Research Output

Smartphone Message Sentiment Analysis

Andriotis, P., Takasu, A. & Tryfonas, T., 2014, Advances in Digital Forensics X. Peterson, G. & Shenoi, S. (eds.). p. 253-265 (IFIP Advances in Information and Communication Technology; vol. 433).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

8 Citations (Scopus)

SoC It to EM: ElectroMagnetic Side-Channel Attacks on a Complex System-on-Chip

Longo, J., De Mulder, E., Page, D. & Tunstall, M., 1 Sep 2015, Cryptographic Hardware and Embedded Systems - CHES 2015. 1 ed. Springer, Vol. 9293. p. 620-640 21 p. (Lecture Notes in Computer Science; vol. 9293).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
45 Citations (Scopus)
499 Downloads (Pure)

Soft systems methodology in net-centric cyber defence system development

Craig, R., Spyridopoulos, T., Tryfonas, T. & May, J. H. R., 2014, Conference Proceedings - IEEE International Conference on Systems, Man and Cybernetics. January ed. San Diego, California, USA: Institute of Electrical and Electronics Engineers (IEEE), Vol. 2014-January. p. 672-677 6 p. 6973986

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Software implementation of finite fields of characteristic three, for use in pairing based cryptosystems

Harrison, K., Page, D. & Smart, N. P., 2002, In : LMS Journal of Computation and Mathematics. 5, p. 181--193

Research output: Contribution to journalArticle (Academic Journal)

SoK: A Comprehensive Analysis of Game-Based Ballot Privacy Definitions

Bernhard, D., Cortier, V., Galindo, D., Pereira, O. & Warinschi, B., 2015, 2015 IEEE Symposium on Security and Privacy - S&P 2015. Institute of Electrical and Electronics Engineers (IEEE), p. 499-516 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

33 Citations (Scopus)

Solving the Shortest Vector Problem in Lattices Faster Using Quantum Search

Laarhoven, T., Mosca, M. & van de Pol, J., 2013, Post-Quantum Cryptography - PQC 2013. Springer Berlin Heidelberg, Vol. 7932. p. 83-101 19 p. (Lecture Notes in Computer Science; vol. 7932).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

7 Citations (Scopus)

Special issue on security of IoT-enabled infrastructures in smart cities

Awad, A. I., Furnell, S., Hassan, A. M. & Tryfonas, T., 1 Sep 2019, In : Ad Hoc Networks. 92, 2 p., 101850.

Research output: Contribution to journalEditorial (Academic Journal)

2 Citations (Scopus)

SPHERE deployment manager: A tool for deploying IoT sensor networks at large scale

Fafoutis, X., Elsts, A., Oikonomou, G. & Piechocki, R., 30 Aug 2018, Ad-hoc, Mobile, and Wireless Networks: 17th International Conference on Ad Hoc Networks and Wireless, ADHOC-NOW 2018, Saint-Malo, France, September 5-7, 2018. Proceedings. Springer, Cham, p. 307-318 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11104 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
1 Citation (Scopus)
117 Downloads (Pure)

Standardising business application security assessments with pattern-driven audit automations

Tryfonas, T. & Kearney, B., 2008, In : Computer Standards and Interfaces. 30, 4, p. 262 - 270

Research output: Contribution to journalArticle (Academic Journal)

7 Citations (Scopus)

Statistical security conditions for two-party secure function evaluation

Crepeau, C. & Wullschleger, J. E., 2008, Information Theoretic Security - ICITS 2008. Springer Berlin Heidelberg, Vol. 5155. p. 86-99

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

11 Citations (Scopus)

Strategic Interaction Analysis of Privacy-Sensitive End-Users of Cloud-Based Mobile Apps

Anastasopoulou, K., Tryfonas, T. & Kokolakis, S., 2013, Human Aspects of Information Security, Privacy, and Trust - HAS 2013. Springer Berlin Heidelberg, Vol. 8030. p. 209-216

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

3 Citations (Scopus)

Stronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient Constructions

Ghadafi, E., 2015, Topics in Cryptology - CT-RSA 2015, The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings. Nyberg, K. (ed.). Springer, Vol. 9048. p. 391-409 19 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

19 Citations (Scopus)

Sub-linear Blind Ring Signatures without Random Oracles

Ghadafi, E. M. O., 2013, Coding and Cryptography - IMACC 2013. Springer Berlin Heidelberg, Vol. 8308. p. 304-323 19 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

5 Citations (Scopus)

Supersingular curves in cryptography

Galbraith, S., 2001, Advances in Cryptology - ASIACRYPT 2001. Springer Berlin Heidelberg, Vol. 2248. p. 495-513

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

131 Citations (Scopus)

Synthesizing Secure Protocols

Cortier, V., Warinschi, B. & Zalinescu, E., 2007, European Symposium On Research In Computer Security - ESORICS 2007. Springer Berlin Heidelberg, Vol. 4734. p. 406-421

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

11 Citations (Scopus)

System dynamics approach to malicious insider cyber-threat modelling and analysis

Fagade, T., Spyridopoulos, T., Albishry, N. & Tryfonas, T., 2017, Human Aspects of Information Security, Privacy and Trust - 5th International Conference, HAS 2017 Held as Part of HCI International 2017, Proceedings. Springer-Verlag Berlin, Vol. 10292 LNCS. p. 309-321 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10292 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

1 Citation (Scopus)

Temperature-resilient time synchronization for the internet of things

Elsts, A., Fafoutis, X., Duquennoy, S., Oikonomou, G., Piechocki, R. & Craddock, I., May 2018, In : IEEE Transactions on Industrial Informatics. 14, 5, p. 2241-2250 10 p.

Research output: Contribution to journalArticle (Academic Journal)

Open Access
File
10 Citations (Scopus)
234 Downloads (Pure)

Template Attacks on ECDSA

Oswald, E. & Marcel, M., 2008, Information Security Applications - WISA 2008. Springer Berlin Heidelberg, Vol. 5379. p. 14-27

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Template Attacks on Masking --- Resistance is Futile

Oswald, ME. & Mangard, S., 2007, Topics in Cryptology - CTRSA 2007. Abe, M. (ed.). Springer Berlin Heidelberg, Vol. 4377. p. 243 - 256

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

68 Citations (Scopus)

The Collision Security of Tandem-DM in the Ideal Cipher Model

Lee, J., Stam, M. & Steinberger, J., 2011, Advances in Cryptology - CRYPTO 2011. Springer, Vol. 6841. p. 561-557 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

34 Citations (Scopus)

The design of scalar AES Instruction Set Extensions for RISC-V

Marshall, B., Newell, G. R., Page, D., Markku-Juhani O., S. & Wolf, C., 15 Sep 2020, (Accepted/In press) In : IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES).

Research output: Contribution to journalArticle (Academic Journal)

The equivalence between the DHP and DLP for elliptic curves used in practical applications

Smart, NP., Vercauteren, F. & Muzereau, A., Mar 2004, In : LMS Journal of Computation and Mathematics. 7, p. 50 - 72 22 p.

Research output: Contribution to journalArticle (Academic Journal)

The Eta pairing revisited

Hess, FK., Smart, NP. & Vercauteren, FRG., Oct 2006, In : IEEE Transactions on Information Theory. 52 (10), p. 4595 - 4602 8 p.

Research output: Contribution to journalArticle (Academic Journal)

281 Citations (Scopus)

The Exact Security of ECIES in the Generic Group Model

Smart, NP., Dec 2001, Cryptography and Coding - IMACC 2001. Honary, B. (ed.). Springer Berlin Heidelberg, Vol. 2260. p. 73 - 84 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

26 Citations (Scopus)

The Fiat–Shamir Transform for Group and Ring Signature Schemes

Lee, M-F., Smart, N. & Warinschi, B., 2010, Security and Cryptography for Networks - SCN 2010. Springer Berlin Heidelberg, Vol. 6280. p. 363-380

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

2 Citations (Scopus)

The GHS attack revisited

Hess, F., 2003, Advances in Cryptology - EUROCRYPT 2003. Springer Berlin Heidelberg, Vol. 2656. p. 374-387

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

16 Citations (Scopus)

The Hessian form of an elliptic curve

Smart, NP., May 2001, Cryptographic Hardware and Embedded Systems - CHES 2001. K., N. & P. (eds.). Springer Berlin Heidelberg, Vol. 2162. p. 118 - 125 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

66 Citations (Scopus)

The Internet of Things: A Security Point of View

Li, S., Tryfonas, T. & Li, H., 4 Apr 2016, In : Internet Research. 26, 2, p. 337-359 23 p.

Research output: Contribution to journalSpecial issue (Academic Journal)

Open Access
File
100 Citations (Scopus)
1256 Downloads (Pure)

The long and winding road: MBSE adoption for functional avionics of spacecraft

Gregory, J., Berthoud, L., Tryfonas, T., Rossignol, A. & Faure, L., 1 Feb 2020, In : Journal of Systems and Software. 160, 11 p., 110453.

Research output: Contribution to journalArticle (Academic Journal)

Open Access
File
1 Citation (Scopus)
144 Downloads (Pure)

The Low-Call Diet: Authenticated Encryption for Call Counting HSM Users

Bond, M., French, G., Smart, N. P. & Watson, G. J., 2013, Topics in Cryptology - CT-RSA 2013. Dawson, E. (ed.). Springer, Vol. 7779. p. 359-374 16 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

1 Citation (Scopus)

The Myth of Generic DPA...and the Magic of Learning

Whitnall, C., Oswald, E. & Standaert, F-X., 2014, Topics in Cryptology - CT-RSA 2014. Benaloh, J. (ed.). Springer, Vol. 8366. p. 183-205 23 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
34 Citations (Scopus)

The number field sieve in the medium prime case

Joux, A., Lercier, R., Smart, N. & Vercauteren, F., 2006, Advances in Cryptology - CRYPTO 2006. Springer Berlin Heidelberg, Vol. 4117. p. 326 - 344 19 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

52 Citations (Scopus)

The Physically Observable Security of Signature Schemes

Malone-Lee, J. C. & Dent, AW., Nov 2005, Coding and Cryptography - IMACC 2005. Springer, Vol. 3796. p. 220-232 13 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

3 Citations (Scopus)

The Preimage Security of Double-Block-Length Compression Functions

Armknecht, F., Fleischmann, E., Krause, M., Lee, J., Stam, M. & Steinberger, J. P., 2011, Advances in Cryptology - ASIACRYPT 2011. Springer, Vol. 7073. p. 233-251 19 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

29 Citations (Scopus)

There's no 'I' in SEAM - An Interim Report on the 'Spacecraft Early Analysis Model'

Gregory, J. R., Berthoud, L., Tryfonas, T. & Faure, L., 14 Aug 2020. 14 p.

Research output: Contribution to conferenceConference Paper

Open Access
File
18 Downloads (Pure)

Thermal Monitoring of a Concrete Bridge in London, UK

Nepomuceno, D. T., Webb, G. T., Bennetts, J., Tryfonas, T. & Vardanega, P. J., 28 Sep 2020, (Accepted/In press) In : Proceedings of the ICE - Bridge Engineering.

Research output: Contribution to journalArticle (Academic Journal)

The Security of Tandem-DM in the Ideal Cipher Model

Lee, J., Stam, M. & Steinberger, J., 1 Apr 2017, In : Journal of Cryptology. 30, 2, p. 495-518 24 p.

Research output: Contribution to journalArticle (Academic Journal)

2 Citations (Scopus)

The Symbiosis between Collision and Preimage Resistance

Andreeva, E. & Stam, M., 2011, Coding an Cryptography - IMACC 2011. Springer, Vol. 7089. p. 152-171 20 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

4 Citations (Scopus)

The TLS Handshake Protocol: A Modular Analysis

Morrissey, P., Smart, N. & Warinschi, B., Apr 2010, In : Journal of Cryptology. 23, 2, p. 187-223 37 p.

Research output: Contribution to journalArticle (Academic Journal)

18 Citations (Scopus)

The World Is Not Enough: Another Look on Second-Order DPA

François-Xavier, S., Nicolas, V-C., Oswald, E., Benedikt, G., Marcel, M., Markus, K. & Stefan, M., 2010, Advances in Cryptology - ASIACRYPT 2010. Springer Berlin Heidelberg, Vol. 6477. p. 112-129 17 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

106 Citations (Scopus)

THOR - The hardware onion router

Francesco, R., Guneysu, T., Sasdrich, P. & Wojcik, M., 2 Sep 2014, Field Programmable Logic and Applications (FPL): 2014 24th International Conference on. Institute of Electrical and Electronics Engineers (IEEE), p. 1-4 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

1 Citation (Scopus)

Threshold FlipThem: When the winner does not need to take all

Leslie, D., Sherfield, C. & Smart, N., 4 Nov 2015, Decision and Game Theory for Security - GameSec 2015. Springer, Vol. 9406. p. 74-92 19 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
6 Citations (Scopus)

Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts

Albrecht, M., Orsini, E., Patterson, K. G., Peer, G. & Smart, N. P., 1 Sep 2017, European Symposium on Research in Computer Security: ESORICS 2017: Part I. Springer, Vol. 10492. p. 29-46 18 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
6 Citations (Scopus)

Toward acceleration of RSA using 3D Graphics hardware

Moss, A., Page, D. & Smart, N., 2007, Cryptography and Coding - IMACC 2007. Springer Berlin Heidelberg, Vol. 4887. p. 369-388

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

32 Citations (Scopus)

Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs

Bernhard, D., Neumann, S. & Volkamer, M., 2013, E-Voting and Identify - VOTE-ID 2013. Heather, J., Schneider, S. A. & Teague, V. (eds.). Springer, Vol. 7985. p. 176-192 17 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

6 Citations (Scopus)

Towards effective cybersecurity resource allocation: the Monte Carlo predictive modelling approach

Fagade, T., Maraslis, K. & Tryfonas, T., Dec 2017, In : International Journal of Critical Infrastructures. 13, 2-3, p. 152-167 16 p.

Research output: Contribution to journalArticle (Academic Journal)

Open Access
File
1 Citation (Scopus)
260 Downloads (Pure)

Towards practical tools for side channel aware software engineering: 'grey box' modelling for instruction leakages

McCann, D., Oswald, E. & Whitnall, C., 1 Aug 2017, 26th USENIX Security Symposium (USENIX Security 17). USENIX Association, p. 199-216 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
78 Downloads (Pure)

Traffic Forensics for IPv6-Based Wireless Sensor Networks and the Internet of Things

Kumar, V., Oikonomou, G. & Tryfonas, T., Mar 2017, 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT 2016): Proceedings of a meeting held 12-14 December 2016, Reston, Virginia, USA. Institute of Electrical and Electronics Engineers (IEEE), 6 p. 7845515

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
5 Citations (Scopus)
610 Downloads (Pure)

TSCH and 6TiSCH for Contiki: Challenges, Design and Evaluation

Duquennoy, S., Elsts, A., Al Nahas, B. & Oikonomou, G., Apr 2018, 2017 13th International Conference on Distributed Computing in Sensor Systems (DCOSS 2017): Proceedings of a meeting held 5-7 June 2017, Ottawa, Ontario, Canada. Institute of Electrical and Electronics Engineers (IEEE), p. 11-18 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
38 Citations (Scopus)
399 Downloads (Pure)

Turning Online Ciphers Off

Andreeva, E., Barwell, G., Bhaumik, R., Nandi, M., Page, D. & Stam, M., 19 Jun 2017, In : Transactions on Symmetric Cryptology. 2017, 2, p. 105-142

Research output: Contribution to journalArticle (Academic Journal)

Open Access
File
67 Downloads (Pure)