Professor Nigel P Smart

B.Sc.(R'dg), Ph.D.(Kent)

  • BS8 1UB

1992 …2019

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

2019

Efficient Constant-Round Multi-party Computation Combining BMR and SPDZ

Lindell, Y., Pinkas, B., Smart, N. P. & Yanai, A., 15 Jul 2019, In : Journal of Cryptology. 32, 3, p. 1026-1069 44 p.

Research output: Contribution to journalArticle (Academic Journal)

Open Access
File
1 Citation (Scopus)
28 Downloads (Pure)

MPC Joins The Dark Side

Cartlidge, J., Smart, N. & Talibi Alaoui, Y., 12 Jul 2019, AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 148-159 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
2 Citations (Scopus)
336 Downloads (Pure)
2018

CAPA: The Spirit of Beaver Against Physical Attacks

Reparaz, O., De Meyer, L., Bilgin, B., Arribas, V., Nikova, S., Nikov, V. & Smart, N., Sep 2018, Advanced in Cryptology - CRYPTO 2018: 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part II. Springer, Cham, p. 121-151 31 p. (Lecture Notes in Computer Science; vol. 10991).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
6 Citations (Scopus)

From Keys to Databases—Real-World Applications of Secure Multi-Party Computation

Archer, D. W., Bogdanov, D., Lindell, Y., Kamm, L., Nielsen, K., Pagter, J. I., Smart, N. P. & Wright, R. N., 1 Dec 2018, In : Computer Journal. 61, 12, p. 1749-1771 23 p.

Research output: Contribution to journalArticle (Academic Journal)

Open Access
14 Citations (Scopus)

Reducing Communication Channels in MPC

Keller, M., Rotaru, D., Smart, N. & Wood, T., Sep 2018, Security and Cryptography for Networks - SCN 2018. Catalano, D. & de Prisco, R. (eds.). Springer Berlin Heidelberg, p. 181-199 19 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
4 Citations (Scopus)
2017

Faster Homomorphic Evaluation of Discrete Fourier Transforms

Costache, A., Smart, N. & Vivek, S., 23 Dec 2017, Financial Cryptography and Data Security: 21st International Conference, FC 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers. Springer, Cham, p. 517-529 13 p. (Lecture Notes in Computer Science; vol. 10322).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
4 Citations (Scopus)

Fixed-point arithmetic in SHE schemes

Costache, A., Smart, N., Vivek, S. & Waller, A., 20 Oct 2017, Selected Areas in Cryptography - SAC 2016: 23rd International Conference, St. John’s, NL, Canada, August 10-12, Revised Selected Papers. Springer, p. 401-422 22 p. (Lecture Notes in Computer Science; vol. 10532).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
10 Citations (Scopus)

Generic Forward-Secure Key Agreement Without Signatures

Delpech de Saint Guilhem, C., Smart, N. & Warinschi, B., 20 Sep 2017, Information Security - ISC 2017: 20th International Conference, ISC 2017, Ho Chi Minh City, Vietnam, November 22-24 2017. Proceedings. Springer, Cham, p. 114-133 20 p. (Lecture Notes in Computer Science; vol. 10599).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
2 Citations (Scopus)

Modes of Operation Suitable for Computing on Encrypted Data

Rotaru, D., Smart, N. & Stam, M., 1 Aug 2017, In : Transactions on Symmetric Cryptology. 2017, 3, p. 294-324 31 p.

Research output: Contribution to journalArticle (Academic Journal)

Open Access

Multi-rate threshold FlipThem

Leslie, D., Sherfield, C. & Smart, N., 1 Sep 2017, European Symposium on Research in Computer Security: ESORICS 2017: Part II. Springer, Vol. 10493. p. 174-190 17 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access

Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts

Albrecht, M., Orsini, E., Patterson, K. G., Peer, G. & Smart, N. P., 1 Sep 2017, European Symposium on Research in Computer Security: ESORICS 2017: Part I. Springer, Vol. 10492. p. 29-46 18 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
6 Citations (Scopus)

When It’s All Just Too Much: Outsourcing MPC-Preprocessing

Scholl, P., Smart, N. & Wood, T., 25 Nov 2017, Cryptography and Coding - IMACC 2017: 16th IMA International Conference, IMACC 2017, Oxford, UK, December 12-14, 2017. Proceedings. Springer, p. 77-99 23 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
2 Citations (Scopus)
2016

Bootstrapping BGV Ciphertexts with a Wider Choice of p and q

Orsini, E. A., Smart, N. P. & van de Pol, J., 27 Oct 2016, In : IET Information Security. 10, 6, p. 348-357

Research output: Contribution to journalArticle (Academic Journal)

Open Access
2 Downloads (Pure)

Cryptography Made Simple

Smart, N. P., 2016, Springer. (Information Security and Cryptography)

Research output: Book/ReportAuthored book

Linear Overhead Optimally-resilient Robust MPC Using Preprocessing

Choudhury, A., Orsini, E., Patra, A. & Smart, N., 2016, Security and Cryptography for Networks - SCN 2016: 10th International Conference, SCN 2016, Amalfi, Italy, August 31 – September 2, 2016, Proceedings. Zikas, V. & De Prisco, R. (eds.). Springer, Vol. 9841. p. 147-168 22 p. (Lecture Notes in Computer Science; vol. 9841).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
1 Citation (Scopus)

More Efficient Constant-Round Multi-Party Computation from BMR and SHE

Lindell, Y., Smart, N. & Soria-Vázquez, E., Nov 2016, Theory of Cryptography: 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part I. Springer, p. 554-581 28 p. (Lecture Notes in Computer Science; vol. 9985).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
13 Citations (Scopus)

MPC-Friendly Symmetric Key Primitives

Grassi, L., Rechberger, C., Rotaru, D., Scholl, P. & Smart, N., 24 Oct 2016, ACM Conference on Computer and Communications Security - CCS 2016. Association for Computing Machinery (ACM), p. 430-443 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
16 Citations (Scopus)

Which Ring Based Somewhat Homomorphic Encryption Scheme is Best?

Costache, A. & Smart, N. P., 29 Feb 2016, Topics in Cryptology - CT-RSA 2016: The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings. Springer, p. 325-340 16 p. (Lecture Notes in Computer Science; vol. 9610).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
27 Citations (Scopus)
2015

Bootstrapping BGV ciphertexts with a wider choice of p and q

Orsini, E. A., van de Pol, J. & Smart, N. P., 30 Mar 2015, Public-Key Cryptography - PKC 2015. Katz, J. (ed.). Springer Berlin Heidelberg, p. 673-698 26 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9020).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
2 Citations (Scopus)

Efficient Constant Round Multi-Party Computation Combining BMR and SPDZ

Lindell, Y., Pinkas, B., Smart, N. & Yanai, A., 19 Aug 2015, Advances in Cryptology - CRYPTO 2015. Springer, Vol. 9216. p. 319-338 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
40 Citations (Scopus)

Just a Little Bit More

van de Pol, J., Smart, N. P. & Yarom, Y., 20 Apr 2015, Topics in Cryptology - CT-RSA 2015. Nyberg, K. (ed.). Springer International Publishing AG, Vol. 9048. p. 3-21 (Lecture Notes in Computer Science; vol. 9048).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
33 Citations (Scopus)

Threshold FlipThem: When the winner does not need to take all

Leslie, D., Sherfield, C. & Smart, N., 4 Nov 2015, Decision and Game Theory for Security - GameSec 2015. Springer, Vol. 9406. p. 74-92 19 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
6 Citations (Scopus)
2014

Actively Secure Private Function Evaluation

Mohassel, P., Sadeghian, S. S. & Smart, N. P., 2014, Advances in Cryptology - ASIACRYPT 2014. Sarkar, P. & Iwata, T. (eds.). Springer, Vol. 8874. p. 486-505 20 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

8 Citations (Scopus)

Anonymity guarantees of the UMTS/LTE authentication and connection protocol

Lee, M-F., Smart, N. P., Warinschi, B. & Watson, G. J., 2014, In : International Journal of Information Security. 13, 6, p. 513-527 15 p.

