Skip to content

Cryptography and Information Security

Organisational unit: Research Grouping

431 - 440 out of 517Page size: 10
  1. 2006
  2. Published

    Elliptic curve cryptography

    Smart, N., 2006, Handbook of Information Security. Wiley, Vol. 2. p. ???-???

    Research output: Chapter in Book/Report/Conference proceedingChapter in a book

  3. Published

    Escrow free encryption supporting cryptographic workflow

    Al-Riyami, S., Malone-Lee, J. & Smart, N., 2006, In : International Journal of Information Security. 5(4), p. 217-230

    Research output: Contribution to journalArticle

  4. Published

    High security pairing-based cryptography revisited

    Granger, R., Page, D. & Smart, N. P., 2006, Algorithmic Number Theory Symposium - ANTS VII. Springer Berlin Heidelberg, Vol. 4076. p. 480-494

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Identity-based encryption gone wild

    Abdalla, M., Catalano, D., Dent, A., John, M-L. & Smart, N., 2006, Automata, Languages and Programming - ICALP 2006. Springer Berlin Heidelberg, Vol. 4052. p. 300-311

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    LASH

    Bentahar, K., Page, D., Saarinen, M-J. O., Silverman, J. H. & Smart, N., 2006, NIST: The Second Cryptographic Hash Workshop. Online, p. -

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    On small characteristic algebraic tori in pairing based cryptography

    Granger, R., Page, D. & Stam, M., 2006, In : LMS Journal of Computation and Mathematics. 9, p. 64-85

    Research output: Contribution to journalArticle

  8. Published

    Secure Cryptographic Workflow in the Standard Model

    Barbosa, M. & Farshim, P., 2006, Progress in Cryptology - INDOCRYPT 2006. Springer Berlin Heidelberg, Vol. 4329. p. 379-393

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    The number field sieve in the medium prime case

    Joux, A., Lercier, R., Smart, N. & Vercauteren, F., 2006, Advances in Cryptology - CRYPTO 2006. Springer Berlin Heidelberg, Vol. 4117. p. 326 - 344 19 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. 2005
  11. Published

    A Key Encapsulation Mechanism for NTRU

    Stam, M., Dec 2005, Cryptography and Coding - IMACC 2005. Springer Berlin Heidelberg, Vol. 3796. p. 410 - 427 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Hash Based Digital Signature Schemes.

    Dods, C., Smart, N. & Stam, M., Nov 2005, Cryptography and Coding - IMACC 2005. Springer Berlin Heidelberg, Vol. 3796. p. 96 - 115 19 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution