Skip to content

Cryptography and Information Security

Organisational unit: Research Grouping

471 - 480 out of 517Page size: 10
  1. 2003
  2. Published

    Computing the $M = U U^t$ integer matrix decomposition

    Smart, N. & Geissler, K., Dec 2003, Cryptography and Coding - IMACC 2003. Springer Berlin Heidelberg, Vol. 2898. p. 223 - 233 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Mental Poker Revisited

    Smart, N. & Barnett, A., Dec 2003, Cryptography and Coding - IMACC 2003. Springer Berlin Heidelberg, Vol. 2898. p. 370 - 383 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    An Analysis of Goubin's Refined Power Analysis Attack

    Smart, N., Sep 2003, Cryptographic Hardware and Embedded Systems - CHES 2003. Springer Berlin Heidelberg, Vol. 2779. p. 281 - 290 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Analysis of the insecurity of ECMQV with partially known nonces

    Smart, NP. & Leadbitter, P., Aug 2003, Information Security Conference - ISC 2003. Springer Berlin Heidelberg, Vol. 2851. p. 240 - 251 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Point multiplication on ordinary elliptic curves over fields of characteristic three.

    Smart, NP. & Westwood, J., Jul 2003, In : Applicable Algebra in Engineering, Communication and Computing. 13, p. 485 - 497 12 p.

    Research output: Contribution to journalArticle

  7. Published

    Access control using pairing based cryptography

    Smart, NP., Apr 2003, Topics in Cryptology - CT-RSA 2003. Springer Berlin Heidelberg, Vol. 2612. p. 111 - 121 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Defending against cache based side-channel attacks

    Page, D., Apr 2003, In : Information Security Technical Report. 8(1), 1, p. 30 - 44 14 p.

    Research output: Contribution to journalArticle

  9. Published

    Two Birds One Stone: Signcryption Using RSA

    Malone-Lee, J. C. & Mao, W., Apr 2003, Topics in Cryptology - CT-RSA 2003. Springer, Vol. 2612. p. 211 - 225 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Efficient Identity based Signature Schemes based on Pairings.

    Hess, F., Feb 2003, Selected Areas in Cryptography -- SAC 2002. Springer Berlin Heidelberg, Vol. 2595. p. 310 - 324 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Modifications of ECDSA

    Malone-Lee, J. & Smart, N., Feb 2003, Selected Areas in Cryptography - SAC 2002. Springer Berlin Heidelberg, Vol. 2595. p. 1 - 12 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution