Skip to content

Cryptography and Information Security

Organisational unit: Research Grouping

61 - 70 out of 511Page size: 10
  1. 2017
  2. Published

    Multi-rate threshold FlipThem

    Leslie, D., Sherfield, C. & Smart, N., 1 Sep 2017, European Symposium on Research in Computer Security: ESORICS 2017: Part II. Springer, Vol. 10493. p. 174-190 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts

    Albrecht, M., Orsini, E., Patterson, K. G., Peer, G. & Smart, N. P., 1 Sep 2017, European Symposium on Research in Computer Security: ESORICS 2017: Part I. Springer, Vol. 10492. p. 29-46 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Modes of Operation Suitable for Computing on Encrypted Data

    Rotaru, D., Smart, N. & Stam, M., 1 Aug 2017, In : Transactions on Symmetric Cryptology. 2017, 3, p. 294-324 31 p.

    Research output: Contribution to journalArticle

  5. Published

    Towards practical tools for side channel aware software engineering: 'grey box' modelling for instruction leakages

    McCann, D., Oswald, E. & Whitnall, C., 1 Aug 2017, 26th USENIX Security Symposium (USENIX Security 17). USENIX Association, p. 199-216 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Evaluating approaches for the next generation of difficulty and complexity assessment tools

    Beale, D., Tryfonas, T. & Young, M., 31 Jul 2017, 2017 IEEE Technology and Engineering Management Society Conference, TEMSCON 2017. Institute of Electrical and Electronics Engineers (IEEE), p. 227-233 7 p. 7998381

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Hacking a bridge: An exploratory study of compliance-based information security management in banking organization

    Fagade, T. & Tryfonas, T., 8 Jul 2017, In : Journal of Systemics, Cybernetics and Informatics. 15, 5, p. 74-80 7 p.

    Research output: Contribution to journalArticle

  8. Published

    Machine-Checked Proofs of Privacy for Electronic Voting Protocols

    Cortier, V., Dragan, C. C., Dupressoir, F., Schmidt, B., Strub, P-Y. & Warinschi, B., Jul 2017, 2017 IEEE 38th IEEE Symposium on Security and Privacy (SP 2017): Proceedings of a meeting held 22-26 May 2017, San Jose, California, USA. Institute of Electrical and Electronics Engineers (IEEE), p. 993-1008 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Adaptive Proofs Have Straightline Extractors (in the Random Oracle Model)

    Bernhard, D., Nguyen, N. K. & Warinschi, B., 26 Jun 2017, Applied Cryptography and Network Security: 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings. Springer, p. 336-353 18 p. (Lecture Notes in Computer Science; vol. 10355).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Faster secure multi-party computation of AES and DES using lookup tables

    Keller, M., Orsini, E., Rotaru, D., Scholl, P., Soria-Vazquez, E. & Vivek, S., 26 Jun 2017, Applied Cryptography and Network Security: 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings. Springer, Cham, p. 229-249 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10355).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Turning Online Ciphers Off

    Andreeva, E., Barwell, G., Bhaumik, R., Nandi, M., Page, D. & Stam, M., 19 Jun 2017, In : Transactions on Symmetric Cryptology. 2017, 2, p. 105-142

    Research output: Contribution to journalArticle

Previous 1...3 4 5 6 7 8 9 10 ...52 Next