Skip to content

Cryptography and Information Security

Organisational unit: Research Grouping

391 - 400 out of 515Page size: 10
  1. 2008
  2. Published

    Security Analysis of Cryptographically Controlled Access to XML Documents

    Abadi, M. & Warinschi, B., 2008, In : Journal of the ACM. 55, 2, p. 108-117 10 p.

    Research output: Contribution to journalArticle

  3. Published

    Security patterns for automated continuous auditing

    Kearney, B. & Tryfonas, T., 2008, In : Information Security Journal: A Global Perspective. 17, 1, p. 13 - 25

    Research output: Contribution to journalArticle

  4. Published

    Side channel analysis of an automotive microprocessor: I

    Hamilton, M., Tunstall, M., Popovici, E. & William P., M., 2008, IET Irish Signals and Systems Conference - ISSC 2008. Institution of Engineering and Technology (IET), p. 4-9

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Standardising business application security assessments with pattern-driven audit automations

    Tryfonas, T. & Kearney, B., 2008, In : Computer Standards and Interfaces. 30, 4, p. 262 - 270

    Research output: Contribution to journalArticle

  6. Published

    Statistical security conditions for two-party secure function evaluation

    Crepeau, C. & Wullschleger, J. E., 2008, Information Theoretic Security - ICITS 2008. Springer Berlin Heidelberg, Vol. 5155. p. 86-99

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Template Attacks on ECDSA

    Oswald, E. & Marcel, M., 2008, Information Security Applications - WISA 2008. Springer Berlin Heidelberg, Vol. 5379. p. 14-27

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks

    Koschuch, M., Großschädl, J., Payer, U., Hudler, M. & Krüger, M., 2008, Cryptology and Network Security --- CANS 2008. Springer Berlin Heidelberg, Vol. 5339. p. 349-365

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. 2007
  10. Published

    A multidimensional continued fraction based on a high-order recurrence relation

    Tourigny, YJM. & Smart, NP., May 2007, In : Mathematics of Computation. 76 (260), p. 1995 - 2022 28 p.

    Research output: Contribution to journalArticle

  11. Published

    A Closer Look at PKI: Security and Efficiency

    Boldyreva, A., Fischlin, M., Palacio, A. & Warinschi, B., 2007, Public Key Cryptography - PKC 2007. Springer Berlin Heidelberg, Vol. 4450. p. 458-475

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    A Cryptographic Model for Branching Time Security Properties - The Case of Contract Signing Protocols

    Cortier, V., Kuesters, R. & Warinschi, B., 2007, European Symposium On Research In Computer Security - ESORICS 2007. Springer Berlin Heidelberg, Vol. 4734. p. 422-437

    Research output: Chapter in Book/Report/Conference proceedingConference contribution