Research Output

A body-centered cubic method for key agreement in dynamic mobile ad hock networks

Askoxylakis, I., Sauveron, D., Markantonakis, K., Tryfonas, T. & Traganitis, A., 2008, Emerging Security Information, Systems and Technologies - SECUREWARE 2008. Institute of Electrical and Electronics Engineers (IEEE), Vol. -. p. 193 - 202

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Access control using pairing based cryptography

Smart, NP., Apr 2003, Topics in Cryptology - CT-RSA 2003. Springer Berlin Heidelberg, Vol. 2612. p. 111 - 121 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

51 Citations (Scopus)

Achieving Optimal Anonymity in Transferable E-Cash with a Judge

Blazy, O., Canard, S., Fuchsbauer, G., Gouget, A., Sibert, H. & Traoré, J., 2011, Progress in Cryptology - AFRICACRYPT 2011. Nitaj, A. & Pointcheval, D. (eds.). Springer, Vol. 6737. p. 206-223 18 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

24 Citations (Scopus)

A Closer Look at PKI: Security and Efficiency

Boldyreva, A., Fischlin, M., Palacio, A. & Warinschi, B., 2007, Public Key Cryptography - PKC 2007. Springer Berlin Heidelberg, Vol. 4450. p. 458-475

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

28 Citations (Scopus)

A collaborative distributed virtual platform for forensic analysis of malicious code

Shand, L. & Tryfonas, T., 2008, Information Security South Africa - ISSA 2008. Innovative Minds, Vol. -. p. 115 - 132

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

A comparison of CEILIDH and XTR

Granger, R., Page, D. & Stam, M., 2004, Algorithmic Number Theory Symposium - ANTS-VI. Springer Berlin Heidelberg, Vol. 3076. p. 235-249

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

26 Citations (Scopus)

A comparison of different finite fields for use in Elliptic Curve Cryptosystems

Smart, NP., Oct 2001, In : Computers and Mathematics with Applications. 42 (?), p. 91 - 100 9 p.

Research output: Contribution to journalArticle (Academic Journal)

A comparison of MNT curves and supersingular curves

Page, D., Smart, N. & Vercauteren, F. R. G., 2006, In : Applicable Algebra in Engineering, Communication and Computing. 17, 5, p. 379-392

Research output: Contribution to journalArticle (Academic Journal)

35 Citations (Scopus)

A Composable Computational Soundness Notion

Cortier, V. & Warinschi, B., 2011, Conference on Computer and Communications Security - CCS 2011. Association for Computing Machinery (ACM), Vol. -. p. 63-74 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

13 Citations (Scopus)

A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework

Whitnall, C. A. & Oswald, ME., 2011, Advances in Cryptology - CRYPTO 2011. Springer Berlin Heidelberg, Vol. 6841. p. 316-334 19 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

33 Citations (Scopus)

Acquiring Volatile Operating System Data Tools and Techniques

Sutherland, I., Evans, J., Tryfonas, T. & Blyth, A., 2008, In : Operating Systems Review. 42, 3, p. 65 - 73

Research output: Contribution to journalArticle (Academic Journal)

24 Citations (Scopus)

A Critical Analysis of ISO 17825 (‘Testing Methods for the Mitigation of Non-invasi

Whitnall, C. A. & Oswald, M. E., 8 Dec 2019, Advances in Cryptology - ASIACRYPT 2014. Springer, Vol. 11923. p. 256-284 28 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access

A Cryptographic Model for Branching Time Security Properties - The Case of Contract Signing Protocols

Cortier, V., Kuesters, R. & Warinschi, B., 2007, European Symposium On Research In Computer Security - ESORICS 2007. Springer Berlin Heidelberg, Vol. 4734. p. 422-437

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

8 Citations (Scopus)

Actively Secure 1-out-of-N OT Extension with Application to Private Set Intersection

Orrù, M., Orsini, E. & Scholl, P., 1 Jan 2017, Topics in Cryptology - CT-RSA 2017: The Cryptographers' Track at the RSA Conference 2017. Springer-Verlag Berlin, p. 381-396 16 p. (Lecture Notes in Computer Science; vol. 10159).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
15 Citations (Scopus)

Actively Secure OT Extension with Optimal Overhead

Keller, M., Orsini, E. & Scholl, P., 20 Aug 2015, Advances in Cryptology - CRYPTO 2015. Springer, Vol. 9215. p. 724-741 18 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
41 Citations (Scopus)

Actively Secure Private Function Evaluation

Mohassel, P., Sadeghian, S. S. & Smart, N. P., 2014, Advances in Cryptology - ASIACRYPT 2014. Sarkar, P. & Iwata, T. (eds.). Springer, Vol. 8874. p. 486-505 20 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

8 Citations (Scopus)

Adapting Helios for Provable Ballot Privacy

Bernhard, D., Cortier, V., Pereira, O., Smyth, B. & Warinschi, B., 2011, European Symposium on Research in Computer Security - ESORICS 2011. Springer Berlin Heidelberg, Vol. 6879. p. 335-354 20 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

42 Citations (Scopus)

Adaptive Proofs Have Straightline Extractors (in the Random Oracle Model)

Bernhard, D., Nguyen, N. K. & Warinschi, B., 26 Jun 2017, Applied Cryptography and Network Security: 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings. Springer, p. 336-353 18 p. (Lecture Notes in Computer Science; vol. 10355).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
1 Citation (Scopus)
211 Downloads (Pure)

Adaptive proofs of knowledge in the random oracle model

Bernhard, D., Fischlin, M. & Warinschi, B., Nov 2016, In : IET Information Security. 10, 6, p. 319-331 13 p.

Research output: Contribution to journalArticle (Academic Journal)

Open Access
File
2 Citations (Scopus)
267 Downloads (Pure)

Adaptive Proofs of Knowledge in the Random Oracle Model

Bernhard, D., Fischlin, M. & Warinschi, B., 2015, Public-Key Cryptography - PKC 2015: 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 -- April 1, 2015, Proceedings. Katz, J. (ed.). Springer, p. 629-649 21 p. (Lecture Notes in Computer Science; vol. 9020).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

13 Citations (Scopus)

Adaptive Pseudo-free Groups And Applications

Catalano, D., Fiore, D. & Warinschi, B., 2011, Advances in Cryptology - EUROCRYPT 2011. Paterson, K. (ed.). Springer Berlin Heidelberg, Vol. 6632. p. 207-223

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

44 Citations (Scopus)

Adaptive static scheduling in IEEE 802.15.4 TSCH networks

Fafoutis, X., Elsts, A., Oikonomou, G., Piechocki, R. & Craddock, I., Jun 2018, 2018 IEEE 4th World Forum on Internet of Things (WF-IoT). Institute of Electrical and Electronics Engineers (IEEE), p. 263-268 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
11 Citations (Scopus)
227 Downloads (Pure)

Advances in Cryptology - EUROCRYPT 2008

Smart, N., 2008, Springer. (Lecture Notes in Computer Science; vol. 4965)

Research output: Book/ReportEdited book

Advances in Elliptic Curve Cryptography

Blake, I., Seroussi, G. & Smart, N., 2004, Cambridge University Press. (London Math Society Lecture Note Series)

Research output: Book/ReportEdited book

A dynamic key agreement mechanism for mission critical mobile ad hoc networking

Askoxylakis, I., Tryfonas, T., May, JHR. & Traganitis, A., 2010, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering: Mobile Lightweight Wireless Systems - ICST Mobilight 2010. Springer, Vol. 45. p. 216-228

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

1 Citation (Scopus)

A face centered cubic key agreement mechanism for mobile ad hoc networks

Askoxylakis, IG., Markantonakis, K., Tryfonas, T., May, J. H. R. & Traganitis, A., 2009, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering: Mobile Lightweight Wireless Systems - ICST Mobilight 2009. Springer, Vol. 13. p. 103 - 113

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

6 Citations (Scopus)

A fair evaluation framework for comparing side-channel distinguishers

Whitnall, C. A. & Oswald, M. E., Aug 2011, In : Journal of Cryptographic Engineering. 1, 2, p. 145-160 16 p.

Research output: Contribution to journalArticle (Academic Journal)

31 Citations (Scopus)

A Family of Key Agreement Mechanisms for Mission Critical Communications for Secure Mobile Ad Hoc and Wireless Mesh Internetworking

Askoxylakis, I., Tryfonas, T., May, JHR., Siris, V. & Traganitis, A., 2011, In : EURASIP Journal on Wireless Communications and Networking. 2011, p. 1-17

Research output: Contribution to journalArticle (Academic Journal)

4 Citations (Scopus)

A fault attack on pairing-based cryptography

Page, DS. & Vercauteren, F. R. G., 2006, In : IEEE Transactions on Computers. 55, 9, p. 1075-1080 6 p.

Research output: Contribution to journalArticle (Academic Journal)

52 Citations (Scopus)

A framework for describing multimedia circulation in the smartphone ecosystem

Andriotis, P., Tryfonas, T., Oikonomou, G. & King, I., 2015, Advances in Digital Forensics XI. Peterson, G. & Shenoi, S. (eds.). Springer International Publishing AG, Vol. 462. p. 251-267 (IFIP Advances in Information and Communication Technology).

Research output: Chapter in Book/Report/Conference proceedingChapter in a book

1 Citation (Scopus)

A Game Theoretical Method for Cost-Benefit Analysis of Malware Dissemination Prevention

Spyridopoulos, T., Maraslis, K., Mylonas, A., Tryfonas, T. & Oikonomou, G., 31 Dec 2015, In : Information Security Journal. 24, 4-6, p. 164-176 13 p.

Research output: Contribution to journalArticle (Academic Journal)

6 Citations (Scopus)

A Game Theoretic Defence Framework Against DoS/DDoS Cyber Attacks

Spyridopoulos, T., Karanikas, G., Tryfonas, T. & Oikonomou, G., Oct 2013, In : Computers and Security. 38, p. 39-50

Research output: Contribution to journalArticle (Academic Journal)

50 Citations (Scopus)

A General Construction of IND-CCA2 Secure Public Key Encryption

Kiltz, E. & Malone-Lee, J. C., Dec 2003, Cryptography and Coding - IMACC 2003. Springer, Vol. 2898. p. 152 - 166 14 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

13 Citations (Scopus)

A Generalization of DDH with Applications to Protocol Analysis and Computational Soundness

Bresson, E., Lakhnech, Y., Mazare, L. & Warinschi, B., 2007, Advances in Cryptology - CRYPTO 2007. Springer Berlin Heidelberg, Vol. 4622. p. 482-499

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

33 Citations (Scopus)

A Guide to the SPHERE 100 Homes Study Dataset

Elsts, A., Burghardt, T., Byrne, D., Camplani, M., Damen, D., Fafoutis, X., Hannuna, S., Harwin, W., Holmes, M., Janko, B., Ponce Lopez, V., Masullo, A., Mirmehdi, M., Oikonomou, G., Piechocki, R., Sherratt, S., Tonkin, E. L., Twomey, N., Vafeas, A., Woznowski, P. R. & 1 others, Craddock, I., 31 Oct 2018, (Unpublished) 38 p.

Research output: Working paperWorking paper and Preprints

File
26 Downloads (Pure)

A holistic approach for Cyber Assurance of Critical Infrastructure with the Viable System Model

Spyridopoulos, T., Topa, I., Karyda, M. & Tryfonas, T., 2014, ICT Systems Security and Privacy Protection: 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014. Proceedings. Springer Berlin Heidelberg, Vol. 428. p. 438-445 8 p. (IFIP Advances in Information and Communication Technology; vol. 428).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

A Key Encapsulation Mechanism for NTRU

Stam, M., Dec 2005, Cryptography and Coding - IMACC 2005. Springer Berlin Heidelberg, Vol. 3796. p. 410 - 427 17 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

