Research Output

2011

Lightweight Steganalysis based on Image Reconstruction & Lead Digit Distribution Analysis

Zaharis, A., Martini, A., Tryfonas, T., Ilioudis, C. & Pangalos, G., 2011, In : International Journal of Digital Crime and Forensics. 3, 4, p. 29 - 41

Research output: Contribution to journalArticle (Academic Journal)

3 Citations (Scopus)

MJH: A Faster Alternative to MDC-2

Lee, J. & Stam, M., 2011, Topics in Cryptology – CT-RSA 2011. Springer Berlin Heidelberg, Vol. 6558. p. 213-236

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

32 Citations (Scopus)

On the Communication Complexity of Reliable and Secure Message Transmission in Asynchronous Networks

Choudhary, A. & Patra, A., 2011, Information Security and Cryptology - ICISC 2011. Springer Berlin Heidelberg, Vol. 7259. p. 450 466 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

On the Joint Security of Encryption and Signature, Revisited

Paterson, K. G., Schuldt, J. C. N., Stam, M. & Thomson, S., 2011, Advances in Cryptology - ASIACRYPT 2011. Springer, Vol. 7073. p. 161-178 18 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

23 Citations (Scopus)

Practical Complexity Differential Cryptanalysis and Fault Analysis of AES

Tunstall, M., 2011, In : Journal of Cryptographic Engineering. 1, 3, p. 219-230

Research output: Contribution to journalArticle (Academic Journal)

6 Citations (Scopus)

Reconstructive Steganalysis by Source Bytes Lead Digit Distribution Examination

Zaharis, A., Martini, A., Tryfonas, T., Ilioudis, C. & Pangalos, G., 2011, Digital Forensics and Incident Analysis - WDFIA 2011. University of Plymouth, Vol. -. p. 55 - 68

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Requirements for a Forensically Ready Cloud Storage Service

Spyridopoulos, T. & Katos, V., 2011, In : International Journal of Digital Crime and Forensics. 3, 3, p. 19-36 18 p.

Research output: Contribution to journalArticle (Academic Journal)

18 Citations (Scopus)

Secure Outsourced Computation

Loftus, J. J. & Smart, N. P., 2011, Progress in Cryptology - AFRICACRYPT 2011. Nitaj, A. & Pointcheval, D. (eds.). BERLIN: Springer Berlin Heidelberg, Vol. 6737. p. 1-20 20 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

21 Citations (Scopus)

Security for Key Management Interfaces

Kremer, S., Steel, G. & Warinschi, B., 2011, Computer Security Foundations Symposium - CSF 2011 . IEEE Computer Society, Vol. -. p. 266-280 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

11 Citations (Scopus)

Security of the Enhanced TCG Privacy-CA Solution

Chen, L., Lee, M-F. & Warinschi, B., 2011, Trustworthy Global Computing - TGC 2011. Springer Berlin Heidelberg, Vol. 7173. p. 121-141 21 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

3 Citations (Scopus)

Side-channel attacks on the McEliece and Niederreiter public-key cryptosystems

Avanzi, R. M., Hoerder, S., Page, D. & Tunstall, M., 2011, In : Journal of Cryptographic Engineering. 1, 4, p. 271-281

Research output: Contribution to journalArticle (Academic Journal)

18 Citations (Scopus)

Signatures on Randomizable Ciphertexts

Blazy, O., Fuchsbauer, G., Pointcheval, D. & Vergnaud, D., 2011, Public Key Cryptography - PKC 2011. Catalano, D., Fazio, N., Gennaro, R. & Nicolosi, A. (eds.). Springer, Vol. 6571. p. 403-422 20 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

39 Citations (Scopus)

The Collision Security of Tandem-DM in the Ideal Cipher Model

Lee, J., Stam, M. & Steinberger, J., 2011, Advances in Cryptology - CRYPTO 2011. Springer, Vol. 6841. p. 561-557 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

34 Citations (Scopus)

The Preimage Security of Double-Block-Length Compression Functions

Armknecht, F., Fleischmann, E., Krause, M., Lee, J., Stam, M. & Steinberger, J. P., 2011, Advances in Cryptology - ASIACRYPT 2011. Springer, Vol. 7073. p. 233-251 19 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

29 Citations (Scopus)

The Symbiosis between Collision and Preimage Resistance

Andreeva, E. & Stam, M., 2011, Coding an Cryptography - IMACC 2011. Springer, Vol. 7089. p. 152-171 20 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

4 Citations (Scopus)

Type checking cryptography implementations

Barbosa, M. B. M., Moss, A. D., Page, D., Rodrigues, N. & Silva, P. F., 2011, Fundamentals of Software Engineering - FSEN 2011. Springer Berlin Heidelberg, Vol. 7141. p. 316-334

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

3 Citations (Scopus)

Using Templates to Distinguish Multiplications from Squaring Operations

Tunstall, M., Hanley, N. & Marnane, W., 2011, In : International Journal of Information Security. 10, 4, p. 255-266

Research output: Contribution to journalArticle (Academic Journal)

14 Citations (Scopus)

Wildcarded Identity-Based Encryption

Abdalla, M., Birkett, J., Catalano, D., Dent, A., Malone-Lee, J., Neven, G., Schuldt, J. & Smart, N., 2011, In : Journal of Cryptology. 24, p. 42-82

Research output: Contribution to journalArticle (Academic Journal)

19 Citations (Scopus)
2010

A dynamic key agreement mechanism for mission critical mobile ad hoc networking

Askoxylakis, I., Tryfonas, T., May, JHR. & Traganitis, A., 2010, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering: Mobile Lightweight Wireless Systems - ICST Mobilight 2010. Springer, Vol. 45. p. 216-228

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

1 Citation (Scopus)

Bridging the gap between symbolic and efficient AES implementations

Moss, A. & Page, D., 2010, Partial Evaluation and Program Manipulation - PEPM 2010. Association for Computing Machinery (ACM), p. 101-110

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

5 Citations (Scopus)

Combined Implementation Attack Resistant Exponentiation

Schmidt, J-M., Tunstall, M., Avanzi, R. M., Kizhvatov, I., Kasper, T. & Oswald, D., 2010, Latincrypt 2010. Springer Berlin Heidelberg, Vol. 6212. p. 305-322

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

10 Citations (Scopus)

Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement

Fiore, D., Gennaro, R. & Smart, N., 2010, Pairing-Based Cryptography - Pairing 2010. Springer Berlin Heidelberg, Vol. 6487. p. 167-186

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

8 Citations (Scopus)

Coordinate Blinding over Large Prime Fields

Tunstall, M. & Joye, M., 2010, Cryptographic Hardware and Embedded Systems - CHES 2010. Springer Berlin Heidelberg, Vol. 6225. p. 443-455

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

6 Citations (Scopus)

Counteracting Power Analysis Attacks by Masking

Oswald, E. & Mangard, S., 2010, Secure Integrated Circuits and Systems. Springer, p. 159-178

Research output: Chapter in Book/Report/Conference proceedingChapter in a book

Engineering secure systems with ISO 26702 and 27001

Evans, R., Tsohou, A., Tryfonas, T. & Morgan, T., 2010, 2010 5th International Conference on System of Systems Engineering, SoSE 2010. Institute of Electrical and Electronics Engineers (IEEE), p. 1-6 5544065

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

6 Citations (Scopus)

Errors Matter: Breaking RSA-Based PIN Encryption with Thirty Ciphertext Validity Queries

Smart, N., 2010, Topics in Cryptology - CT-RSA 2010. Springer Berlin Heidelberg, Vol. 5985. p. 15-25

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

4 Citations (Scopus)

Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes

Smart, N. & Vercauteren, F., 2010, Public Key Cryptography - PKC 2010. Springer Berlin Heidelberg, Vol. 6056. p. 420-443

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

433 Citations (Scopus)

Get Shorty via Group Signatures without Encryption

Bichsel, P., Camenisch, J., Neven, G., Smart, N. & Warinschi, B., 2010, Security and Cryptography for Networks - SCN 2010. Springer Berlin Heidelberg, Vol. 6280. p. 381-398

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

56 Citations (Scopus)

Groth–Sahai Proofs Revisited

Ghadafi, E., Smart, N. & Warinschi, B., 2010, Public Key Cryptography - PKC 2010. Springer Berlin Heidelberg, Vol. 6056. p. 177-192

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

41 Citations (Scopus)

Guessing Attacks and the Computational Soundness of Static Equivalence

Baudet, M., Warinschi, B. & Abadi, M., 2010, In : Journal of Computer Security. 18, 5, p. 909-968 60 p.

Research output: Contribution to journalArticle (Academic Journal)

6 Citations (Scopus)

Hardware Implementations of the Round-Two SHA-3 Candidates: Comparison on a Common Ground

Tillich, S., Feldhofer, M., Kirschbaum, M., Plos, T., Schmidt, J-M. & Szekely, A., 2010, Proceedings of Austrochip 2010. Fachhochschule Kärnten, Vol. -. p. 43 - 48 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Hardware Trojans for Inducing or Amplifying Side-Channel Leakage of Cryptographic Software

Gallais, J-F., Großschädl, J., Hanley, N., Kasper, M., Medwed, M., Regazzoni, F., Schmidt, J-M., Tillich, S. & Wojcik, M., 2010, Trusted Systems - INTRUST 2010. Springer Berlin Heidelberg, Vol. 6802. p. 253 - 270 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

10 Citations (Scopus)

Improved Fault Analysis of Signature Schemes

Giraud, C., Knudsen, E. W. & Tunstall, M., 2010, Smart Card Research and Advanced Application - CARDIS 2010. Springer Berlin Heidelberg, Vol. 6035. p. 164-181

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

4 Citations (Scopus)

Information Security Management and Standards of Best Practice

Tryfonas, T., 2010, Handbook of Electronic Security and Digital Forensics. Jahankhani, H., Watson, D. L., Me, G. & Leonhardt, F. (eds.). World Scientific Publishing Co., Vol. -. p. 207 - 236

