Research Output

2013

Breaking the O(n|C|) Barrier for Unconditionally Secure Asynchronous Multiparty Computation

Choudhary, A., 2013, Topics in Cryptology - INDOCRYPT 2013. INDOCRYPT: Springer Berlin Heidelberg, Vol. 8250. p. 19-37 19 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Cryptographically Enforced RBAC

Ferrara, A-L., Fuchsbauer, G. & Warinschi, B., 2013, IEEE CSF 2013. Computer Security Foundations Symposium - CSF 2013: IEEE Computer Society, p. 115 129 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

10 Citations (Scopus)

Cryptographic Key Exchange in IPv6-Based Low Power, Lossy Networks

Ilia, P., Oikonomou, G. & Tryfonas, T., 2013, Information Security Theory and Practice - WISTP 2013. Springer Berlin Heidelberg, Vol. 7886. p. 34-49 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

5 Citations (Scopus)

Cryptographic Voting - A Gentle Introduction.

Bernhard, D. & Warinschi, B., 2013, Foundations of Security Analysis and Design VII - FOSAD 2012/2013. Springer, Vol. 8604. p. 167-211 45 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Data Recovery Strategies for Cloud Environments

Spyridopoulos, T. & Katos, V., 2013, Cybercrime and Cloud Forensics: Applications for Investigation Processes. Ruan, K. (ed.). IGI Global, p. 251-265 15 p.

Research output: Chapter in Book/Report/Conference proceedingChapter in a book

9 Citations (Scopus)

Deduction Soundness: Prove One, Get Five for Free

Bohl, F., Cortier, V. & Warinschi, B., 4 Nov 2013, ACM CCS 2013. Association for Computing Machinery (ACM), p. 1261-1272

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

8 Citations (Scopus)

Differential Fault Analysis of AES: Towards Reaching its Limits

Ali, S. S., Mukhopadhyay, D. & Tunstall, M., 2013, In : Journal of Cryptographic Engineering. 3, 2, p. 73 97 p.

Research output: Contribution to journalArticle (Academic Journal)

24 Citations (Scopus)

Does My Device Leak Information? An a priori Statistical Power Analysis of Leakage Detection Tests

Mather, L. T., Oswald, M. E., Bandenburg, J. & Wojcik, M., 2013, Advances in Cryptology - ASIACRYPT 2013. Sako, K. & Sarkar, P. (eds.). Springer Berlin Heidelberg, Vol. 8269. p. 486-505 20 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

40 Citations (Scopus)

Estimating Key Sizes for High Dimensional Lattice-Based Systems

van de Pol, J. & Smart, N. P., Dec 2013, Proc. Cryptography and Coding. Springer, Vol. 8308. p. 290-303 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

24 Citations (Scopus)

Field switching in BGV-style homomorphic encryption

Gentry, C., Halevi, S., Peikert, C. & Smart, N. P., 2013, In : Journal of Computer Security. 21, 5, p. 663-684

Research output: Contribution to journalArticle (Academic Journal)

17 Citations (Scopus)

Formalizing Group Blind Signatures and Practical Constructions without Random Oracles.

Ghadafi, E. M. O., 2013, Information Security and Privacy - ACISP 2013.. Springer, Vol. 7959. p. 330-346 16 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

12 Citations (Scopus)

Game Theoretic Approach for Cost-Benefit Analysis of Malware Proliferation Prevention

Spyridopoulos, T., Oikonomou, G., Tryfonas, T. & Ge, M., 2013, Information Security and Privacy - SEC 2013. IFIP Advances in Information and Communication Technology, Vol. 405. p. 28-41

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

4 Citations (Scopus)

Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions

Baecher, P., Farshim, P., Fischlin, M. & Stam, M., 2013, Advances in Cryptology - EUROCRYPT 2013. Springer, Vol. 7881. p. 426-443 18 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

