Skip to content

Cryptography and Information Security

Organisational unit: Research Grouping

461 - 470 out of 513Page size: 10
  1. 2004
  2. Published

    Generalising the GHS attack on the elliptic curve discrete logarithm problem

    Hess, F. K., 2004, In : LMS Journal of Computation and Mathematics. 7, p. 167-192

    Research output: Contribution to journalArticle

  3. Published

    Information theoretic secure oblivious polynomial evaluation: Model, bounds and constructions

    Mueller-Quade, J., Otsuka, A., Hanaoka, G., Imai, H., Nascimento, A. & Andreas, W., 2004, Information Security and Privacy - ACIPS 2004. Springer Berlin Heidelberg, Vol. 3108. p. 62-73

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    On the security of the verifiably-encrypted signature scheme of Boneh, Gentry, Lynn and Shacham

    Hess, F., 2004, In : Information Processing Letters. 89, 3, p. 111-114 4 p., 111-114.

    Research output: Contribution to journalArticle

  5. Published

    On XTR and side-channel analysis

    Page, D. & Stam, M., 2004, Selected Areas in Cryptography - SAC 2004. Springer Berlin Heidelberg, Vol. 3357. p. 54-68

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Parallel cryptographic arithmetic using a redundant Montgomery representation

    Page, D. & Smart, N. P., 2004, In : IEEE Transactions on Computers. 53, 11, p. 1474-1482

    Research output: Contribution to journalArticle

  7. 2003
  8. Published

    A General Construction of IND-CCA2 Secure Public Key Encryption

    Kiltz, E. & Malone-Lee, J. C., Dec 2003, Cryptography and Coding - IMACC 2003. Springer, Vol. 2898. p. 152 - 166 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Computing the $M = U U^t$ integer matrix decomposition

    Smart, N. & Geissler, K., Dec 2003, Cryptography and Coding - IMACC 2003. Springer Berlin Heidelberg, Vol. 2898. p. 223 - 233 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Mental Poker Revisited

    Smart, N. & Barnett, A., Dec 2003, Cryptography and Coding - IMACC 2003. Springer Berlin Heidelberg, Vol. 2898. p. 370 - 383 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    An Analysis of Goubin's Refined Power Analysis Attack

    Smart, N., Sep 2003, Cryptographic Hardware and Embedded Systems - CHES 2003. Springer Berlin Heidelberg, Vol. 2779. p. 281 - 290 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Analysis of the insecurity of ECMQV with partially known nonces

    Smart, NP. & Leadbitter, P., Aug 2003, Information Security Conference - ISC 2003. Springer Berlin Heidelberg, Vol. 2851. p. 240 - 251 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution