Filter
Conference Contribution (Conference Proceeding)

Search results

  • 2024

    Super Mario in the Pernicious Kingdoms: Classifying glitches in old games

    Hallett, J., Page, D., Limmer, I. & Forward, L., 20 Jan 2024, (Accepted/In press) 8th International Workshop on Games and Software Engineering: Emerging Advanced Technologies for Game Engineering. 8th ed. 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

  • 2022

    Towards Micro-architectural Leakage Simulators: Reverse Engineering Micro-architectural Leakage Features Is Practical

    Page, D., Oswald, M. E. & Gao, S., 25 May 2022, Advances in Cryptology – EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2022, Proceedings. Dunkelman, O. & Dziembowski, S. (eds.). Springer Verlag, Vol. LNCS 13277. p. 284-311 28 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13277 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

    3 Citations (Scopus)
  • 2021

    A Reference Implemenation for RPL Attacks Using Contiki-NG and COOJA

    Algahtani, F., Tryfonas, T. & Oikonomou, G., 18 Nov 2021, 2021 17th International Conference on Distributed Computing in Sensor Systems (DCOSS). Institute of Electrical and Electronics Engineers (IEEE), 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

    Open Access
    File
    8 Citations (Scopus)
    1110 Downloads (Pure)
  • Towards Multi-Criteria Heuristic Optimization for Computational Offloading in Multi-Access Edge Computing

    Singh, R., Armour, S. M. D., Sooriyabandara, M., Khan, A. & Oikonomou, G., 7 Jun 2021, IEEE International Conference on High Performance Switching and Routing, HPSR 2021 . IEEE International Conference on High Performance Switching and Routing, (International Conference on High Performance Switching and Routing (HPSR)).

    Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

    Open Access
    File
    2 Citations (Scopus)
    114 Downloads (Pure)
  • 2020

    Authentication in Key-Exchange: Definitions, Relations and Composition

    Delpech De Saint Guilhem, C. P. R., Fischlin, M. & Warinschi, B., 22 Jun 2020, 2020 IEEE 33rd Computer Security Foundations Symposium. p. 288 303 p.

    Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

    Open Access
  • Dynamic Cloud Service Management for Scalable Internet of Things Applications

    Mavromatis, A., Gunner, S., Tryfonas, T. & Simeonidou, D., 9 Apr 2020, 2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation: SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI. Institute of Electrical and Electronics Engineers (IEEE), 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

    Open Access
    File
    1 Citation (Scopus)
    214 Downloads (Pure)
  • Fifty Shades of Ballot Privacy: Privacy against a Malicious Board

    Cortier, V., Lallemand, J. & Warinschi, B., 22 Jun 2020, 2020 IEEE 33rd Computer Security Foundations Symposium. IEEE Computer Society

    Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

    Open Access
  • Implementing the Draft RISC-V Scalar Cryptography Extensions

    Marshall, B., Page, D. & Pham, T. H., 17 Nov 2020, HASP '20: Proceedings of the 9th International Workshop on Hardware and Architectural Support for Security and Privacy.

    Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

  • Model-based Cybersecurity Engineering for Connected and Automated Vehicles: The FLOURISH Project

    Robles-Ramirez, D., Tryfonas, T., Escamilla-Ambrosio, P. J., Fagade, T., Anastasopoulou, K., Tassi, A. & Piechocki, R., 2 Apr 2020, Proceedings of the 11th Model-Based Enterprise Summit: (MBE 2020). NIST National Institute of Standards and Technology, p. 139-149 11 p. (Advanced Manufacturing Series; vol. 100, no. 29).

    Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

    Open Access
    File
    196 Downloads (Pure)
  • 2019

    A Critical Analysis of ISO 17825 (‘Testing Methods for the Mitigation of Non-invasive attack classes against cryptographic modules')

    Whitnall, C. A. & Oswald, M. E., 8 Dec 2019, Advances in Cryptology – ASIACRYPT 2019. Springer, Vol. 11923. p. 256-284 28 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

    Open Access
    25 Citations (Scopus)
  • An SDN Agent-Enabled Rate Adaptation Framework for WLAN

    Li, L., Oikonomou, G., Beach, M., Nejabati, R. & Simeonidou, D., 1 May 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC). Institute of Electrical and Electronics Engineers (IEEE), 6 p. 8761424. (IEEE International Conference on Communications; vol. 2019-May).

    Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

    Open Access
    File
    5 Citations (Scopus)
    329 Downloads (Pure)
  • Assessing the Potential Value of a SHM Deployment on a Proposed Footbridge

    Nepomuceno, D., Bennetts, J., Webb, G. T., Langhorne, M., Johnson, M., Macdonald, J., Tryfonas, T. & Vardanega, P., 2019, Advances and Challenges in Structural Engineering: Proceedings of the 2nd GeoMEast International Congress and Exhibition on Sustainable Civil Infrastructures, Egypt 2018 – The Official International Congress of the Soil-Structure Interaction Group in Egypt (SSIGE). Rodrigues, H. & Elnashai, A. (eds.). Springer, Cham, p. 151-166 16 p. (Sustainable Civil Infrastructures).

    Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

    Open Access
    File
    4 Citations (Scopus)
    418 Downloads (Pure)
  • Constructing TI-Friendly Substitution Boxes Using Shift-Invariant Permutations

    Gao, S., Roy, A. & Oswald, E., 3 Feb 2019, Topics in Cryptology – CT-RSA 2019 - The Cryptographers’ Track at the RSA Conference 2019, Proceedings. Matsui, M. (ed.). Springer Verlag, p. 433-452 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11405 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

    Open Access
    File
    4 Citations (Scopus)
    3101 Downloads (Pure)
  • Early Validation of the Data Handling Unit of a Spacecraft Using MBSE

    Gregory, J., Berthoud, L., Tryfonas, T. & Prezzavento, A., 20 Jun 2019, 2019 IEEE Aerospace Conference, AERO 2019: 2-9 March 2019, Big Sky, MT, USA. IEEE Computer Society, Vol. 2019-March. 15 p. 8741767. (Aerospace Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

    8 Citations (Scopus)
  • Encrypted Databases: New Volume Attacks against Range Queries

    Gui, Z., Johnson, O. T. & Warinschi, B., 6 Nov 2019, CCS'19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 361-378 47 p.

    Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

    Open Access
    File
    54 Citations (Scopus)
    375 Downloads (Pure)
  • EVM Prediction for Massive MIMO

    Boukley Hasan, W. A. G., Doufexi, A., Oikonomou, G. & Beach, M. A., 11 Sept 2019, 2019 IEEE 30th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC). 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

    Open Access
    File
    3 Citations (Scopus)
    285 Downloads (Pure)
  • Examining the practical side channel resilience of arx-boxes

    Yan, Y. & Oswald, E., 30 Apr 2019, ACM International Conference on Computing Frontiers 2019, CF 2019 - Proceedings: April 30 - May 2, 2019, Alghero, Sardinia, Italy . Association for Computing Machinery (ACM), p. 373-379 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

    Open Access
    File
    4 Citations (Scopus)
    311 Downloads (Pure)
  • Fault Attack Countermeasures for Error Samplers in Lattice-Based Cryptography

    Howe, J., Khalid, A., Martinoli, M., Regazzoni, F. & Oswald, E., 22 Feb 2019, (Accepted/In press) IEEE International Symposium on Circuits and Systems (ISCAS).

    Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

    Open Access
  • MPC Joins The Dark Side

    Cartlidge, J., Smart, N. & Talibi Alaoui, Y., 12 Jul 2019, Asia CCS 2019: Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 148-159 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

    Open Access
    File
    25 Citations (Scopus)
    1050 Downloads (Pure)
  • Non-profiled Mask Recovery: The Impact of Independent Component Analysis

    Gao, S., Oswald, E., Chen, H. & Xi, W., 7 Mar 2019, Smart Card Research and Advanced Applications: 17th International Conference, CARDIS 2018, Montpelier, France, November 12–14, 2018, Revised Selected Papers. Springer, Cham, p. 51-64 14 p. (Lecture Notes in Computer Science; vol. 11389).

    Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

    Open Access
  • Residential Damp Detection with Temperature and Humidity Urban Sensing

    Nepomuceno, D., Tryfonas, T. & Vardanega, P., 5 Jul 2019, International Conference on Smart Infrastructure and Construction 2019 (ICSIC): Driving data-informed decision-making . DeJong, M., Schooling, J. & Viggiani, G. (eds.). Thomas Telford (ICE Publishing), p. 605-611 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

    Open Access
    File
    1 Citation (Scopus)
    188 Downloads (Pure)
  • 2018

    Adaptive static scheduling in IEEE 802.15.4 TSCH networks

    Fafoutis, X., Elsts, A., Oikonomou, G., Piechocki, R. & Craddock, I., Jun 2018, 2018 IEEE 4th World Forum on Internet of Things (WF-IoT). Institute of Electrical and Electronics Engineers (IEEE), p. 263-268 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

    Open Access
    File
    26 Citations (Scopus)
    368 Downloads (Pure)
  • Analysing Interface Bonding in 5G WLANs

    Dilmore, M., Doufexi, A. & Oikonomou, G., 1 Nov 2018, (E-pub ahead of print) 2018 IEEE 23rd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD 2018). Institute of Electrical and Electronics Engineers (IEEE), 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

    Open Access
    File
    3 Citations (Scopus)
    337 Downloads (Pure)
  • An Evaluation of Performance and Competition in Customer Services on Twitter: A UK Telecoms Case Study

    Albishry, N., Crick, T., Tryfonas, T. & Fagade, T., 23 Apr 2018, WWW’18 Companion, April 23–27, 2018, Lyon, France. Association for Computing Machinery (ACM), p. 1713-1720 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

    Open Access
    File
    1 Citation (Scopus)
    699 Downloads (Pure)
  • A Novel Use of Kernel Discriminant Analysis as a Higher-Order Side-Channel Distinguisher

    Zhou, X., Whitnall, C., Oswald, E., Sun, D. & Wang, Z., 26 Jan 2018, Smart Card Research and Advanced Applications: 16th International Conference, CARDIS 2017, Lugano, Switzerland, November 13–15, 2017, Revised Selected Papers. Springer, Cham, p. 70-87 18 p. (Lecture Notes in Computer Science; vol. 10728).

    Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

    Open Access
  • A Provably Secure PKCS#11 Configuration Without Authenticated Attributes

    Stanley-Oakes, R., 1 Feb 2018, Financial Cryptography and Data Security: 21st International Conference, FC 2017, Valletta, Malta, April 3-7, 2017, Revised Selected Papers. Springer Berlin Heidelberg, p. 145-162 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

    Open Access
    File
    323 Downloads (Pure)
  • A review of air quality sensing technologies and their potential interfaces with IoT for asthma management

    Bamashmoos, F., Woznowski, P. & Tryfonas, T., 26 Jun 2018, Proceedings of the 11th PErvasive Technologies Related to Assistive Environments Conference, PETRA 2018. Association for Computing Machinery (ACM), p. 470-475 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

    Open Access
    File
    4 Citations (Scopus)
    505 Downloads (Pure)
  • A Systematic Study of the Impact of Graphical Models on Inference-based Attacks on AES

    Green, J. A. F., Oswald, E. & Roy, A., 12 Nov 2018, (Accepted/In press) A Systematic Study of the Impact of Graphical Models on Inference-based Attacks on AES . CARDIS 2018, (Smart Card Research and Advanced Applications).

    Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

    Open Access
  • CAPA: The Spirit of Beaver Against Physical Attacks

    Reparaz, O., De Meyer, L., Bilgin, B., Arribas, V., Nikova, S., Nikov, V. & Smart, N., Sept 2018, Advanced in Cryptology - CRYPTO 2018: 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part II. Springer, Cham, p. 121-151 31 p. (Lecture Notes in Computer Science; vol. 10991).

    Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

    Open Access
    30 Citations (Scopus)
  • Energy-efficient, noninvasive water flow sensor

    Vafeas, A., Elsts, A., Pope, J., Fafoutis, X., Oikonomou, G., Piechocki, R. & Craddock, I., 26 Jul 2018, Proceedings - 2018 IEEE International Conference on Smart Computing, SMARTCOMP 2018. Institute of Electrical and Electronics Engineers (IEEE), p. 139-146 8 p. 8421342

    Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

    12 Citations (Scopus)
  • Evolving SDN for Low-Power IoT Networks

    Baddeley, M., Nejabati, R., Oikonomou, G., Sooriyabandara, M. & Simeonidou, D., 13 Sept 2018, (E-pub ahead of print) 2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft 2018): Proceedings of a meeting held 25-29 June 2018, Montreal, Quebec, Canada. Institute of Electrical and Electronics Engineers (IEEE), p. 71-79 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

    Open Access
    File
    55 Citations (Scopus)
    295 Downloads (Pure)
  • Exploring Potential 6LoWPAN Traffic Side Channels.

    Yan, Y., Oswald, E. & Tryfonas, T., 14 Feb 2018, EWSN ’18 Proceedings of the 2018 International Conference on Embedded Wireless Systems and Networks: Madrid, Spain, 14-16 February 2018. Association for Computing Machinery (ACM), p. 270-275 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

    Open Access
    File
    72 Downloads (Pure)
  • Machine-checked proofs for electronic voting: Privacy and verifiability for belenios

    Cortier, V., Dragan, C. C., Dupressoir, F. & Warinschi, B., Sept 2018, 2018 IEEE 31st Computer Security Foundations Symposium (CSF 2018): Proceedings of a meeting held 9-12 July 2018, Oxford, United Kingdom. Institute of Electrical and Electronics Engineers (IEEE), p. 298-312 15 p. 8429313

    Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

    20 Citations (Scopus)
  • Popularity and Geospatial Spread of Trends on Twitter: A Middle Eastern Case Study

    Albishry, N., Crick, T., Fagade, T. & Tryfonas, T., Sept 2018, Proceedings of the 10th International Conference on Computational Collective Intelligence (ICCCI 2018): 5-7 September 2018 - Bristol, UK. Springer, Vol. 11055. p. 167-177 11 p. 63. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

    Open Access
    File
    180 Downloads (Pure)
  • Public policy and skills for smart cities: The UK outlook

    Tryfonas, T. & Crick, T., 26 Jun 2018, PETRA '18: Proceedings of the 11th PErvasive Technologies Related to Assistive Environments Conference. Association for Computing Machinery (ACM), p. 116-117 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

    Open Access
    File
    17 Citations (Scopus)
    267 Downloads (Pure)
  • Reducing Communication Channels in MPC

    Keller, M., Rotaru, D., Smart, N. & Wood, T., Sept 2018, Security and Cryptography for Networks - SCN 2018. Catalano, D. & de Prisco, R. (eds.). Springer Berlin Heidelberg, p. 181-199 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

    Open Access
    9 Citations (Scopus)
  • Safe cryptography for all: towards visual metaphor driven cryptography building blocks

    van der Linden, D., Rashid, A., Williams, E. J. & Warinschi, B., 1 Oct 2018, 2018 IEEE/ACM 1st International Workshop on Security Awareness from Design to Deployment (SEAD 2018): Proceedings of a meeting held 27 May - 3 June 2018, Gothenburg, Sweden.. Association for Computing Machinery (ACM), p. 41-44 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

    Open Access
    File
    2 Citations (Scopus)
    155 Downloads (Pure)
  • Sensor-based smart hot-desking for improvement of office well-being

    Berelson, K., Simini, F., Tryfonas, T. & Cooper, P., 3 Oct 2018, DTUC’18: Digital Tools & Uses Congress, Paris 3-5 October 2018. Association for Computing Machinery (ACM), 9 p. 10. (ACM International Conference Proceedings Series).

    Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

    Open Access
    File
    6 Citations (Scopus)
    1068 Downloads (Pure)
  • SPHERE deployment manager: A tool for deploying IoT sensor networks at large scale

    Fafoutis, X., Elsts, A., Oikonomou, G. & Piechocki, R., 30 Aug 2018, Ad-hoc, Mobile, and Wireless Networks: 17th International Conference on Ad Hoc Networks and Wireless, ADHOC-NOW 2018, Saint-Malo, France, September 5-7, 2018. Proceedings. Springer, Cham, p. 307-318 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11104 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

    Open Access
    File
    2 Citations (Scopus)
    166 Downloads (Pure)
  • TSCH and 6TiSCH for Contiki: Challenges, Design and Evaluation

    Duquennoy, S., Elsts, A., Al Nahas, B. & Oikonomou, G., Apr 2018, 2017 13th International Conference on Distributed Computing in Sensor Systems (DCOSS 2017): Proceedings of a meeting held 5-7 June 2017, Ottawa, Ontario, Canada. Institute of Electrical and Electronics Engineers (IEEE), p. 11-18 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

    Open Access
    File
    89 Citations (Scopus)
    697 Downloads (Pure)
  • Untagging Tor: A Formal Treatment of Onion Encryption

    Degabriele, J. P. & Stam, M., 2 Jun 2018, Advances in Cryptology - EUROCRYPT 2018: 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part I. Buus Nielsen , J. & Rijmen , V. (eds.). Springer, p. 259-293 35 p. (Lecture Notes in Computer Science; vol. 10820).

    Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

    Open Access
    3 Citations (Scopus)
  • 2017

    Actively Secure 1-out-of-N OT Extension with Application to Private Set Intersection

    Orrù, M., Orsini, E. & Scholl, P., 1 Jan 2017, Topics in Cryptology - CT-RSA 2017: The Cryptographers' Track at the RSA Conference 2017. Springer-Verlag Berlin, p. 381-396 16 p. (Lecture Notes in Computer Science; vol. 10159).

    Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

    Open Access
    61 Citations (Scopus)
  • Adaptive Proofs Have Straightline Extractors (in the Random Oracle Model)

    Bernhard, D., Nguyen, N. K. & Warinschi, B., 26 Jun 2017, Applied Cryptography and Network Security: 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings. Springer, p. 336-353 18 p. (Lecture Notes in Computer Science; vol. 10355).

    Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

    Open Access
    File
    3 Citations (Scopus)
    245 Downloads (Pure)
  • Authenticated Encryption in the Face of Protocol and Side Channel Leakage

    Barwell, G., Martin, D., Oswald, E. & Stam, M., 30 Nov 2017, Advances in Cryptology - ASIACRYPT 2017: 23rd International Conference on the Theory and Application of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I. Springer, p. 693-723 31 p. (Lecture Notes in Computer Science; vol. 10624).

    Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

    Open Access
    36 Citations (Scopus)
  • Categorising and Comparing Cluster-Based DPA Distinguishers

    Zhou, X., Whitnall, C., Oswald, E., Sun, D. & Wang, Z., 23 Dec 2017, Selected Areas in Cryptography – SAC 2017: 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers. Springer, Cham, p. 442-458 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

    Open Access
    1 Citation (Scopus)
  • Cryptographic randomness on a CC2538: a case study

    Yan, Y., Oswald, E. & Tryfonas, T., Mar 2017, 8th IEEE International Workshop on Information Forensics and Security, WIFS 2016: Proceedings of a meeting held 4-7 December 2016, Abu Dhabi, United Arab Emirates.. Institute of Electrical and Electronics Engineers (IEEE), 6 p. 7823912. (International Workshops on Information Forensics and Security).

    Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

    Open Access
    3 Citations (Scopus)
  • Evaluating approaches for the next generation of difficulty and complexity assessment tools

    Beale, D., Tryfonas, T. & Young, M., 31 Jul 2017, 2017 IEEE Technology and Engineering Management Society Conference, TEMSCON 2017. Institute of Electrical and Electronics Engineers (IEEE), p. 227-233 7 p. 7998381

    Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

    7 Citations (Scopus)
  • Faster Homomorphic Evaluation of Discrete Fourier Transforms

    Costache, A., Smart, N. & Vivek, S., 23 Dec 2017, Financial Cryptography and Data Security: 21st International Conference, FC 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers. Springer, Cham, p. 517-529 13 p. (Lecture Notes in Computer Science; vol. 10322).

    Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

    Open Access
    10 Citations (Scopus)
  • Faster secure multi-party computation of AES and DES using lookup tables

    Keller, M., Orsini, E., Rotaru, D., Scholl, P., Soria-Vazquez, E. & Vivek, S., 26 Jun 2017, Applied Cryptography and Network Security: 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings. Springer, Cham, p. 229-249 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10355).

    Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

    Open Access
    24 Citations (Scopus)
  • Fixed-point arithmetic in SHE schemes

    Costache, A., Smart, N., Vivek, S. & Waller, A., 20 Oct 2017, (E-pub ahead of print) Selected Areas in Cryptography - SAC 2016: 23rd International Conference, St. John’s, NL, Canada, August 10-12, Revised Selected Papers. Springer, p. 401-422 22 p. (Lecture Notes in Computer Science; vol. 10532).

    Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

    Open Access
    26 Citations (Scopus)