Research output: Chapter in Book/Report/Conference proceedingChapter in a book

Leakage Resilient Cryptography in Practice

Standaert, F-X., Pereira, O., Yu, Y., Quisquater, J-J., Yung, M. & Oswald, E., 2010, Towards Hardware-Intrinsic Security. Springer, p. 105-139

Research output: Chapter in Book/Report/Conference proceedingChapter in a book

52 Citations (Scopus)

New Results on Instruction Cache Attacks

Aciicmez, O., Brumley, B. B. & Grabher, P., 2010, Cryptographic Hardware and Embedded Systems - CHES 2010. Springer Berlin Heidelberg, Vol. 6225. p. 110-124

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

78 Citations (Scopus)

Obfuscation for Cryptographic Purposes

Hofheinz, D., Malone-Lee, J. & Stam, M., 2010, In : Journal of Cryptology. 23, p. 121-168

Research output: Contribution to journalArticle (Academic Journal)

22 Citations (Scopus)

On the design and implementation of an efficient DAA scheme

Chen, L., Page, D. & Smart, N., 2010, Smart Card Research and Advanced Application Conference - CARDIS 2010. Springer Berlin Heidelberg, Vol. 6035. p. 223-237 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

57 Citations (Scopus)

Robustness Guarantees for Anonymity

Barthe, G., Hevia, A., Luo, Z., Rezk, T. & Warinschi, B., 2010, IEEE Computer Security Foundations Symposium - CSF 2010. IEEE Computer Society, Vol. -. p. 91-106

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

3 Citations (Scopus)

SCA-Resistant Embedded Processors - The Next Generation

Tillich, S., Kirschbaum, M. & Szekely, A., 2010, Computer Security Applications Conference - ACSAC 2010. Association for Computing Machinery (ACM), Vol. -. p. 211-220 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

5 Citations (Scopus)

Secure Multiparty AES

Damgård, I. & Keller, M., 2010, Financial Cryptography and Data Security - FC 2010. Sion, R. (ed.). Springer Berlin Heidelberg, Vol. 6052. p. 367-374 8 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

24 Citations (Scopus)

Security of the TCG Privacy-CA Solution

Chen, L. & Warinschi, B., 2010, Embedded and Ubiquitous Computing - EUC 2010. IEEE Computer Society, Vol. -. p. 609-616 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

13 Citations (Scopus)

Smart Cards

Markantonakis, K., Mayes, K., Sauveron, D. & Tunstall, M., 2010, Handbook of Technology Management. Wiley, Vol. 2. p. 248-264

Research output: Chapter in Book/Report/Conference proceedingChapter in a book

The Fiat–Shamir Transform for Group and Ring Signature Schemes

Lee, M-F., Smart, N. & Warinschi, B., 2010, Security and Cryptography for Networks - SCN 2010. Springer Berlin Heidelberg, Vol. 6280. p. 363-380

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

2 Citations (Scopus)

The TLS Handshake Protocol: A Modular Analysis

Morrissey, P., Smart, N. & Warinschi, B., Apr 2010, In : Journal of Cryptology. 23, 2, p. 187-223 37 p.

Research output: Contribution to journalArticle (Academic Journal)

18 Citations (Scopus)

The World Is Not Enough: Another Look on Second-Order DPA

François-Xavier, S., Nicolas, V-C., Oswald, E., Benedikt, G., Marcel, M., Markus, K. & Stefan, M., 2010, Advances in Cryptology - ASIACRYPT 2010. Springer Berlin Heidelberg, Vol. 6477. p. 112-129 17 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

106 Citations (Scopus)

Uniform Evaluation of Hardware Implementations of the Round-Two SHA-3 Candidates

Tillich, S., Feldhofer, M., Kirschbaum, M., Plos, T., Schmidt, J-M. & Szekely, A., 2010, The Second SHA-3 Candidate Conference. NIST, Vol. -. p. -

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Using compilers to enhance cryptographic product development

Bangerter, E., Barbosa, M., Bernstein, D. J., Damgard, I., Page, D., Pagter, J. I., Sadeghi, A-R. & Sovio, S., 2010, Information Security Solutions Europe - ISSE 2010. Vieweg+Teubner, p. 291-301

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

2009

A face centered cubic key agreement mechanism for mobile ad hoc networks

Askoxylakis, IG., Markantonakis, K., Tryfonas, T., May, J. H. R. & Traganitis, A., 2009, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering: Mobile Lightweight Wireless Systems - ICST Mobilight 2009. Springer, Vol. 13. p. 103 - 113

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

6 Citations (Scopus)

A lightweight web-based vulnerability scanner for small-scale computer network security assessment

Davies, P. & Tryfonas, T., 2009, In : Journal of Network and Computer Applications. 32, 1, p. 78 - 95

Research output: Contribution to journalArticle (Academic Journal)

6 Citations (Scopus)