inducing or Amplifying Side-Channel Leakage of Cryptographic Software.
    Trusted Systems - INTRUST 2010, Lecture Notes in Computer Science 6802, pp. 253 -- 270, 2010.
  272. Christophe Giraud, Eric W. Knudsen, Michael Tunstall.
    Improved Fault Analysis of Signature Schemes.
    Smart Card Research and Advanced Application - CARDIS 2010, Lecture Notes in Computer Science 6035, pp. 164--181, 2010.
  273. T Tryfonas.
    Information Security Management and Standards of Best Practice.
    Handbook of Electronic Security and Digital Forensics, World Scientific -, pp. 207 -- 236, 2010.
  274. Francois-Xavier Standaert, Olivier Pereira, Yu Yu, Jean-Jacques Quisquater, Moti Yung, Elisabeth Oswald.
    Leakage Resilient Cryptography in Practice.
    Towards Hardware-Intrinsic Security, Springer, pp. 105--139, 2010.
  275. Onur Aciicmez, Billy Bob Brumley, Philipp Grabher.
    New Results on Instruction Cache Attacks.
    Cryptographic Hardware and Embedded Systems - CHES 2010, Lecture Notes in Computer Science 6225, pp. 110--124, 2010.
  276. Dennis Hofheinz, John Malone-Lee, Martijn Stam.
    Obfuscation for Cryptographic Purposes.
    Journal of Cryptology, Vol. 23, pp. 121--168, 2010.
  277. Liqun Chen, Daniel Page, Nigel Smart.
    On the design and implementation of an efficient DAA scheme.
    Smart Card Research and Advanced Application Conference - CARDIS 2010, Lecture Notes in Computer Science 6035, pp. 223--237, 2010.
    DOI: http://dx.doi.org/10.1007/978-3-642-12510-2_16.
  278. Gilles Barthe, Alejandro Hevia, Zhengqin Luo, Tamara Rezk, Bogdan Warinschi.
    Robustness Guarantees for Anonymity.
    IEEE Computer Security Foundations Symposium - CSF 2010, IEEE Computer Society -, pp. 91--106, 2010.
  279. Stefan Tillich, Mario Kirschbaum, Alexander Szekely.
    SCA-Resistant Embedded Processors - The Next Generation.
    Computer Security Applications Conference - ACSAC 2010, Association for Computing Machinery (ACM) -, pp. 211--220, 2010.
  280. Ivan Damgård, Marcel Keller.
    Secure Multiparty AES.
    Financial Cryptography and Data Security - FC 2010, Lecture Notes in Computer Science 6052, pp. 367--374, 2010.
    DOI: http://dx.doi.org/10.1007/978-3-642-14577-3_31.
  281. Liqun Chen, Bogdan Warinschi.
    Security of the TCG Privacy-CA Solution.
    Embedded and Ubiquitous Computing - EUC 2010, IEEE Computer Society -, pp. 609--616, 2010.
  282. Konstantinos Markantonakis, Keith Mayes, Damien Sauveron, Michael Tunstall.
    Smart Cards.
    Handbook of Technology Management, Wiley 2, pp. 248--264, 2010.
  283. Ming-Feng Lee, Nigel Smart, Bogdan Warinschi.
    The Fiat?Shamir Transform for Group and Ring Signature Schemes.
    Security and Cryptography for Networks - SCN 2010, Lecture Notes in Computer Science 6280, pp. 363--380, 2010.
  284. Standaert François-Xavier, Veyrat-Charvillon Nicolas, Elisabeth Oswald, Gierlichs Benedikt, Medwed Marcel, Kasper Markus, Mangard Stefan.
    The World Is Not Enough: Another Look on Second-Order DPA.
    Advances in Cryptology - ASIACRYPT 2010, Lecture Notes in Computer Science 6477, pp. 112--129, 2010.
    DOI: http://dx.doi.org/10.1007/978-3-642-17373-8_7.
  285. Stefan Tillich, Martin Feldhofer, Mario Kirschbaum, Thomas Plos, Jörn-Marc Schmidt, Alexander Szekely.
    Uniform Evaluation of Hardware Implementations of the Round-Two SHA-3 Candidates.
    The Second SHA-3 Candidate Conference, NIST -, pp. --, 2010.
  286. E. Bangerter, M. Barbosa, D.J. Bernstein, I. Damgard, Daniel Page, J.I. Pagter, A.-R. Sadeghi, S. Sovio.
    Using compilers to enhance cryptographic product development.
    Information Security Solutions Europe - ISSE 2010, Vieweg+Teubner, pp. 291--301, 2010.
  287. 2009

  288. Manuel B M Barbosa, Andrew D Moss, Daniel Page.
    Constructive and destructive use of compilers in elliptic curve cryptography.
    Journal of Cryptology, Vol. 22, pp. 259--281, 2009.
    DOI: http://dx.doi.org/10.1007/s00145-008-9023-0.
  289. IG Askoxylakis, K Markantonakis, T Tryfonas, John H R May, A Traganitis.
    A face centered cubic key agreement mechanism for mobile ad hoc networks.
    Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Springer 13, pp. 103 -- 113, 2009.
  290. P Davies, T Tryfonas.
    A lightweight web-based vulnerability scanner for small-scale computer network security assessment.
    Journal of Network and Computer Applications, Vol. 32, pp. 78 -- 95, 2009.
    DOI: http://dx.doi.org/10.1016/j.jnca.2008.04.007.
  291. WM To, T Tryfonas, DW Farthing.
    Audit Log Unification and Review with Log Management Information Bases.
    Frontiers in Artificial Intelligence and Applications, IOS Press 187, pp. 180 -- 191, 2009.
  292. Pooya Farshim, Bogdan Warinschi.
    Certified Encryption Revisited.
    Progress in Cryptology - AFRICACRYPT 2009, Lecture Notes in Computer Science 5580, pp. 179--197, 2009.
  293. Frederic Amiel, Benoit Feix, Michael Tunstall, Claire Whelan, William P Marnane.
    Distinguishing Multiplications from Squaring Operations.
    Selected Areas in Cryptography ? SAC 2008, Lecture Notes in Computer Science 5381, pp. 346--360, 2009.
  294. Martin Geissler, Nigel Smart.
    Distributing the Key Distribution Centre in Sakai?Kasahara Based Systems.
    Coding and Cryptography - IMACC 2009, Lecture Notes in Computer Science 5921, pp. 252--262, 2009.
  295. Christian Lederer, Roland Mader, Manuel Koschuch, Johann Großschädl, Alexander Szekely, Stefan Tillich.
    Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks.
    Information Security Theory and Practices --- WISTP 2009, Lecture Notes in Computer Science 5746, pp. 112--127, 2009.
  296. Marc Joye, Michael Tunstall.
    Exponent recoding and regular exponentiation algorithms.
    Progress in Cryptology - AfricaCrypt 2009, Lecture Notes in Computer Science 5580, pp. 334--349, 2009.
  297. Alexandra Boldyreva, David Cash, Marc Fischlin, Bogdan Warinschi.
    Foundations of Non-Malleable Hash and One-Way Functions.
    Advances in Cryptology - ASIACRYPT 2009, Lecture Notes in Computer Science 5912, pp. 524--541, 2009.
  298. M. Koschuch, Johann Groszschaedl, Daniel Page, Philipp Grabher, M. Hudler, M. Kruger.
    Hardware/software co-design of public-key cryptography for SSL protocol execution in embedded systems.
    Information and Communication Systems - ICICS 2009, Lecture Notes in Computer Science 5927, pp. 63--79, 2009.
  299. Gregory Neven, Nigel Smart, Bogdan Warinschi.
    Hash Function Requirements for Schnorr Signatures.
    Journal of Mathematical Cryptology, Vol. 3(1), pp. 69--87, 2009.
  300. Nigel Smart, Bogdan Warinschi.
    Identity Based Group Signatures from Hierarchical Identity Based Encryption.
    Pairings 2009, Lecture Notes in Computer Science 5671, pp. 150--170, 2009.
  301. Robert P McEvoy, Colin C. Murphy, William P. Marnane, Michael Tunstall.
    Isolated WDDL: A Hiding Countermeasure for Differential Power Analysis on FPGAs.
    ACM Transactions on Reconfigurable Technology and Systems, Vol. 2(1), pp. 1--23, 2009.
  302. Philipp Grabher, Johann Groszschaedl, Daniel Page.
    Non-deterministic processors: FPGA-based analysis of area, performance and security.
    Workshop on Embedded Systems Security - WESS, Association for Computing Machinery (ACM), pp. 1----10, 2009.
  303. Essam Ghadafi, Nigel Smart, Bogdan Warinschi.
    Practical Zero-Knowledge Proofs for Circuit Evaluation.
    Coding and Cryptography - IMACC 2009, Lecture Notes in Computer Science 5921, pp. 469--494, 2009.
  304. Andrew Moss, Daniel Page.
    Program interpolation.
    Partial Evaluation and Program Manipulation - PEPM, Association for Computing Machinery (ACM), pp. 31--40, 2009.
  305. Michael Tunstall.
    Random Order m-ary Exponentiation.
    Australasian Conference on Information Security and Privacy ? ACISP 2009, Lecture Notes in Computer Science 5594, pp. 437--451, 2009.
  306. Benny Pinkas, Thomas Schneider, Nigel Smart, Stephen Williams.
    Secure Two-Party Computation Is Practical.
    Advances in Cryptology -- ASIACRYPT 2009, Lecture Notes in Computer Science 5912, pp. 250--267, 2009.
    DOI: http://dx.doi.org/10.1007/978-3-642-10366-7_15.
  307. Liqun Chen, Paul Morrissey, Nigel Smart, Bogdan Warinschi.
    Security Notions and Generic Constructions for Client Puzzles.
    Advances in Cryptology - Asiacrypt 2009, Lecture Notes in Computer Science 5912, pp. 505--523, 2009.
  308. Laurent Mazaré, Bogdan Warinschi.
    Separating Trace Mapping and Reactive Simulatability Soundness: The Case of Adaptive Corruption.
    ARSPA-WITS, Lecture Notes in Computer Science 5511, pp. 193--210, 2009.
  309. Johann Groszschaedl, Elisabeth Oswald, Daniel Page, Michael Tunstall.
    Side channel analysis of cryptographic software via early-terminating multiplications.
    International Conference on Information Security and Cryptology - ICISC 2009, Lecture Notes in Computer Science 5984, pp. 176--192, 2009.
  310. Konstantinos Markantonakis, Michael Tunstall, Gerhard Hancke, Ioannis Askoxylakis, Keith Mayes.
    Smart Card Security - Theory and Practice.
    Information Security Technical Report, Vol. 14, pp. 46--56, 2009.
  311. Neil Hanley, Michael Tunstall, William P. Marnane.
    Unknown Plaintext Template Attacks.
    Workshop on Information Security Applications ? WISA 2009, Lecture Notes in Computer Science 5932, pp. 148--162, 2009.
  312. S Styles, T Tryfonas.
    Using Penetration Testing Feedback to Cultivate an Atmosphere of Proactive Security amongst End-users.
    Information Management & Computer Security, Vol. 17, pp. 44 -- 52, 2009.
  313. 2008

  314. Kamel Bentahar, Pooya Farshim, John Malone-Lee, Nigel Smart.
    Generic Constructions of Identity-Based and Certificateless KEMs.
    Journal of Cryptology, Vol. 21(2), pp. 178--199, 2008.
    DOI: http://dx.doi.org/10.1007/s00145-007-9000-z.
  315. Paul Morrissey, Nigel Smart, Bogdan Warinschi.
    A Modular Security Analysis of the TLS Handshake Protocol.
    Advances in Cryptology - Asiacrypt 2008, Lecture Notes in Computer Science 5350, pp. 55--73, 2008.
  316. I Askoxylakis, D Sauveron, K Markantonakis, T Tryfonas, A Traganitis.
    A body-centered cubic method for key agreement in dynamic mobile ad hock networks.
    Emerging Security Information, Systems and Technologies - SECUREWARE 2008, Institute of Electrical and Electronics Engineers (IEEE) -, pp. 193 -- 202, 2008.
  317. L Shand, T Tryfonas.
    A collaborative distributed virtual platform for forensic analysis of malicious code.
    Information Security South Africa - ISSA 2008, Innovative Minds -, pp. 115 -- 132, 2008.
  318. I Sutherland, J Evans, T Tryfonas, A Blyth.
    Acquiring Volatile Operating System Data Tools and Techniques.
    Operating Systems Review, Vol. 42, pp. 65 -- 73, 2008.
    DOI: http://dx.doi.org/10.1145/1368506.1368516.
  319. Nigel Smart.
    Advances in Cryptology - EUROCRYPT 2008.
    Springer, 2008.
  320. Stefan Tillich, Martin Feldhofer, Thomas Popp, Johann Großschädl.
    Area, Delay, and Power Characteristics of Standard-Cell Implementations of the AES S-Box.
    Journal of Signal Processing Systems, Vol. 50(2), pp. 251--261, 2008.
  321. Manuel B M Barbosa, Pooya Farshim.
    Certificateless signcryption.
    ACM Symposium on Information, Computer and Communications Security - ASIACCS, Association for Computing Machinery (ACM), pp. 369--372, 2008.
  322. S Wehner, Jurg Wullschleger.
    Composable security in the bounded quantum storage model.
    Automata, Languages and Programming - ICALP 2008, Lecture Notes in Computer Science 5126, pp. 604--615, 2008.
  323. Övünc Kocabas, Erkay Savas, Johann Großschädl.
    Enhancing an Embedded Processor Core with a Cryptographic Unit for Performance and Security.
    Reconfigurable Computing and FPGAs - ReConFig 2008, IEEE Computer Society, pp. 409--414, 2008.
  324. B Przydatek, Jurg Wullschleger.
    Error-tolerant combiners for oblivious primitives.
    Automata, Languages and Programming - ICALP 2008, Lecture Notes in Computer Science 5126, pp. 461--472, 2008.
  325. Brian Baldwin, Emmanuel Popovici, Mike Tunstall, William Marnane.
    Fault injection platform for block ciphers.
    IET Irish Signals and Systems Conference - ISSC 2008, IET, pp. 10?15, 2008.
  326. D Jones, I Sutherland, T Tryfonas.
    Global positioning systems: Analysis principles and sources of evidence in user devices.
    Digital Forensics and Incident Analysis - WDFIA 2008, Institute of Electrical and Electronics Engineers (IEEE) -, pp. 33 -- 39, 2008.
  327. C. Whelan, A. Byrne, Daniel Page, Frederik R G Vercauteren, M. Scott, W. Marnane.
    Implementation attacks, countermeasures & performance evaluation.
    Identity- Based Cryptography, IOS Press, pp. 226--243, 2008.
  328. Yehuda Lindell, Benny Pinkas, Nigel Smart.
    Implementing two-party computation efficiently with security against malicious adversaries.
    Security and Cryptography for Networks - SCN 2008, Lecture Notes in Computer Science 5229, pp. 2--20, 2008.
  329. Philipp Grabher, Johann Groszschaedl, Daniel Page.
    Light-weight instruction set extensions for bit-sliced cryptography.
    Cryptographic Hardware and Embedded Systems - CHES 2008, Lecture Notes in Computer Science 5154, pp. 331--345, 2008.
  330. S Wolf, Jurg E Wullschleger.
    New monotones and lower bounds in unconditional two-party computation.
    IEEE Trans. Info. Theory, Vol. 54, pp. 2792--2795, 2008.
  331. Liqun Chen, Paul Morrissey, Nigel Smart.
    On Proofs of Security for DAA Schemes.
    Provable Security - PROVSEC 2008, Lecture Notes in Computer Science 5324, pp. 167--175, 2008.
  332. Philipp Grabher, Johann Groszschaedl, Daniel Page.
    On software parallel implementation of cryptographic pairings.
    Selected Areas in Cryptography - SAC 2008, Lecture Notes in Computer Science 5381, pp. 34--49, 2008.
  333. Steven Galbraith, Kenneth Paterson, Nigel Smart.
    Pairings for Cryptographers.
    Discrete Applied Mathematics, Vol. 156, pp. 3113--3121, 2008.
  334. Liqun Chen, Paul Morrissey, Nigel Smart.
    Pairings in Trusted Computing.
    Pairings 2008, Lecture Notes in Computer Science 5209, pp. 1--17, 2008.
  335. Elisabeth Oswald, Daniel Page, Nigel Smart.
    Randomised representations.
    IET Proceedings on Information Security, Vol. 2, pp. 19--27, 2008.
  336. Johann Groszschaedl, Vejda Tobias, Daniel Page.
    Reassessing the TCG specifications for trusted computing in mobile and embedded systems.
    Hardware-Oriented Security and Trust - HOST 2008, Institute of Electrical and Electronics Engineers (IEEE), pp. 84--90, 2008.
  337. Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi.
    Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions.
    Journal of Cryptology, Vol. 21, pp. 350--391, 2008.
  338. Martin Abadi, Bogdan Warinschi.
    Security Analysis of Cryptographically Controlled Access to XML Documents.
    Journal of the ACM, Vol. 55, pp. 108--117, 2008.
    DOI: http://dx.doi.org/10.1145/1346330.1346331.
  339. B Kearney, T Tryfonas.
    Security patterns for automated continuous auditing.
    Information Security Journal: A Global Perspective, Vol. 17, pp. 13 -- 25, 2008.
  340. Mark Hamilton, Mike Tunstall, Emmanuel Popovici, Marnane William P. .
    Side channel analysis of an automotive microprocessor: I.
    IET Irish Signals and Systems Conference - ISSC 2008, IET, pp. 4--9, 2008.
  341. T Tryfonas, B Kearney.
    Standardising business application security assessments with pattern-driven audit automations.
    Computer Standards & Interfaces, Vol. 30, pp. 262 -- 270, 2008.
    DOI: http://dx.doi.org/10.1016/j.csi.2007.10.002.
  342. Claude Crepeau, Jurg E Wullschleger.
    Statistical security conditions for two-party secure function evaluation.
    Information Theoretic Security - ICITS 2008, Lecture Notes in Computer Science 5155, pp. 86--99, 2008.
  343. Elisabeth Oswald, Medweb Marcel.
    Template Attacks on ECDSA.
    Information Security Applications - WISA 2008, Lecture Notes in Computer Science 5379, pp. 14--27, 2008.
  344. Manuel Koschuch, Johann Großschädl, Udo Payer, Matthias Hudler, Michael Krüger.
    Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks.
    Cryptology and Network Security --- CANS 2008, Lecture Notes in Computer Science 5339, pp. 349--365, 2008.
  345. 2007

  346. YJM Tourigny, NP Smart.
    A multidimensional continued fraction based on a high-order recurrence relation.
    Mathematics of Computation, Vol. 76 (260), pp. 1995 -- 2022, 2007.
  347. Alexandra Boldyreva, Marc Fischlin, Adriana Palacio, Bogdan Warinschi.
    A Closer Look at PKI: Security and Efficiency.
    Public Key Cryptography - PKC 2007, Lecture Notes in Computer Science 4450, pp. 458--475, 2007.
  348. Veronique Cortier, Ralf Kuesters, Bogdan Warinschi.
    A Cryptographic Model for Branching Time Security Properties - The Case of Contract Signing Protocols.
    European Symposium On Research In Computer Security - ESORICS 2007, Lecture Notes in Computer Science 4734, pp. 422--437, 2007.
  349. Emmanuel Bresson, Yassine Lakhnech, Laurent Mazare, Bogdan Warinschi.
    A Generalization of DDH with Applications to Protocol Analysis and Computational Soundness.
    Advances in Cryptology - CRYPTO 2007, Lecture Notes in Computer Science 4622, pp. 482--499, 2007.
  350. Robert Granger, Florian Hess, Roger Oyono, Nicolas Theriault, Fre Vercauteren.
    Ate Pairing on Hyperelliptic Curves.
    Advances in Cryptology - EUROCRYPT 2007, Lecture Notes in Computer Science 4515, pp. 430--447, 2007.
  351. Manuel B M Barbosa, Andrew D Moss, Daniel Page.
    Compiler assisted elliptic curve cryptography.
    Information Security - IS 2007, Lecture Notes in Computer Science 4804, pp. 1785--1802, 2007.
  352. Philipp Grabher, Johann Groszschaedl, Daniel Page.
    Cryptographic side-channels from low-power cache memory.
    Cryptography and Coding - IMACC 2007, Lecture Notes in Computer Science 4887, pp. 170--184, 2007.
  353. Kamel Bentahar, Nigel Smart.
    Efficient 15,360-bit RSA Using Woop-Optimised Montgomery Arithmetic.
    Cryptography and Coding - IMACC 2007, Lecture Notes in Computer Science 4887, pp. 346--363, 2007.
  354. Tor Bjorstad, Alexander Dent, Nigel Smart.
    Efficient KEMs with partial message recovery.
    Cryptography and Coding - IMACC 2007, Lecture Notes in Computer Science 4887, pp. 233--256, 2007.
  355. V Cortier, H. Hordegen, Bogdan Warinschi.
    Explicit Randomness is not Necessary when Modeling Probabilistic Encryption.
    Electr. Notes Theor. Comput. Sci, Vol. 186, pp. 49--65, 2007.
  356. Chen L., Cheng Z., Nigel Smart.
    Identity-based key agreement protocols from pairings.
    International Journal of Information Security, Vol. 6, pp. 213--241, 2007.
  357. Michel Abdalla, Alexander Dent, John Malone-Lee, Gregory Neven, Phan D.H., Nigel Smart.
    Identity-based traitor tracing.
    Public Key Cryptography - PKC 2007, Lecture Notes in Computer Science 4450, pp. 361--367, 2007.
  358. Tobias Vejda, Daniel Page, Johann Groszschaedl.
    Instruction set extensions for pairing-based cryptography.
    Pairing-Based Cryptography --- PAIRING 2007, Lecture Notes in Computer Science 4575, pp. 208--224, 2007.
  359. Peter Leadbitter, Daniel Page, Nigel Smart.
    Non-deterministic multi-threading.
    IEEE Transactions on Computers, Vol. 56, pp. 992--998, 2007.
  360. D. Hofheinz, John Malone-Lee, Martijn Stam.
    Obfuscation for cryptographic purposes.
    Theory of Cryptography Conference - TCC 2007, Lecture Notes in Computer Science 4392, pp. 214--232, 2007.
  361. Nigel Smart, Fre Vercauteren.
    On computable isomorphisms in efficient asymmetric pairing-based systems.
    Discrete Applied Mathematics, Vol. 155(4), pp. 538--547, 2007.
  362. S Mangard, ME Oswald, T Popp.
    Power Analysis Attacks: Revealing the Secrets of Smart Cards.
    Springer, 2007.
  363. Stefan Tillich, Johann Großschädl.
    Power Analysis Resistant AES Implementation with Instruction Set Extensions.
