Research Output

2005

Hardware acceleration of the Tate pairing in characteristic three

Grabher, P. & Page, D., 2005, Cryptographic Hardware and Embedded Systems - CHES 2005. Springer Berlin Heidelberg, Vol. 3659. p. 398-411

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

26 Citations (Scopus)

Hardware and software normal basis arithmetic for pairing-based cryptography in characteristic three

Granger, R., Page, D. & Stam, M., 2005, In : IEEE Transactions on Computers. 54, 7, p. 852-860

Research output: Contribution to journalArticle (Academic Journal)

48 Citations (Scopus)

Hash Based Digital Signature Schemes.

Dods, C., Smart, N. & Stam, M., Nov 2005, Cryptography and Coding - IMACC 2005. Springer Berlin Heidelberg, Vol. 3796. p. 96 - 115 19 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

46 Citations (Scopus)

On the automatic construction of indistinguishable operations

Barbosa, M. B. M. & Page, D., 2005, Cryptography And Coding - IMACC 2005. Springer Berlin Heidelberg, Vol. 3796. p. 233-247

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

8 Citations (Scopus)

On the linear complexity and multidimensional distribution of congruential generators over elliptic curves

Hess, F. K. & Shparlinksi, I., 2005, In : Designs, Codes and Cryptography. 35, 1, p. 111-117 7 p., 111-117.

Research output: Contribution to journalArticle (Academic Journal)

28 Citations (Scopus)

Password-based Encryption Analyzed

Abadi, M. & Warinschi, B., 2005, Internation Colloqium on Automata, Languages and Programming - ICALP 2005. Springer Berlin Heidelberg, Vol. 3580. p. 664-676

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

17 Citations (Scopus)

Practical cryptography in high dimensional tori

van Dijk, M., Granger, R., Page, D., Rubin, K., Silverberg, A., Stam, M. & Woodruff, D., 2005, Advances in Cryptology - EUROCRYPT 2005. Springer Berlin Heidelberg, Vol. 3494. p. 234-250

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

19 Citations (Scopus)

Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions

Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Malone-Lee, J., Neven, G., Paillier, P. & Shi, H., 2005, Advances in Cryptology - CRYPTO 2005. Springer, Vol. 3621. p. 205-222 18 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Secure Computation of the Mean and Related Statistics

Kiltz, E., Leander, G. & Malone-Lee, J., 2005, Theory of Cryptography Conference - TCC 2005. Springer, Vol. 3378. p. 283-302 20 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

38 Citations (Scopus)

Signcryption with Non-Interactive Non-Repudiation

Malone-Lee, J., 2005, In : Designs, Codes and Cryptography. 37, 1, p. 81-109

Research output: Contribution to journalArticle (Academic Journal)

The Physically Observable Security of Signature Schemes

Malone-Lee, J. C. & Dent, AW., Nov 2005, Coding and Cryptography - IMACC 2005. Springer, Vol. 3796. p. 220-232 13 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

3 Citations (Scopus)
2004

A comparison of CEILIDH and XTR

Granger, R., Page, D. & Stam, M., 2004, Algorithmic Number Theory Symposium - ANTS-VI. Springer Berlin Heidelberg, Vol. 3076. p. 235-249

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

26 Citations (Scopus)

Advances in Elliptic Curve Cryptography

Blake, I., Seroussi, G. & Smart, N., 2004, Cambridge University Press. (London Math Society Lecture Note Series)

Research output: Book/ReportEdited book

A note on the Tate pairing of curves over finite fields

Hess, F. K., 2004, In : Archiv der Mathematik. 82, p. 28-32 28-32.

Research output: Contribution to journalArticle (Academic Journal)

13 Citations (Scopus)

Attacking DSA under a repeated bits assumption

Leadbitter, P. J., Page, D. & Smart, N. P., 2004, Cryptographic Hardware and Embedded Systems - CHES 2004. Springer Berlin Heidelberg, Vol. 3156. p. 428-440

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

10 Citations (Scopus)

Function field sieve in characteristic three

Granger, R., Holt, A. J., Page, D., Smart, N. P. & Vercauteren, F. R. G., 2004, Algorithmic Number Theory Symposium - ANTS-VI. Springer Berlin Heidelberg, Vol. 3076. p. 223-234

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

10 Citations (Scopus)

Generalising the GHS attack on the elliptic curve discrete logarithm problem

Hess, F. K., 2004, In : LMS Journal of Computation and Mathematics. 7, p. 167-192

Research output: Contribution to journalArticle (Academic Journal)

Information theoretic secure oblivious polynomial evaluation: Model, bounds and constructions

Mueller-Quade, J., Otsuka, A., Hanaoka, G., Imai, H., Nascimento, A. & Andreas, W., 2004, Information Security and Privacy - ACIPS 2004. Springer Berlin Heidelberg, Vol. 3108. p. 62-73

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

On the security of the verifiably-encrypted signature scheme of Boneh, Gentry, Lynn and Shacham

Hess, F., 2004, In : Information Processing Letters. 89, 3, p. 111-114 4 p., 111-114.

Research output: Contribution to journalArticle (Academic Journal)

13 Citations (Scopus)

On XTR and side-channel analysis

Page, D. & Stam, M., 2004, Selected Areas in Cryptography - SAC 2004. Springer Berlin Heidelberg, Vol. 3357. p. 54-68

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Parallel cryptographic arithmetic using a redundant Montgomery representation

Page, D. & Smart, N. P., 2004, In : IEEE Transactions on Computers. 53, 11, p. 1474-1482

Research output: Contribution to journalArticle (Academic Journal)

22 Citations (Scopus)

Projective Coordinates Leak

Naccache, D., Smart, NP. & Stern, J., May 2004, Advances in Cryptology - EUROCRYPT 2004. Springer Berlin Heidelberg, Vol. 3027. p. 257 - 267 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

29 Citations (Scopus)

Security of signature schemes in a multi-user setting

Smart, NP. & Menezes, A., Aug 2004, In : Designs, Codes and Cryptography. 33, p. 261 - 274 13 p.

Research output: Contribution to journalArticle (Academic Journal)

56 Citations (Scopus)

The equivalence between the DHP and DLP for elliptic curves used in practical applications

Smart, NP., Vercauteren, F. & Muzereau, A., Mar 2004, In : LMS Journal of Computation and Mathematics. 7, p. 50 - 72 22 p.

Research output: Contribution to journalArticle (Academic Journal)

2003

Access control using pairing based cryptography

Smart, NP., Apr 2003, Topics in Cryptology - CT-RSA 2003. Springer Berlin Heidelberg, Vol. 2612. p. 111 - 121 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

51 Citations (Scopus)

A General Construction of IND-CCA2 Secure Public Key Encryption

Kiltz, E. & Malone-Lee, J. C., Dec 2003, Cryptography and Coding - IMACC 2003. Springer, Vol. 2898. p. 152 - 166 14 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

13 Citations (Scopus)

Analysis of the insecurity of ECMQV with partially known nonces

Smart, NP. & Leadbitter, P., Aug 2003, Information Security Conference - ISC 2003. Springer Berlin Heidelberg, Vol. 2851. p. 240 - 251 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

8 Citations (Scopus)

An Analysis of Goubin's Refined Power Analysis Attack

Smart, N., Sep 2003, Cryptographic Hardware and Embedded Systems - CHES 2003. Springer Berlin Heidelberg, Vol. 2779. p. 281 - 290 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Commitment capacity of discrete memoryless channels

A.C.A., N., H., I. & Andreas, W., 2003, Cryptography and Coding - IMACC 2003. Springer Berlin Heidelberg, Vol. 2898. p. 35-51

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

43 Citations (Scopus)

Computing the $M = U U^t$ integer matrix decomposition

Smart, N. & Geissler, K., Dec 2003, Cryptography and Coding - IMACC 2003. Springer Berlin Heidelberg, Vol. 2898. p. 223 - 233 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Computing the multiplicative group of residue class rings

Hess, F., S., P. & M.E., P., 2003, In : Mathematics of Computation. 72, p. 1531-1548

Research output: Contribution to journalArticle (Academic Journal)

13 Citations (Scopus)

Defending against cache based side-channel attacks

Page, D., Apr 2003, In : Information Security Technical Report. 8(1), 1, p. 30 - 44 14 p.

Research output: Contribution to journalArticle (Academic Journal)

44 Citations (Scopus)

Efficient Identity based Signature Schemes based on Pairings.

Hess, F., Feb 2003, Selected Areas in Cryptography -- SAC 2002. Springer Berlin Heidelberg, Vol. 2595. p. 310 - 324 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

606 Citations (Scopus)

Estimates for Discrete Logarithm Computations in Finite Fields of Small Characteristic

Granger, R., 2003, Cryptography and Coding - IMACC 2003. Springer, Vol. 2898. p. 190-206 17 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

7 Citations (Scopus)

Mental Poker Revisited

Smart, N. & Barnett, A., Dec 2003, Cryptography and Coding - IMACC 2003. Springer Berlin Heidelberg, Vol. 2898. p. 370 - 383 13 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

21 Citations (Scopus)

Modifications of ECDSA

Malone-Lee, J. & Smart, N., Feb 2003, Selected Areas in Cryptography - SAC 2002. Springer Berlin Heidelberg, Vol. 2595. p. 1 - 12 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

7 Citations (Scopus)

Point multiplication on ordinary elliptic curves over fields of characteristic three.

Smart, NP. & Westwood, J., Jul 2003, In : Applicable Algebra in Engineering, Communication and Computing. 13, p. 485 - 497 12 p.

Research output: Contribution to journalArticle (Academic Journal)

30 Citations (Scopus)

The GHS attack revisited

Hess, F., 2003, Advances in Cryptology - EUROCRYPT 2003. Springer Berlin Heidelberg, Vol. 2656. p. 374-387

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

16 Citations (Scopus)

Two Birds One Stone: Signcryption Using RSA

Malone-Lee, J. C. & Mao, W., Apr 2003, Topics in Cryptology - CT-RSA 2003. Springer, Vol. 2612. p. 211 - 225 14 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

114 Citations (Scopus)

Using media processors for low-memory AES implementation

Page, D. & Irwin, J. P. J., 2003, Application-specific Systems, Architectures and Processors - ASAP 2003. Institute of Electrical and Electronics Engineers (IEEE), p. 144--154

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

11 Citations (Scopus)
2002

An Algorithm for Computing Weierstrass Points

Hess, F., Jul 2002, Algorithmic Number Theory - ANTS 2002. Fieker, C. & Kohel, D. R. (eds.). Springer Berlin Heidelberg, Vol. 2369. p. 357 - 371 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

4 Citations (Scopus)

An extension of Kedlaya's algorithm to Artin-Schreier curves in characteristic 2

Denef, J. & Vercauteren, F., Jul 2002, Algorithmic Number Theory - ANTS 2002. Fieker, C. & Kohel, D. R. (eds.). Springer Berlin Heidelberg, Vol. 2369. p. 369 - 384 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

An identity based authenticated key agreement protocol based on the Weil pairing

Smart, NP., Jun 2002, In : Electronics Letters. 38 (13), p. 630 - 632 2 p.

Research output: Contribution to journalArticle (Academic Journal)

Applications of Multiple Trust Authorities in Pairing Based Cryptosystems

Chen, L., Harrison, K., Smart, N. & Soldera, D., Sep 2002, InfraSec 2002. Davida, G., Frankel, Y. & Rees, O. (eds.). Springer Berlin Heidelberg, Vol. 2437. p. 260 - 275 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

109 Citations (Scopus)

Certification of Public Keys within an Identity Based System

Chen, L., Harrison, K., Moss, A., Smart, NP. & Soldera, D., Sep 2002, Information Security - ISC 2002. Chan, A. H. & Gligor, V. (eds.). Springer Berlin Heidelberg, Vol. 2443. p. 322 - 333 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

26 Citations (Scopus)

Computing Riemann-Roch Spaces in Algebraic Function Fields and Related Topics

Hess, F., Apr 2002, In : Journal of Symbolic Computation. 33 (4), p. 425 - 445 20 p.

Research output: Contribution to journalArticle (Academic Journal)

67 Citations (Scopus)

Computing zeta functions of hyperelliptic curves over finite fields of characteristic 2

Vercauteren, F., Aug 2002, Advances in Cryptology -- CRYPTO 2002. Springer Berlin Heidelberg, Vol. 2442. p. 369 - 384 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

15 Citations (Scopus)

Constructive and Destructive Facets of Weil Descent on Elliptic Curves

Gaudry, P., Hess, FK. & Smart, NP., Jan 2002, In : Journal of Cryptology. 15 (1), p. 19 - 46 28 p.

Research output: Contribution to journalArticle (Academic Journal)

139 Citations (Scopus)

Cryptography, An Introduction

Smart, N., 2002, McGraw-Hill.

Research output: Book/ReportAuthored book

Elliptic curve Paillier schemes

Galbraith, S. D., 2002, In : Journal of Cryptology. 15, p. 129-138

Research output: Contribution to journalArticle (Academic Journal)