Research output: Contribution to journalArticle (Academic Journal)

9 Citations (Scopus)

Dishonest Majority Multi-Party Computation for Binary Circuits

Larraia De Vega, E., Orsini, E. & Smart, N. P., 2014, Advances in Cryptology - CRYPTO 2014. Garay, J. A. & Gennaro, R. (eds.). Springer, Vol. 8617. p. 495-512 18 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

21 Citations (Scopus)

Fully homomorphic SIMD operations

Smart, N. P. & Vercauteren, F. R. G., 1 Apr 2014, In : Designs, Codes and Cryptography. 71, 1, p. 57-81

Research output: Contribution to journalArticle (Academic Journal)

199 Citations (Scopus)

'Ooh Aah... Just a Little Bit' : A Small Amount of Side Channel Can Go a Long Way

Benger, N., van de Pol, J., Smart, N. P. & Yarom, Y., 23 Sep 2014, Cryptographic Hardware and Embedded Systems - CHES 2014. Batina, L. & Robshaw, M. (eds.). Springer Verlag, Vol. 8731. p. 75-92 (Lecture Notes in Computer Science; vol. 8731).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Reducing the Overhead of MPC over a Large Population

Choudhary, A., Patra, A. & Smart, N. P., 29 Aug 2014, Security and Cryptography for Networks - SCN 2014. Springer Verlag, Vol. 8642. p. 197-217 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

2 Citations (Scopus)

What is Computer Science? An Information Security Perspective

Page, D. & Smart, N., 2014, Springer Verlag. (Undergraduate Topics in Computer Science)

Research output: Book/ReportAuthored book

2013

An Analysis of the EMV Channel Establishment Protocol

Brzuska, C., Smart, N. P., Warinschi, B. & Watson, G., 4 Nov 2013, ACM CCS 2013. Association for Computing Machinery (ACM), p. 373-386

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

20 Citations (Scopus)

An Architecture for Practical Actively Secure MPC with Dishonest Majority

Keller, M. K. S., Scholl, P. & Smart, N. P., 4 Nov 2013, ACM CCS 2013. Association for Computing Machinery (ACM), p. 549-560

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

38 Citations (Scopus)

Between a Rock and a Hard Place: Interpolating between MPC and FHE

Choudhury, A., Loftus, J. J., Orsini, E. A., Patra, A. & Smart, N. P., Dec 2013, Advances in Cryptology - ASIACRYPT 2013. Springer Verlag, Vol. 8270. p. 221-240 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

13 Citations (Scopus)

Estimating Key Sizes for High Dimensional Lattice-Based Systems

van de Pol, J. & Smart, N. P., Dec 2013, Proc. Cryptography and Coding. Springer, Vol. 8308. p. 290-303 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

24 Citations (Scopus)

Field switching in BGV-style homomorphic encryption

Gentry, C., Halevi, S., Peikert, C. & Smart, N. P., 2013, In : Journal of Computer Security. 21, 5, p. 663-684

Research output: Contribution to journalArticle (Academic Journal)

17 Citations (Scopus)

Less is more: relaxed yet composable security notions for key exchange

Brzuska, C., Fischlin, M., Smart, N. P., Warinschi, B. & Williams, S. C., 2013, In : International Journal of Information Security. 12, p. 267-297

Research output: Contribution to journalArticle (Academic Journal)

22 Citations (Scopus)

Practical Covertly Secure MPC for Dishonest Majority - Or: Breaking the SPDZ Limits

Damgård, I., Keller, M., Larraia, E., Pastro, V., Scholl, P. & Smart, N. P., 2013, Computer Security - ESORICS 2013. Crampton, J., Jajodia, S. & Mayes, K. (eds.). Springer, Vol. 8134. p. 1-18 18 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

139 Citations (Scopus)

The Low-Call Diet: Authenticated Encryption for Call Counting HSM Users

Bond, M., French, G., Smart, N. P. & Watson, G. J., 2013, Topics in Cryptology - CT-RSA 2013. Dawson, E. (ed.). Springer, Vol. 7779. p. 359-374 16 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

1 Citation (Scopus)
2012

Better Bootstrapping in Fully Homomorphic Encryption

Gentry, C., Halevi, S. & Smart, N. P., 2012, Public Key Cryptography - PKC 2012. Fischlin, M., Buchmann, J. & Manulis, M. (eds.). Springer Berlin Heidelberg, Vol. 7293. p. 1-16 16 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

98 Citations (Scopus)

Efficient Two-Move Blind Signatures in the Common Reference String Model

Ghadafi, E. & Smart, N. P., 2012, Information Security - ISC 2012. Springer, Vol. 7483. p. 274-289 16 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

7 Citations (Scopus)

Fully Homomorphic Encryption with Polylog Overhead

Gentry, C., Halevi, S. & Smart, N. P., 2012, Advances in Cryptology - EUROCRYPT 2012. Pointcheval, D. & Johansson, T. (eds.). Springer Berlin Heidelberg, Vol. 7237. p. 465-482 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

217 Citations (Scopus)

Homomorphic Evaluation of the AES Circuit

Gentry, C., Halevi, S. & Smart, N. P., 2012, Advances in Cryptology - CRYPTO 2012. Safavi-Naini, R. & Canetti, R. (eds.). Springer Berlin Heidelberg, Vol. 7417. p. 850-867 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

295 Citations (Scopus)

Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocol

Damgård, I., Keller, M., Larraia, E., Miles, C. & Smart, N. P., 2012, Security and Cryptography for Networks - SCN 2012. Springer, Vol. 7485. p. 241-263 23 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

32 Citations (Scopus)

Multiparty Computation from Somewhat Homomorphic Encryption

Damgård, I., Pastro, V., Smart, N. P. & Zakarias, S., 2012, Advances in Cryptology - CRYPTO 2012. Safavi-Naini, R. & Canetti, R. (eds.). Springer Berlin Heidelberg, Vol. 7417. p. 643-662 20 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

363 Citations (Scopus)

On CCA-Secure Somewhat Homomorphic Encryption

Loftus, J., May, A., Smart, N. P. & Vercauteren, F., 2012, Selected Areas in Cryptography - SAC 2011. Miri, A. & Vaudenay, S. (eds.). Springer Berlin Heidelberg, Vol. 7118. p. 55-72 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

20 Citations (Scopus)

On the Joint Security of Encryption and Signature in EMV

Degabriele, J. P., Lehmann, A., Paterson, K. G., Smart, N. P. & Strefler, M., 2012, Topics in Cryptology - CT-RSA 2012. Dunkelman, O. (ed.). Springer Berlin Heidelberg, Vol. 7178. p. 116-135 20 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

23 Citations (Scopus)

Relations between the security models for certificateless encryption and ID-based key agreement

Fiore, D., Gennaro, R. & Smart, N., Feb 2012, In : International Journal of Information Security. 11, 1, p. 1-22 22 p.

Research output: Contribution to journalArticle (Academic Journal)

2 Citations (Scopus)

Ring Switching in BGV-Style Homomorphic Encryption

Gentry, C., Halevi, S., Peikert, C. & Smart, N. P., 2012, Security and Cryptography for Networks - SCN 2012. Springer, Vol. 7485. p. 19-37 19 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

29 Citations (Scopus)

Using the cloud to determine key strengths

Kleinjung, T., Lenstra, A., Page, D. & Smart, N. P., 2012, Progress in Cryptology - INDOCRYPT 2012. Springer Berlin Heidelberg, Vol. 7668. p. 17-39

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

8 Citations (Scopus)
2011

Improved Key Generation for Gentry's Fully Homomorphic Encryption Scheme

Scholl, P. & Smart, N. P., 2011, Cryptography and Coding - IMACC 2011. Chen, L. (ed.). Springer Berlin Heidelberg, Vol. 7089. p. 10-22 13 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

16 Citations (Scopus)

Secure Outsourced Computation

Loftus, J. J. & Smart, N. P., 2011, Progress in Cryptology - AFRICACRYPT 2011. Nitaj, A. & Pointcheval, D. (eds.). BERLIN: Springer Berlin Heidelberg, Vol. 6737. p. 1-20 20 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

21 Citations (Scopus)