Dr Daniel Page

Ph.D.(Bristol)

  • BS8 1UB

19992020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

2020

FENL: an ISE to mitigate analogue micro-architectural leakage

Gao, S., Marshall, B., Page, D. & Pham, T. H., 2 Mar 2020, In : IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES). 2020, 2, p. 73--98

Research output: Contribution to journalArticle (Academic Journal)

Open Access
2019

Share-slicing: Friend or Foe?

Gao, S., Marshall, B., Page, D. & Oswald, M. E., 19 Nov 2019, In : IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES). 2020, 1, p. 152-174

Research output: Contribution to journalArticle (Academic Journal)

Open Access
File
23 Downloads (Pure)
2017

Turning Online Ciphers Off

Andreeva, E., Barwell, G., Bhaumik, R., Nandi, M., Page, D. & Stam, M., 19 Jun 2017, In : Transactions on Symmetric Cryptology. 2017, 2, p. 105-142

Research output: Contribution to journalArticle (Academic Journal)

Open Access
File
61 Downloads (Pure)
2015

Rogue Decryption Failures: Reconciling AE Robustness Notions

Barwell, G., Page, D. & Stam, M., Dec 2015, Cryptography and Coding - IMACC 2015: 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings. Groth, J. (ed.). Springer, Vol. 9496. p. 94-111 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
13 Citations (Scopus)

SoC It to EM: ElectroMagnetic Side-Channel Attacks on a Complex System-on-Chip

Longo, J., De Mulder, E., Page, D. & Tunstall, M., 1 Sep 2015, Cryptographic Hardware and Embedded Systems - CHES 2015. 1 ed. Springer, Vol. 9293. p. 620-640 21 p. (Lecture Notes in Computer Science; vol. 9293).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
44 Citations (Scopus)
463 Downloads (Pure)
2014

Digital Investigations for IPv6-Based Wireless Sensor Networks

Kumar, V., Oikonomou, G., Tryfonas, T., Page, D. & Phillips, I., Aug 2014, In : Digital Investigation. 11, Supplement 2, p. S66-S75 12 p.

Research output: Contribution to journalSpecial issue (Academic Journal)

10 Citations (Scopus)

Simulatable Leakage: Analysis, Pitfalls, and New Constructions

Longo, J., Martin, D. P., Oswald, M. E., Page, D., Stam, M. & Tunstall, M., 7 Dec 2014, Advances in Cryptology - ASIACRYPT 2014. Springer Berlin Heidelberg, Vol. 8873. p. 223-242 (Lecture Notes in Computer Science; vol. 8873).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
7 Citations (Scopus)

What is Computer Science? An Information Security Perspective

Page, D. & Smart, N., 2014, Springer Verlag. (Undergraduate Topics in Computer Science)

Research output: Book/ReportAuthored book

2013

Light-weight primitive, feather-weight security: a cryptanalytic knock-out

Banciu, V., Hoerder, S. & Page, D., 2013, Workshop on Embedded Systems Security - WESS 2013. Association for Computing Machinery (ACM), p. 1--10

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

On secure embedded token design: Quasi-looped Yao circuits and bounded leakage

Hoerder, S., Järvinen, K. & Page, D., 2013, Workshop in Information Security Theory and Practice - WISTP 2013. Springer Berlin Heidelberg, Vol. 7886. p. 112-128

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

2012

Compiler assisted masking

Moss, A. D., Oswald, E., Page, D. & Tunstall, M., 2012, Cryptographic Hardware and Embedded Systems - CHES. Springer Berlin Heidelberg, Vol. 7428. p. 58-75

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

44 Citations (Scopus)

Efficient Java implementation of elliptic curve cryptography for J2ME-enabled mobile devices

Groszschaedl, J., Page, D. & Tillich, S., 2012, Workshop in Information Security Theory and Practice - WISTP 2012. Springer Berlin Heidelberg, Vol. 7322. p. 189--207

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

5 Citations (Scopus)

Fault attacks on pairing based cryptography: a state of the art

El Mrabet, N., Page, D. & Vercauteren, F. R. G., 2012, Fault Analysis in Cryptography. Springer, p. 221-236

Research output: Chapter in Book/Report/Conference proceedingChapter in a book

Harnessing biased faults in attacks on ECC-based signature schemes

Järvinen, K., Blondeau, C., Page, D. & Tunstall, M., 2012, Fault Diagnosis and Tolerance in Cryptography - FDTC 2012. Institute of Electrical and Electronics Engineers (IEEE), p. 72-82

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

8 Citations (Scopus)

On reconfigurable fabrics and generic side-channel countermeasures

Beat, R., Grabher, P., Page, D., Tillich, S. & Wojcik, M., 2012, Field Programmable Logic - FPL 2012. Institute of Electrical and Electronics Engineers (IEEE), p. 663--66

