Skip to content

Cryptography and Information Security

Organisational unit: Research Grouping

451 - 460 out of 514Page size: 10
  1. 2005
  2. Published

    Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions

    Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Malone-Lee, J., Neven, G., Paillier, P. & Shi, H., 2005, Advances in Cryptology - CRYPTO 2005. Springer, Vol. 3621. p. 205-222 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Secure Computation of the Mean and Related Statistics

    Kiltz, E., Leander, G. & Malone-Lee, J., 2005, Theory of Cryptography Conference - TCC 2005. Springer, Vol. 3378. p. 283-302 20 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Signcryption with Non-Interactive Non-Repudiation

    Malone-Lee, J., 2005, In : Designs, Codes and Cryptography. 37, 1, p. 81-109

    Research output: Contribution to journalArticle

  5. 2004
  6. Published

    Security of signature schemes in a multi-user setting

    Smart, NP. & Menezes, A., Aug 2004, In : Designs, Codes and Cryptography. 33, p. 261 - 274 13 p.

    Research output: Contribution to journalArticle

  7. Published

    Projective Coordinates Leak

    Naccache, D., Smart, NP. & Stern, J., May 2004, Advances in Cryptology - EUROCRYPT 2004. Springer Berlin Heidelberg, Vol. 3027. p. 257 - 267 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    The equivalence between the DHP and DLP for elliptic curves used in practical applications

    Smart, NP., Vercauteren, F. & Muzereau, A., Mar 2004, In : LMS Journal of Computation and Mathematics. 7, p. 50 - 72 22 p.

    Research output: Contribution to journalArticle

  9. Published

    A comparison of CEILIDH and XTR

    Granger, R., Page, D. & Stam, M., 2004, Algorithmic Number Theory Symposium - ANTS-VI. Springer Berlin Heidelberg, Vol. 3076. p. 235-249

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Advances in Elliptic Curve Cryptography

    Blake, I., Seroussi, G. & Smart, N., 2004, Cambridge University Press. (London Math Society Lecture Note Series)

    Research output: Book/ReportEdited book

  11. Published

    A note on the Tate pairing of curves over finite fields

    Hess, F. K., 2004, In : Archiv der Mathematik. 82, p. 28-32 28-32.

    Research output: Contribution to journalArticle

  12. Published

    Attacking DSA under a repeated bits assumption

    Leadbitter, P. J., Page, D. & Smart, N. P., 2004, Cryptographic Hardware and Embedded Systems - CHES 2004. Springer Berlin Heidelberg, Vol. 3156. p. 428-440

    Research output: Chapter in Book/Report/Conference proceedingConference contribution