Research Output

2015

Stronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient Constructions

Ghadafi, E., 2015, Topics in Cryptology - CT-RSA 2015, The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings. Nyberg, K. (ed.). Springer, Vol. 9048. p. 391-409 19 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

19 Citations (Scopus)

Threshold FlipThem: When the winner does not need to take all

Leslie, D., Sherfield, C. & Smart, N., 4 Nov 2015, Decision and Game Theory for Security - GameSec 2015. Springer, Vol. 9406. p. 74-92 19 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
6 Citations (Scopus)
2014

Actively Secure Private Function Evaluation

Mohassel, P., Sadeghian, S. S. & Smart, N. P., 2014, Advances in Cryptology - ASIACRYPT 2014. Sarkar, P. & Iwata, T. (eds.). Springer, Vol. 8874. p. 486-505 20 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

8 Citations (Scopus)

A holistic approach for Cyber Assurance of Critical Infrastructure with the Viable System Model

Spyridopoulos, T., Topa, I., Karyda, M. & Tryfonas, T., 2014, ICT Systems Security and Privacy Protection: 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014. Proceedings. Springer Berlin Heidelberg, Vol. 428. p. 438-445 8 p. (IFIP Advances in Information and Communication Technology; vol. 428).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

All-or-Nothing Transforms as a countermeasure to differential side-channel analysis

McEvoy, R. P., Tunstall, M., Whelan, C., Murphy, C. C. & Marnane, W. P., Jun 2014, In : International Journal of Information Security. 13, 3, p. 291-304 14 p.

Research output: Contribution to journalArticle (Academic Journal)

5 Citations (Scopus)

Anonymity guarantees of the UMTS/LTE authentication and connection protocol

Lee, M-F., Smart, N. P., Warinschi, B. & Watson, G. J., 2014, In : International Journal of Information Security. 13, 6, p. 513-527 15 p.

Research output: Contribution to journalArticle (Academic Journal)

9 Citations (Scopus)

Asynchronous Byzantine Agreement with optimal resilience

Patra, A., Choudhury, A. & Rangan, C. P., Apr 2014, In : Distributed Computing. 27, 2, p. 111-146 36 p.

Research output: Contribution to journalArticle (Academic Journal)

9 Citations (Scopus)

Attribute-Based Signatures with User-Controlled Linkability

Ghadafi, E. M. O., El Kaafarani, A., Liqun, C. & Davenport, J., 2014, Cryptology and Network Security, CANS 2014. Springer Berlin Heidelberg, Vol. 8813. p. 256-269 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

7 Citations (Scopus)

A viable systems approach towards cyber situational awareness

Craig, R., Tryfonas, T. & May, J., 2014, Conference Proceedings - IEEE International Conference on Systems, Man and Cybernetics. January ed. Institute of Electrical and Electronics Engineers (IEEE), Vol. 2014-January. p. 1405-1411 7 p. 6974112

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

2 Citations (Scopus)

Complexity metrics and user strength perceptions of the pattern-lock graphical authentication method

Andriotis, P., Tryfonas, T. & Oikonomou, G., 2014, Human Aspects of Information Security, Privacy, and Trust - HAS 2014. Tryfonas, T. & Askoxylakis, I. G. (eds.). Springer Berlin Heidelberg, Vol. 8533. p. 115-126 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Cryptographic puzzles and DoS resilience, revisited.

Groza, B. & Warinschi, B., 2014, In : Designs, Codes and Cryptography. 73, 1, p. 177-207 31 p.

Research output: Contribution to journalArticle (Academic Journal)

8 Citations (Scopus)

Decentralized Traceable Attribute-Based Signatures

Ghadafi, E. M. O., El Kaafarani, A. & Khader, D., 25 Feb 2014, Topics in Cryptology – CT-RSA 2014. Springer, Vol. 8366. p. 327-348 22 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

37 Citations (Scopus)

Deducibility constraints and blind signatures

Bursuc, S., Comon-Lundh, H. & Delaune, S., Nov 2014, In : Information and Computation. 238, p. 106-127

Research output: Contribution to journalArticle (Academic Journal)

Digital Investigations for IPv6-Based Wireless Sensor Networks

Kumar, V., Oikonomou, G., Tryfonas, T., Page, D. & Phillips, I., Aug 2014, In : Digital Investigation. 11, Supplement 2, p. S66-S75 12 p.

Research output: Contribution to journalSpecial issue (Academic Journal)

10 Citations (Scopus)

Dishonest Majority Multi-Party Computation for Binary Circuits

Larraia De Vega, E., Orsini, E. & Smart, N. P., 2014, Advances in Cryptology - CRYPTO 2014. Garay, J. A. & Gennaro, R. (eds.). Springer, Vol. 8617. p. 495-512 18 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

21 Citations (Scopus)

Efficient, Oblivious Data Structures for MPC

Keller, M. K. S. & Scholl, P., Dec 2014, Advances in Cryptology - ASIACRYPT 2014: 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part II. Springer Berlin Heidelberg, Vol. 8874. p. 506-525 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

32 Citations (Scopus)

Efficient Distributed Tag-Based Encryption and Its Application to Group Signatures with Efficient Distributed Traceability

Ghadafi, E., 2014, Progress in Cryptology - LATINCRYPT 2014. Springer, Vol. 8895. p. 327-347 21 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

6 Citations (Scopus)

Encryption Schemes Secure under Related-Key and Key-Dependent Message Attacks

Böhl, F., Davies, G. T. & Hofheinz, D., 2014, Public Key Cryptography - PKC 2014. Krawczyk, H. (ed.). Springer, Vol. 8383. p. 483-500 18 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

9 Citations (Scopus)

Fully homomorphic SIMD operations

Smart, N. P. & Vercauteren, F. R. G., 1 Apr 2014, In : Designs, Codes and Cryptography. 71, 1, p. 57-81

Research output: Contribution to journalArticle (Academic Journal)

199 Citations (Scopus)

Homomorphic Signatures with Efficient Verification for Polynomial Functions.

Catalano, D., Fiore, D. & Warinschi, B., 2014, Advances in Cryptology - CRYPTO 2014. Springer Berlin Heidelberg, Vol. 8617. p. 371-389 19 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

53 Citations (Scopus)

ICEPOLE: High-Speed, Hardware-Oriented Authenticated Encryption

Morawiecki, P., Gaj, K., Homsirikamol, E., Matusiewicz, K., Pieprzyk, J., Rogawski, M., Srebrny, M. & Wojcik, M., 2014, Cryptographic Hardware and Embedded Systems – CHES 2014. Springer Berlin Heidelberg, Vol. 8731. p. 392-413 22 p.

Research output: Chapter in Book/Report/Conference proceedingChapter in a book

12 Citations (Scopus)

Industrial Wireless Sensor Networks

Li, S., Sun, H., Nallanathan, A., Xu, LI., Zhao, S. & Sun, Q., Aug 2014, In : International Journal of Distributed Sensor Networks . 10, 8, 2 p., 218050.

Research output: Contribution to journalEditorial (Academic Journal)

Open Access
File
2 Citations (Scopus)
171 Downloads (Pure)

KDM Security in the Hybrid Framework

Davies, G. T. & Stam, M., 2014, Topics in Cryptology - CT-RSA 2014. Benaloh, J. (ed.). Springer Verlag, Vol. 8366. p. 461-480 20 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

6 Citations (Scopus)

Key-Versatile Signatures and Applications: RKA, KDM and Joint Enc/Sig

Bellare, M., Meiklejohn, S. & Thomson, S., 2014, Advances in Cryptology - EUROCRYPT 2014. Springer Berlin Heidelberg, Vol. 8441. p. 496-513 18 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

8 Citations (Scopus)

Managing Cyber Security Risks in Industrial Control Systems with Game Theory and Viable System Modelling

