Research Output

2009

Audit Log Unification and Review with Log Management Information Bases

To, WM., Tryfonas, T. & Farthing, DW., 2009, Frontiers in Artificial Intelligence and Applications: Databases and Information Systems V. Haav, H. & Kalja, A. (eds.). IOS Press, Vol. 187. p. 180 - 191

Research output: Chapter in Book/Report/Conference proceedingChapter in a book

1 Citation (Scopus)

Certified Encryption Revisited

Farshim, P. & Warinschi, B., 2009, Progress in Cryptology - AFRICACRYPT 2009. Springer Berlin Heidelberg, Vol. 5580. p. 179-197

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

4 Citations (Scopus)

Constructive and destructive use of compilers in elliptic curve cryptography

Barbosa, M. B. M., Moss, A. D. & Page, D., Apr 2009, In : Journal of Cryptology. 22, 2, p. 259-281 23 p.

Research output: Contribution to journalArticle (Academic Journal)

6 Citations (Scopus)

Distinguishing Multiplications from Squaring Operations

Amiel, F., Feix, B., Tunstall, M., Whelan, C. & Marnane, W. P., 2009, Selected Areas in Cryptography – SAC 2008. Springer Berlin Heidelberg, Vol. 5381. p. 346-360

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Distributing the Key Distribution Centre in Sakai–Kasahara Based Systems

Geissler, M. & Smart, N., 2009, Coding and Cryptography - IMACC 2009. Springer Berlin Heidelberg, Vol. 5921. p. 252-262

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

9 Citations (Scopus)

Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks

Lederer, C., Mader, R., Koschuch, M., Großschädl, J., Szekely, A. & Tillich, S., 2009, Information Security Theory and Practices --- WISTP 2009. Springer Berlin Heidelberg, Vol. 5746. p. 112-127

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

41 Citations (Scopus)

Exponent recoding and regular exponentiation algorithms

Joye, M. & Tunstall, M., 2009, Progress in Cryptology - AfricaCrypt 2009. Springer Berlin Heidelberg, Vol. 5580. p. 334-349

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

42 Citations (Scopus)

Foundations of Non-Malleable Hash and One-Way Functions

Boldyreva, A., Cash, D., Fischlin, M. & Warinschi, B., 2009, Advances in Cryptology - ASIACRYPT 2009. Springer Berlin Heidelberg, Vol. 5912. p. 524-541

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

25 Citations (Scopus)

Hardware/software co-design of public-key cryptography for SSL protocol execution in embedded systems

Koschuch, M., Groszschaedl, J., Page, D., Grabher, P., Hudler, M. & Kruger, M., 2009, Information and Communication Systems - ICICS 2009. Springer Berlin Heidelberg, Vol. 5927. p. 63-79

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

2 Citations (Scopus)

Hash Function Requirements for Schnorr Signatures

Neven, G., Smart, N. & Warinschi, B., 2009, In : Journal of Mathematical Cryptology. 3(1), p. 69-87

Research output: Contribution to journalArticle (Academic Journal)

23 Citations (Scopus)

Identity Based Group Signatures from Hierarchical Identity Based Encryption

Smart, N. & Warinschi, B., 2009, Pairings 2009. Springer Berlin Heidelberg, Vol. 5671. p. 150-170

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

10 Citations (Scopus)

Isolated WDDL: A Hiding Countermeasure for Differential Power Analysis on FPGAs

McEvoy, R. P., Murphy, C. C., Marnane, W. P. & Tunstall, M., 2009, In : ACM Transactions on Reconfigurable Technology and Systems. 2(1), p. 1-23

Research output: Contribution to journalArticle (Academic Journal)

29 Citations (Scopus)

Non-deterministic processors: FPGA-based analysis of area, performance and security

Grabher, P., Groszschaedl, J. & Page, D., 2009, Workshop on Embedded Systems Security - WESS. Association for Computing Machinery (ACM), p. 1--10

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

15 Citations (Scopus)

Practical Zero-Knowledge Proofs for Circuit Evaluation

Ghadafi, E., Smart, N. & Warinschi, B., 2009, Coding and Cryptography - IMACC 2009. Springer Berlin Heidelberg, Vol. 5921. p. 469-494

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

3 Citations (Scopus)

Program interpolation

Moss, A. & Page, D., 2009, Partial Evaluation and Program Manipulation - PEPM. Association for Computing Machinery (ACM), p. 31-40

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Random Order m-ary Exponentiation

Tunstall, M., 2009, Australasian Conference on Information Security and Privacy – ACISP 2009. Springer Berlin Heidelberg, Vol. 5594. p. 437-451

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

1 Citation (Scopus)

Secure Two-Party Computation Is Practical

Pinkas, B., Schneider, T., Smart, N. & Williams, S., 2009, Advances in Cryptology -- ASIACRYPT 2009. Springer Berlin Heidelberg, Vol. 5912. p. 250-267

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

225 Citations (Scopus)

Security Notions and Generic Constructions for Client Puzzles

Chen, L., Morrissey, P., Smart, N. & Warinschi, B., 2009, Advances in Cryptology - Asiacrypt 2009. Springer Berlin Heidelberg, Vol. 5912. p. 505-523

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

26 Citations (Scopus)

Separating Trace Mapping and Reactive Simulatability Soundness: The Case of Adaptive Corruption

Mazaré, L. & Warinschi, B., 2009, ARSPA-WITS. Springer Berlin Heidelberg, Vol. 5511. p. 193-210 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

3 Citations (Scopus)

Side channel analysis of cryptographic software via early-terminating multiplications

Groszschaedl, J., Oswald, E., Page, D. & Tunstall, M., 2009, International Conference on Information Security and Cryptology - ICISC 2009. Springer Berlin Heidelberg, Vol. 5984. p. 176-192

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Smart Card Security - Theory and Practice

Markantonakis, K., Tunstall, M., Hancke, G., Askoxylakis, I. & Mayes, K., 2009, In : Information Security Technical Report. 14, 2, p. 46-56

Research output: Contribution to journalArticle (Academic Journal)

Unknown Plaintext Template Attacks

Hanley, N., Tunstall, M. & Marnane, W. P., 2009, Workshop on Information Security Applications – WISA 2009. Springer Berlin Heidelberg, Vol. 5932. p. 148-162

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

17 Citations (Scopus)

Using Penetration Testing Feedback to Cultivate an Atmosphere of Proactive Security amongst End-users

Styles, S. & Tryfonas, T., 2009, In : Information Management and Computer Security. 17, 1, p. 44 - 52

Research output: Contribution to journalArticle (Academic Journal)

6 Citations (Scopus)
2008

A body-centered cubic method for key agreement in dynamic mobile ad hock networks

Askoxylakis, I., Sauveron, D., Markantonakis, K., Tryfonas, T. & Traganitis, A., 2008, Emerging Security Information, Systems and Technologies - SECUREWARE 2008. Institute of Electrical and Electronics Engineers (IEEE), Vol. -. p. 193 - 202

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

A collaborative distributed virtual platform for forensic analysis of malicious code

Shand, L. & Tryfonas, T., 2008, Information Security South Africa - ISSA 2008. Innovative Minds, Vol. -. p. 115 - 132

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Acquiring Volatile Operating System Data Tools and Techniques

Sutherland, I., Evans, J., Tryfonas, T. & Blyth, A., 2008, In : Operating Systems Review. 42, 3, p. 65 - 73

Research output: Contribution to journalArticle (Academic Journal)

24 Citations (Scopus)

Advances in Cryptology - EUROCRYPT 2008

Smart, N., 2008, Springer. (Lecture Notes in Computer Science; vol. 4965)

Research output: Book/ReportEdited book

A Modular Security Analysis of the TLS Handshake Protocol

Morrissey, P., Smart, N. & Warinschi, B., 2008, Advances in Cryptology - Asiacrypt 2008. Springer Berlin Heidelberg, Vol. 5350. p. 55-73

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

38 Citations (Scopus)

Area, Delay, and Power Characteristics of Standard-Cell Implementations of the AES S-Box

Tillich, S., Feldhofer, M., Popp, T. & Großschädl, J., 2008, In : Journal of Signal Processing Systems. 50(2), p. 251-261

Research output: Contribution to journalArticle (Academic Journal)

25 Citations (Scopus)

Certificateless signcryption

Barbosa, M. B. M. & Farshim, P., 2008, ACM Symposium on Information, Computer and Communications Security - ASIACCS . Association for Computing Machinery (ACM), p. 369-372

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Composable security in the bounded quantum storage model

Wehner, S. & Wullschleger, J., 2008, Automata, Languages and Programming - ICALP 2008. Springer Berlin Heidelberg, Vol. 5126. p. 604-615

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

11 Citations (Scopus)

Enhancing an Embedded Processor Core with a Cryptographic Unit for Performance and Security

Kocabas, Ö., Savas, E. & Großschädl, J., 2008, Reconfigurable Computing and FPGAs - ReConFig 2008. IEEE Computer Society, p. 409-414

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Error-tolerant combiners for oblivious primitives

Przydatek, B. & Wullschleger, J., 2008, Automata, Languages and Programming - ICALP 2008. Springer Berlin Heidelberg, Vol. 5126. p. 461-472

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

6 Citations (Scopus)

Fault injection platform for block ciphers

Baldwin, B., Popovici, E., Tunstall, M. & Marnane, W., 2008, IET Irish Signals and Systems Conference - ISSC 2008. Institution of Engineering and Technology (IET), p. 10–15

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Generic Constructions of Identity-Based and Certificateless KEMs

Bentahar, K., Farshim, P., Malone-Lee, J. & Smart, N., Apr 2008, In : Journal of Cryptology. 21(2), p. 178-199 22 p.

