Research Output

2012

Improved "Partial Sums"-based Square Attack on AES

Tunstall, M., 2012, International Conference on Security and Cryptography - SECRYPT 2012. INSTICC Press, p. 25-34

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

13 Citations (Scopus)

Infective Computation and Dummy Rounds: Fault Protection for Block Ciphers without Check-before-Output

Benedikt, G., Schmidt, J-M. & Tunstall, M., 2012, LATINCRYPT 2012. Springer Berlin Heidelberg, Vol. 7533. p. 305-321

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

37 Citations (Scopus)

Life-logging in smart environments: Challenges and security threats

Petroulakis, N. E., Askoxylakis, I. G. & Tryfonas, T., 2012, IEEE International Conference on Communications. Institute of Electrical and Electronics Engineers (IEEE), p. 5680-5684 5 p. 6364934

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

22 Citations (Scopus)

LoSt: Location Based Storage

Watson, G., Safavi-Naini, R., Alimomeni, M., Locasto, M. & Narayan, S., 2012, Cloud Computing Security Workshop - CCSW 2012. Association for Computing Machinery (ACM), Vol. -. p. 59-70 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

36 Citations (Scopus)

Measuring Vote Privacy, Revisited

Bernhard, D., Warinschi, B., Cortier, V. & Pereira, O., 2012, Proceedings of the 2012 ACM conference on Computer and communications security. ACM: ACM Press / Sheridan, p. 941--952 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

11 Citations (Scopus)

Multiparty Computation from Somewhat Homomorphic Encryption

Damgård, I., Pastro, V., Smart, N. P. & Zakarias, S., 2012, Advances in Cryptology - CRYPTO 2012. Safavi-Naini, R. & Canetti, R. (eds.). Springer Berlin Heidelberg, Vol. 7417. p. 643-662 20 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

363 Citations (Scopus)

On CCA-Secure Somewhat Homomorphic Encryption

Loftus, J., May, A., Smart, N. P. & Vercauteren, F., 2012, Selected Areas in Cryptography - SAC 2011. Miri, A. & Vaudenay, S. (eds.). Springer Berlin Heidelberg, Vol. 7118. p. 55-72 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

20 Citations (Scopus)

On reconfigurable fabrics and generic side-channel countermeasures

Beat, R., Grabher, P., Page, D., Tillich, S. & Wojcik, M., 2012, Field Programmable Logic - FPL 2012. Institute of Electrical and Electronics Engineers (IEEE), p. 663--66

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

5 Citations (Scopus)

On the Joint Security of Encryption and Signature in EMV

Degabriele, J. P., Lehmann, A., Paterson, K. G., Smart, N. P. & Strefler, M., 2012, Topics in Cryptology - CT-RSA 2012. Dunkelman, O. (ed.). Springer Berlin Heidelberg, Vol. 7178. p. 116-135 20 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

23 Citations (Scopus)

On the Trade-Off between Network Connectivity, Round Complexity, and Communication Complexity of Reliable Message Transmission

Badanidiyuru, A., Patra, A., Choudhary, A., Kannan, S. & Chandrasekaran, P. R., 2012, In : Journal of the ACM. 22, 5, p. 1-35 35 p., 22.

Research output: Contribution to journalArticle (Academic Journal)

5 Citations (Scopus)

Pinpointing Side-Channel Information Leaks in Web Applications

Mather, L. T. & Oswald, M. E., Oct 2012, In : Journal of Cryptographic Engineering. 2, 3, p. 161-177

Research output: Contribution to journalArticle (Academic Journal)

7 Citations (Scopus)

Plaintext-Checkable Encryption

Canard, S., Fuchsbauer, G., Gouget, A. & Laguillaumie, F., 2012, Topics in Cryptology - CT-RSA 2012. Dunkelman, O. (ed.). Springer, Vol. 7178. p. 332-348 17 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

