Skip to content

Cryptography and Information Security

Organisational unit: Research Grouping

401 - 410 out of 515Page size: 10
  1. 2007
  2. Published

    A Generalization of DDH with Applications to Protocol Analysis and Computational Soundness

    Bresson, E., Lakhnech, Y., Mazare, L. & Warinschi, B., 2007, Advances in Cryptology - CRYPTO 2007. Springer Berlin Heidelberg, Vol. 4622. p. 482-499

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Ate Pairing on Hyperelliptic Curves

    Granger, R., Hess, F., Oyono, R., Theriault, N. & Vercauteren, F., 2007, Advances in Cryptology - EUROCRYPT 2007. Springer Berlin Heidelberg, Vol. 4515. p. 430-447

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Compiler assisted elliptic curve cryptography

    Barbosa, M. B. M., Moss, A. D. & Page, D., 2007, Information Security - IS 2007. Springer Berlin Heidelberg, Vol. 4804. p. 1785-1802

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Cryptographic side-channels from low-power cache memory

    Grabher, P., Groszschaedl, J. & Page, D., 2007, Cryptography and Coding - IMACC 2007. Springer Berlin Heidelberg, Vol. 4887. p. 170-184

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Efficient 15,360-bit RSA Using Woop-Optimised Montgomery Arithmetic

    Bentahar, K. & Smart, N., 2007, Cryptography and Coding - IMACC 2007. Springer Berlin Heidelberg, Vol. 4887. p. 346-363

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Efficient KEMs with partial message recovery

    Bjorstad, T., Dent, A. & Smart, N., 2007, Cryptography and Coding - IMACC 2007. Springer Berlin Heidelberg, Vol. 4887. p. 233-256

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Explicit Randomness is not Necessary when Modeling Probabilistic Encryption

    Cortier, V., Hordegen, H. & Warinschi, B., 2007, In : Electronic Notes in Theoretical Computer Science. 186, p. 49-65

    Research output: Contribution to journalArticle

  9. Published

    Identity-based key agreement protocols from pairings

    L., C., Z., C. & Smart, N., 2007, In : International Journal of Information Security. 6, p. 213-241

    Research output: Contribution to journalArticle

  10. Published

    Identity-based traitor tracing

    Abdalla, M., Dent, A., Malone-Lee, J., Neven, G., D.H., P. & Smart, N., 2007, Public Key Cryptography - PKC 2007. Springer Berlin Heidelberg, Vol. 4450. p. 361-367

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Instruction set extensions for pairing-based cryptography

    Vejda, T., Page, D. & Groszschaedl, J., 2007, Pairing-Based Cryptography --- PAIRING 2007. Springer Berlin Heidelberg, Vol. 4575. p. 208-224

    Research output: Chapter in Book/Report/Conference proceedingConference contribution