Skip to content

Cryptography and Information Security

Organisational unit: Research Grouping

471 - 480 out of 513Page size: 10
  1. 2003
  2. Published

    Point multiplication on ordinary elliptic curves over fields of characteristic three.

    Smart, NP. & Westwood, J., Jul 2003, In : Applicable Algebra in Engineering, Communication and Computing. 13, p. 485 - 497 12 p.

    Research output: Contribution to journalArticle

  3. Published

    Access control using pairing based cryptography

    Smart, NP., Apr 2003, Topics in Cryptology - CT-RSA 2003. Springer Berlin Heidelberg, Vol. 2612. p. 111 - 121 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Defending against cache based side-channel attacks

    Page, D., Apr 2003, In : Information Security Technical Report. 8(1), 1, p. 30 - 44 14 p.

    Research output: Contribution to journalArticle

  5. Published

    Two Birds One Stone: Signcryption Using RSA

    Malone-Lee, J. C. & Mao, W., Apr 2003, Topics in Cryptology - CT-RSA 2003. Springer, Vol. 2612. p. 211 - 225 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Efficient Identity based Signature Schemes based on Pairings.

    Hess, F., Feb 2003, Selected Areas in Cryptography -- SAC 2002. Springer Berlin Heidelberg, Vol. 2595. p. 310 - 324 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Modifications of ECDSA

    Malone-Lee, J. & Smart, N., Feb 2003, Selected Areas in Cryptography - SAC 2002. Springer Berlin Heidelberg, Vol. 2595. p. 1 - 12 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Commitment capacity of discrete memoryless channels

    A.C.A., N., H., I. & Andreas, W., 2003, Cryptography and Coding - IMACC 2003. Springer Berlin Heidelberg, Vol. 2898. p. 35-51

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Computing the multiplicative group of residue class rings

    Hess, F., S., P. & M.E., P., 2003, In : Mathematics of Computation. 72, p. 1531-1548

    Research output: Contribution to journalArticle

  10. Published

    Estimates for Discrete Logarithm Computations in Finite Fields of Small Characteristic

    Granger, R., 2003, Cryptography and Coding - IMACC 2003. Springer, Vol. 2898. p. 190-206 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    The GHS attack revisited

    Hess, F., 2003, Advances in Cryptology - EUROCRYPT 2003. Springer Berlin Heidelberg, Vol. 2656. p. 374-387

    Research output: Chapter in Book/Report/Conference proceedingConference contribution