Research output: Contribution to journalArticle (Academic Journal)

77 Citations (Scopus)

Global positioning systems: Analysis principles and sources of evidence in user devices

Jones, D., Sutherland, I. & Tryfonas, T., 2008, Digital Forensics and Incident Analysis - WDFIA 2008. Institute of Electrical and Electronics Engineers (IEEE), Vol. -. p. 33 - 39

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

1 Citation (Scopus)

Implementation attacks, countermeasures & performance evaluation

Whelan, C., Byrne, A., Page, D., Vercauteren, F. R. G., Scott, M. & Marnane, W., 2008, Identity- Based Cryptography. IOS Press, p. 226-243

Research output: Chapter in Book/Report/Conference proceedingChapter in a book

Implementing two-party computation efficiently with security against malicious adversaries

Lindell, Y., Pinkas, B. & Smart, N., 2008, Security and Cryptography for Networks - SCN 2008. Springer Berlin Heidelberg, Vol. 5229. p. 2-20

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

72 Citations (Scopus)

Light-weight instruction set extensions for bit-sliced cryptography

Grabher, P., Groszschaedl, J. & Page, D., 2008, Cryptographic Hardware and Embedded Systems - CHES 2008. Springer Berlin Heidelberg, Vol. 5154. p. 331-345

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

31 Citations (Scopus)

New monotones and lower bounds in unconditional two-party computation

Wolf, S. & Wullschleger, J. E., 2008, In : IEEE Transactions on Information Theory. 54, p. 2792-2795

Research output: Contribution to journalArticle (Academic Journal)

22 Citations (Scopus)

On Proofs of Security for DAA Schemes

Chen, L., Morrissey, P. & Smart, N., 2008, Provable Security - PROVSEC 2008. Springer Berlin Heidelberg, Vol. 5324. p. 167-175

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

16 Citations (Scopus)

On software parallel implementation of cryptographic pairings

Grabher, P., Groszschaedl, J. & Page, D., 2008, Selected Areas in Cryptography - SAC 2008. Springer Berlin Heidelberg, Vol. 5381. p. 34-49

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

28 Citations (Scopus)

Pairings for Cryptographers

Galbraith, S., Paterson, K. & Smart, N., 2008, In : Discrete Applied Mathematics. 156, p. 3113-3121

Research output: Contribution to journalArticle (Academic Journal)

368 Citations (Scopus)

Pairings in Trusted Computing

Chen, L., Morrissey, P. & Smart, N., 2008, Pairings 2008. Springer Berlin Heidelberg, Vol. 5209. p. 1-17

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

62 Citations (Scopus)

Randomised representations

Oswald, E., Page, D. & Smart, N., 2008, In : IET Information Security. 2, 2, p. 19-27

Research output: Contribution to journalArticle (Academic Journal)

Reassessing the TCG specifications for trusted computing in mobile and embedded systems

Groszschaedl, J., Tobias, V. & Page, D., 2008, Hardware-Oriented Security and Trust - HOST 2008. Institute of Electrical and Electronics Engineers (IEEE), p. 84-90

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

12 Citations (Scopus)

Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions

Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Malone-Lee, J., Neven, G., Paillier, P. & Shi, H., 2008, In : Journal of Cryptology. 21, 3, p. 350-391 42 p.

Research output: Contribution to journalArticle (Academic Journal)

Security Analysis of Cryptographically Controlled Access to XML Documents

Abadi, M. & Warinschi, B., 2008, In : Journal of the ACM. 55, 2, p. 108-117 10 p.

Research output: Contribution to journalArticle (Academic Journal)

15 Citations (Scopus)

Security patterns for automated continuous auditing

Kearney, B. & Tryfonas, T., 2008, In : Information Security Journal: A Global Perspective. 17, 1, p. 13 - 25

Research output: Contribution to journalArticle (Academic Journal)

2 Citations (Scopus)

Side channel analysis of an automotive microprocessor: I

Hamilton, M., Tunstall, M., Popovici, E. & William P., M., 2008, IET Irish Signals and Systems Conference - ISSC 2008. Institution of Engineering and Technology (IET), p. 4-9

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

1 Citation (Scopus)