Research Output

Conference Contribution (Conference Proceeding)

Separating Trace Mapping and Reactive Simulatability Soundness: The Case of Adaptive Corruption

Mazaré, L. & Warinschi, B., 2009, ARSPA-WITS. Springer Berlin Heidelberg, Vol. 5511. p. 193-210 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

3 Citations (Scopus)

Side channel analysis of an automotive microprocessor: I

Hamilton, M., Tunstall, M., Popovici, E. & William P., M., 2008, IET Irish Signals and Systems Conference - ISSC 2008. Institution of Engineering and Technology (IET), p. 4-9

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

1 Citation (Scopus)

Side channel analysis of cryptographic software via early-terminating multiplications

Groszschaedl, J., Oswald, E., Page, D. & Tunstall, M., 2009, International Conference on Information Security and Cryptology - ICISC 2009. Springer Berlin Heidelberg, Vol. 5984. p. 176-192

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Signatures on Randomizable Ciphertexts

Blazy, O., Fuchsbauer, G., Pointcheval, D. & Vergnaud, D., 2011, Public Key Cryptography - PKC 2011. Catalano, D., Fazio, N., Gennaro, R. & Nicolosi, A. (eds.). Springer, Vol. 6571. p. 403-422 20 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

39 Citations (Scopus)

Simulatable Leakage: Analysis, Pitfalls, and New Constructions

Longo, J., Martin, D. P., Oswald, M. E., Page, D., Stam, M. & Tunstall, M., 7 Dec 2014, Advances in Cryptology - ASIACRYPT 2014. Springer Berlin Heidelberg, Vol. 8873. p. 223-242 (Lecture Notes in Computer Science; vol. 8873).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
8 Citations (Scopus)

Smart Attacks on the Integrity of the Internet of Things: Avoiding Detection by Employing Game Theory

Margelis, G., Piechocki, R., Tryfonas, T. & Thomas, P., May 2017, 2016 IEEE Global Communications Conference (GLOBECOM 2016): Proceedings of a meeting held 4-8 December 2016, Washington, DC, USA. Institute of Electrical and Electronics Engineers (IEEE), 6 p. 7842270

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
2 Citations (Scopus)
276 Downloads (Pure)

Smartphone Message Sentiment Analysis

Andriotis, P., Takasu, A. & Tryfonas, T., 2014, Advances in Digital Forensics X. Peterson, G. & Shenoi, S. (eds.). p. 253-265 (IFIP Advances in Information and Communication Technology; vol. 433).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

8 Citations (Scopus)

SoC It to EM: ElectroMagnetic Side-Channel Attacks on a Complex System-on-Chip

Longo, J., De Mulder, E., Page, D. & Tunstall, M., 1 Sep 2015, Cryptographic Hardware and Embedded Systems - CHES 2015. 1 ed. Springer, Vol. 9293. p. 620-640 21 p. (Lecture Notes in Computer Science; vol. 9293).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
45 Citations (Scopus)
499 Downloads (Pure)

Soft systems methodology in net-centric cyber defence system development

Craig, R., Spyridopoulos, T., Tryfonas, T. & May, J. H. R., 2014, Conference Proceedings - IEEE International Conference on Systems, Man and Cybernetics. January ed. San Diego, California, USA: Institute of Electrical and Electronics Engineers (IEEE), Vol. 2014-January. p. 672-677 6 p. 6973986

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

SoK: A Comprehensive Analysis of Game-Based Ballot Privacy Definitions

Bernhard, D., Cortier, V., Galindo, D., Pereira, O. & Warinschi, B., 2015, 2015 IEEE Symposium on Security and Privacy - S&P 2015. Institute of Electrical and Electronics Engineers (IEEE), p. 499-516 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

33 Citations (Scopus)

Solving the Shortest Vector Problem in Lattices Faster Using Quantum Search

Laarhoven, T., Mosca, M. & van de Pol, J., 2013, Post-Quantum Cryptography - PQC 2013. Springer Berlin Heidelberg, Vol. 7932. p. 83-101 19 p. (Lecture Notes in Computer Science; vol. 7932).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

7 Citations (Scopus)

SPHERE deployment manager: A tool for deploying IoT sensor networks at large scale

Fafoutis, X., Elsts, A., Oikonomou, G. & Piechocki, R., 30 Aug 2018, Ad-hoc, Mobile, and Wireless Networks: 17th International Conference on Ad Hoc Networks and Wireless, ADHOC-NOW 2018, Saint-Malo, France, September 5-7, 2018. Proceedings. Springer, Cham, p. 307-318 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11104 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
1 Citation (Scopus)
117 Downloads (Pure)

Statistical security conditions for two-party secure function evaluation

Crepeau, C. & Wullschleger, J. E., 2008, Information Theoretic Security - ICITS 2008. Springer Berlin Heidelberg, Vol. 5155. p. 86-99

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

11 Citations (Scopus)

Strategic Interaction Analysis of Privacy-Sensitive End-Users of Cloud-Based Mobile Apps

Anastasopoulou, K., Tryfonas, T. & Kokolakis, S., 2013, Human Aspects of Information Security, Privacy, and Trust - HAS 2013. Springer Berlin Heidelberg, Vol. 8030. p. 209-216

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

3 Citations (Scopus)

Stronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient Constructions

Ghadafi, E., 2015, Topics in Cryptology - CT-RSA 2015, The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings. Nyberg, K. (ed.). Springer, Vol. 9048. p. 391-409 19 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

19 Citations (Scopus)

Sub-linear Blind Ring Signatures without Random Oracles

Ghadafi, E. M. O., 2013, Coding and Cryptography - IMACC 2013. Springer Berlin Heidelberg, Vol. 8308. p. 304-323 19 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

5 Citations (Scopus)

Supersingular curves in cryptography

Galbraith, S., 2001, Advances in Cryptology - ASIACRYPT 2001. Springer Berlin Heidelberg, Vol. 2248. p. 495-513

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

131 Citations (Scopus)

Synthesizing Secure Protocols

Cortier, V., Warinschi, B. & Zalinescu, E., 2007, European Symposium On Research In Computer Security - ESORICS 2007. Springer Berlin Heidelberg, Vol. 4734. p. 406-421

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

11 Citations (Scopus)

System dynamics approach to malicious insider cyber-threat modelling and analysis

Fagade, T., Spyridopoulos, T., Albishry, N. & Tryfonas, T., 2017, Human Aspects of Information Security, Privacy and Trust - 5th International Conference, HAS 2017 Held as Part of HCI International 2017, Proceedings. Springer-Verlag Berlin, Vol. 10292 LNCS. p. 309-321 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10292 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

1 Citation (Scopus)

Template Attacks on ECDSA

Oswald, E. & Marcel, M., 2008, Information Security Applications - WISA 2008. Springer Berlin Heidelberg, Vol. 5379. p. 14-27

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Template Attacks on Masking --- Resistance is Futile

Oswald, ME. & Mangard, S., 2007, Topics in Cryptology - CTRSA 2007. Abe, M. (ed.). Springer Berlin Heidelberg, Vol. 4377. p. 243 - 256

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

68 Citations (Scopus)

The Collision Security of Tandem-DM in the Ideal Cipher Model

Lee, J., Stam, M. & Steinberger, J., 2011, Advances in Cryptology - CRYPTO 2011. Springer, Vol. 6841. p. 561-557 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

34 Citations (Scopus)

The Exact Security of ECIES in the Generic Group Model

Smart, NP., Dec 2001, Cryptography and Coding - IMACC 2001. Honary, B. (ed.). Springer Berlin Heidelberg, Vol. 2260. p. 73 - 84 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

26 Citations (Scopus)

The Fiat–Shamir Transform for Group and Ring Signature Schemes

Lee, M-F., Smart, N. & Warinschi, B., 2010, Security and Cryptography for Networks - SCN 2010. Springer Berlin Heidelberg, Vol. 6280. p. 363-380

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

2 Citations (Scopus)

The GHS attack revisited

Hess, F., 2003, Advances in Cryptology - EUROCRYPT 2003. Springer Berlin Heidelberg, Vol. 2656. p. 374-387

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

16 Citations (Scopus)

The Hessian form of an elliptic curve

Smart, NP., May 2001, Cryptographic Hardware and Embedded Systems - CHES 2001. K., N. & P. (eds.). Springer Berlin Heidelberg, Vol. 2162. p. 118 - 125 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

66 Citations (Scopus)

The Low-Call Diet: Authenticated Encryption for Call Counting HSM Users

Bond, M., French, G., Smart, N. P. & Watson, G. J., 2013, Topics in Cryptology - CT-RSA 2013. Dawson, E. (ed.). Springer, Vol. 7779. p. 359-374 16 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

1 Citation (Scopus)

The Myth of Generic DPA...and the Magic of Learning

Whitnall, C., Oswald, E. & Standaert, F-X., 2014, Topics in Cryptology - CT-RSA 2014. Benaloh, J. (ed.). Springer, Vol. 8366. p. 183-205 23 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
34 Citations (Scopus)

The number field sieve in the medium prime case

Joux, A., Lercier, R., Smart, N. & Vercauteren, F., 2006, Advances in Cryptology - CRYPTO 2006. Springer Berlin Heidelberg, Vol. 4117. p. 326 - 344 19 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

52 Citations (Scopus)

The Physically Observable Security of Signature Schemes

Malone-Lee, J. C. & Dent, AW., Nov 2005, Coding and Cryptography - IMACC 2005. Springer, Vol. 3796. p. 220-232 13 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

3 Citations (Scopus)

The Preimage Security of Double-Block-Length Compression Functions

Armknecht, F., Fleischmann, E., Krause, M., Lee, J., Stam, M. & Steinberger, J. P., 2011, Advances in Cryptology - ASIACRYPT 2011. Springer, Vol. 7073. p. 233-251 19 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

29 Citations (Scopus)

The Symbiosis between Collision and Preimage Resistance

Andreeva, E. & Stam, M., 2011, Coding an Cryptography - IMACC 2011. Springer, Vol. 7089. p. 152-171 20 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

4 Citations (Scopus)

The World Is Not Enough: Another Look on Second-Order DPA

François-Xavier, S., Nicolas, V-C., Oswald, E., Benedikt, G., Marcel, M., Markus, K. & Stefan, M., 2010, Advances in Cryptology - ASIACRYPT 2010. Springer Berlin Heidelberg, Vol. 6477. p. 112-129 17 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

106 Citations (Scopus)

THOR - The hardware onion router

Francesco, R., Guneysu, T., Sasdrich, P. & Wojcik, M., 2 Sep 2014, Field Programmable Logic and Applications (FPL): 2014 24th International Conference on. Institute of Electrical and Electronics Engineers (IEEE), p. 1-4 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

1 Citation (Scopus)

Threshold FlipThem: When the winner does not need to take all

Leslie, D., Sherfield, C. & Smart, N., 4 Nov 2015, Decision and Game Theory for Security - GameSec 2015. Springer, Vol. 9406. p. 74-92 19 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
6 Citations (Scopus)

Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts

Albrecht, M., Orsini, E., Patterson, K. G., Peer, G. & Smart, N. P., 1 Sep 2017, European Symposium on Research in Computer Security: ESORICS 2017: Part I. Springer, Vol. 10492. p. 29-46 18 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
6 Citations (Scopus)

Toward acceleration of RSA using 3D Graphics hardware

Moss, A., Page, D. & Smart, N., 2007, Cryptography and Coding - IMACC 2007. Springer Berlin Heidelberg, Vol. 4887. p. 369-388

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

32 Citations (Scopus)

Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs

Bernhard, D., Neumann, S. & Volkamer, M., 2013, E-Voting and Identify - VOTE-ID 2013. Heather, J., Schneider, S. A. & Teague, V. (eds.). Springer, Vol. 7985. p. 176-192 17 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

6 Citations (Scopus)

Towards practical tools for side channel aware software engineering: 'grey box' modelling for instruction leakages

McCann, D., Oswald, E. & Whitnall, C., 1 Aug 2017, 26th USENIX Security Symposium (USENIX Security 17). USENIX Association, p. 199-216 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
78 Downloads (Pure)

Traffic Forensics for IPv6-Based Wireless Sensor Networks and the Internet of Things

Kumar, V., Oikonomou, G. & Tryfonas, T., Mar 2017, 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT 2016): Proceedings of a meeting held 12-14 December 2016, Reston, Virginia, USA. Institute of Electrical and Electronics Engineers (IEEE), 6 p. 7845515

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
5 Citations (Scopus)
610 Downloads (Pure)

TSCH and 6TiSCH for Contiki: Challenges, Design and Evaluation

Duquennoy, S., Elsts, A., Al Nahas, B. & Oikonomou, G., Apr 2018, 2017 13th International Conference on Distributed Computing in Sensor Systems (DCOSS 2017): Proceedings of a meeting held 5-7 June 2017, Ottawa, Ontario, Canada. Institute of Electrical and Electronics Engineers (IEEE), p. 11-18 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
38 Citations (Scopus)
399 Downloads (Pure)

Two Birds One Stone: Signcryption Using RSA

Malone-Lee, J. C. & Mao, W., Apr 2003, Topics in Cryptology - CT-RSA 2003. Springer, Vol. 2612. p. 211 - 225 14 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

114 Citations (Scopus)

Two topics in hyperelliptic cryptography

Hess, F., Seroussi, G. & Smart, NP., Dec 2001, Selected Areas in Cryptography - SAC 2001. Vaudenay, S. & Youssef, A. M. (eds.). Springer Berlin Heidelberg, Vol. 2259. p. 181 - 189 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

6 Citations (Scopus)

Type checking cryptography implementations

Barbosa, M. B. M., Moss, A. D., Page, D., Rodrigues, N. & Silva, P. F., 2011, Fundamentals of Software Engineering - FSEN 2011. Springer Berlin Heidelberg, Vol. 7141. p. 316-334

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

3 Citations (Scopus)

Understanding Adaptivity: Random Systems Revisited

Jetchev, D., Özen, O. & Stam, M., 2012, Advances in Cryptology - ASIACRYPT 2012. Springer, Vol. 7658. p. 313-330 18 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

9 Citations (Scopus)

Uniform Evaluation of Hardware Implementations of the Round-Two SHA-3 Candidates

Tillich, S., Feldhofer, M., Kirschbaum, M., Plos, T., Schmidt, J-M. & Szekely, A., 2010, The Second SHA-3 Candidate Conference. NIST, Vol. -. p. -

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Universally Composable Cryptographic Role-Based Access Control

Liu, B. & Warinschi, B., 16 Nov 2016, Provable Security - ProvSec 2016: 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings. Chen, L. & Han, J. (eds.). Springer, p. 61-80 20 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access

Unknown Plaintext Template Attacks

Hanley, N., Tunstall, M. & Marnane, W. P., 2009, Workshop on Information Security Applications – WISA 2009. Springer Berlin Heidelberg, Vol. 5932. p. 148-162

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

17 Citations (Scopus)

Untagging Tor: A Formal Treatment of Onion Encryption

Degabriele, J. P. & Stam, M., 2 Jun 2018, Advances in Cryptology - EUROCRYPT 2018: 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part I. Buus Nielsen, J. & Rijmen, V. (eds.). Springer, p. 259-293 35 p. (Lecture Notes in Computer Science; vol. 10820).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access

Using compilers to enhance cryptographic product development

Bangerter, E., Barbosa, M., Bernstein, D. J., Damgard, I., Page, D., Pagter, J. I., Sadeghi, A-R. & Sovio, S., 2010, Information Security Solutions Europe - ISSE 2010. Vieweg+Teubner, p. 291-301

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)