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

5 Citations (Scopus)

Practical realisation and elimination of an ECC-related software bug attack

Brumley, B., Barbosa, M. B. M., Page, D. & Vercauteren, F. R. G., 2012, Topics in Cryptology - CT-RSA 2012. Springer Berlin Heidelberg, Vol. 7178. p. 171-186

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

20 Citations (Scopus)

Using the cloud to determine key strengths

Kleinjung, T., Lenstra, A., Page, D. & Smart, N. P., 2012, Progress in Cryptology - INDOCRYPT 2012. Springer Berlin Heidelberg, Vol. 7668. p. 17-39

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

8 Citations (Scopus)
2011

An evaluation of hash functions on a power analysis resistant processor architecture

Hoerder, S., Wojcik, M., Tillich, S. & Page, D., 2011, Workshop in Information Security Theory and Practice - WISTP 2011. Springer Berlin Heidelberg, Vol. 6633. p. 160-174

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

3 Citations (Scopus)

An exploration of mechanisms for dynamic cryptographic instruction set extension

Grabher, P., Groszschaedl, J., Hoerder, S., Järvinen, K., Page, D., Tillich, S. & Wojcik, M., 2011, Cryptographic Hardware and Embedded Systems - CHES 2011. Springer Berlin Heidelberg, Vol. 6917. p. 1-16

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

1 Citation (Scopus)

An exploration of mechanisms for dynamic cryptographic instruction set extension

Grabher, P., Groszschaedl, J., Hoerder, S., Järvinen, K., Page, D., Tillich, S. & Wojcik, M., 2011, In : Journal of Cryptographic Engineering. 2, 1, p. 1-18 18 p.

Research output: Contribution to journalArticle (Academic Journal)

2 Citations (Scopus)

A unified multiply/accumulate unit for pairing-based cryptography over prime, binary and ternary fields

Vejda, T., Groszschaedl, J. & Page, D., 2011, Digital System Design, Architectures, Methods and Tools - DSD 2011. Institute of Electrical and Electronics Engineers (IEEE), p. 658-666

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Bit-sliced binary normal basis multiplication

Brumley, B. & Page, D., 2011, Computer Arithmetic - ARITH 2011. Institute of Electrical and Electronics Engineers (IEEE), p. 205-212

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

1 Citation (Scopus)

Can code polymorphism limit information leakage?

Amarilli, A., Muller, S., Naccache, D., Page, D., Rauzy, P. & Tunstall, M., 2011, Workshop on Information Security Theory and Practice - WISTP 2011. Springer Berlin Heidelberg, Vol. 6633. p. 1-21

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

9 Citations (Scopus)

Side-channel attacks on the McEliece and Niederreiter public-key cryptosystems

Avanzi, R. M., Hoerder, S., Page, D. & Tunstall, M., 2011, In : Journal of Cryptographic Engineering. 1, 4, p. 271-281

Research output: Contribution to journalArticle (Academic Journal)

18 Citations (Scopus)

Type checking cryptography implementations

Barbosa, M. B. M., Moss, A. D., Page, D., Rodrigues, N. & Silva, P. F., 2011, Fundamentals of Software Engineering - FSEN 2011. Springer Berlin Heidelberg, Vol. 7141. p. 316-334

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

3 Citations (Scopus)
2010

Bridging the gap between symbolic and efficient AES implementations

Moss, A. & Page, D., 2010, Partial Evaluation and Program Manipulation - PEPM 2010. Association for Computing Machinery (ACM), p. 101-110

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

5 Citations (Scopus)

On the design and implementation of an efficient DAA scheme

Chen, L., Page, D. & Smart, N., 2010, Smart Card Research and Advanced Application Conference - CARDIS 2010. Springer Berlin Heidelberg, Vol. 6035. p. 223-237 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

56 Citations (Scopus)

Using compilers to enhance cryptographic product development

Bangerter, E., Barbosa, M., Bernstein, D. J., Damgard, I., Page, D., Pagter, J. I., Sadeghi, A-R. & Sovio, S., 2010, Information Security Solutions Europe - ISSE 2010. Vieweg+Teubner, p. 291-301

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

2009

Constructive and destructive use of compilers in elliptic curve cryptography

Barbosa, M. B. M., Moss, A. D. & Page, D., Apr 2009, In : Journal of Cryptology. 22, 2, p. 259-281 23 p.

Research output: Contribution to journalArticle (Academic Journal)

6 Citations (Scopus)

Hardware/software co-design of public-key cryptography for SSL protocol execution in embedded systems

Koschuch, M., Groszschaedl, J., Page, D., Grabher, P., Hudler, M. & Kruger, M., 2009, Information and Communication Systems - ICICS 2009. Springer Berlin Heidelberg, Vol. 5927. p. 63-79

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

2 Citations (Scopus)

Non-deterministic processors: FPGA-based analysis of area, performance and security

Grabher, P., Groszschaedl, J. & Page, D., 2009, Workshop on Embedded Systems Security - WESS. Association for Computing Machinery (ACM), p. 1--10

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

15 Citations (Scopus)

Program interpolation

Moss, A. & Page, D., 2009, Partial Evaluation and Program Manipulation - PEPM. Association for Computing Machinery (ACM), p. 31-40

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Side channel analysis of cryptographic software via early-terminating multiplications

Groszschaedl, J., Oswald, E., Page, D. & Tunstall, M., 2009, International Conference on Information Security and Cryptology - ICISC 2009. Springer Berlin Heidelberg, Vol. 5984. p. 176-192

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

2008

Implementation attacks, countermeasures & performance evaluation

Whelan, C., Byrne, A., Page, D., Vercauteren, F. R. G., Scott, M. & Marnane, W., 2008, Identity- Based Cryptography. IOS Press, p. 226-243

Research output: Chapter in Book/Report/Conference proceedingChapter in a book

Light-weight instruction set extensions for bit-sliced cryptography

Grabher, P., Groszschaedl, J. & Page, D., 2008, Cryptographic Hardware and Embedded Systems - CHES 2008. Springer Berlin Heidelberg, Vol. 5154. p. 331-345

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

31 Citations (Scopus)

On software parallel implementation of cryptographic pairings

Grabher, P., Groszschaedl, J. & Page, D., 2008, Selected Areas in Cryptography - SAC 2008. Springer Berlin Heidelberg, Vol. 5381. p. 34-49

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

28 Citations (Scopus)

Randomised representations

Oswald, E., Page, D. & Smart, N., 2008, In : IET Information Security. 2, 2, p. 19-27

Research output: Contribution to journalArticle (Academic Journal)

Reassessing the TCG specifications for trusted computing in mobile and embedded systems

Groszschaedl, J., Tobias, V. & Page, D., 2008, Hardware-Oriented Security and Trust - HOST 2008. Institute of Electrical and Electronics Engineers (IEEE), p. 84-90

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

12 Citations (Scopus)
2007

Compiler assisted elliptic curve cryptography

Barbosa, M. B. M., Moss, A. D. & Page, D., 2007, Information Security - IS 2007. Springer Berlin Heidelberg, Vol. 4804. p. 1785-1802

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

5 Citations (Scopus)

Cryptographic side-channels from low-power cache memory

Grabher, P., Groszschaedl, J. & Page, D., 2007, Cryptography and Coding - IMACC 2007. Springer Berlin Heidelberg, Vol. 4887. p. 170-184

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

10 Citations (Scopus)

Hardware/software co-design of public-key cryptography for SSL protocol execution in embedded systems

Manuel, K., Groszschaedl, J. & Page, D., 2007, Workshop on Embedded Systems Security - WESS 2007.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Instruction set extensions for pairing-based cryptography

Vejda, T., Page, D. & Groszschaedl, J., 2007, Pairing-Based Cryptography --- PAIRING 2007. Springer Berlin Heidelberg, Vol. 4575. p. 208-224

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

11 Citations (Scopus)

Non-deterministic multi-threading

Leadbitter, P., Page, D. & Smart, N., 2007, In : IEEE Transactions on Computers. 56, 7, p. 992-998

Research output: Contribution to journalArticle (Academic Journal)

Toward acceleration of RSA using 3D Graphics hardware

Moss, A., Page, D. & Smart, N., 2007, Cryptography and Coding - IMACC 2007. Springer Berlin Heidelberg, Vol. 4887. p. 369-388

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

32 Citations (Scopus)
2006

A comparison of MNT curves and supersingular curves

Page, D., Smart, N. & Vercauteren, F. R. G., 2006, In : Applicable Algebra in Engineering, Communication and Computing. 17, 5, p. 379-392

Research output: Contribution to journalArticle (Academic Journal)

35 Citations (Scopus)

A fault attack on pairing-based cryptography

Page, DS. & Vercauteren, F. R. G., 2006, In : IEEE Transactions on Computers. 55, 9, p. 1075-1080 6 p.

Research output: Contribution to journalArticle (Academic Journal)

52 Citations (Scopus)

Discrete logarithm variants of VSH

Lenstra, A., Page, D. & Stam, M., 2006, Vietcrypt. Springer Berlin Heidelberg, Vol. 4341. p. 229-242

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

4 Citations (Scopus)

High security pairing-based cryptography revisited

Granger, R., Page, D. & Smart, N. P., 2006, Algorithmic Number Theory Symposium - ANTS VII. Springer Berlin Heidelberg, Vol. 4076. p. 480-494

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

42 Citations (Scopus)

LASH

Bentahar, K., Page, D., Saarinen, M-J. O., Silverman, J. H. & Smart, N., 2006, NIST: The Second Cryptographic Hash Workshop. Online, p. -

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

On small characteristic algebraic tori in pairing based cryptography

Granger, R., Page, D. & Stam, M., 2006, In : LMS Journal of Computation and Mathematics. 9, p. 64-85

Research output: Contribution to journalArticle (Academic Journal)