Skip to content

Cryptography and Information Security

Organisational unit: Research Grouping

491 - 500 out of 513Page size: 10
  1. 2002
  2. Published

    Computing Riemann-Roch Spaces in Algebraic Function Fields and Related Topics

    Hess, F., Apr 2002, In : Journal of Symbolic Computation. 33 (4), p. 425 - 445 20 p.

    Research output: Contribution to journalArticle

  3. Published

    Constructive and Destructive Facets of Weil Descent on Elliptic Curves

    Gaudry, P., Hess, FK. & Smart, NP., Jan 2002, In : Journal of Cryptology. 15 (1), p. 19 - 46 28 p.

    Research output: Contribution to journalArticle

  4. Published

    Cryptography, An Introduction

    Smart, N., 2002, McGraw-Hill.

    Research output: Book/ReportAuthored book

  5. Published

    Elliptic curve Paillier schemes

    Galbraith, S. D., 2002, In : Journal of Cryptology. 15, p. 129-138

    Research output: Contribution to journalArticle

  6. Published

    Hardware implementation of finite fields of characteristic three

    Page, D. & Smart, N. P., 2002, Cryptographic Hardware and Embedded Systems - CHES 2002. Springer Berlin Heidelberg, Vol. 2523. p. 529-539

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Instruction stream mutation for non-deterministic processors

    Irwin, J. P. J., Page, D. & Smart, N. P., 2002, Application-specific Systems, Architectures and Processors - ASAP 2002. Institute of Electrical and Electronics Engineers (IEEE), p. 286-295

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Software implementation of finite fields of characteristic three, for use in pairing based cryptosystems

    Harrison, K., Page, D. & Smart, N. P., 2002, In : LMS Journal of Computation and Mathematics. 5, p. 181--193

    Research output: Contribution to journalArticle

  9. 2001
  10. Published

    The Exact Security of ECIES in the Generic Group Model

    Smart, NP., Dec 2001, Cryptography and Coding - IMACC 2001. Honary, B. (ed.). Springer Berlin Heidelberg, Vol. 2260. p. 73 - 84 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Two topics in hyperelliptic cryptography

    Hess, F., Seroussi, G. & Smart, NP., Dec 2001, Selected Areas in Cryptography - SAC 2001. Vaudenay, S. & Youssef, A. M. (eds.). Springer Berlin Heidelberg, Vol. 2259. p. 181 - 189 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    A comparison of different finite fields for use in Elliptic Curve Cryptosystems

    Smart, NP., Oct 2001, In : Computers and Mathematics with Applications. 42 (?), p. 91 - 100 9 p.

    Research output: Contribution to journalArticle