    Cryptographic Hardware and Embedded Systems --- CHES 2007, Lecture Notes in Computer Science 4727, pp. 303--319, 2007.
  364. Popp T., Mangard S., Elisabeth Oswald.
    Power analysis attacks and countermeasures.
    IEEE Design and Test of Computers, Vol. 24(6), pp. 535--543, 2007.
  365. Manuel B M Barbosa, Pooya Farshim.
    Randomness Reuse: Improvements and Extensions.
    Cryptography and Coding - IMACC 2007, Lecture Notes in Computer Science 4887, pp. 261--280, 2007.
  366. Veronique Cortier, Bogdan Warinschi, Eugen Zalinescu.
    Synthesizing Secure Protocols.
    European Symposium On Research In Computer Security - ESORICS 2007, Lecture Notes in Computer Science 4734, pp. 406--421, 2007.
  367. ME Oswald, S Mangard.
    Template Attacks on Masking --- Resistance is Futile.
    Topics in Cryptology - CTRSA 2007, Lecture Notes in Computer Science 4377, pp. 243 -- 256, 2007.
  368. Andrew Moss, Daniel Page, Nigel Smart.
    Toward acceleration of RSA using 3D Graphics hardware.
    Cryptography and Coding - IMACC 2007, Lecture Notes in Computer Science 4887, pp. 369--388, 2007.
  369. 2006

  370. FK Hess, NP Smart, FRG Vercauteren.
    The Eta pairing revisited.
    IEEE Transactions on Information Theory, Vol. 52 (10), pp. 4595 -- 4602, 2006.
    DOI: http://dx.doi.org/10.1109/TIT.2006.881709.
  371. L Chen, Z Cheng, J Malone-Lee, NP Smart.
    Efficient ID-KEM based on the Sakai-Kasahara key construction.
    IEE Proceedings: Information Security, Vol. 153 (1), pp. 19 -- 26, 2006.
    DOI: http://dx.doi.org/10.1049/ip-ifs:20055070.
  372. S Canard, B Schoenmakers, M Stam, J Traoré.
    List signature schemes.
    Discrete Applied Mathematics, Vol. 154 (2), pp. 189 -- 201, 2006.
    DOI: http://dx.doi.org/10.1016/j.dam.2005.08.003.
  373. Daniel Page, Nigel Smart, Frederik R G Vercauteren.
    A comparison of MNT curves and supersingular curves.
    Applicable Algebra in Engineering, Communication and Computing, Vol. 17, pp. 379--392, 2006.
  374. DS Page, Frederik R G Vercauteren.
    A fault attack on pairing-based cryptography.
    IEEE Transactions on Computers, Vol. 55, pp. 1075--1080, 2006.
  375. Denef J., Frederik R G Vercauteren.
    An Extension of Kedlaya's Algorithm to Hyperelliptic Curves in Characteristic 2.
    Journal of Cryptology, Vol. 19, pp. 1--25, 2006.
  376. Jan Denef, Frederik Vercauteren.
    Counting points on C$_ab$ curves using Monsky-Washnitzer cohomology.
    Finite fields and their Applications, Vol. 12, pp. 78--102, 2006.
  377. Arjen Lenstra, Daniel Page, Martijn Stam.
    Discrete logarithm variants of VSH.
    Vietcrypt, Lecture Notes in Computer Science 4341, pp. 229--242, 2006.
  378. Nigel Smart.
    Elliptic curve cryptography.
    Handbook of Information Security, Wiley 2, pp. ???--???, 2006.
  379. Sattam Al-Riyami, John Malone-Lee, Nigel Smart.
    Escrow free encryption supporting cryptographic workflow.
    International Journal of Information Security, Vol. 5(4), pp. 217--230, 2006.
  380. Robert Granger, Daniel Page, Nigel P. Smart.
    High security pairing-based cryptography revisited.
    Algorithmic Number Theory Symposium - ANTS VII, Lecture Notes in Computer Science 4076, pp. 480--494, 2006.
  381. Michel Abdalla, Dario Catalano, Alexander Dent, Malone-Lee John, Nigel Smart.
    Identity-based encryption gone wild.
    Automata, Languages and Programming - ICALP 2006, Lecture Notes in Computer Science 4052, pp. 300--311, 2006.
  382. Kamel Bentahar, Daniel Page, Markku-Juhani O. Saarinen, Joseph H. Silverman, Nigel Smart.
    LASH.
    NIST: The Second Cryptographic Hash Workshop, Online, pp. --, 2006.
  383. Rob Granger, Daniel Page, Martijn Stam.
    On small characteristic algebraic tori in pairing based cryptography.
    LMS Journal of Computation and Mathematics, Vol. 9, pp. 64--85, 2006.
  384. Manuel Barbosa, Pooya Farshim.
    Secure Cryptographic Workflow in the Standard Model.
    Progress in Cryptology - INDOCRYPT 2006, Lecture Notes in Computer Science 4329, pp. 379--393, 2006.
  385. Antoine Joux, Reynauld Lercier, Nigel Smart, Fre Vercauteren.
    The number field sieve in the medium prime case.
    Advances in Cryptology - CRYPTO 2006, Lecture Notes in Computer Science 4117, pp. 326 -- 344, 2006.
    DOI: http://dx.doi.org/10.1007/11818175_19.
  386. 2005

  387. M Stam.
    A Key Encapsulation Mechanism for NTRU.
    Cryptography and Coding - IMACC 2005, Lecture Notes in Computer Science 3796, pp. 410 -- 427, 2005.
  388. Chris Dods, Nigel Smart, Martijn Stam.
    Hash Based Digital Signature Schemes..
    Cryptography and Coding - IMACC 2005, Lecture Notes in Computer Science 3796, pp. 96 -- 115, 2005.
  389. John C Malone-Lee, AW Dent.
    The Physically Observable Security of Signature Schemes.
    Coding and Cryptography - IMACC 2005, Lecture Notes in Computer Science 3796, pp. 220--232, 2005.
  390. R Cramer, S Fehr, M Stam.
    Black-Box Secret Sharing from Primitive Sets in Number Fields.
    Advances in Cryptology - CRYPTO 2005, Lecture Notes in Computer Science 3621, pp. 344 -- 360, 2005.
  391. Nigel Smart, Fre Vercauteren, Joe Silverman.
    An algebraic approach to NTRU (q = 2^n) via Witt vectors and overdetermined systems of nonlinear equations..
    Security and Cryptography for Networks - SCN 2006, Lecture Notes in Computer Science 3352, pp. 278 -- 298, 2005.
  392. NP Smart.
    Efficient key encapsulation to multiple parties.
    Security and Cryptography for Networks - SCN 2006, Lecture Notes in Computer Science 3352, pp. 208 -- 219, 2005.
  393. J. Mueller-Quade, A. Nascimento, Andreas Winter, Pim Tuyls, H. Imai.
    An information theoretic model for quantum secret sharing schemes.
    Quantum Inf. Comput, Vol. 5, pp. 69--80, 2005.
  394. Manuel Barbosa, Pooya Farshim.
    Efficient Identity-Based Key Encapsulation to Multiple Parties.
    Coding and Cryptography - IMACC 2005, Lecture Notes in Computer Science 3796, pp. 428--441, 2005.
  395. P. J. Green, Richard Noad, Nigel P. Smart.
    Further Hidden Markov Model Cryptanalysis.
    Cryptographic Hardware and Embedded Systems - CHES 2005, Lecture Notes in Computer Science 3659, pp. 61--74, 2005.
  396. P Grabher, Daniel Page.
    Hardware acceleration of the Tate pairing in characteristic three.
    Cryptographic Hardware and Embedded Systems - CHES 2005, Lecture Notes in Computer Science 3659, pp. 398--411, 2005.
  397. R Granger, Daniel Page, M Stam.
    Hardware and software normal basis arithmetic for pairing-based cryptography in characteristic three.
    IEEE Transactions on Computers, Vol. 54, pp. 852--860, 2005.
  398. Manuel B M Barbosa, Daniel Page.
    On the automatic construction of indistinguishable operations.
    Cryptography And Coding - IMACC 2005, Lecture Notes in Computer Science 3796, pp. 233--247, 2005.
  399. Florian K Hess, I Shparlinksi.
    On the linear complexity and multidimensional distribution of congruential generators over elliptic curves.
    Designs, Codes and Cryptography, Vol. 35, pp. 111--117, 2005.
  400. Martin Abadi, Bogdan Warinschi.
    Password-based Encryption Analyzed.
    Internation Colloqium on Automata, Languages and Programming - ICALP 2005, Lecture Notes in Computer Science 3580, pp. 664--676, 2005.
  401. M van Dijk , R Granger, Daniel Page, K Rubin, A Silverberg, M Stam, D Woodruff.
    Practical cryptography in high dimensional tori.
    Advances in Cryptology - EUROCRYPT 2005, Lecture Notes in Computer Science 3494, pp. 234--250, 2005.
  402. Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi.
    Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions.
    Advances in Cryptology - CRYPTO 2005, Lecture Notes in Computer Science 3621, pp. 205--222, 2005.
  403. Eike Kiltz, Gregor Leander, John Malone-Lee.
    Secure Computation of the Mean and Related Statistics.
    Theory of Cryptography Conference - TCC 2005, Lecture Notes in Computer Science 3378, pp. 283--302, 2005.
  404. John Malone-Lee.
    Signcryption with Non-Interactive Non-Repudiation.
    Designs, Codes and Cryptography, Vol. 37, pp. 81--109, 2005.
  405. 2004

  406. NP Smart, A Menezes.
    Security of signature schemes in a multi-user setting.
    Designs, Codes and Cryptography, Vol. 33, pp. 261 -- 274, 2004.
  407. D Naccache, NP Smart, J Stern.
    Projective Coordinates Leak.
    Advances in Cryptology - EUROCRYPT 2004, Lecture Notes in Computer Science 3027, pp. 257 -- 267, 2004.
    DOI: http://dx.doi.org/10.1007/b97182.
  408. NP Smart, F Vercauteren, A Muzereau.
    The equivalence between the DHP and DLP for elliptic curves used in practical applications.
    LMS Journal of Computation and Mathematics, Vol. 7, pp. 50 -- 72, 2004.
  409. Rob Granger, Daniel Page, Martijn Stam.
    A comparison of CEILIDH and XTR.
    Algorithmic Number Theory Symposium - ANTS-VI, Lecture Notes in Computer Science 3076, pp. 235--249, 2004.
  410. Florian K Hess.
    A note on the Tate pairing of curves over finite fields.
    Archiv der Mathematik, Vol. 82, pp. 28--32, 2004.
  411. Ian Blake, Gadiel Seroussi, Nigel Smart.
    Advances in Elliptic Curve Cryptography.
    Cambridge University Press, 2004.
  412. Peter J Leadbitter, Daniel Page, Nigel P Smart.
    Attacking DSA under a repeated bits assumption.
    Cryptographic Hardware and Embedded Systems - CHES 2004, Lecture Notes in Computer Science 3156, pp. 428--440, 2004.
  413. Rob Granger, A.J. Holt, Daniel Page, Nigel P Smart, Frederik R G Vercauteren.
    Function field sieve in characteristic three.
    Algorithmic Number Theory Symposium - ANTS-VI, Lecture Notes in Computer Science 3076, pp. 223--234, 2004.
  414. Florian K Hess.
    Generalising the GHS attack on the elliptic curve discrete logarithm problem.
    LMS Journal of Computation and Mathematics, Vol. 7, pp. 167--192, 2004.
