Skip to content

Cryptography and Information Security

Organisational unit: Research Grouping

421 - 430 out of 515Page size: 10
  1. 2006
  2. Published

    The Eta pairing revisited

    Hess, FK., Smart, NP. & Vercauteren, FRG., Oct 2006, In : IEEE Transactions on Information Theory. 52 (10), p. 4595 - 4602 8 p.

    Research output: Contribution to journalArticle

  3. Published

    Efficient ID-KEM based on the Sakai-Kasahara key construction

    Chen, L., Cheng, Z., Malone-Lee, J. & Smart, NP., Mar 2006, In : IEE Proceedings: Information Security. 153 (1), p. 19 - 26 8 p.

    Research output: Contribution to journalArticle

  4. Published

    List signature schemes

    Canard, S., Schoenmakers, B., Stam, M. & Traoré, J., Feb 2006, In : Discrete Applied Mathematics. 154 (2), p. 189 - 201 12 p.

    Research output: Contribution to journalArticle

  5. Published

    A comparison of MNT curves and supersingular curves

    Page, D., Smart, N. & Vercauteren, F. R. G., 2006, In : Applicable Algebra in Engineering, Communication and Computing. 17, 5, p. 379-392

    Research output: Contribution to journalArticle

  6. Published

    A fault attack on pairing-based cryptography

    Page, DS. & Vercauteren, F. R. G., 2006, In : IEEE Transactions on Computers. 55, 9, p. 1075-1080 6 p.

    Research output: Contribution to journalArticle

  7. Published

    An Extension of Kedlaya's Algorithm to Hyperelliptic Curves in Characteristic 2

    J., D. & Vercauteren, F. R. G., 2006, In : Journal of Cryptology. 19, 1, p. 1-25 25 p., 1-26.

    Research output: Contribution to journalArticle

  8. Published

    Counting points on C$_ab$ curves using Monsky-Washnitzer cohomology

    Denef, J. & Vercauteren, F., 2006, In : Finite Fields and Their Applications. 12, 1, p. 78-102 25 p.

    Research output: Contribution to journalArticle

  9. Published

    Discrete logarithm variants of VSH

    Lenstra, A., Page, D. & Stam, M., 2006, Vietcrypt. Springer Berlin Heidelberg, Vol. 4341. p. 229-242

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Elliptic curve cryptography

    Smart, N., 2006, Handbook of Information Security. Wiley, Vol. 2. p. ???-???

    Research output: Chapter in Book/Report/Conference proceedingChapter in a book

  11. Published

    Escrow free encryption supporting cryptographic workflow

    Al-Riyami, S., Malone-Lee, J. & Smart, N., 2006, In : International Journal of Information Security. 5(4), p. 217-230

    Research output: Contribution to journalArticle