Skip to content

Cryptography and Information Security

Organisational unit: Research Grouping

481 - 490 out of 513Page size: 10
  1. 2003
  2. Published

    Using media processors for low-memory AES implementation

    Page, D. & Irwin, J. P. J., 2003, Application-specific Systems, Architectures and Processors - ASAP 2003. Institute of Electrical and Electronics Engineers (IEEE), p. 144--154

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. 2002
  4. Published

    Applications of Multiple Trust Authorities in Pairing Based Cryptosystems

    Chen, L., Harrison, K., Smart, N. & Soldera, D., Sep 2002, InfraSec 2002. Davida, G., Frankel, Y. & Rees, O. (eds.). Springer Berlin Heidelberg, Vol. 2437. p. 260 - 275 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Certification of Public Keys within an Identity Based System

    Chen, L., Harrison, K., Moss, A., Smart, NP. & Soldera, D., Sep 2002, Information Security - ISC 2002. Chan, A. H. & Gligor, V. (eds.). Springer Berlin Heidelberg, Vol. 2443. p. 322 - 333 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Computing zeta functions of hyperelliptic curves over finite fields of characteristic 2

    Vercauteren, F., Aug 2002, Advances in Cryptology -- CRYPTO 2002. Springer Berlin Heidelberg, Vol. 2442. p. 369 - 384 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Flaws in Applying Proof Methodologies to Signature Schemes

    Stern, J., Pointcheval, D., Malone-Lee, J. & Smart, NP., Aug 2002, Advances in Cryptology - CRYPTO 2002. Yung, M. (ed.). Springer Berlin Heidelberg, Vol. 2442. p. 93 - 110 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    An Algorithm for Computing Weierstrass Points

    Hess, F., Jul 2002, Algorithmic Number Theory - ANTS 2002. Fieker, C. & Kohel, D. R. (eds.). Springer Berlin Heidelberg, Vol. 2369. p. 357 - 371 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    An extension of Kedlaya's algorithm to Artin-Schreier curves in characteristic 2

    Denef, J. & Vercauteren, F., Jul 2002, Algorithmic Number Theory - ANTS 2002. Fieker, C. & Kohel, D. R. (eds.). Springer Berlin Heidelberg, Vol. 2369. p. 369 - 384 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    An identity based authenticated key agreement protocol based on the Weil pairing

    Smart, NP., Jun 2002, In : Electronics Letters. 38 (13), p. 630 - 632 2 p.

    Research output: Contribution to journalArticle

  11. Published

    Public key signatures in the multi-user setting

    Galbraith, SD., Malone-Lee, J. & Smart, NP., Jun 2002, In : Information Processing Letters. 83 (5), p. 263 - 266 3 p.

    Research output: Contribution to journalArticle

  12. Published

    Extending the GHS Weil descent attack

    Galbraith, S., Hess, F. & Smart, N., May 2002, Advances in Cryptology - EUROCRYPT 2002. Springer Berlin Heidelberg, Vol. 2332. p. 29 - 44 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution