Research Output

2008

Standardising business application security assessments with pattern-driven audit automations

Tryfonas, T. & Kearney, B., 2008, In : Computer Standards and Interfaces. 30, 4, p. 262 - 270

Research output: Contribution to journalArticle (Academic Journal)

7 Citations (Scopus)

Statistical security conditions for two-party secure function evaluation

Crepeau, C. & Wullschleger, J. E., 2008, Information Theoretic Security - ICITS 2008. Springer Berlin Heidelberg, Vol. 5155. p. 86-99

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

11 Citations (Scopus)

Template Attacks on ECDSA

Oswald, E. & Marcel, M., 2008, Information Security Applications - WISA 2008. Springer Berlin Heidelberg, Vol. 5379. p. 14-27

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks

Koschuch, M., Großschädl, J., Payer, U., Hudler, M. & Krüger, M., 2008, Cryptology and Network Security --- CANS 2008. Springer Berlin Heidelberg, Vol. 5339. p. 349-365

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

4 Citations (Scopus)
2007

A Closer Look at PKI: Security and Efficiency

Boldyreva, A., Fischlin, M., Palacio, A. & Warinschi, B., 2007, Public Key Cryptography - PKC 2007. Springer Berlin Heidelberg, Vol. 4450. p. 458-475

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

28 Citations (Scopus)

A Cryptographic Model for Branching Time Security Properties - The Case of Contract Signing Protocols

Cortier, V., Kuesters, R. & Warinschi, B., 2007, European Symposium On Research In Computer Security - ESORICS 2007. Springer Berlin Heidelberg, Vol. 4734. p. 422-437

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

8 Citations (Scopus)

A Generalization of DDH with Applications to Protocol Analysis and Computational Soundness

Bresson, E., Lakhnech, Y., Mazare, L. & Warinschi, B., 2007, Advances in Cryptology - CRYPTO 2007. Springer Berlin Heidelberg, Vol. 4622. p. 482-499

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

33 Citations (Scopus)

A multidimensional continued fraction based on a high-order recurrence relation

Tourigny, YJM. & Smart, NP., May 2007, In : Mathematics of Computation. 76 (260), p. 1995 - 2022 28 p.

Research output: Contribution to journalArticle (Academic Journal)

Ate Pairing on Hyperelliptic Curves

Granger, R., Hess, F., Oyono, R., Theriault, N. & Vercauteren, F., 2007, Advances in Cryptology - EUROCRYPT 2007. Springer Berlin Heidelberg, Vol. 4515. p. 430-447

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

39 Citations (Scopus)

Compiler assisted elliptic curve cryptography

Barbosa, M. B. M., Moss, A. D. & Page, D., 2007, Information Security - IS 2007. Springer Berlin Heidelberg, Vol. 4804. p. 1785-1802

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

5 Citations (Scopus)

Cryptographic side-channels from low-power cache memory

Grabher, P., Groszschaedl, J. & Page, D., 2007, Cryptography and Coding - IMACC 2007. Springer Berlin Heidelberg, Vol. 4887. p. 170-184

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

10 Citations (Scopus)

Efficient 15,360-bit RSA Using Woop-Optimised Montgomery Arithmetic

Bentahar, K. & Smart, N., 2007, Cryptography and Coding - IMACC 2007. Springer Berlin Heidelberg, Vol. 4887. p. 346-363

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

1 Citation (Scopus)

Efficient KEMs with partial message recovery

Bjorstad, T., Dent, A. & Smart, N., 2007, Cryptography and Coding - IMACC 2007. Springer Berlin Heidelberg, Vol. 4887. p. 233-256

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

6 Citations (Scopus)

Explicit Randomness is not Necessary when Modeling Probabilistic Encryption

Cortier, V., Hordegen, H. & Warinschi, B., 2007, In : Electronic Notes in Theoretical Computer Science. 186, p. 49-65

Research output: Contribution to journalArticle (Academic Journal)

4 Citations (Scopus)

Identity-based key agreement protocols from pairings

L., C., Z., C. & Smart, N., 2007, In : International Journal of Information Security. 6, p. 213-241

Research output: Contribution to journalArticle (Academic Journal)

304 Citations (Scopus)

Identity-based traitor tracing

Abdalla, M., Dent, A., Malone-Lee, J., Neven, G., D.H., P. & Smart, N., 2007, Public Key Cryptography - PKC 2007. Springer Berlin Heidelberg, Vol. 4450. p. 361-367

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

27 Citations (Scopus)

Instruction set extensions for pairing-based cryptography

Vejda, T., Page, D. & Groszschaedl, J., 2007, Pairing-Based Cryptography --- PAIRING 2007. Springer Berlin Heidelberg, Vol. 4575. p. 208-224

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

11 Citations (Scopus)

Non-deterministic multi-threading

Leadbitter, P., Page, D. & Smart, N., 2007, In : IEEE Transactions on Computers. 56, 7, p. 992-998

Research output: Contribution to journalArticle (Academic Journal)

Obfuscation for cryptographic purposes

Hofheinz, D., Malone-Lee, J. & Stam, M., 2007, Theory of Cryptography Conference - TCC 2007. Springer Berlin Heidelberg, Vol. 4392. p. 214-232

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

37 Citations (Scopus)

On computable isomorphisms in efficient asymmetric pairing-based systems

Smart, N. & Vercauteren, F., 2007, In : Discrete Applied Mathematics. 155(4), p. 538-547

Research output: Contribution to journalArticle (Academic Journal)

27 Citations (Scopus)

Power Analysis Attacks: Revealing the Secrets of Smart Cards

Mangard, S., Oswald, ME. & Popp, T., 2007, Springer. 337 p.

Research output: Book/ReportAuthored book

1217 Citations (Scopus)

Power analysis attacks and countermeasures

T., P., S., M. & Oswald, E., 2007, In : IEEE Design and Test of Computers. 24(6), p. 535-543

Research output: Contribution to journalArticle (Academic Journal)

49 Citations (Scopus)

Power Analysis Resistant AES Implementation with Instruction Set Extensions

Tillich, S. & Großschädl, J., 2007, Cryptographic Hardware and Embedded Systems --- CHES 2007. Springer Berlin Heidelberg, Vol. 4727. p. 303-319

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

16 Citations (Scopus)

Randomness Reuse: Improvements and Extensions

Barbosa, M. B. M. & Farshim, P., 2007, Cryptography and Coding - IMACC 2007. Springer Berlin Heidelberg, Vol. 4887. p. 261-280

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Synthesizing Secure Protocols

Cortier, V., Warinschi, B. & Zalinescu, E., 2007, European Symposium On Research In Computer Security - ESORICS 2007. Springer Berlin Heidelberg, Vol. 4734. p. 406-421

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

11 Citations (Scopus)

Template Attacks on Masking --- Resistance is Futile

Oswald, ME. & Mangard, S., 2007, Topics in Cryptology - CTRSA 2007. Abe, M. (ed.). Springer Berlin Heidelberg, Vol. 4377. p. 243 - 256

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

68 Citations (Scopus)

Toward acceleration of RSA using 3D Graphics hardware

Moss, A., Page, D. & Smart, N., 2007, Cryptography and Coding - IMACC 2007. Springer Berlin Heidelberg, Vol. 4887. p. 369-388

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

32 Citations (Scopus)
2006

A comparison of MNT curves and supersingular curves

Page, D., Smart, N. & Vercauteren, F. R. G., 2006, In : Applicable Algebra in Engineering, Communication and Computing. 17, 5, p. 379-392

Research output: Contribution to journalArticle (Academic Journal)

35 Citations (Scopus)

A fault attack on pairing-based cryptography

Page, DS. & Vercauteren, F. R. G., 2006, In : IEEE Transactions on Computers. 55, 9, p. 1075-1080 6 p.

Research output: Contribution to journalArticle (Academic Journal)

52 Citations (Scopus)

An Extension of Kedlaya's Algorithm to Hyperelliptic Curves in Characteristic 2

J., D. & Vercauteren, F. R. G., 2006, In : Journal of Cryptology. 19, 1, p. 1-25 25 p., 1-26.

Research output: Contribution to journalArticle (Academic Journal)

18 Citations (Scopus)

Counting points on C$_ab$ curves using Monsky-Washnitzer cohomology

Denef, J. & Vercauteren, F., 2006, In : Finite Fields and Their Applications. 12, 1, p. 78-102 25 p.

Research output: Contribution to journalArticle (Academic Journal)

Discrete logarithm variants of VSH

Lenstra, A., Page, D. & Stam, M., 2006, Vietcrypt. Springer Berlin Heidelberg, Vol. 4341. p. 229-242

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

4 Citations (Scopus)

Efficient ID-KEM based on the Sakai-Kasahara key construction

Chen, L., Cheng, Z., Malone-Lee, J. & Smart, NP., Mar 2006, In : IEE Proceedings: Information Security. 153 (1), p. 19 - 26 8 p.

Research output: Contribution to journalArticle (Academic Journal)

34 Citations (Scopus)

Elliptic curve cryptography

Smart, N., 2006, Handbook of Information Security. Wiley, Vol. 2. p. ???-???

Research output: Chapter in Book/Report/Conference proceedingChapter in a book

Escrow free encryption supporting cryptographic workflow

Al-Riyami, S., Malone-Lee, J. & Smart, N., 2006, In : International Journal of Information Security. 5(4), p. 217-230

Research output: Contribution to journalArticle (Academic Journal)

23 Citations (Scopus)

High security pairing-based cryptography revisited

Granger, R., Page, D. & Smart, N. P., 2006, Algorithmic Number Theory Symposium - ANTS VII. Springer Berlin Heidelberg, Vol. 4076. p. 480-494

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

42 Citations (Scopus)

Identity-based encryption gone wild

Abdalla, M., Catalano, D., Dent, A., John, M-L. & Smart, N., 2006, Automata, Languages and Programming - ICALP 2006. Springer Berlin Heidelberg, Vol. 4052. p. 300-311

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

77 Citations (Scopus)

LASH

Bentahar, K., Page, D., Saarinen, M-J. O., Silverman, J. H. & Smart, N., 2006, NIST: The Second Cryptographic Hash Workshop. Online, p. -

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

List signature schemes

Canard, S., Schoenmakers, B., Stam, M. & Traoré, J., Feb 2006, In : Discrete Applied Mathematics. 154 (2), p. 189 - 201 12 p.

Research output: Contribution to journalArticle (Academic Journal)

18 Citations (Scopus)

On small characteristic algebraic tori in pairing based cryptography

Granger, R., Page, D. & Stam, M., 2006, In : LMS Journal of Computation and Mathematics. 9, p. 64-85

Research output: Contribution to journalArticle (Academic Journal)

Secure Cryptographic Workflow in the Standard Model

Barbosa, M. & Farshim, P., 2006, Progress in Cryptology - INDOCRYPT 2006. Springer Berlin Heidelberg, Vol. 4329. p. 379-393

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

14 Citations (Scopus)

The Eta pairing revisited

Hess, FK., Smart, NP. & Vercauteren, FRG., Oct 2006, In : IEEE Transactions on Information Theory. 52 (10), p. 4595 - 4602 8 p.

Research output: Contribution to journalArticle (Academic Journal)

279 Citations (Scopus)

The number field sieve in the medium prime case

Joux, A., Lercier, R., Smart, N. & Vercauteren, F., 2006, Advances in Cryptology - CRYPTO 2006. Springer Berlin Heidelberg, Vol. 4117. p. 326 - 344 19 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

52 Citations (Scopus)
2005

A Key Encapsulation Mechanism for NTRU

Stam, M., Dec 2005, Cryptography and Coding - IMACC 2005. Springer Berlin Heidelberg, Vol. 3796. p. 410 - 427 17 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

4 Citations (Scopus)

An algebraic approach to NTRU (q = 2^n) via Witt vectors and overdetermined systems of nonlinear equations.

Smart, N., Vercauteren, F. & Silverman, J., Jan 2005, Security and Cryptography for Networks - SCN 2006. Springer Berlin Heidelberg, Vol. 3352. p. 278 - 298 20 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

An information theoretic model for quantum secret sharing schemes

Mueller-Quade, J., Nascimento, A., Winter, A., Tuyls, P. & Imai, H., 2005, In : Quantum Inf. Comput. 5, p. 69-80

Research output: Contribution to journalArticle (Academic Journal)

Black-Box Secret Sharing from Primitive Sets in Number Fields

Cramer, R., Fehr, S. & Stam, M., Aug 2005, Advances in Cryptology - CRYPTO 2005. Springer Berlin Heidelberg, Vol. 3621. p. 344 - 360 16 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Efficient Identity-Based Key Encapsulation to Multiple Parties

Barbosa, M. & Farshim, P., 2005, Coding and Cryptography - IMACC 2005. Springer, Vol. 3796. p. 428-441 14 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

32 Citations (Scopus)

Efficient key encapsulation to multiple parties

Smart, NP., Jan 2005, Security and Cryptography for Networks - SCN 2006. Springer Berlin Heidelberg, Vol. 3352. p. 208 - 219 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

26 Citations (Scopus)

Further Hidden Markov Model Cryptanalysis

Green, P. J., Noad, R. & Smart, N. P., 2005, Cryptographic Hardware and Embedded Systems - CHES 2005. Rao, J. R. & Sunar, B. (eds.). Springer Berlin Heidelberg, Vol. 3659. p. 61-74 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

7 Citations (Scopus)