Research Output

2016

Bootstrapping BGV Ciphertexts with a Wider Choice of p and q

Orsini, E. A., Smart, N. P. & van de Pol, J., 27 Oct 2016, In : IET Information Security. 10, 6, p. 348-357

Research output: Contribution to journalArticle (Academic Journal)

Open Access
2 Downloads (Pure)

Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations

Martin, D., Mather, L., Oswald, E. & Stam, M., 16 Nov 2016, Advances in Cryptology - ASIACRYPT 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I. Cheon, J. H. & Takagi, T. (eds.). Springer, p. 548-572 25 p. (Lecture Notes in Computer Science; vol. 10031).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
13 Citations (Scopus)

Characterising and Comparing the Energy Consumption of Side Channel Attack Countermeasures and Lightweight Cryptography on Embedded Devices

McCann, D. A. J., Eder, K. I. & Oswald, M. E., Mar 2016, Proceedings of 2015 International Workshop on Secure Internet of Things (SIoT): Proceedings of a meeting held 21-25 September 2015 at Vienna, Austria. Institute of Electrical and Electronics Engineers (IEEE), p. 65-71 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
7 Citations (Scopus)
284 Downloads (Pure)

Cryptography Made Simple

Smart, N. P., 2016, Springer. (Information Security and Cryptography)

Research output: Book/ReportAuthored book

Efficient Secure Multiparty Computation with Identifiable Abort

Orsini, E. A., Scholl, P. & Baum, C., 22 Oct 2016, Theory of Cryptography: 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part I. Springer, p. 461-490 30 p. (Lectures Notes in Computer Science; vol. 9985).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access

Foundations of Hardware-Based Attested Computation and Application to SGX

Barbosa, M., Portela, B., Scerri, G. & Warinschi, B., Jun 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P 2016): Proceedings of a meeting held 21-24 March 2016, Saarbrucken, Germany. Institute of Electrical and Electronics Engineers (IEEE), p. 245-260 16 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
18 Citations (Scopus)

Highlighting Relationships of a Smartphone's Social Ecosystem in Potentially Large Investigations

Andriotis, P., Oikonomou, G., Tryfonas, T. & Li, S., 16 Aug 2016, In : IEEE Transactions on Cybernetics. 46, 9, p. 1974-1985

Research output: Contribution to journalArticle (Academic Journal)

7 Citations (Scopus)

Impact of user data privacy management controls on mobile device investigations

Andriotis, P. & Tryfonas, T., 2016, Advances in Digital Forensics XII - 12th IFIP WG 11.9 International Conference, Revised Selected Papers. Springer, New York, NY, Vol. 484. p. 89-105 17 p. (IFIP Advances in Information and Communication Technology; vol. 484).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

6 Citations (Scopus)

Implementation of a leakage-resilient ElGamal key encapsulation mechanism

Galindo, D., Großschädl, J., Liu, Z., Vadnala, P. K. & Vivek, S., Sep 2016, In : Journal of Cryptographic Engineering. 6, 3, p. 229-238 10 p.

Research output: Contribution to journalArticle (Academic Journal)

Open Access
8 Citations (Scopus)

Indifferentiability of Confusion-Diffusion Networks

Dodis, Y., Stam, M., Steinberger, J. & Liu, T., 28 Apr 2016, Advances in Cryptology - EUROCRYPT 2016: 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II. Fischlin, M. & Coron, J-S. (eds.). Springer, p. 679-704 26 p. (Lecture Notes in Computer Science; vol. 9666).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

7 Citations (Scopus)

Key Confirmation in Key Exchange Protocols: Formal Definitions and Implications for TLS 1.3

Fischlin, M., Günther, F., Schmidt, B. & Warinschi, B., Aug 2016, 2016 IEEE Symposium on Security and Privacy (S&P 2016): Proceedings of a meeting held 22-26 May 2016, San Jose, California, USA. Institute of Electrical and Electronics Engineers (IEEE), p. 452-469 18 p. (2016 IEEE Symposium on Security and Privacy (SP)).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
11 Citations (Scopus)

Linear Overhead Optimally-resilient Robust MPC Using Preprocessing

Choudhury, A., Orsini, E., Patra, A. & Smart, N., 2016, Security and Cryptography for Networks - SCN 2016: 10th International Conference, SCN 2016, Amalfi, Italy, August 31 – September 2, 2016, Proceedings. Zikas, V. & De Prisco, R. (eds.). Springer, Vol. 9841. p. 147-168 22 p. (Lecture Notes in Computer Science; vol. 9841).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
1 Citation (Scopus)

MASCOT: Faster Malicious Arithmetic Secure Computation with Oblivious Transfer

Keller, M., Orsini, E. & Scholl, P., 24 Oct 2016, CCS '16: Proceedings of the 23rd ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), Vol. 24-28-October-2016. p. 830-842 13 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
77 Citations (Scopus)

Mass surveillance in cyberspace and the lost art of keeping a secret: Policy Lessons for Government After the Snowden Leaks

Tryfonas, T., Carter, M., Crick, T. & Andriotis, P., 21 Jun 2016, Human Aspects of Information Security, Privacy, and Trust: 4th International Conference, HAS 2016, Held as Part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016, Proceedings. Tryfonas, T. (ed.). p. 174-185 12 p. (Lecture Notes in Computer Science; vol. 9750).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
1404 Downloads (Pure)

More Efficient Constant-Round Multi-Party Computation from BMR and SHE

Lindell, Y., Smart, N. & Soria-Vázquez, E., Nov 2016, Theory of Cryptography: 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part I. Springer, p. 554-581 28 p. (Lecture Notes in Computer Science; vol. 9985).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
13 Citations (Scopus)

MPC-Friendly Symmetric Key Primitives

Grassi, L., Rechberger, C., Rotaru, D., Scholl, P. & Smart, N., 24 Oct 2016, ACM Conference on Computer and Communications Security - CCS 2016. Association for Computing Machinery (ACM), p. 430-443 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
16 Citations (Scopus)

On the Hardness of Proving CCA-Security of Signed ElGamal

Bernhard, D., Fischlin, M. & Warinschi, B., 18 Feb 2016, Public-Key Cryptography – PKC 2016: 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I. Cheng, C-M., Chung, K-M., Persiano, G. & Yang, B-Y. (eds.). Springer, p. 47-69 23 p. (Lecture Notes in Computer Science; vol. 9614).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
9 Citations (Scopus)
361 Downloads (Pure)

Provably-Secure Remote Memory Attestation for Heap Overflow Protection

Boldyreva, A., Kim, T., Lipton, R. & Warinschi, B., 30 Aug 2016, Security and Cryptography for Networks: 10th International Conference, SCN 2016, Amalfi, Italy, August 31 – September 2, 2016, Proceedings. Zikas, V. & De Prisco, R. (eds.). Springer, (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
254 Downloads (Pure)

Reducing the Number of Non-linear Multiplications in Masking Schemes

Pulkus, J. & Vivek, S., 4 Aug 2016, Cryptographic Hardware and Embedded Systems – CHES 2016: 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings. Gierlichs, B. & Poschmann, A. Y. (eds.). Springer, p. 479-497 19 p. (Lecture Notes in Computer Science; vol. 9813).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
5 Citations (Scopus)

Risk Assessment for Mobile Systems Through a Multilayered Hierarchical Bayesian Network

Li, S., Tryfonas, T., Russell, G. & Andriotis, P., Aug 2016, In : IEEE Transactions on Cybernetics. 46, 8, p. 1749-1759 11 p.

Research output: Contribution to journalArticle (Academic Journal)

Open Access
File
27 Citations (Scopus)
321 Downloads (Pure)

Secure Software Licensing: Models, Constructions, and Proofs

Costea, S. & Warinschi, B., Aug 2016, 2016 IEEE 29th Computer Security Foundations Symposium (CSF 2016): Proceedings of a meeting held 27 June - 1 July 2016, Lisbon, Portugal. Institute of Electrical and Electronics Engineers (IEEE), p. 31-44 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
1 Citation (Scopus)
407 Downloads (Pure)

Security by Compliance? A Study of Insider Threat Implications for Nigerian Banks

Fagade, T. H. & Tryfonas, T., 21 Jun 2016, Human Aspects of Information Security, Privacy, and Trust: 4th International Conference, HAS 2016, Held as Part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016, Proceedings. Tryfonas, T. (ed.). p. 128-139 12 p. (Lecture Notes in Computer Science; vol. 9750).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
8 Citations (Scopus)
340 Downloads (Pure)

The Internet of Things: A Security Point of View

Li, S., Tryfonas, T. & Li, H., 4 Apr 2016, In : Internet Research. 26, 2, p. 337-359 23 p.

Research output: Contribution to journalSpecial issue (Academic Journal)

Open Access
File
99 Citations (Scopus)
1237 Downloads (Pure)

Universally Composable Cryptographic Role-Based Access Control

Liu, B. & Warinschi, B., 16 Nov 2016, Provable Security - ProvSec 2016: 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings. Chen, L. & Han, J. (eds.). Springer, p. 61-80 20 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access

Which Ring Based Somewhat Homomorphic Encryption Scheme is Best?

Costache, A. & Smart, N. P., 29 Feb 2016, Topics in Cryptology - CT-RSA 2016: The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings. Springer, p. 325-340 16 p. (Lecture Notes in Computer Science; vol. 9610).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
27 Citations (Scopus)
2015

Actively Secure OT Extension with Optimal Overhead

Keller, M., Orsini, E. & Scholl, P., 20 Aug 2015, Advances in Cryptology - CRYPTO 2015. Springer, Vol. 9215. p. 724-741 18 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
41 Citations (Scopus)

Adaptive Proofs of Knowledge in the Random Oracle Model

Bernhard, D., Fischlin, M. & Warinschi, B., 2015, Public-Key Cryptography - PKC 2015: 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 -- April 1, 2015, Proceedings. Katz, J. (ed.). Springer, p. 629-649 21 p. (Lecture Notes in Computer Science; vol. 9020).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

13 Citations (Scopus)

A framework for describing multimedia circulation in the smartphone ecosystem

Andriotis, P., Tryfonas, T., Oikonomou, G. & King, I., 2015, Advances in Digital Forensics XI. Peterson, G. & Shenoi, S. (eds.). Springer International Publishing AG, Vol. 462. p. 251-267 (IFIP Advances in Information and Communication Technology).

Research output: Chapter in Book/Report/Conference proceedingChapter in a book

1 Citation (Scopus)

A Game Theoretical Method for Cost-Benefit Analysis of Malware Dissemination Prevention

Spyridopoulos, T., Maraslis, K., Mylonas, A., Tryfonas, T. & Oikonomou, G., 31 Dec 2015, In : Information Security Journal. 24, 4-6, p. 164-176 13 p.

Research output: Contribution to journalArticle (Academic Journal)

6 Citations (Scopus)

A Leakage Resilient MAC

Martin, D., Oswald, E., Stam, M. & Wójcik, M., Dec 2015, Cryptography and Coding - IMACC 2015: 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings. Groth, J. (ed.). Springer, Vol. 9496. p. 295-310 16 p. (Lecture Notes in Computer Science; vol. 9496).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
7 Citations (Scopus)

Application of a Game Theoretic Approach in Smart Sensor Data Trustworthiness Problems

Maraslis, K., Spyridopoulos, T., Oikonomou, G., Tryfonas, T. & Haghighi, M., 9 May 2015, ICT Systems Security and Privacy Protection: 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings. Hamburg: Springer International Publishing AG, Vol. 455. p. 601-615 15 p. (IFIP Advances in Information and Communication Technology).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

3 Citations (Scopus)

Bootstrapping BGV ciphertexts with a wider choice of p and q

Orsini, E. A., van de Pol, J. & Smart, N. P., 30 Mar 2015, Public-Key Cryptography - PKC 2015. Katz, J. (ed.). Springer Berlin Heidelberg, p. 673-698 26 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9020).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
2 Citations (Scopus)

Counting Keys in Parallel After a Side Channel Attack

Martin, D., O'Connell, J., Oswald, E. & Stam, M., Dec 2015, Advances in Cryptology - ASIACRYPT 2015: 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part II. Iwata, T. & Cheon, J. H. (eds.). Springer, Vol. 9453. p. 313-337 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
28 Citations (Scopus)

Efficient Asynchronous Verifiable Secret Sharing and Multiparty Computation

Patra, A., Choudhury, A. & Rangan, C. P., Jan 2015, In : Journal of Cryptology. 28, 1, p. 49-109 61 p.

Research output: Contribution to journalArticle (Academic Journal)

8 Citations (Scopus)

Efficient Constant Round Multi-Party Computation Combining BMR and SPDZ

Lindell, Y., Pinkas, B., Smart, N. & Yanai, A., 19 Aug 2015, Advances in Cryptology - CRYPTO 2015. Springer, Vol. 9216. p. 319-338 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
40 Citations (Scopus)

Exploring the Resilience of Some Lightweight Ciphers Against Profiled Single Trace Attacks

Banciu, V., Oswald, E. & Whitnall, C., 2015, Constructive Side-Channel Analysis and Secure Design - 6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14, 2015. Revised Selected Papers.. Springer Berlin Heidelberg, p. 51-63 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
1 Citation (Scopus)

Finding shortest lattice vectors faster using quantum search

Laarhoven, T., Mosca, M. & Van De Pol, J., Dec 2015, In : Designs, Codes and Cryptography. 77, 2, p. 375-400 26 p.

