Skip to content

Cryptography and Information Security

Organisational unit: Research Grouping

441 - 450 out of 514Page size: 10
  1. 2005
  2. Published

    Efficient key encapsulation to multiple parties

    Smart, NP., Jan 2005, Security and Cryptography for Networks - SCN 2006. Springer Berlin Heidelberg, Vol. 3352. p. 208 - 219 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    An information theoretic model for quantum secret sharing schemes

    Mueller-Quade, J., Nascimento, A., Winter, A., Tuyls, P. & Imai, H., 2005, In : Quantum Inf. Comput. 5, p. 69-80

    Research output: Contribution to journalArticle

  4. Published

    Efficient Identity-Based Key Encapsulation to Multiple Parties

    Barbosa, M. & Farshim, P., 2005, Coding and Cryptography - IMACC 2005. Springer, Vol. 3796. p. 428-441 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Further Hidden Markov Model Cryptanalysis

    Green, P. J., Noad, R. & Smart, N. P., 2005, Cryptographic Hardware and Embedded Systems - CHES 2005. Rao, J. R. & Sunar, B. (eds.). Springer Berlin Heidelberg, Vol. 3659. p. 61-74 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Hardware acceleration of the Tate pairing in characteristic three

    Grabher, P. & Page, D., 2005, Cryptographic Hardware and Embedded Systems - CHES 2005. Springer Berlin Heidelberg, Vol. 3659. p. 398-411

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Hardware and software normal basis arithmetic for pairing-based cryptography in characteristic three

    Granger, R., Page, D. & Stam, M., 2005, In : IEEE Transactions on Computers. 54, 7, p. 852-860

    Research output: Contribution to journalArticle

  8. Published

    On the automatic construction of indistinguishable operations

    Barbosa, M. B. M. & Page, D., 2005, Cryptography And Coding - IMACC 2005. Springer Berlin Heidelberg, Vol. 3796. p. 233-247

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    On the linear complexity and multidimensional distribution of congruential generators over elliptic curves

    Hess, F. K. & Shparlinksi, I., 2005, In : Designs, Codes and Cryptography. 35, 1, p. 111-117 7 p., 111-117.

    Research output: Contribution to journalArticle

  10. Published

    Password-based Encryption Analyzed

    Abadi, M. & Warinschi, B., 2005, Internation Colloqium on Automata, Languages and Programming - ICALP 2005. Springer Berlin Heidelberg, Vol. 3580. p. 664-676

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Practical cryptography in high dimensional tori

    van Dijk, M., Granger, R., Page, D., Rubin, K., Silverberg, A., Stam, M. & Woodruff, D., 2005, Advances in Cryptology - EUROCRYPT 2005. Springer Berlin Heidelberg, Vol. 3494. p. 234-250

    Research output: Chapter in Book/Report/Conference proceedingConference contribution