Research Output

Filter
Chapter in a book
2018

Two Sides of the Same Coin: Counting and Enumerating Keys Post Side-Channel Attacks Revisited

Martin, D. P., Mather, L. & Oswald, E., 7 Mar 2018, Two Sides of the Same Coin: Counting and Enumerating Keys Post Side-Channel Attacks Revisited. p. 394-412 Chapter 21. (Topics in Cryptology – CT-RSA 2018; vol. 10808).

Research output: Chapter in Book/Report/Conference proceedingChapter in a book

3 Citations (Scopus)
2015

A framework for describing multimedia circulation in the smartphone ecosystem

Andriotis, P., Tryfonas, T., Oikonomou, G. & King, I., 2015, Advances in Digital Forensics XI. Peterson, G. & Shenoi, S. (eds.). Springer International Publishing AG, Vol. 462. p. 251-267 (IFIP Advances in Information and Communication Technology).

Research output: Chapter in Book/Report/Conference proceedingChapter in a book

1 Citation (Scopus)

Messaging Activity Reconstruction with Sentiment Polarity Identification

Andriotis, P. & Oikonomou, G., 2015, Human Aspects of Information Security, Privacy, and Trust - HAS 2015. Tryfonas, T. & Askoxylakis, I. G. (eds.). Springer Berlin Heidelberg, Vol. 9190. p. 475-486 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingChapter in a book

2 Citations (Scopus)
2014

ICEPOLE: High-Speed, Hardware-Oriented Authenticated Encryption

Morawiecki, P., Gaj, K., Homsirikamol, E., Matusiewicz, K., Pieprzyk, J., Rogawski, M., Srebrny, M. & Wojcik, M., 2014, Cryptographic Hardware and Embedded Systems – CHES 2014. Springer Berlin Heidelberg, Vol. 8731. p. 392-413 22 p.

Research output: Chapter in Book/Report/Conference proceedingChapter in a book

12 Citations (Scopus)
2013

Data Recovery Strategies for Cloud Environments

Spyridopoulos, T. & Katos, V., 2013, Cybercrime and Cloud Forensics: Applications for Investigation Processes. Ruan, K. (ed.). IGI Global, p. 251-265 15 p.

Research output: Chapter in Book/Report/Conference proceedingChapter in a book

9 Citations (Scopus)
2012

Fault attacks on pairing based cryptography: a state of the art

El Mrabet, N., Page, D. & Vercauteren, F. R. G., 2012, Fault Analysis in Cryptography. Springer, p. 221-236

Research output: Chapter in Book/Report/Conference proceedingChapter in a book

2011

Computationally Sound Analysis of Encrypting with Diffie Hellman Keys

Cortier, V., Kremer, S., Bresson, E., Lacknech, Y., Mazare, L. & Warinschi, B., 2011, Formal Models and Techniques for Analyzing Security Protocols. IOS Press, p. 277-303

Research output: Chapter in Book/Report/Conference proceedingChapter in a book

Consumerization: Consequences of Fuzzy Work-Home Boundaries

Koeberl, P., Li, J., Rajan, A., Vishik, C. & Wojcik, M., 2011, ISSE 2011 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2011 Conference. Vieweg+Teubner, p. 138-153 16 p.

Research output: Chapter in Book/Report/Conference proceedingChapter in a book

2010

Counteracting Power Analysis Attacks by Masking

Oswald, E. & Mangard, S., 2010, Secure Integrated Circuits and Systems. Springer, p. 159-178

Research output: Chapter in Book/Report/Conference proceedingChapter in a book

Information Security Management and Standards of Best Practice

Tryfonas, T., 2010, Handbook of Electronic Security and Digital Forensics. Jahankhani, H., Watson, D. L., Me, G. & Leonhardt, F. (eds.). World Scientific Publishing Co., Vol. -. p. 207 - 236

Research output: Chapter in Book/Report/Conference proceedingChapter in a book

Leakage Resilient Cryptography in Practice

Standaert, F-X., Pereira, O., Yu, Y., Quisquater, J-J., Yung, M. & Oswald, E., 2010, Towards Hardware-Intrinsic Security. Springer, p. 105-139

Research output: Chapter in Book/Report/Conference proceedingChapter in a book

52 Citations (Scopus)

Smart Cards

Markantonakis, K., Mayes, K., Sauveron, D. & Tunstall, M., 2010, Handbook of Technology Management. Wiley, Vol. 2. p. 248-264

Research output: Chapter in Book/Report/Conference proceedingChapter in a book

2009

Audit Log Unification and Review with Log Management Information Bases

To, WM., Tryfonas, T. & Farthing, DW., 2009, Frontiers in Artificial Intelligence and Applications: Databases and Information Systems V. Haav, H. & Kalja, A. (eds.). IOS Press, Vol. 187. p. 180 - 191

Research output: Chapter in Book/Report/Conference proceedingChapter in a book

1 Citation (Scopus)
2008

Implementation attacks, countermeasures & performance evaluation

Whelan, C., Byrne, A., Page, D., Vercauteren, F. R. G., Scott, M. & Marnane, W., 2008, Identity- Based Cryptography. IOS Press, p. 226-243

Research output: Chapter in Book/Report/Conference proceedingChapter in a book

2006

Elliptic curve cryptography

Smart, N., 2006, Handbook of Information Security. Wiley, Vol. 2. p. ???-???

Research output: Chapter in Book/Report/Conference proceedingChapter in a book