4 Citations (Scopus)

A Leakage Resilient MAC

Martin, D., Oswald, E., Stam, M. & Wójcik, M., Dec 2015, Cryptography and Coding - IMACC 2015: 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings. Groth, J. (ed.). Springer, Vol. 9496. p. 295-310 16 p. (Lecture Notes in Computer Science; vol. 9496).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
7 Citations (Scopus)

A lightweight web-based vulnerability scanner for small-scale computer network security assessment

Davies, P. & Tryfonas, T., 2009, In : Journal of Network and Computer Applications. 32, 1, p. 78 - 95

Research output: Contribution to journalArticle (Academic Journal)

6 Citations (Scopus)

All for one-one for all: Unifying univariate DPA attacks

Mangard, S., Oswald, ME. & Standaert, F-X., 2011, In : IET Information Security. 5(2), p. 100 - 110

Research output: Contribution to journalArticle (Academic Journal)

126 Citations (Scopus)

All-or-Nothing Transforms as a countermeasure to differential side-channel analysis

McEvoy, R. P., Tunstall, M., Whelan, C., Murphy, C. C. & Marnane, W. P., Jun 2014, In : International Journal of Information Security. 13, 3, p. 291-304 14 p.

Research output: Contribution to journalArticle (Academic Journal)

5 Citations (Scopus)

A Methodology for the Characterisation of Leakages in Combinatorial Logic

Bertoni, G. & Martinoli, M., 18 Nov 2016, Security, Privacy, and Applied Cryptography Engineering: 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings. Springer Verlag, p. 363-382 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10076).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
5 Citations (Scopus)

A Modular Security Analysis of the TLS Handshake Protocol

Morrissey, P., Smart, N. & Warinschi, B., 2008, Advances in Cryptology - Asiacrypt 2008. Springer Berlin Heidelberg, Vol. 5350. p. 55-73

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

38 Citations (Scopus)

A Modular Treatment of Cryptographic APIs: The Symmetric-Key Case

Shrimpton, T., Stam, M. & Warinschi, B., 21 Jul 2016, Advances in Cryptology - CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I. Springer, p. 277-307 31 p. (Lecture Notes in Computer Science (LNCS); vol. 9814).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
3 Citations (Scopus)

A multidimensional continued fraction based on a high-order recurrence relation

Tourigny, YJM. & Smart, NP., May 2007, In : Mathematics of Computation. 76 (260), p. 1995 - 2022 28 p.

Research output: Contribution to journalArticle (Academic Journal)

An algebraic approach to NTRU (q = 2^n) via Witt vectors and overdetermined systems of nonlinear equations.

Smart, N., Vercauteren, F. & Silverman, J., Jan 2005, Security and Cryptography for Networks - SCN 2006. Springer Berlin Heidelberg, Vol. 3352. p. 278 - 298 20 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

An Algorithm for Computing Weierstrass Points

Hess, F., Jul 2002, Algorithmic Number Theory - ANTS 2002. Fieker, C. & Kohel, D. R. (eds.). Springer Berlin Heidelberg, Vol. 2369. p. 357 - 371 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

4 Citations (Scopus)

Analysing Interface Bonding in 5G WLANs

Dilmore, M., Doufexi, A. & Oikonomou, G., 1 Nov 2018, 2018 IEEE 23rd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD 2018). Institute of Electrical and Electronics Engineers (IEEE), 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
1 Citation (Scopus)
188 Downloads (Pure)

Analysis of Key Wrapping APIs: Generic Policies, Computational Security

Scerri, G. & Stanley-Oakes, R. W., Aug 2016, 2016 IEEE 28th Computer Security Foundations Symposium (CSF 2016): Proceedings of a meeting held 27 June - 1 July 2016, Lisbon, Portugal. Institute of Electrical and Electronics Engineers (IEEE), p. 281-295 15 p. (Proceedings of the IEEE Computer Security Foundations Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
9 Citations (Scopus)
253 Downloads (Pure)

Analysis of the insecurity of ECMQV with partially known nonces

Smart, NP. & Leadbitter, P., Aug 2003, Information Security Conference - ISC 2003. Springer Berlin Heidelberg, Vol. 2851. p. 240 - 251 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

8 Citations (Scopus)