Research Output

2000

A wearable public key infrastructure (WPKI)

Smart, NP. & Muller, HL., 2000, Proc. International Symposium on Wearable Computers. IEEE Computer Society, Vol. -. p. 127 - 133

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

2 Citations (Scopus)

Physical side channel attacks on cryptographic systems

Smart, NP., 2000, In : Software Focus. 1, p. 5 - 13

Research output: Contribution to journalArticle (Academic Journal)

2001

A comparison of different finite fields for use in Elliptic Curve Cryptosystems

Smart, NP., Oct 2001, In : Computers and Mathematics with Applications. 42 (?), p. 91 - 100 9 p.

Research output: Contribution to journalArticle (Academic Journal)

A note on the x-coordinate of points on an elliptic curve in characteristic two

Smart, NP., Oct 2001, In : Information Processing Letters. 80 (?), p. 261 - 263 2 p.

Research output: Contribution to journalArticle (Academic Journal)

3 Citations (Scopus)

Arithmetic on superelliptic curves

Galbraith, SD., Paulus, S. & Smart, NP., Jan 2001, In : Mathematics of Computation. 71 (?), p. 393 - 405 12 p.

Research output: Contribution to journalArticle (Academic Journal)

How secure are elliptic curves over composite extension fields?

Smart, NP., May 2001, Advances in Cryptology - EUROCRYPT2001. Pfitzmann, B. (ed.). Springer Berlin Heidelberg, Vol. 2045. p. 30 - 39 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

20 Citations (Scopus)

Lattice attacks on digital signature schemes

Howgrave-Graham, N. & Smart, NP., Aug 2001, In : Designs, Codes and Cryptography. 23 (3), p. 283 - 290 8 p.

Research output: Contribution to journalArticle (Academic Journal)

111 Citations (Scopus)

Limitations of constructive Weil descent

Galbraith, S., 2001, Cryptography and Computational Number Theory. de Gruyter, p. 59-70

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Non-deterministic Processors

May, D., Muller, H. & Smart, N., Jul 2001, Information, Security and Privacy - ACISP 2001. Springer Berlin Heidelberg, Vol. 2119. p. 115 - 129 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Preventing SPA/DPA in ECC systems using the Jacobi Form.

Smart, NP. & Liardet, P-Y., May 2001, Cryptographic Hardware and Embedded Systems - CHES 2001. K., N. & P. (eds.). Springer Berlin Heidelberg, Vol. 2162. p. 391 - 401 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

106 Citations (Scopus)

Random Register Renaming to Foil DPA

May, D., Muller, H. & Smart, N., May 2001, Cryptographic Hardware and Embedded Systems - CHES 2001. Springer Berlin Heidelberg, Vol. 2162. p. 28 - 38 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

55 Citations (Scopus)

Supersingular curves in cryptography

Galbraith, S., 2001, Advances in Cryptology - ASIACRYPT 2001. Springer Berlin Heidelberg, Vol. 2248. p. 495-513

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

131 Citations (Scopus)

The Exact Security of ECIES in the Generic Group Model

Smart, NP., Dec 2001, Cryptography and Coding - IMACC 2001. Honary, B. (ed.). Springer Berlin Heidelberg, Vol. 2260. p. 73 - 84 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

26 Citations (Scopus)

The Hessian form of an elliptic curve

Smart, NP., May 2001, Cryptographic Hardware and Embedded Systems - CHES 2001. K., N. & P. (eds.). Springer Berlin Heidelberg, Vol. 2162. p. 118 - 125 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

66 Citations (Scopus)

Two topics in hyperelliptic cryptography

Hess, F., Seroussi, G. & Smart, NP., Dec 2001, Selected Areas in Cryptography - SAC 2001. Vaudenay, S. & Youssef, A. M. (eds.). Springer Berlin Heidelberg, Vol. 2259. p. 181 - 189 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

6 Citations (Scopus)

Weil descent of Jacobians

Galbraith, S., 2001, Proc. WCC2001. Electronic Notes in Discrete Math 6, p. 459-468

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

4 Citations (Scopus)
2002

An Algorithm for Computing Weierstrass Points

Hess, F., Jul 2002, Algorithmic Number Theory - ANTS 2002. Fieker, C. & Kohel, D. R. (eds.). Springer Berlin Heidelberg, Vol. 2369. p. 357 - 371 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

4 Citations (Scopus)

An extension of Kedlaya's algorithm to Artin-Schreier curves in characteristic 2

Denef, J. & Vercauteren, F., Jul 2002, Algorithmic Number Theory - ANTS 2002. Fieker, C. & Kohel, D. R. (eds.). Springer Berlin Heidelberg, Vol. 2369. p. 369 - 384 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

An identity based authenticated key agreement protocol based on the Weil pairing

Smart, NP., Jun 2002, In : Electronics Letters. 38 (13), p. 630 - 632 2 p.

Research output: Contribution to journalArticle (Academic Journal)

Applications of Multiple Trust Authorities in Pairing Based Cryptosystems

Chen, L., Harrison, K., Smart, N. & Soldera, D., Sep 2002, InfraSec 2002. Davida, G., Frankel, Y. & Rees, O. (eds.). Springer Berlin Heidelberg, Vol. 2437. p. 260 - 275 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

109 Citations (Scopus)

Certification of Public Keys within an Identity Based System

Chen, L., Harrison, K., Moss, A., Smart, NP. & Soldera, D., Sep 2002, Information Security - ISC 2002. Chan, A. H. & Gligor, V. (eds.). Springer Berlin Heidelberg, Vol. 2443. p. 322 - 333 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

26 Citations (Scopus)

Computing Riemann-Roch Spaces in Algebraic Function Fields and Related Topics

Hess, F., Apr 2002, In : Journal of Symbolic Computation. 33 (4), p. 425 - 445 20 p.

Research output: Contribution to journalArticle (Academic Journal)

67 Citations (Scopus)

Computing zeta functions of hyperelliptic curves over finite fields of characteristic 2

Vercauteren, F., Aug 2002, Advances in Cryptology -- CRYPTO 2002. Springer Berlin Heidelberg, Vol. 2442. p. 369 - 384 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

15 Citations (Scopus)

Constructive and Destructive Facets of Weil Descent on Elliptic Curves

Gaudry, P., Hess, FK. & Smart, NP., Jan 2002, In : Journal of Cryptology. 15 (1), p. 19 - 46 28 p.

Research output: Contribution to journalArticle (Academic Journal)

139 Citations (Scopus)

Cryptography, An Introduction

Smart, N., 2002, McGraw-Hill.

Research output: Book/ReportAuthored book

Elliptic curve Paillier schemes

Galbraith, S. D., 2002, In : Journal of Cryptology. 15, p. 129-138

Research output: Contribution to journalArticle (Academic Journal)

Extending the GHS Weil descent attack

Galbraith, S., Hess, F. & Smart, N., May 2002, Advances in Cryptology - EUROCRYPT 2002. Springer Berlin Heidelberg, Vol. 2332. p. 29 - 44 16 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

52 Citations (Scopus)

Flaws in Applying Proof Methodologies to Signature Schemes

Stern, J., Pointcheval, D., Malone-Lee, J. & Smart, NP., Aug 2002, Advances in Cryptology - CRYPTO 2002. Yung, M. (ed.). Springer Berlin Heidelberg, Vol. 2442. p. 93 - 110 17 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

58 Citations (Scopus)

Hardware implementation of finite fields of characteristic three

Page, D. & Smart, N. P., 2002, Cryptographic Hardware and Embedded Systems - CHES 2002. Springer Berlin Heidelberg, Vol. 2523. p. 529-539

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Instruction stream mutation for non-deterministic processors

Irwin, J. P. J., Page, D. & Smart, N. P., 2002, Application-specific Systems, Architectures and Processors - ASAP 2002. Institute of Electrical and Electronics Engineers (IEEE), p. 286-295

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

32 Citations (Scopus)

Public key signatures in the multi-user setting

Galbraith, SD., Malone-Lee, J. & Smart, NP., Jun 2002, In : Information Processing Letters. 83 (5), p. 263 - 266 3 p.

Research output: Contribution to journalArticle (Academic Journal)

30 Citations (Scopus)

Software implementation of finite fields of characteristic three, for use in pairing based cryptosystems

Harrison, K., Page, D. & Smart, N. P., 2002, In : LMS Journal of Computation and Mathematics. 5, p. 181--193

Research output: Contribution to journalArticle (Academic Journal)

2003

Access control using pairing based cryptography

Smart, NP., Apr 2003, Topics in Cryptology - CT-RSA 2003. Springer Berlin Heidelberg, Vol. 2612. p. 111 - 121 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

51 Citations (Scopus)

A General Construction of IND-CCA2 Secure Public Key Encryption

Kiltz, E. & Malone-Lee, J. C., Dec 2003, Cryptography and Coding - IMACC 2003. Springer, Vol. 2898. p. 152 - 166 14 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

13 Citations (Scopus)

Analysis of the insecurity of ECMQV with partially known nonces

Smart, NP. & Leadbitter, P., Aug 2003, Information Security Conference - ISC 2003. Springer Berlin Heidelberg, Vol. 2851. p. 240 - 251 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

8 Citations (Scopus)

An Analysis of Goubin's Refined Power Analysis Attack

Smart, N., Sep 2003, Cryptographic Hardware and Embedded Systems - CHES 2003. Springer Berlin Heidelberg, Vol. 2779. p. 281 - 290 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Commitment capacity of discrete memoryless channels

A.C.A., N., H., I. & Andreas, W., 2003, Cryptography and Coding - IMACC 2003. Springer Berlin Heidelberg, Vol. 2898. p. 35-51

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

43 Citations (Scopus)

Computing the $M = U U^t$ integer matrix decomposition

Smart, N. & Geissler, K., Dec 2003, Cryptography and Coding - IMACC 2003. Springer Berlin Heidelberg, Vol. 2898. p. 223 - 233 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Computing the multiplicative group of residue class rings

Hess, F., S., P. & M.E., P., 2003, In : Mathematics of Computation. 72, p. 1531-1548

Research output: Contribution to journalArticle (Academic Journal)

13 Citations (Scopus)

Defending against cache based side-channel attacks

Page, D., Apr 2003, In : Information Security Technical Report. 8(1), 1, p. 30 - 44 14 p.

Research output: Contribution to journalArticle (Academic Journal)

44 Citations (Scopus)

Efficient Identity based Signature Schemes based on Pairings.

Hess, F., Feb 2003, Selected Areas in Cryptography -- SAC 2002. Springer Berlin Heidelberg, Vol. 2595. p. 310 - 324 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

606 Citations (Scopus)

Estimates for Discrete Logarithm Computations in Finite Fields of Small Characteristic

Granger, R., 2003, Cryptography and Coding - IMACC 2003. Springer, Vol. 2898. p. 190-206 17 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

7 Citations (Scopus)

Mental Poker Revisited

Smart, N. & Barnett, A., Dec 2003, Cryptography and Coding - IMACC 2003. Springer Berlin Heidelberg, Vol. 2898. p. 370 - 383 13 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

21 Citations (Scopus)

Modifications of ECDSA

Malone-Lee, J. & Smart, N., Feb 2003, Selected Areas in Cryptography - SAC 2002. Springer Berlin Heidelberg, Vol. 2595. p. 1 - 12 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

7 Citations (Scopus)

Point multiplication on ordinary elliptic curves over fields of characteristic three.

Smart, NP. & Westwood, J., Jul 2003, In : Applicable Algebra in Engineering, Communication and Computing. 13, p. 485 - 497 12 p.

Research output: Contribution to journalArticle (Academic Journal)

30 Citations (Scopus)

The GHS attack revisited

Hess, F., 2003, Advances in Cryptology - EUROCRYPT 2003. Springer Berlin Heidelberg, Vol. 2656. p. 374-387

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

16 Citations (Scopus)

Two Birds One Stone: Signcryption Using RSA

Malone-Lee, J. C. & Mao, W., Apr 2003, Topics in Cryptology - CT-RSA 2003. Springer, Vol. 2612. p. 211 - 225 14 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

114 Citations (Scopus)

Using media processors for low-memory AES implementation

Page, D. & Irwin, J. P. J., 2003, Application-specific Systems, Architectures and Processors - ASAP 2003. Institute of Electrical and Electronics Engineers (IEEE), p. 144--154

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

11 Citations (Scopus)
2004

A comparison of CEILIDH and XTR

Granger, R., Page, D. & Stam, M., 2004, Algorithmic Number Theory Symposium - ANTS-VI. Springer Berlin Heidelberg, Vol. 3076. p. 235-249

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

26 Citations (Scopus)

Advances in Elliptic Curve Cryptography

Blake, I., Seroussi, G. & Smart, N., 2004, Cambridge University Press. (London Math Society Lecture Note Series)

Research output: Book/ReportEdited book