Research output: Contribution to journalArticle (Academic Journal)

Open Access
File
32 Citations (Scopus)
268 Downloads (Pure)

Just a Little Bit More

van de Pol, J., Smart, N. P. & Yarom, Y., 20 Apr 2015, Topics in Cryptology - CT-RSA 2015. Nyberg, K. (ed.). Springer International Publishing AG, Vol. 9048. p. 3-21 (Lecture Notes in Computer Science; vol. 9048).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
33 Citations (Scopus)

Key-Homomorphic Constrained Pseudorandom Functions

Banerjee, A., Fuchsbauer, G., Peikert, C., Pietrzak, K. & Stevens, S., 2015, Theory of Cryptography - TCC 2015. Dodis, Y. & Nielsen, J. B. (eds.). Springer, Vol. 9015. p. 31-60 30 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

21 Citations (Scopus)

Leakage-Resilient Authentication and Encryption from Symmetric Cryptographic Primitives

Pereira, O., Standaert, F-X. & Vivek, S., 16 Oct 2015, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. Ray, I., Li, N. & Kruegel, C. (eds.). Denver, Colorado, USA: Association for Computing Machinery (ACM), p. 96-108 13 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

33 Citations (Scopus)

Messaging Activity Reconstruction with Sentiment Polarity Identification

Andriotis, P. & Oikonomou, G., 2015, Human Aspects of Information Security, Privacy, and Trust - HAS 2015. Tryfonas, T. & Askoxylakis, I. G. (eds.). Springer Berlin Heidelberg, Vol. 9190. p. 475-486 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingChapter in a book

2 Citations (Scopus)

MJH: a faster alternative to MDC-2

Lee, J. & Stam, M., Aug 2015, In : Designs, Codes and Cryptography. 76, 2, p. 179-205

Research output: Contribution to journalArticle (Academic Journal)

3 Citations (Scopus)

Policy Privacy in Cryptographic Access Control

Ferrara, A. L., Fuchsbauer, G., Liu, B. & Warinschi, B., 2015, IEEE 28th Computer Security Foundations Symposium - CSF 2015. Institute of Electrical and Electronics Engineers (IEEE), p. 46-60 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

4 Citations (Scopus)

Real-time Monitoring of Privacy Abuses and Intrusion Detection in Android System

Li, S., Chen, J., Spyridopoulos, T., Andriotis, P., Ludwiniak, R. & Russell, G., 2015, 3rd International Conference on Human Aspects of Information Security, Privacy and Trust. Springer Berlin Heidelberg, Vol. 9190. p. 379-390

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

3 Citations (Scopus)

Reliable Information Extraction for Single Trace Attacks

Banciu, V., Oswald, E. & Whitnall, C., 2015, Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition, DATE 2015, Grenoble, France, March 9-13, 2015.. Association for Computing Machinery (ACM), p. 133-138 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
8 Citations (Scopus)

Robust Profiling for DPA-Style Attacks

Whitnall, C. & Oswald, E., 2015, Cryptographic Hardware and Embedded Systems - CHES 2015. Güneysu, T. & Handschuh, H. (eds.). Springer, Vol. 9293. p. 3-21 18 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
26 Citations (Scopus)

Rogue Decryption Failures: Reconciling AE Robustness Notions

Barwell, G., Page, D. & Stam, M., Dec 2015, Cryptography and Coding - IMACC 2015: 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings. Groth, J. (ed.). Springer, Vol. 9496. p. 94-111 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
13 Citations (Scopus)

Selective Opening Security for Receivers

Hazay, C., Patra, A. & Warinschi, B., 2015, Advances in Cryptology - ASIACRYPT 2015. Springer, Vol. 9452. p. 443-469 27 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

14 Citations (Scopus)

SoC It to EM: ElectroMagnetic Side-Channel Attacks on a Complex System-on-Chip

Longo, J., De Mulder, E., Page, D. & Tunstall, M., 1 Sep 2015, Cryptographic Hardware and Embedded Systems - CHES 2015. 1 ed. Springer, Vol. 9293. p. 620-640 21 p. (Lecture Notes in Computer Science; vol. 9293).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
44 Citations (Scopus)
491 Downloads (Pure)

SoK: A Comprehensive Analysis of Game-Based Ballot Privacy Definitions

Bernhard, D., Cortier, V., Galindo, D., Pereira, O. & Warinschi, B., 2015, 2015 IEEE Symposium on Security and Privacy - S&P 2015. Institute of Electrical and Electronics Engineers (IEEE), p. 499-516 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

32 Citations (Scopus)