6 Citations (Scopus)

Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme

Bos, J. W., Lauter, K., Loftus, J. & Naehrig, M., Dec 2013, Proc. Cryptography and Coding. Springer, Vol. 8308. p. 45-64 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

181 Citations (Scopus)

Incident Analysis & Digital Forensics in SCADA and Industrial Control Systems

Spyridopoulos, T., Tryfonas, T. & May, J. H. R., Oct 2013, System Safety Conference incorporating the Cyber Security Conference 2013, 8th IET International. Institution of Engineering and Technology (IET), p. 1-6 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

File
14 Citations (Scopus)
334 Downloads (Pure)

JPEG Steganography Detection with Benford's Law

Andriotis, P., Oikonomou, G. & Tryfonas, T., 15 Mar 2013, In : Digital Investigation. 9, 3-4, p. 246-257

Research output: Contribution to journalArticle (Academic Journal)

19 Citations (Scopus)

Less is more: relaxed yet composable security notions for key exchange

Brzuska, C., Fischlin, M., Smart, N. P., Warinschi, B. & Williams, S. C., 2013, In : International Journal of Information Security. 12, p. 267-297

Research output: Contribution to journalArticle (Academic Journal)

22 Citations (Scopus)

Light-weight primitive, feather-weight security: a cryptanalytic knock-out

Banciu, V., Hoerder, S. & Page, D., 2013, Workshop on Embedded Systems Security - WESS 2013. Association for Computing Machinery (ACM), p. 1--10

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Multilevel Visualization Using Enhanced Social Network Analysis with Smartphone Data

Andriotis, P., Tzermias, Z., Mparmpaki, A., Ioannidis, S. & Oikonomou, G., 2013, In : International Journal of Digital Crime and Forensics. 5, 4, p. 34-54

Research output: Contribution to journalArticle (Academic Journal)

6 Citations (Scopus)

On secure embedded token design: Quasi-looped Yao circuits and bounded leakage

Hoerder, S., Järvinen, K. & Page, D., 2013, Workshop in Information Security Theory and Practice - WISTP 2013. Springer Berlin Heidelberg, Vol. 7886. p. 112-128

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

On Two Different Methods for Steganography Detection in JPEG Images with Benford's Law

Andriotis, P., Tryfonas, T., Oikonomou, G., Spyridopoulos, T., Zaharis, A., Martini, A. & Askoxylakis, I., May 2013, Proc. 7th Scientific NATO Conference in Security and Protection of Information (SPI 2013). Brno University of Defence, p. 3-14

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Policy Analysis for Self-administrated Role-Based Access Control

Ferrara, A-L., Madhusudan, P. & Parlato, G., 2013, Tools and Algorithms for the Construction and Analysis of Systems - TACAS 2013. Piterman, N. & Smolka, S. A. (eds.). Springer, Vol. 7795. p. 432-447 16 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

19 Citations (Scopus)

Practical Covertly Secure MPC for Dishonest Majority - Or: Breaking the SPDZ Limits

Damgård, I., Keller, M., Larraia, E., Pastro, V., Scholl, P. & Smart, N. P., 2013, Computer Security - ESORICS 2013. Crampton, J., Jajodia, S. & Mayes, K. (eds.). Springer, Vol. 8134. p. 1-18 18 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

139 Citations (Scopus)

Privacy-supporting cloud computing by in-browser key translation

Arapinis, M., Bursuc, S. & Ryan, M., 2013, In : Journal of Computer Security. 21, p. 846 880 p., 6.

Research output: Contribution to journalArticle (Academic Journal)

10 Citations (Scopus)

Profiling DPA: Efficacy and efficiency trade-offs

Oswald, M. E. & Whitnall, C. A., Aug 2013, Cryptographic Hardware and Embedded Systems - CHES 2013. Springer Verlag, Vol. 8086. p. 37-54 18 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
15 Citations (Scopus)

Solving the Shortest Vector Problem in Lattices Faster Using Quantum Search

Laarhoven, T., Mosca, M. & van de Pol, J., 2013, Post-Quantum Cryptography - PQC 2013. Springer Berlin Heidelberg, Vol. 7932. p. 83-101 19 p. (Lecture Notes in Computer Science; vol. 7932).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

7 Citations (Scopus)

Strategic Interaction Analysis of Privacy-Sensitive End-Users of Cloud-Based Mobile Apps

Anastasopoulou, K., Tryfonas, T. & Kokolakis, S., 2013, Human Aspects of Information Security, Privacy, and Trust - HAS 2013. Springer Berlin Heidelberg, Vol. 8030. p. 209-216

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

3 Citations (Scopus)

Sub-linear Blind Ring Signatures without Random Oracles

Ghadafi, E. M. O., 2013, Coding and Cryptography - IMACC 2013. Springer Berlin Heidelberg, Vol. 8308. p. 304-323 19 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

5 Citations (Scopus)

The Low-Call Diet: Authenticated Encryption for Call Counting HSM Users

Bond, M., French, G., Smart, N. P. & Watson, G. J., 2013, Topics in Cryptology - CT-RSA 2013. Dawson, E. (ed.). Springer, Vol. 7779. p. 359-374 16 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

1 Citation (Scopus)

Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs

Bernhard, D., Neumann, S. & Volkamer, M., 2013, E-Voting and Identify - VOTE-ID 2013. Heather, J., Schneider, S. A. & Teague, V. (eds.). Springer, Vol. 7985. p. 176-192 17 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

5 Citations (Scopus)
2012

Analyzing Temporal Role Based Access Control Models

Uzun, E., Atluri, V., Sural, S., Vaidya, J., Parlato, G., Ferrara, A-L. & P., M., 2012, Symposium on Access Control Models and Technologies - SACMAT 2012. Association for Computing Machinery (ACM), p. 177-186

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

24 Citations (Scopus)

A practical device authentication scheme using SRAM PUFs

Koeberl, P., Li, J., Maes, R., Rajan, A., Vishik, C., Wojcik, M. & Wu, W., 2012, In : Journal of Cryptographic Engineering. 2, 4, p. 255-269 14 p.

Research output: Contribution to journalArticle (Academic Journal)

4 Citations (Scopus)

Better Bootstrapping in Fully Homomorphic Encryption

Gentry, C., Halevi, S. & Smart, N. P., 2012, Public Key Cryptography - PKC 2012. Fischlin, M., Buchmann, J. & Manulis, M. (eds.). Springer Berlin Heidelberg, Vol. 7293. p. 1-16 16 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

98 Citations (Scopus)

Brief Announcement: Efficient Optimally Resilient Statistical AVSS and its Applications

Choudhary, A. & Patra, A., 2012, ACM Symposium on Principles of Distributed Computing - PODC 2012. ACM Press / Sheridan, p. 103-104

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

2 Citations (Scopus)

Brief Announcement: Optimal Amortized Secret Sharing with Cheater Identification

Choudhary, A., 2012, ACM Symposium on Principles of Distributed Computing - PODC 2012. ACM Press / Sheridan, Vol. -. p. 101-102

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

9 Citations (Scopus)

Collisions Are Not Incidental: A Compression Function Exploiting Discrete Geometry

Jetchev, D., Özen, O. & Stam, M., 2012, Theory of Cryptography - TCC 2012. Springer, Vol. 7194. p. 303-320 18 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

12 Citations (Scopus)

Compiler assisted masking

Moss, A. D., Oswald, E., Page, D. & Tunstall, M., 2012, Cryptographic Hardware and Embedded Systems - CHES. Springer Berlin Heidelberg, Vol. 7428. p. 58-75

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

44 Citations (Scopus)

Design and Performance Evaluation of a Lightweight Wireless Early Warning Intrusion Detection Prototype

Fragkiadakis, A., Tragos, E., Tryfonas, T. & Askoxylakis, I., 2012, In : EURASIP Journal on Wireless Communications and Networking. 2012:73, p. 1-18

Research output: Contribution to journalArticle (Academic Journal)

22 Citations (Scopus)

Efficient Java implementation of elliptic curve cryptography for J2ME-enabled mobile devices

Groszschaedl, J., Page, D. & Tillich, S., 2012, Workshop in Information Security Theory and Practice - WISTP 2012. Springer Berlin Heidelberg, Vol. 7322. p. 189--207

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

5 Citations (Scopus)

Efficient Network Coding Signatures in the Standard Model

Catalano, D., Fiore, D. & Warinschi, B., 2012, Public Key Cryptography - PKC 2012. Springer Berlin Heidelberg, Vol. 7293. p. 680-696 17 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

58 Citations (Scopus)

Efficient Threshold Zero-Knowledge with Applications to User-Centric Protocols

Keller, M., Mikkelsen, G. L. & Rupp, A., 2012, Information Theoretic Security - ICITS 2012. Smith, A. (ed.). Springer Berlin Heidelberg, Vol. 7412. p. 147-166 20 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

5 Citations (Scopus)

Efficient Two-Move Blind Signatures in the Common Reference String Model

Ghadafi, E. & Smart, N. P., 2012, Information Security - ISC 2012. Springer, Vol. 7483. p. 274-289 16 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

7 Citations (Scopus)

Fault attacks on pairing based cryptography: a state of the art

El Mrabet, N., Page, D. & Vercauteren, F. R. G., 2012, Fault Analysis in Cryptography. Springer, p. 221-236

Research output: Chapter in Book/Report/Conference proceedingChapter in a book

Forensic Analysis of Wireless Networking Evidence of Android Smartphones

Andriotis, P., Oikonomou, G. & Tryfonas, T., 2012, Workshop on Information Forensics and Security - WIFS 2012. Institute of Electrical and Electronics Engineers (IEEE), p. 109-114

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

27 Citations (Scopus)

Fully Homomorphic Encryption with Polylog Overhead

Gentry, C., Halevi, S. & Smart, N. P., 2012, Advances in Cryptology - EUROCRYPT 2012. Pointcheval, D. & Johansson, T. (eds.). Springer Berlin Heidelberg, Vol. 7237. p. 465-482 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

217 Citations (Scopus)

Harnessing biased faults in attacks on ECC-based signature schemes

Järvinen, K., Blondeau, C., Page, D. & Tunstall, M., 2012, Fault Diagnosis and Tolerance in Cryptography - FDTC 2012. Institute of Electrical and Electronics Engineers (IEEE), p. 72-82

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

8 Citations (Scopus)

Homomorphic Evaluation of the AES Circuit

Gentry, C., Halevi, S. & Smart, N. P., 2012, Advances in Cryptology - CRYPTO 2012. Safavi-Naini, R. & Canetti, R. (eds.). Springer Berlin Heidelberg, Vol. 7417. p. 850-867 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

295 Citations (Scopus)

How Not to Prove Yourself: Pitfalls of Fiat-Shamir and Applications to Helios

Bernhard, D., Warinschi, B. & Pereira, O., 2012, Advances in Cryptology - ASIACRYPT 2012. Springer Verlag, Vol. 7658. p. 626-643 18 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

70 Citations (Scopus)

Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocol

Damgård, I., Keller, M., Larraia, E., Miles, C. & Smart, N. P., 2012, Security and Cryptography for Networks - SCN 2012. Springer, Vol. 7485. p. 241-263 23 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

32 Citations (Scopus)

Improved decoding of affine-variety codes

Orsini, E. A., Marcolla, C. & Sala, M., 2012, In : Journal of Pure and Applied Algebra. 216, 7, p. 1533 1565 p.

Research output: Contribution to journalArticle (Academic Journal)

22 Citations (Scopus)