Research Output

Filter
Article (Academic Journal)
2020

FENL: an ISE to mitigate analogue micro-architectural leakage

Gao, S., Marshall, B., Page, D. & Pham, T. H., 2 Mar 2020, In : IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES). 2020, 2, p. 73--98

Research output: Contribution to journalArticle (Academic Journal)

Open Access

The long and winding road: MBSE adoption for functional avionics of spacecraft

Gregory, J., Berthoud, L., Tryfonas, T., Rossignol, A. & Faure, L., 1 Feb 2020, In : Journal of Systems and Software. 160, 11 p., 110453.

Research output: Contribution to journalArticle (Academic Journal)

Open Access
File
134 Downloads (Pure)
2019

Efficient Constant-Round Multi-party Computation Combining BMR and SPDZ

Lindell, Y., Pinkas, B., Smart, N. P. & Yanai, A., 15 Jul 2019, In : Journal of Cryptology. 32, 3, p. 1026-1069 44 p.

Research output: Contribution to journalArticle (Academic Journal)

Open Access
File
1 Citation (Scopus)
28 Downloads (Pure)

Investigating the Flexibility of the MBSE Approach to the Biomass Mission

Gregory, J. R., Berthoud, L., Tryfonas, T., Prezzavento, A. & Faure, L., 23 Nov 2019, (Accepted/In press) In : IEEE Transactions on Systems, Man, and Cybernetics: Systems. 16 p.

Research output: Contribution to journalArticle (Academic Journal)

4 Downloads (Pure)

Share-slicing: Friend or Foe?

Gao, S., Marshall, B., Page, D. & Oswald, M. E., 19 Nov 2019, In : IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES). 2020, 1, p. 152-174

Research output: Contribution to journalArticle (Academic Journal)

Open Access
File
28 Downloads (Pure)
2018

Efficient DCT-based secret key generation for the Internet of Things

Margelis, G., Fafoutis, X., Oikonomou, G., Piechocki, R., Tryfonas, T. & Thomas, P., 28 Aug 2018, In : Ad Hoc Networks. 11 p.

Research output: Contribution to journalArticle (Academic Journal)

Open Access
File
9 Citations (Scopus)
287 Downloads (Pure)

From Keys to Databases—Real-World Applications of Secure Multi-Party Computation

Archer, D. W., Bogdanov, D., Lindell, Y., Kamm, L., Nielsen, K., Pagter, J. I., Smart, N. P. & Wright, R. N., 1 Dec 2018, In : Computer Journal. 61, 12, p. 1749-1771 23 p.

Research output: Contribution to journalArticle (Academic Journal)

Open Access
14 Citations (Scopus)

In compute/memory dynamic packet/circuit switch placement for optically disaggregated data centers

Peters, A., Oikonomou, G. & Zervas, G., Jul 2018, In : IEEE/OSA Journal of Optical Communications and Networking. 10, 7, p. B164-B178 15 p.

Research output: Contribution to journalArticle (Academic Journal)

Open Access
File
4 Citations (Scopus)
108 Downloads (Pure)

Temperature-resilient time synchronization for the internet of things

Elsts, A., Fafoutis, X., Duquennoy, S., Oikonomou, G., Piechocki, R. & Craddock, I., May 2018, In : IEEE Transactions on Industrial Informatics. 14, 5, p. 2241-2250 10 p.

Research output: Contribution to journalArticle (Academic Journal)

Open Access
File
10 Citations (Scopus)
229 Downloads (Pure)
2017

An intelligent hot-desking model harnessing the power of occupancy sensing

Cooper, P. B., Maraslis, K., Tryfonas, T. & Oikonomou, G., 3 Oct 2017, In : Facilities. 35, 13/14, p. 766-786 21 p.

Research output: Contribution to journalArticle (Academic Journal)

Open Access
File
4 Citations (Scopus)
202 Downloads (Pure)

An SME Decision Support System Utilising Defined Scoring Methods

Pashley, D., Tryfonas, T., Crossley, A. & Setchell, C., 31 Dec 2017, In : International Journal on Advances in Intelligent Systems. 10, 3/4, p. 327-344 18 p.

Research output: Contribution to journalArticle (Academic Journal)

Open Access
File
76 Downloads (Pure)

Hacking a bridge: An exploratory study of compliance-based information security management in banking organization

Fagade, T. & Tryfonas, T., 8 Jul 2017, In : Journal of Systemics, Cybernetics and Informatics. 15, 5, p. 74-80 7 p.

Research output: Contribution to journalArticle (Academic Journal)

Open Access
File
27 Downloads (Pure)

Modes of Operation Suitable for Computing on Encrypted Data

Rotaru, D., Smart, N. & Stam, M., 1 Aug 2017, In : Transactions on Symmetric Cryptology. 2017, 3, p. 294-324 31 p.

Research output: Contribution to journalArticle (Academic Journal)

Open Access

On the Shape of the General Error Locator Polynomial for Cyclic Codes

Caruso, F., Orsini, E., Sala, M. & Tinnirello, C., Jun 2017, In : IEEE Transactions on Information Theory. 63, 6, p. 3641-3557 17 p.

Research output: Contribution to journalArticle (Academic Journal)

Open Access
File
6 Citations (Scopus)
248 Downloads (Pure)

Rapid Deployment of a WSN on the Clifton Suspension Bridge, UK

Gunner, S., Vardanega, P., Tryfonas, T., Macdonald, J. & Wilson, E., 22 Dec 2017, In : Proceedings of the ICE - Smart Infrastructure and Construction. 170, 3, p. 59-71 13 p.

Research output: Contribution to journalArticle (Academic Journal)

Open Access
File
315 Downloads (Pure)

The Security of Tandem-DM in the Ideal Cipher Model

Lee, J., Stam, M. & Steinberger, J., 1 Apr 2017, In : Journal of Cryptology. 30, 2, p. 495-518 24 p.

Research output: Contribution to journalArticle (Academic Journal)

2 Citations (Scopus)

Towards effective cybersecurity resource allocation: the Monte Carlo predictive modelling approach

Fagade, T., Maraslis, K. & Tryfonas, T., Dec 2017, In : International Journal of Critical Infrastructures. 13, 2-3, p. 152-167 16 p.

Research output: Contribution to journalArticle (Academic Journal)

Open Access
File
1 Citation (Scopus)
254 Downloads (Pure)

Turning Online Ciphers Off

Andreeva, E., Barwell, G., Bhaumik, R., Nandi, M., Page, D. & Stam, M., 19 Jun 2017, In : Transactions on Symmetric Cryptology. 2017, 2, p. 105-142

Research output: Contribution to journalArticle (Academic Journal)

Open Access
File
66 Downloads (Pure)
2016

Adaptive proofs of knowledge in the random oracle model

Bernhard, D., Fischlin, M. & Warinschi, B., Nov 2016, In : IET Information Security. 10, 6, p. 319-331 13 p.

Research output: Contribution to journalArticle (Academic Journal)

Open Access
File
2 Citations (Scopus)
267 Downloads (Pure)

A Study on Usability and Security Features of the Android Pattern Lock Screen

Andriotis, P., Oikonomou, G., Mylonas, A. & Tryfonas, T., 1 Mar 2016, In : Information and Computer Security. 24, 1, p. 53-72

Research output: Contribution to journalArticle (Academic Journal)

5 Citations (Scopus)

Bootstrapping BGV Ciphertexts with a Wider Choice of p and q

Orsini, E. A., Smart, N. P. & van de Pol, J., 27 Oct 2016, In : IET Information Security. 10, 6, p. 348-357

Research output: Contribution to journalArticle (Academic Journal)

Open Access
2 Downloads (Pure)

Highlighting Relationships of a Smartphone's Social Ecosystem in Potentially Large Investigations

Andriotis, P., Oikonomou, G., Tryfonas, T. & Li, S., 16 Aug 2016, In : IEEE Transactions on Cybernetics. 46, 9, p. 1974-1985

Research output: Contribution to journalArticle (Academic Journal)

7 Citations (Scopus)

Implementation of a leakage-resilient ElGamal key encapsulation mechanism

Galindo, D., Großschädl, J., Liu, Z., Vadnala, P. K. & Vivek, S., Sep 2016, In : Journal of Cryptographic Engineering. 6, 3, p. 229-238 10 p.

Research output: Contribution to journalArticle (Academic Journal)

Open Access
8 Citations (Scopus)

Risk Assessment for Mobile Systems Through a Multilayered Hierarchical Bayesian Network

Li, S., Tryfonas, T., Russell, G. & Andriotis, P., Aug 2016, In : IEEE Transactions on Cybernetics. 46, 8, p. 1749-1759 11 p.

Research output: Contribution to journalArticle (Academic Journal)

Open Access
File
27 Citations (Scopus)
321 Downloads (Pure)
2015

A Game Theoretical Method for Cost-Benefit Analysis of Malware Dissemination Prevention

Spyridopoulos, T., Maraslis, K., Mylonas, A., Tryfonas, T. & Oikonomou, G., 31 Dec 2015, In : Information Security Journal. 24, 4-6, p. 164-176 13 p.

Research output: Contribution to journalArticle (Academic Journal)

6 Citations (Scopus)

Efficient Asynchronous Verifiable Secret Sharing and Multiparty Computation

Patra, A., Choudhury, A. & Rangan, C. P., Jan 2015, In : Journal of Cryptology. 28, 1, p. 49-109 61 p.

Research output: Contribution to journalArticle (Academic Journal)

8 Citations (Scopus)

Finding shortest lattice vectors faster using quantum search

Laarhoven, T., Mosca, M. & Van De Pol, J., Dec 2015, In : Designs, Codes and Cryptography. 77, 2, p. 375-400 26 p.

Research output: Contribution to journalArticle (Academic Journal)

Open Access
File
32 Citations (Scopus)
268 Downloads (Pure)

MJH: a faster alternative to MDC-2

Lee, J. & Stam, M., Aug 2015, In : Designs, Codes and Cryptography. 76, 2, p. 179-205

Research output: Contribution to journalArticle (Academic Journal)

3 Citations (Scopus)
2014

All-or-Nothing Transforms as a countermeasure to differential side-channel analysis

McEvoy, R. P., Tunstall, M., Whelan, C., Murphy, C. C. & Marnane, W. P., Jun 2014, In : International Journal of Information Security. 13, 3, p. 291-304 14 p.

Research output: Contribution to journalArticle (Academic Journal)

5 Citations (Scopus)

Anonymity guarantees of the UMTS/LTE authentication and connection protocol

Lee, M-F., Smart, N. P., Warinschi, B. & Watson, G. J., 2014, In : International Journal of Information Security. 13, 6, p. 513-527 15 p.

Research output: Contribution to journalArticle (Academic Journal)

9 Citations (Scopus)

Asynchronous Byzantine Agreement with optimal resilience

Patra, A., Choudhury, A. & Rangan, C. P., Apr 2014, In : Distributed Computing. 27, 2, p. 111-146 36 p.

Research output: Contribution to journalArticle (Academic Journal)

9 Citations (Scopus)

Cryptographic puzzles and DoS resilience, revisited.

Groza, B. & Warinschi, B., 2014, In : Designs, Codes and Cryptography. 73, 1, p. 177-207 31 p.

Research output: Contribution to journalArticle (Academic Journal)

8 Citations (Scopus)

Deducibility constraints and blind signatures

Bursuc, S., Comon-Lundh, H. & Delaune, S., Nov 2014, In : Information and Computation. 238, p. 106-127

Research output: Contribution to journalArticle (Academic Journal)

Fully homomorphic SIMD operations

Smart, N. P. & Vercauteren, F. R. G., 1 Apr 2014, In : Designs, Codes and Cryptography. 71, 1, p. 57-81

Research output: Contribution to journalArticle (Academic Journal)

199 Citations (Scopus)

On the Amortized Complexity of Zero-Knowledge Protocols

Cramer, R., Damgård, I. & Keller, M., 2014, In : Journal of Cryptology. 27, 2, p. 284-316 33 p.

Research output: Contribution to journalArticle (Academic Journal)

6 Citations (Scopus)
2013

A Game Theoretic Defence Framework Against DoS/DDoS Cyber Attacks

Spyridopoulos, T., Karanikas, G., Tryfonas, T. & Oikonomou, G., Oct 2013, In : Computers and Security. 38, p. 39-50

Research output: Contribution to journalArticle (Academic Journal)

50 Citations (Scopus)

A note on time-bound hierarchical key assignment schemes

Ateniese, G., Santis, A. D., Ferrara, A-L. & Masucci, B., 2013, In : Information Processing Letters. 113, 5-6, p. 151-155 5 p.

Research output: Contribution to journalArticle (Academic Journal)

6 Citations (Scopus)

Differential Fault Analysis of AES: Towards Reaching its Limits

Ali, S. S., Mukhopadhyay, D. & Tunstall, M., 2013, In : Journal of Cryptographic Engineering. 3, 2, p. 73 97 p.

Research output: Contribution to journalArticle (Academic Journal)

24 Citations (Scopus)

Field switching in BGV-style homomorphic encryption

Gentry, C., Halevi, S., Peikert, C. & Smart, N. P., 2013, In : Journal of Computer Security. 21, 5, p. 663-684

Research output: Contribution to journalArticle (Academic Journal)

17 Citations (Scopus)

JPEG Steganography Detection with Benford's Law

Andriotis, P., Oikonomou, G. & Tryfonas, T., 15 Mar 2013, In : Digital Investigation. 9, 3-4, p. 246-257

Research output: Contribution to journalArticle (Academic Journal)

19 Citations (Scopus)

Less is more: relaxed yet composable security notions for key exchange

Brzuska, C., Fischlin, M., Smart, N. P., Warinschi, B. & Williams, S. C., 2013, In : International Journal of Information Security. 12, p. 267-297

Research output: Contribution to journalArticle (Academic Journal)

22 Citations (Scopus)

Multilevel Visualization Using Enhanced Social Network Analysis with Smartphone Data

Andriotis, P., Tzermias, Z., Mparmpaki, A., Ioannidis, S. & Oikonomou, G., 2013, In : International Journal of Digital Crime and Forensics. 5, 4, p. 34-54

Research output: Contribution to journalArticle (Academic Journal)

6 Citations (Scopus)

Privacy-supporting cloud computing by in-browser key translation

Arapinis, M., Bursuc, S. & Ryan, M., 2013, In : Journal of Computer Security. 21, p. 846 880 p., 6.

Research output: Contribution to journalArticle (Academic Journal)

10 Citations (Scopus)
2012

A practical device authentication scheme using SRAM PUFs

Koeberl, P., Li, J., Maes, R., Rajan, A., Vishik, C., Wojcik, M. & Wu, W., 2012, In : Journal of Cryptographic Engineering. 2, 4, p. 255-269 14 p.

Research output: Contribution to journalArticle (Academic Journal)

4 Citations (Scopus)

Design and Performance Evaluation of a Lightweight Wireless Early Warning Intrusion Detection Prototype

Fragkiadakis, A., Tragos, E., Tryfonas, T. & Askoxylakis, I., 2012, In : EURASIP Journal on Wireless Communications and Networking. 2012:73, p. 1-18

Research output: Contribution to journalArticle (Academic Journal)

22 Citations (Scopus)

Improved decoding of affine-variety codes

Orsini, E. A., Marcolla, C. & Sala, M., 2012, In : Journal of Pure and Applied Algebra. 216, 7, p. 1533 1565 p.

Research output: Contribution to journalArticle (Academic Journal)

22 Citations (Scopus)

On the Trade-Off between Network Connectivity, Round Complexity, and Communication Complexity of Reliable Message Transmission

Badanidiyuru, A., Patra, A., Choudhary, A., Kannan, S. & Chandrasekaran, P. R., 2012, In : Journal of the ACM. 22, 5, p. 1-35 35 p., 22.

Research output: Contribution to journalArticle (Academic Journal)

5 Citations (Scopus)

Pinpointing Side-Channel Information Leaks in Web Applications

Mather, L. T. & Oswald, M. E., Oct 2012, In : Journal of Cryptographic Engineering. 2, 3, p. 161-177

Research output: Contribution to journalArticle (Academic Journal)

7 Citations (Scopus)

Provably-Secure Time-Bound Hierarchical Key Assignment Schemes

Ateniese, G., De Santis, A., Ferrara, A-L. & Masucci, B., 2012, In : Journal of Cryptology. 25, 2, p. 243-270

Research output: Contribution to journalArticle (Academic Journal)

42 Citations (Scopus)

Relations between the security models for certificateless encryption and ID-based key agreement

Fiore, D., Gennaro, R. & Smart, N., Feb 2012, In : International Journal of Information Security. 11, 1, p. 1-22 22 p.

Research output: Contribution to journalArticle (Academic Journal)

2 Citations (Scopus)