  415. J Mueller-Quade, A Otsuka, G Hanaoka, H Imai, A Nascimento, Winter Andreas.
    Information theoretic secure oblivious polynomial evaluation: Model, bounds and constructions.
    Information Security and Privacy - ACIPS 2004, Lecture Notes in Computer Science 3108, pp. 62--73, 2004.
  416. Daniel Page, Martijn Stam.
    On XTR and side-channel analysis.
    Selected Areas in Cryptography - SAC 2004, Lecture Notes in Computer Science 3357, pp. 54--68, 2004.
  417. Florian Hess.
    On the security of the verifiably-encrypted signature scheme of Boneh, Gentry, Lynn and Shacham.
    Information Processing Letters, Vol. 89, pp. 111--114, 2004.
  418. Daniel Page, Nigel P Smart.
    Parallel cryptographic arithmetic using a redundant Montgomery representation.
    IEEE Transactions on Computers, Vol. 53, pp. 1474--1482, 2004.
  419. 2003

  420. E Kiltz, John C Malone-Lee.
    A General Construction of IND-CCA2 Secure Public Key Encryption.
    Cryptography and Coding - IMACC 2003, Lecture Notes in Computer Science 2898, pp. 152 -- 166, 2003.
  421. Nigel Smart, Katharina Geissler.
    Computing the $M = U U^t$ integer matrix decomposition.
    Cryptography and Coding - IMACC 2003, Lecture Notes in Computer Science 2898, pp. 223 -- 233, 2003.
  422. Nigel Smart, Adam Barnett.
    Mental Poker Revisited.
    Cryptography and Coding - IMACC 2003, Lecture Notes in Computer Science 2898, pp. 370 -- 383, 2003.
  423. Nigel Smart.
    An Analysis of Goubin's Refined Power Analysis Attack.
    Cryptographic Hardware and Embedded Systems - CHES 2003, Lecture Notes in Computer Science 2779, pp. 281 -- 290, 2003.
  424. NP Smart, P Leadbitter.
    Analysis of the insecurity of ECMQV with partially known nonces.
    Information Security Conference - ISC 2003, Lecture Notes in Computer Science 2851, pp. 240 -- 251, 2003.
  425. NP Smart, J Westwood.
    Point multiplication on ordinary elliptic curves over fields of characteristic three..
    Applicable Algebra in Engineering, Communication and Computing, Vol. 13, pp. 485 -- 497, 2003.
  426. NP Smart.
    Access control using pairing based cryptography.
    Topics in Cryptology - CT-RSA 2003, Lecture Notes in Computer Science 2612, pp. 111 -- 121, 2003.
  427. Daniel Page.
    Defending against cache based side-channel attacks.
    Information Security Technical Report, Vol. 8(1), pp. 30 -- 44, 2003.
  428. John C Malone-Lee, Wenbo Mao.
    Two Birds One Stone: Signcryption Using RSA.
    Topics in Cryptology - CT-RSA 2003, Lecture Notes in Computer Science 2612, pp. 211 -- 225, 2003.
  429. F Hess.
    Efficient Identity based Signature Schemes based on Pairings..
    Selected Areas in Cryptography -- SAC 2002, Lecture Notes in Computer Science 2595, pp. 310 -- 324, 2003.
  430. John Malone-Lee, Nigel Smart.
    Modifications of ECDSA.
    Selected Areas in Cryptography - SAC 2002, Lecture Notes in Computer Science 2595, pp. 1 -- 12, 2003.
  431. Nascimento A.C.A., Imai H., Winter Andreas.
    Commitment capacity of discrete memoryless channels.
    Cryptography and Coding - IMACC 2003, Lecture Notes in Computer Science 2898, pp. 35--51, 2003.
  432. Florian Hess, Pauli S., Pohst M.E..
    Computing the multiplicative group of residue class rings.
    Math. Comp, Vol. 72, pp. 1531--1548, 2003.
  433. Robert Granger.
    Estimates for Discrete Logarithm Computations in Finite Fields of Small Characteristic.
    Cryptography and Coding - IMACC 2003, Lecture Notes in Computer Science 2898, pp. 190--206, 2003.
  434. Florian Hess.
    The GHS attack revisited.
    Advances in Cryptology - EUROCRYPT 2003, Lecture Notes in Computer Science 2656, pp. 374--387, 2003.
  435. Daniel Page, James P J Irwin.
    Using media processors for low-memory AES implementation.
    Application-specific Systems, Architectures and Processors - ASAP 2003, Institute of Electrical and Electronics Engineers (IEEE), pp. 144----154, 2003.
  436. 2002

  437. L Chen, K Harrison, N Smart, D Soldera.
    Applications of Multiple Trust Authorities in Pairing Based Cryptosystems.
    InfraSec 2002, Lecture Notes in Computer Science 2437, pp. 260 -- 275, 2002.
  438. L Chen, K Harrison, A Moss, NP Smart, D Soldera.
    Certification of Public Keys within an Identity Based System.
    Information Security - ISC 2002, Lecture Notes in Computer Science 2443, pp. 322 -- 333, 2002.
  439. F Vercauteren.
    Computing zeta functions of hyperelliptic curves over finite fields of characteristic 2.
    Advances in Cryptology -- CRYPTO 2002, Lecture Notes in Computer Science 2442, pp. 369 -- 384, 2002.
  440. J Stern, D Pointcheval, J Malone-Lee, NP Smart.
    Flaws in Applying Proof Methodologies to Signature Schemes.
    Advances in Cryptology - CRYPTO 2002, Lecture Notes in Computer Science 2442, pp. 93 -- 110, 2002.
  441. F Hess.
    An Algorithm for Computing Weierstrass Points.
    Algorithmic Number Theory - ANTS 2002, Lecture Notes in Computer Science 2369, pp. 357 -- 371, 2002.
  442. J Denef, F Vercauteren.
    An extension of Kedlaya's algorithm to Artin-Schreier curves in characteristic 2.
    Algorithmic Number Theory - ANTS 2002, Lecture Notes in Computer Science 2369, pp. 369 -- 384, 2002.
  443. NP Smart.
    An identity based authenticated key agreement protocol based on the Weil pairing.
    Electronics Letters, Vol. 38 (13), pp. 630 -- 632, 2002.
  444. SD Galbraith, J Malone-Lee, NP Smart.
    Public key signatures in the multi-user setting.
    Information Processing Letters, Vol. 83 (5), pp. 263 -- 266, 2002.
  445. Steven Galbraith, Florian Hess, Nigel Smart.
    Extending the GHS Weil descent attack.
    Advances in Cryptology - EUROCRYPT 2002, Lecture Notes in Computer Science 2332, pp. 29 -- 44, 2002.
  446. F Hess.
    Computing Riemann-Roch Spaces in Algebraic Function Fields and Related Topics.
    Journal of Symbolic Computation, Vol. 33 (4), pp. 425 -- 445, 2002.
  447. P Gaudry, FK Hess, NP Smart.
    Constructive and Destructive Facets of Weil Descent on Elliptic Curves.
    Journal of Cryptology, Vol. 15 (1), pp. 19 -- 46, 2002.
    DOI: http://dx.doi.org/10.1007/s00145-001-0011-x.
  448. Nigel Smart.
    Cryptography, An Introduction.
    McGraw-Hill, 2002.
  449. Steven D Galbraith.
    Elliptic curve Paillier schemes.
    Journal of Cryptology, Vol. 15, pp. 129--138, 2002.
  450. Daniel Page, Nigel P Smart.
    Hardware implementation of finite fields of characteristic three.
    Cryptographic Hardware and Embedded Systems - CHES 2002, Lecture Notes in Computer Science 2523, pp. 529--539, 2002.
  451. James P J Irwin, Daniel Page, Nigel P Smart.
    Instruction stream mutation for non-deterministic processors.
    Application-specific Systems, Architectures and Processors - ASAP 2002, Institute of Electrical and Electronics Engineers (IEEE), pp. 286--295, 2002.
  452. Keith Harrison, Daniel Page, Nigel P Smart.
    Software implementation of finite fields of characteristic three, for use in pairing based cryptosystems.
    LMS Journal of Computation and Mathematics, Vol. 5, pp. 181----193, 2002.
  453. 2001

  454. NP Smart.
    The Exact Security of ECIES in the Generic Group Model.
    Cryptography and Coding - IMACC 2001, Lecture Notes in Computer Science 2260, pp. 73 -- 84, 2001.
  455. F Hess, G Seroussi, NP Smart.
    Two topics in hyperelliptic cryptography.
    Selected Areas in Cryptography - SAC 2001, Lecture Notes in Computer Science 2259, pp. 181 -- 189, 2001.
  456. NP Smart.
    A comparison of different finite fields for use in Elliptic Curve Cryptosystems.
    Computers and Mathematics with Applications, Vol. 42 (?), pp. 91 -- 100, 2001.
  457. NP Smart.
    A note on the x-coordinate of points on an elliptic curve in characteristic two.
    Information Processing Letters, Vol. 80 (?), pp. 261 -- 263, 2001.
  458. N Howgrave-Graham, NP Smart.
    Lattice attacks on digital signature schemes.
    Designs, Codes and Cryptography, Vol. 23 (3), pp. 283 -- 290, 2001.
    DOI: http://dx.doi.org/10.1023/A:1011214926272.
  459. David May, Henk Muller, Nigel Smart.
    Non-deterministic Processors.
    Information, Security and Privacy - ACISP 2001, Lecture Notes in Computer Science 2119, pp. 115 -- 129, 2001.
  460. NP Smart.
    How secure are elliptic curves over composite extension fields?.
    Advances in Cryptology - EUROCRYPT2001, Lecture Notes in Computer Science 2045, pp. 30 -- 39, 2001.
  461. NP Smart, P-Y Liardet.
    Preventing SPA/DPA in ECC systems using the Jacobi Form..
    Cryptographic Hardware and Embedded Systems - CHES 2001, Lecture Notes in Computer Science 2162, pp. 391 -- 401, 2001.
  462. David May, Henk Muller, Nigel Smart.
    Random Register Renaming to Foil DPA.
    Cryptographic Hardware and Embedded Systems - CHES 2001, Lecture Notes in Computer Science 2162, pp. 28 -- 38, 2001.
  463. NP Smart.
    The Hessian form of an elliptic curve.
    Cryptographic Hardware and Embedded Systems - CHES 2001, Lecture Notes in Computer Science 2162, pp. 118 -- 125, 2001.
  464. SD Galbraith, S Paulus, NP Smart.
    Arithmetic on superelliptic curves.
    Mathematics of Computation, Vol. 71 (?), pp. 393 -- 405, 2001.
  465. Steven Galbraith.
    Limitations of constructive Weil descent.
    Cryptography and Computational Number Theory, de Gruyter, pp. 59--70, 2001.
  466. Steven Galbraith.
    Supersingular curves in cryptography.
    Advances in Cryptology - ASIACRYPT 2001, Lecture Notes in Computer Science 2248, pp. 495--513, 2001.
  467. Steven Galbraith.
    Weil descent of Jacobians.
    Proc. WCC2001, Electronic Notes in Discrete Math 6, pp. 459--468, 2001.
  468. 2000

  469. NP Smart, HL Muller.
    A wearable public key infrastructure (WPKI).
    Proc. International Symposium on Wearable Computers, IEEE Computing -, pp. 127 -- 133, 2000.
  470. NP Smart.
    Physical side channel attacks on cryptographic systems.
    Software Focus, Vol. 1, pp. 5 -- 13, 2000.