Skip to content

Cryptography and Information Security

Organisational unit: Research Grouping

441 - 450 out of 517Page size: 10
  1. 2005
  2. Published

    The Physically Observable Security of Signature Schemes

    Malone-Lee, J. C. & Dent, AW., Nov 2005, Coding and Cryptography - IMACC 2005. Springer, Vol. 3796. p. 220-232 13 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Black-Box Secret Sharing from Primitive Sets in Number Fields

    Cramer, R., Fehr, S. & Stam, M., Aug 2005, Advances in Cryptology - CRYPTO 2005. Springer Berlin Heidelberg, Vol. 3621. p. 344 - 360 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    An algebraic approach to NTRU (q = 2^n) via Witt vectors and overdetermined systems of nonlinear equations.

    Smart, N., Vercauteren, F. & Silverman, J., Jan 2005, Security and Cryptography for Networks - SCN 2006. Springer Berlin Heidelberg, Vol. 3352. p. 278 - 298 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Efficient key encapsulation to multiple parties

    Smart, NP., Jan 2005, Security and Cryptography for Networks - SCN 2006. Springer Berlin Heidelberg, Vol. 3352. p. 208 - 219 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    An information theoretic model for quantum secret sharing schemes

    Mueller-Quade, J., Nascimento, A., Winter, A., Tuyls, P. & Imai, H., 2005, In : Quantum Inf. Comput. 5, p. 69-80

    Research output: Contribution to journalArticle

  7. Published

    Efficient Identity-Based Key Encapsulation to Multiple Parties

    Barbosa, M. & Farshim, P., 2005, Coding and Cryptography - IMACC 2005. Springer, Vol. 3796. p. 428-441 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Further Hidden Markov Model Cryptanalysis

    Green, P. J., Noad, R. & Smart, N. P., 2005, Cryptographic Hardware and Embedded Systems - CHES 2005. Rao, J. R. & Sunar, B. (eds.). Springer Berlin Heidelberg, Vol. 3659. p. 61-74 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Hardware acceleration of the Tate pairing in characteristic three

    Grabher, P. & Page, D., 2005, Cryptographic Hardware and Embedded Systems - CHES 2005. Springer Berlin Heidelberg, Vol. 3659. p. 398-411

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Hardware and software normal basis arithmetic for pairing-based cryptography in characteristic three

    Granger, R., Page, D. & Stam, M., 2005, In : IEEE Transactions on Computers. 54, 7, p. 852-860

    Research output: Contribution to journalArticle

  11. Published

    On the automatic construction of indistinguishable operations

    Barbosa, M. B. M. & Page, D., 2005, Cryptography And Coding - IMACC 2005. Springer Berlin Heidelberg, Vol. 3796. p. 233-247

    Research output: Chapter in Book/Report/Conference proceedingConference contribution