23 Citations (Scopus)

Practical realisation and elimination of an ECC-related software bug attack

Brumley, B., Barbosa, M. B. M., Page, D. & Vercauteren, F. R. G., 2012, Topics in Cryptology - CT-RSA 2012. Springer Berlin Heidelberg, Vol. 7178. p. 171-186

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

20 Citations (Scopus)

Provably-Secure Time-Bound Hierarchical Key Assignment Schemes

Ateniese, G., De Santis, A., Ferrara, A-L. & Masucci, B., 2012, In : Journal of Cryptology. 25, 2, p. 243-270

Research output: Contribution to journalArticle (Academic Journal)

42 Citations (Scopus)

Relations between the security models for certificateless encryption and ID-based key agreement

Fiore, D., Gennaro, R. & Smart, N., Feb 2012, In : International Journal of Information Security. 11, 1, p. 1-22 22 p.

Research output: Contribution to journalArticle (Academic Journal)

2 Citations (Scopus)

Revisiting Difficulty Notions for Client Puzzles and DoS Resilience

Groza, B. & Warinschi, B., 2012, Information Security Conference - ISC 2012. Springer Berlin Heidelberg, Vol. 7483. p. 39-54 16 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

5 Citations (Scopus)

Ring Switching in BGV-Style Homomorphic Encryption

Gentry, C., Halevi, S., Peikert, C. & Smart, N. P., 2012, Security and Cryptography for Networks - SCN 2012. Springer, Vol. 7485. p. 19-37 19 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

29 Citations (Scopus)

Secure Proxy Signatures Schemes for Delegation of Signing Rights

Alexandra, B., Adriana, P. & Warinschi, B., Jan 2012, In : Journal of Cryptology. 25, 1, p. 57-115 59 p.

Research output: Contribution to journalArticle (Academic Journal)

115 Citations (Scopus)

Security Analysis of an Open Car Immobilizer Protocol Stack

Tillich, S. & Wojcik, M., 18 Dec 2012, Trusted Systems - INTRUST 2012. Springer Verlag, Vol. 7711. p. 83-94 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Security Analysis of Role-Based Access Control through Program Verification

Ferrara, A-L., Parlato, G. & P., M., 2012, Computer Security Foundations Symposium - CSF 2012. IEEE Computer Society, p. 113-125

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

18 Citations (Scopus)

Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation

Boldyreva, A., Degabriele, J. P., Paterson, K. G. & Stam, M., 2012, Advances in Cryptology - EUROCRYPT 2012. Springer, Vol. 7237. p. 682-699 18 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

17 Citations (Scopus)

Understanding Adaptivity: Random Systems Revisited

Jetchev, D., Özen, O. & Stam, M., 2012, Advances in Cryptology - ASIACRYPT 2012. Springer, Vol. 7658. p. 313-330 18 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

9 Citations (Scopus)

Using the cloud to determine key strengths

Kleinjung, T., Lenstra, A., Page, D. & Smart, N. P., 2012, Progress in Cryptology - INDOCRYPT 2012. Springer Berlin Heidelberg, Vol. 7668. p. 17-39

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

8 Citations (Scopus)
2011

Achieving Optimal Anonymity in Transferable E-Cash with a Judge

Blazy, O., Canard, S., Fuchsbauer, G., Gouget, A., Sibert, H. & Traoré, J., 2011, Progress in Cryptology - AFRICACRYPT 2011. Nitaj, A. & Pointcheval, D. (eds.). Springer, Vol. 6737. p. 206-223 18 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

24 Citations (Scopus)

A Composable Computational Soundness Notion

Cortier, V. & Warinschi, B., 2011, Conference on Computer and Communications Security - CCS 2011. Association for Computing Machinery (ACM), Vol. -. p. 63-74 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

13 Citations (Scopus)

A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework

Whitnall, C. A. & Oswald, ME., 2011, Advances in Cryptology - CRYPTO 2011. Springer Berlin Heidelberg, Vol. 6841. p. 316-334 19 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

33 Citations (Scopus)

Adapting Helios for Provable Ballot Privacy

Bernhard, D., Cortier, V., Pereira, O., Smyth, B. & Warinschi, B., 2011, European Symposium on Research in Computer Security - ESORICS 2011. Springer Berlin Heidelberg, Vol. 6879. p. 335-354 20 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

42 Citations (Scopus)

Adaptive Pseudo-free Groups And Applications

Catalano, D., Fiore, D. & Warinschi, B., 2011, Advances in Cryptology - EUROCRYPT 2011. Paterson, K. (ed.). Springer Berlin Heidelberg, Vol. 6632. p. 207-223

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

44 Citations (Scopus)

A fair evaluation framework for comparing side-channel distinguishers

Whitnall, C. A. & Oswald, M. E., Aug 2011, In : Journal of Cryptographic Engineering. 1, 2, p. 145-160 16 p.

Research output: Contribution to journalArticle (Academic Journal)

31 Citations (Scopus)

A Family of Key Agreement Mechanisms for Mission Critical Communications for Secure Mobile Ad Hoc and Wireless Mesh Internetworking

Askoxylakis, I., Tryfonas, T., May, JHR., Siris, V. & Traganitis, A., 2011, In : EURASIP Journal on Wireless Communications and Networking. 2011, p. 1-17

Research output: Contribution to journalArticle (Academic Journal)

4 Citations (Scopus)

All for one-one for all: Unifying univariate DPA attacks

Mangard, S., Oswald, ME. & Standaert, F-X., 2011, In : IET Information Security. 5(2), p. 100 - 110

Research output: Contribution to journalArticle (Academic Journal)

126 Citations (Scopus)

Analysis of the SSH Key Exchange Protocol

Williams, S. C., 2011, Coding and Cryptography - IMACC2011. Springer, Vol. 7089. p. 356-374 19 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

3 Citations (Scopus)

An evaluation of hash functions on a power analysis resistant processor architecture

Hoerder, S., Wojcik, M., Tillich, S. & Page, D., 2011, Workshop in Information Security Theory and Practice - WISTP 2011. Springer Berlin Heidelberg, Vol. 6633. p. 160-174

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

3 Citations (Scopus)

An exploration of mechanisms for dynamic cryptographic instruction set extension

Grabher, P., Groszschaedl, J., Hoerder, S., Järvinen, K., Page, D., Tillich, S. & Wojcik, M., 2011, Cryptographic Hardware and Embedded Systems - CHES 2011. Springer Berlin Heidelberg, Vol. 6917. p. 1-16

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

1 Citation (Scopus)

An exploration of mechanisms for dynamic cryptographic instruction set extension

Grabher, P., Groszschaedl, J., Hoerder, S., Järvinen, K., Page, D., Tillich, S. & Wojcik, M., 2011, In : Journal of Cryptographic Engineering. 2, 1, p. 1-18 18 p.

Research output: Contribution to journalArticle (Academic Journal)

2 Citations (Scopus)

An Exploration of the Kolmogorov-Smirnov Test as a Competitor to Mutual Information Analysis

Whitnall, C. A., Oswald, M. E. & Mather, L. T., 2011, Smart Card Research and Advanced Applications: 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011, Revised Selected Papers. Prouff, E. (ed.). Springer Berlin Heidelberg, p. 234-251 18 p. (Lecture Notes in Computer Science; vol. 7079).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
34 Citations (Scopus)
264 Downloads (Pure)

A Survey of Symbolic Methods in Computational Analysis of Cryptographic Systems

Cortier, V., Kremer, S. & Warinschi, B., 2011, In : Journal of Automated Reasoning. 46, 3-4, p. 225-259

Research output: Contribution to journalArticle (Academic Journal)

40 Citations (Scopus)

A unified multiply/accumulate unit for pairing-based cryptography over prime, binary and ternary fields

Vejda, T., Groszschaedl, J. & Page, D., 2011, Digital System Design, Architectures, Methods and Tools - DSD 2011. Institute of Electrical and Electronics Engineers (IEEE), p. 658-666

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Bit-sliced binary normal basis multiplication

Brumley, B. & Page, D., 2011, Computer Arithmetic - ARITH 2011. Institute of Electrical and Electronics Engineers (IEEE), p. 205-212

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

1 Citation (Scopus)

Can code polymorphism limit information leakage?

Amarilli, A., Muller, S., Naccache, D., Page, D., Rauzy, P. & Tunstall, M., 2011, Workshop on Information Security Theory and Practice - WISTP 2011. Springer Berlin Heidelberg, Vol. 6633. p. 1-21

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

9 Citations (Scopus)

Commuting Signatures and Verifiable Encryption

Fuchsbauer, G., 2011, Advances in Cryptology - EUROCRYPT 2011. Paterson, K. G. (ed.). Springer, Vol. 6632. p. 224-245 22 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

60 Citations (Scopus)

Composability of Bellare-Rogaway Key Exchange Protocols

Brzuska, C., Fischlin, M., Warinschi, B. & Williams, S. C., 2011, Conference on Computer and Communications Security - CCS 2011. Association for Computing Machinery (ACM), Vol. -. p. 51-62 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

32 Citations (Scopus)

Computationally Sound Analysis of Encrypting with Diffie Hellman Keys

Cortier, V., Kremer, S., Bresson, E., Lacknech, Y., Mazare, L. & Warinschi, B., 2011, Formal Models and Techniques for Analyzing Security Protocols. IOS Press, p. 277-303

Research output: Chapter in Book/Report/Conference proceedingChapter in a book

Consumerization: Consequences of Fuzzy Work-Home Boundaries

Koeberl, P., Li, J., Rajan, A., Vishik, C. & Wojcik, M., 2011, ISSE 2011 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2011 Conference. Vieweg+Teubner, p. 138-153 16 p.

Research output: Chapter in Book/Report/Conference proceedingChapter in a book

Differential Fault Analysis of the Advanced Encryption Standard using a Single Fault

Tunstall, M., Mukhopadhyay, D. & Ali, S., 2011, Workshop in Information Security Theory and Practice - WISTP 2011. Springer Berlin Heidelberg, Vol. 6633. p. 224-233

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

146 Citations (Scopus)

Efficient Hashing Using the AES Instruction Set

Bos, J. W., Özen, O. & Stam, M., 2011, Cryptographic Hardware and Embedded Systems - CHES 2011. Springer, Vol. 6917. p. 507-522 16 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

14 Citations (Scopus)

Evaluation of a PUF Device Authentication Scheme on a Discrete 0.13um SRAM

Koeberl, P., Li, J., Maes, R., Rajan, A., Vishik, C. & Wojcik, M., 2011, Trusted Systems - INTRUST 2011. Chen, L., Yung, M. & Zhu, L. (eds.). Springer Berlin Heidelberg, Vol. 7222. p. 271-288

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

15 Citations (Scopus)

Implementation and Evaluation of an SCA-Resistant Embedded Processor

Tillich, S., Mario, K. & Alexander, S., Sep 2011, Smart Card Research and Advanced Applications - CARDIS 2011. Prouff, E. (ed.). Springer Berlin Heidelberg, Vol. 7079. p. 151 - 165 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

4 Citations (Scopus)

Improved Key Generation for Gentry's Fully Homomorphic Encryption Scheme

Scholl, P. & Smart, N. P., 2011, Cryptography and Coding - IMACC 2011. Chen, L. (ed.). Springer Berlin Heidelberg, Vol. 7089. p. 10-22 13 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

16 Citations (Scopus)

Improved Trace-Driven Cache-Collision Attacks Against Embedded AES Implementations

Jean-François, G., Ilya, K. & Tunstall, M., 2011, Workshop on Information Security Applications - WISA 2011. Springer Berlin Heidelberg, Vol. 6513. p. 243-257

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

28 Citations (Scopus)