Spyridopoulos, T., Maraslis, K., Tryfonas, T., Oikonomou, G. & Li, S., 2014, IEEE 9th International Conference on System of Systems Engineering (SoSE), 2014. Institute of Electrical and Electronics Engineers (IEEE), p. 266-271 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Masking Tables—An Underestimated Security Risk

Tunstall, M., Whitnall, C. A. & Oswald, M. E., 2014, Fast Software Encryption 2013. Springer, Vol. 8424. p. 425-444 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
20 Citations (Scopus)

Multi-target DPA Attacks: Pushing DPA Beyond the Limits of a Desktop Computer

Mather, L. T., Oswald, M. E. & Whitnall, C. A., 2014, Advances in Cryptology - ASIACRYPT 2014. Springer, Vol. 8873. p. 243-261 19 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
20 Citations (Scopus)

One-Sided Adaptively Secure Two-Party Computation

Hazay, C. & Patra, A., 2014, Theory of Cryptography - TCC 2014. Lindell, Y. (ed.). Springer, Vol. 8349. p. 368-393 26 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

10 Citations (Scopus)

On Symmetric Encryption with Distinguishable Decryption Failures

Boldyreva, A., Degabriele, J. P., Paterson, K. G. & Stam, M., 2014, Fast Sofware Encryption - FSE 2013. Springer, Vol. 8424. p. 367-390 23 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

On the Amortized Complexity of Zero-Knowledge Protocols

Cramer, R., Damgård, I. & Keller, M., 2014, In : Journal of Cryptology. 27, 2, p. 284-316 33 p.

Research output: Contribution to journalArticle (Academic Journal)

6 Citations (Scopus)

On the Development of Automated Forensic Analysis Methods for Mobile Devices

Andriotis, P., Tryfonas, T., Oikonomou, G., Li, S., Tzermias, Z., Xynos, K., Read, H. & Prevelakis, V., 2014, Trust and Trustworthy Computing - TRUST 2014. Holz, T. & Ioannidis, S. (eds.). Springer Berlin Heidelberg, Vol. 8564. p. 212-213 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

'Ooh Aah... Just a Little Bit' : A Small Amount of Side Channel Can Go a Long Way

Benger, N., van de Pol, J., Smart, N. P. & Yarom, Y., 23 Sep 2014, Cryptographic Hardware and Embedded Systems - CHES 2014. Batina, L. & Robshaw, M. (eds.). Springer Verlag, Vol. 8731. p. 75-92 (Lecture Notes in Computer Science; vol. 8731).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Pragmatism vs. Elegance: Comparing Two Approaches to Simple Power Attacks on AES

Banciu, V. & Oswald, E., 2014, Constructive Side-Channel Analysis and Secure Design - 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers.. Springer Berlin Heidelberg, Vol. 8622. p. 29-40 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

3 Citations (Scopus)

Reducing the Overhead of MPC over a Large Population

Choudhary, A., Patra, A. & Smart, N. P., 29 Aug 2014, Security and Cryptography for Networks - SCN 2014. Springer Verlag, Vol. 8642. p. 197-217 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

2 Citations (Scopus)

Simulatable Leakage: Analysis, Pitfalls, and New Constructions

Longo, J., Martin, D. P., Oswald, M. E., Page, D., Stam, M. & Tunstall, M., 7 Dec 2014, Advances in Cryptology - ASIACRYPT 2014. Springer Berlin Heidelberg, Vol. 8873. p. 223-242 (Lecture Notes in Computer Science; vol. 8873).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
8 Citations (Scopus)

Smartphone Message Sentiment Analysis

Andriotis, P., Takasu, A. & Tryfonas, T., 2014, Advances in Digital Forensics X. Peterson, G. & Shenoi, S. (eds.). p. 253-265 (IFIP Advances in Information and Communication Technology; vol. 433).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

7 Citations (Scopus)

Soft systems methodology in net-centric cyber defence system development

Craig, R., Spyridopoulos, T., Tryfonas, T. & May, J. H. R., 2014, Conference Proceedings - IEEE International Conference on Systems, Man and Cybernetics. January ed. San Diego, California, USA: Institute of Electrical and Electronics Engineers (IEEE), Vol. 2014-January. p. 672-677 6 p. 6973986

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

The Myth of Generic DPA...and the Magic of Learning

Whitnall, C., Oswald, E. & Standaert, F-X., 2014, Topics in Cryptology - CT-RSA 2014. Benaloh, J. (ed.). Springer, Vol. 8366. p. 183-205 23 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
34 Citations (Scopus)

THOR - The hardware onion router

Francesco, R., Guneysu, T., Sasdrich, P. & Wojcik, M., 2 Sep 2014, Field Programmable Logic and Applications (FPL): 2014 24th International Conference on. Institute of Electrical and Electronics Engineers (IEEE), p. 1-4 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

1 Citation (Scopus)

Vac - Verifier of Administrative Role-Based Access Control Policies

Ferrara, A-L., Lam, T. N., Madhusudan, P. & Parlato, G., 2014, Computer Aided Verification. Springer, Vol. 8559. p. 184-191 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

13 Citations (Scopus)

What is Computer Science? An Information Security Perspective

Page, D. & Smart, N., 2014, Springer Verlag. (Undergraduate Topics in Computer Science)

Research output: Book/ReportAuthored book

2013

A Game Theoretic Defence Framework Against DoS/DDoS Cyber Attacks

Spyridopoulos, T., Karanikas, G., Tryfonas, T. & Oikonomou, G., Oct 2013, In : Computers and Security. 38, p. 39-50

Research output: Contribution to journalArticle (Academic Journal)

50 Citations (Scopus)

An Analysis of the EMV Channel Establishment Protocol

Brzuska, C., Smart, N. P., Warinschi, B. & Watson, G., 4 Nov 2013, ACM CCS 2013. Association for Computing Machinery (ACM), p. 373-386

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

20 Citations (Scopus)

An Architecture for Practical Actively Secure MPC with Dishonest Majority

Keller, M. K. S., Scholl, P. & Smart, N. P., 4 Nov 2013, ACM CCS 2013. Association for Computing Machinery (ACM), p. 549-560

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

38 Citations (Scopus)

A note on time-bound hierarchical key assignment schemes

Ateniese, G., Santis, A. D., Ferrara, A-L. & Masucci, B., 2013, In : Information Processing Letters. 113, 5-6, p. 151-155 5 p.

Research output: Contribution to journalArticle (Academic Journal)

6 Citations (Scopus)

A Pilot Study on the Security of Pattern Screen-Lock Methods and Soft Side Channel Attacks

Andriotis, P., Tryfonas, T., Oikonomou, G. & Yildiz, C., 2013, Security and Privacy in Wireless and Mobile Networks - WiSec 13. Association for Computing Machinery (ACM), p. 1-6

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

57 Citations (Scopus)

Asynchronous Multiparty Computation with Linear Communication Complexity

Choudhury, A., Hirt, M. & Patra, A., 2013, DISC 2013. Afek, Y. (ed.). Heidelberg: Springer Berlin Heidelberg, Vol. 8205. p. 388-402 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

A System Dynamics Model of Cyber Conflict

Polatin-Reuben, D., Craig, R., Spyridopoulos, T. & Tryfonas, T., 2013, Systems, Man, and Cybernetics - IEEE SMC 2013. Institute of Electrical and Electronics Engineers (IEEE), p. 303-308

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

2 Citations (Scopus)

Ballot Secrecy and Ballot Independence Coincide

Smyth, B. & Bernhard, D., 2013, Computer Security - ESORICS 2013. Crampton, J., Jajodia, S. & Mayes, K. (eds.). Springer, Vol. 8134. p. 463-480 18 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

13 Citations (Scopus)

Between a Rock and a Hard Place: Interpolating between MPC and FHE

Choudhury, A., Loftus, J. J., Orsini, E. A., Patra, A. & Smart, N. P., Dec 2013, Advances in Cryptology - ASIACRYPT 2013. Springer Verlag, Vol. 8270. p. 221-240 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

13 Citations (Scopus)