Research Output

Article (Academic Journal)

A comparison of different finite fields for use in Elliptic Curve Cryptosystems

Smart, NP., Oct 2001, In : Computers and Mathematics with Applications. 42 (?), p. 91 - 100 9 p.

Research output: Contribution to journalArticle (Academic Journal)

A comparison of MNT curves and supersingular curves

Page, D., Smart, N. & Vercauteren, F. R. G., 2006, In : Applicable Algebra in Engineering, Communication and Computing. 17, 5, p. 379-392

Research output: Contribution to journalArticle (Academic Journal)

35 Citations (Scopus)

Acquiring Volatile Operating System Data Tools and Techniques

Sutherland, I., Evans, J., Tryfonas, T. & Blyth, A., 2008, In : Operating Systems Review. 42, 3, p. 65 - 73

Research output: Contribution to journalArticle (Academic Journal)

24 Citations (Scopus)

Adaptive proofs of knowledge in the random oracle model

Bernhard, D., Fischlin, M. & Warinschi, B., Nov 2016, In : IET Information Security. 10, 6, p. 319-331 13 p.

Research output: Contribution to journalArticle (Academic Journal)

Open Access
File
2 Citations (Scopus)
267 Downloads (Pure)

A fair evaluation framework for comparing side-channel distinguishers

Whitnall, C. A. & Oswald, M. E., Aug 2011, In : Journal of Cryptographic Engineering. 1, 2, p. 145-160 16 p.

Research output: Contribution to journalArticle (Academic Journal)

31 Citations (Scopus)

A Family of Key Agreement Mechanisms for Mission Critical Communications for Secure Mobile Ad Hoc and Wireless Mesh Internetworking

Askoxylakis, I., Tryfonas, T., May, JHR., Siris, V. & Traganitis, A., 2011, In : EURASIP Journal on Wireless Communications and Networking. 2011, p. 1-17

Research output: Contribution to journalArticle (Academic Journal)

4 Citations (Scopus)

A fault attack on pairing-based cryptography

Page, DS. & Vercauteren, F. R. G., 2006, In : IEEE Transactions on Computers. 55, 9, p. 1075-1080 6 p.

Research output: Contribution to journalArticle (Academic Journal)

52 Citations (Scopus)

A Game Theoretical Method for Cost-Benefit Analysis of Malware Dissemination Prevention

Spyridopoulos, T., Maraslis, K., Mylonas, A., Tryfonas, T. & Oikonomou, G., 31 Dec 2015, In : Information Security Journal. 24, 4-6, p. 164-176 13 p.

Research output: Contribution to journalArticle (Academic Journal)

6 Citations (Scopus)

A Game Theoretic Defence Framework Against DoS/DDoS Cyber Attacks

Spyridopoulos, T., Karanikas, G., Tryfonas, T. & Oikonomou, G., Oct 2013, In : Computers and Security. 38, p. 39-50

Research output: Contribution to journalArticle (Academic Journal)

50 Citations (Scopus)

A lightweight web-based vulnerability scanner for small-scale computer network security assessment

Davies, P. & Tryfonas, T., 2009, In : Journal of Network and Computer Applications. 32, 1, p. 78 - 95

Research output: Contribution to journalArticle (Academic Journal)

6 Citations (Scopus)

All for one-one for all: Unifying univariate DPA attacks

Mangard, S., Oswald, ME. & Standaert, F-X., 2011, In : IET Information Security. 5(2), p. 100 - 110

Research output: Contribution to journalArticle (Academic Journal)

126 Citations (Scopus)

All-or-Nothing Transforms as a countermeasure to differential side-channel analysis

McEvoy, R. P., Tunstall, M., Whelan, C., Murphy, C. C. & Marnane, W. P., Jun 2014, In : International Journal of Information Security. 13, 3, p. 291-304 14 p.

Research output: Contribution to journalArticle (Academic Journal)

5 Citations (Scopus)

A multidimensional continued fraction based on a high-order recurrence relation

Tourigny, YJM. & Smart, NP., May 2007, In : Mathematics of Computation. 76 (260), p. 1995 - 2022 28 p.

Research output: Contribution to journalArticle (Academic Journal)

An exploration of mechanisms for dynamic cryptographic instruction set extension

Grabher, P., Groszschaedl, J., Hoerder, S., Järvinen, K., Page, D., Tillich, S. & Wojcik, M., 2011, In : Journal of Cryptographic Engineering. 2, 1, p. 1-18 18 p.

Research output: Contribution to journalArticle (Academic Journal)

2 Citations (Scopus)

An Extension of Kedlaya's Algorithm to Hyperelliptic Curves in Characteristic 2

J., D. & Vercauteren, F. R. G., 2006, In : Journal of Cryptology. 19, 1, p. 1-25 25 p., 1-26.

Research output: Contribution to journalArticle (Academic Journal)

18 Citations (Scopus)

An identity based authenticated key agreement protocol based on the Weil pairing

Smart, NP., Jun 2002, In : Electronics Letters. 38 (13), p. 630 - 632 2 p.

Research output: Contribution to journalArticle (Academic Journal)

An information theoretic model for quantum secret sharing schemes

Mueller-Quade, J., Nascimento, A., Winter, A., Tuyls, P. & Imai, H., 2005, In : Quantum Inf. Comput. 5, p. 69-80

Research output: Contribution to journalArticle (Academic Journal)

An intelligent hot-desking model harnessing the power of occupancy sensing

Cooper, P. B., Maraslis, K., Tryfonas, T. & Oikonomou, G., 3 Oct 2017, In : Facilities. 35, 13/14, p. 766-786 21 p.

Research output: Contribution to journalArticle (Academic Journal)

Open Access
File
4 Citations (Scopus)
202 Downloads (Pure)

Anonymity guarantees of the UMTS/LTE authentication and connection protocol

Lee, M-F., Smart, N. P., Warinschi, B. & Watson, G. J., 2014, In : International Journal of Information Security. 13, 6, p. 513-527 15 p.

Research output: Contribution to journalArticle (Academic Journal)

9 Citations (Scopus)

A note on the Tate pairing of curves over finite fields

Hess, F. K., 2004, In : Archiv der Mathematik. 82, p. 28-32 28-32.

Research output: Contribution to journalArticle (Academic Journal)

13 Citations (Scopus)

A note on the x-coordinate of points on an elliptic curve in characteristic two

Smart, NP., Oct 2001, In : Information Processing Letters. 80 (?), p. 261 - 263 2 p.

Research output: Contribution to journalArticle (Academic Journal)

3 Citations (Scopus)

A note on time-bound hierarchical key assignment schemes

Ateniese, G., Santis, A. D., Ferrara, A-L. & Masucci, B., 2013, In : Information Processing Letters. 113, 5-6, p. 151-155 5 p.

Research output: Contribution to journalArticle (Academic Journal)

6 Citations (Scopus)

An SME Decision Support System Utilising Defined Scoring Methods

Pashley, D., Tryfonas, T., Crossley, A. & Setchell, C., 31 Dec 2017, In : International Journal on Advances in Intelligent Systems. 10, 3/4, p. 327-344 18 p.

Research output: Contribution to journalArticle (Academic Journal)

Open Access
File
76 Downloads (Pure)

A practical device authentication scheme using SRAM PUFs

Koeberl, P., Li, J., Maes, R., Rajan, A., Vishik, C., Wojcik, M. & Wu, W., 2012, In : Journal of Cryptographic Engineering. 2, 4, p. 255-269 14 p.

Research output: Contribution to journalArticle (Academic Journal)

4 Citations (Scopus)

Area, Delay, and Power Characteristics of Standard-Cell Implementations of the AES S-Box

Tillich, S., Feldhofer, M., Popp, T. & Großschädl, J., 2008, In : Journal of Signal Processing Systems. 50(2), p. 251-261

Research output: Contribution to journalArticle (Academic Journal)

25 Citations (Scopus)

Arithmetic on superelliptic curves

Galbraith, SD., Paulus, S. & Smart, NP., Jan 2001, In : Mathematics of Computation. 71 (?), p. 393 - 405 12 p.

Research output: Contribution to journalArticle (Academic Journal)

A Study on Usability and Security Features of the Android Pattern Lock Screen

Andriotis, P., Oikonomou, G., Mylonas, A. & Tryfonas, T., 1 Mar 2016, In : Information and Computer Security. 24, 1, p. 53-72

Research output: Contribution to journalArticle (Academic Journal)

5 Citations (Scopus)

A Survey of Symbolic Methods in Computational Analysis of Cryptographic Systems

Cortier, V., Kremer, S. & Warinschi, B., 2011, In : Journal of Automated Reasoning. 46, 3-4, p. 225-259

Research output: Contribution to journalArticle (Academic Journal)

40 Citations (Scopus)

Asynchronous Byzantine Agreement with optimal resilience

Patra, A., Choudhury, A. & Rangan, C. P., Apr 2014, In : Distributed Computing. 27, 2, p. 111-146 36 p.

Research output: Contribution to journalArticle (Academic Journal)

9 Citations (Scopus)

Bootstrapping BGV Ciphertexts with a Wider Choice of p and q

Orsini, E. A., Smart, N. P. & van de Pol, J., 27 Oct 2016, In : IET Information Security. 10, 6, p. 348-357

Research output: Contribution to journalArticle (Academic Journal)

Open Access
2 Downloads (Pure)

Computing Riemann-Roch Spaces in Algebraic Function Fields and Related Topics

Hess, F., Apr 2002, In : Journal of Symbolic Computation. 33 (4), p. 425 - 445 20 p.

Research output: Contribution to journalArticle (Academic Journal)

67 Citations (Scopus)

Computing the multiplicative group of residue class rings

Hess, F., S., P. & M.E., P., 2003, In : Mathematics of Computation. 72, p. 1531-1548

Research output: Contribution to journalArticle (Academic Journal)

13 Citations (Scopus)

Constructive and Destructive Facets of Weil Descent on Elliptic Curves

Gaudry, P., Hess, FK. & Smart, NP., Jan 2002, In : Journal of Cryptology. 15 (1), p. 19 - 46 28 p.

Research output: Contribution to journalArticle (Academic Journal)

139 Citations (Scopus)

Constructive and destructive use of compilers in elliptic curve cryptography

Barbosa, M. B. M., Moss, A. D. & Page, D., Apr 2009, In : Journal of Cryptology. 22, 2, p. 259-281 23 p.

Research output: Contribution to journalArticle (Academic Journal)

6 Citations (Scopus)

Counting points on C$_ab$ curves using Monsky-Washnitzer cohomology

Denef, J. & Vercauteren, F., 2006, In : Finite Fields and Their Applications. 12, 1, p. 78-102 25 p.

Research output: Contribution to journalArticle (Academic Journal)

Cryptographic puzzles and DoS resilience, revisited.

Groza, B. & Warinschi, B., 2014, In : Designs, Codes and Cryptography. 73, 1, p. 177-207 31 p.

Research output: Contribution to journalArticle (Academic Journal)

8 Citations (Scopus)

Deducibility constraints and blind signatures

Bursuc, S., Comon-Lundh, H. & Delaune, S., Nov 2014, In : Information and Computation. 238, p. 106-127

Research output: Contribution to journalArticle (Academic Journal)

Defending against cache based side-channel attacks

Page, D., Apr 2003, In : Information Security Technical Report. 8(1), 1, p. 30 - 44 14 p.

Research output: Contribution to journalArticle (Academic Journal)

44 Citations (Scopus)

Design and Performance Evaluation of a Lightweight Wireless Early Warning Intrusion Detection Prototype

Fragkiadakis, A., Tragos, E., Tryfonas, T. & Askoxylakis, I., 2012, In : EURASIP Journal on Wireless Communications and Networking. 2012:73, p. 1-18

Research output: Contribution to journalArticle (Academic Journal)

22 Citations (Scopus)

Differential Fault Analysis of AES: Towards Reaching its Limits

Ali, S. S., Mukhopadhyay, D. & Tunstall, M., 2013, In : Journal of Cryptographic Engineering. 3, 2, p. 73 97 p.

Research output: Contribution to journalArticle (Academic Journal)

24 Citations (Scopus)

Efficient Asynchronous Verifiable Secret Sharing and Multiparty Computation

Patra, A., Choudhury, A. & Rangan, C. P., Jan 2015, In : Journal of Cryptology. 28, 1, p. 49-109 61 p.

Research output: Contribution to journalArticle (Academic Journal)

8 Citations (Scopus)

Efficient Constant-Round Multi-party Computation Combining BMR and SPDZ

Lindell, Y., Pinkas, B., Smart, N. P. & Yanai, A., 15 Jul 2019, In : Journal of Cryptology. 32, 3, p. 1026-1069 44 p.

Research output: Contribution to journalArticle (Academic Journal)

Open Access
File
1 Citation (Scopus)
28 Downloads (Pure)

Efficient DCT-based secret key generation for the Internet of Things

Margelis, G., Fafoutis, X., Oikonomou, G., Piechocki, R., Tryfonas, T. & Thomas, P., 28 Aug 2018, In : Ad Hoc Networks. 11 p.

Research output: Contribution to journalArticle (Academic Journal)

Open Access
File
9 Citations (Scopus)
287 Downloads (Pure)

Efficient ID-KEM based on the Sakai-Kasahara key construction

Chen, L., Cheng, Z., Malone-Lee, J. & Smart, NP., Mar 2006, In : IEE Proceedings: Information Security. 153 (1), p. 19 - 26 8 p.

Research output: Contribution to journalArticle (Academic Journal)

34 Citations (Scopus)

Elliptic curve Paillier schemes

Galbraith, S. D., 2002, In : Journal of Cryptology. 15, p. 129-138

Research output: Contribution to journalArticle (Academic Journal)

Escrow free encryption supporting cryptographic workflow

Al-Riyami, S., Malone-Lee, J. & Smart, N., 2006, In : International Journal of Information Security. 5(4), p. 217-230

Research output: Contribution to journalArticle (Academic Journal)

23 Citations (Scopus)

Explicit Randomness is not Necessary when Modeling Probabilistic Encryption

Cortier, V., Hordegen, H. & Warinschi, B., 2007, In : Electronic Notes in Theoretical Computer Science. 186, p. 49-65

Research output: Contribution to journalArticle (Academic Journal)

4 Citations (Scopus)

FENL: an ISE to mitigate analogue micro-architectural leakage

Gao, S., Marshall, B., Page, D. & Pham, T. H., 2 Mar 2020, In : IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES). 2020, 2, p. 73--98

Research output: Contribution to journalArticle (Academic Journal)

Open Access

Field switching in BGV-style homomorphic encryption

Gentry, C., Halevi, S., Peikert, C. & Smart, N. P., 2013, In : Journal of Computer Security. 21, 5, p. 663-684

Research output: Contribution to journalArticle (Academic Journal)

17 Citations (Scopus)

Finding shortest lattice vectors faster using quantum search

Laarhoven, T., Mosca, M. & Van De Pol, J., Dec 2015, In : Designs, Codes and Cryptography. 77, 2, p. 375-400 26 p.

Research output: Contribution to journalArticle (Academic Journal)

Open Access
File
32 Citations (Scopus)
268 Downloads (Pure)