Skip to content

Cryptography and Information Security

Organisational unit: Research Grouping

431 - 440 out of 514Page size: 10
  1. 2006
  2. Published

    Identity-based encryption gone wild

    Abdalla, M., Catalano, D., Dent, A., John, M-L. & Smart, N., 2006, Automata, Languages and Programming - ICALP 2006. Springer Berlin Heidelberg, Vol. 4052. p. 300-311

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    LASH

    Bentahar, K., Page, D., Saarinen, M-J. O., Silverman, J. H. & Smart, N., 2006, NIST: The Second Cryptographic Hash Workshop. Online, p. -

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    On small characteristic algebraic tori in pairing based cryptography

    Granger, R., Page, D. & Stam, M., 2006, In : LMS Journal of Computation and Mathematics. 9, p. 64-85

    Research output: Contribution to journalArticle

  5. Published

    Secure Cryptographic Workflow in the Standard Model

    Barbosa, M. & Farshim, P., 2006, Progress in Cryptology - INDOCRYPT 2006. Springer Berlin Heidelberg, Vol. 4329. p. 379-393

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    The number field sieve in the medium prime case

    Joux, A., Lercier, R., Smart, N. & Vercauteren, F., 2006, Advances in Cryptology - CRYPTO 2006. Springer Berlin Heidelberg, Vol. 4117. p. 326 - 344 19 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. 2005
  8. Published

    A Key Encapsulation Mechanism for NTRU

    Stam, M., Dec 2005, Cryptography and Coding - IMACC 2005. Springer Berlin Heidelberg, Vol. 3796. p. 410 - 427 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Hash Based Digital Signature Schemes.

    Dods, C., Smart, N. & Stam, M., Nov 2005, Cryptography and Coding - IMACC 2005. Springer Berlin Heidelberg, Vol. 3796. p. 96 - 115 19 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    The Physically Observable Security of Signature Schemes

    Malone-Lee, J. C. & Dent, AW., Nov 2005, Coding and Cryptography - IMACC 2005. Springer, Vol. 3796. p. 220-232 13 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Black-Box Secret Sharing from Primitive Sets in Number Fields

    Cramer, R., Fehr, S. & Stam, M., Aug 2005, Advances in Cryptology - CRYPTO 2005. Springer Berlin Heidelberg, Vol. 3621. p. 344 - 360 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    An algebraic approach to NTRU (q = 2^n) via Witt vectors and overdetermined systems of nonlinear equations.

    Smart, N., Vercauteren, F. & Silverman, J., Jan 2005, Security and Cryptography for Networks - SCN 2006. Springer Berlin Heidelberg, Vol. 3352. p. 278 - 298 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution