Skip to content

Dr Daniel PagePh.D.(Bristol)

Senior Lecturer in Computer Science

31 - 40 out of 69Page size: 10
  1. 2009
  2. Published

    Program interpolation

    Moss, A. & Page, D., 2009, Partial Evaluation and Program Manipulation - PEPM. Association for Computing Machinery (ACM), p. 31-40

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Side channel analysis of cryptographic software via early-terminating multiplications

    Groszschaedl, J., Oswald, E., Page, D. & Tunstall, M., 2009, International Conference on Information Security and Cryptology - ICISC 2009. Springer Berlin Heidelberg, Vol. 5984. p. 176-192

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. 2008
  5. Published

    Implementation attacks, countermeasures & performance evaluation

    Whelan, C., Byrne, A., Page, D., Vercauteren, F. R. G., Scott, M. & Marnane, W., 2008, Identity- Based Cryptography. IOS Press, p. 226-243

    Research output: Chapter in Book/Report/Conference proceedingChapter in a book

  6. Published

    Light-weight instruction set extensions for bit-sliced cryptography

    Grabher, P., Groszschaedl, J. & Page, D., 2008, Cryptographic Hardware and Embedded Systems - CHES 2008. Springer Berlin Heidelberg, Vol. 5154. p. 331-345

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    On software parallel implementation of cryptographic pairings

    Grabher, P., Groszschaedl, J. & Page, D., 2008, Selected Areas in Cryptography - SAC 2008. Springer Berlin Heidelberg, Vol. 5381. p. 34-49

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Randomised representations

    Oswald, E., Page, D. & Smart, N., 2008, In : IET Information Security. 2, 2, p. 19-27

    Research output: Contribution to journalArticle

  9. Published

    Reassessing the TCG specifications for trusted computing in mobile and embedded systems

    Groszschaedl, J., Tobias, V. & Page, D., 2008, Hardware-Oriented Security and Trust - HOST 2008. Institute of Electrical and Electronics Engineers (IEEE), p. 84-90

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. 2007
  11. Published

    Compiler assisted elliptic curve cryptography

    Barbosa, M. B. M., Moss, A. D. & Page, D., 2007, Information Security - IS 2007. Springer Berlin Heidelberg, Vol. 4804. p. 1785-1802

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Cryptographic side-channels from low-power cache memory

    Grabher, P., Groszschaedl, J. & Page, D., 2007, Cryptography and Coding - IMACC 2007. Springer Berlin Heidelberg, Vol. 4887. p. 170-184

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Hardware/software co-design of public-key cryptography for SSL protocol execution in embedded systems

    Manuel, K., Groszschaedl, J. & Page, D., 2007, Workshop on Embedded Systems Security - WESS 2007.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution