Skip to content

Cryptography and Information Security

Organisational unit: Research Grouping

461 - 470 out of 514Page size: 10
  1. 2004
  2. Published

    Function field sieve in characteristic three

    Granger, R., Holt, A. J., Page, D., Smart, N. P. & Vercauteren, F. R. G., 2004, Algorithmic Number Theory Symposium - ANTS-VI. Springer Berlin Heidelberg, Vol. 3076. p. 223-234

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Generalising the GHS attack on the elliptic curve discrete logarithm problem

    Hess, F. K., 2004, In : LMS Journal of Computation and Mathematics. 7, p. 167-192

    Research output: Contribution to journalArticle

  4. Published

    Information theoretic secure oblivious polynomial evaluation: Model, bounds and constructions

    Mueller-Quade, J., Otsuka, A., Hanaoka, G., Imai, H., Nascimento, A. & Andreas, W., 2004, Information Security and Privacy - ACIPS 2004. Springer Berlin Heidelberg, Vol. 3108. p. 62-73

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    On the security of the verifiably-encrypted signature scheme of Boneh, Gentry, Lynn and Shacham

    Hess, F., 2004, In : Information Processing Letters. 89, 3, p. 111-114 4 p., 111-114.

    Research output: Contribution to journalArticle

  6. Published

    On XTR and side-channel analysis

    Page, D. & Stam, M., 2004, Selected Areas in Cryptography - SAC 2004. Springer Berlin Heidelberg, Vol. 3357. p. 54-68

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Parallel cryptographic arithmetic using a redundant Montgomery representation

    Page, D. & Smart, N. P., 2004, In : IEEE Transactions on Computers. 53, 11, p. 1474-1482

    Research output: Contribution to journalArticle

  8. 2003
  9. Published

    A General Construction of IND-CCA2 Secure Public Key Encryption

    Kiltz, E. & Malone-Lee, J. C., Dec 2003, Cryptography and Coding - IMACC 2003. Springer, Vol. 2898. p. 152 - 166 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Computing the $M = U U^t$ integer matrix decomposition

    Smart, N. & Geissler, K., Dec 2003, Cryptography and Coding - IMACC 2003. Springer Berlin Heidelberg, Vol. 2898. p. 223 - 233 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Mental Poker Revisited

    Smart, N. & Barnett, A., Dec 2003, Cryptography and Coding - IMACC 2003. Springer Berlin Heidelberg, Vol. 2898. p. 370 - 383 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    An Analysis of Goubin's Refined Power Analysis Attack

    Smart, N., Sep 2003, Cryptographic Hardware and Embedded Systems - CHES 2003. Springer Berlin Heidelberg, Vol. 2779. p. 281 - 290 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution