Skip to content

Cryptography and Information Security

Organisational unit: Research Grouping

61 - 70 out of 509Page size: 10
  1. 2017
  2. Published

    Modes of Operation Suitable for Computing on Encrypted Data

    Rotaru, D., Smart, N. & Stam, M., 1 Aug 2017, In : Transactions on Symmetric Cryptology. 2017, 3, p. 294-324 31 p.

    Research output: Contribution to journalArticle

  3. Published

    Towards practical tools for side channel aware software engineering: 'grey box' modelling for instruction leakages

    McCann, D., Oswald, E. & Whitnall, C., 1 Aug 2017, 26th USENIX Security Symposium (USENIX Security 17). USENIX Association, p. 199-216 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Evaluating approaches for the next generation of difficulty and complexity assessment tools

    Beale, D., Tryfonas, T. & Young, M., 31 Jul 2017, 2017 IEEE Technology and Engineering Management Society Conference, TEMSCON 2017. Institute of Electrical and Electronics Engineers (IEEE), p. 227-233 7 p. 7998381

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Hacking a bridge: An exploratory study of compliance-based information security management in banking organization

    Fagade, T. & Tryfonas, T., 8 Jul 2017, In : Journal of Systemics, Cybernetics and Informatics. 15, 5, p. 74-80 7 p.

    Research output: Contribution to journalArticle

  6. Published

    Machine-Checked Proofs of Privacy for Electronic Voting Protocols

    Cortier, V., Dragan, C. C., Dupressoir, F., Schmidt, B., Strub, P-Y. & Warinschi, B., Jul 2017, 2017 IEEE 38th IEEE Symposium on Security and Privacy (SP 2017): Proceedings of a meeting held 22-26 May 2017, San Jose, California, USA. Institute of Electrical and Electronics Engineers (IEEE), p. 993-1008 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Adaptive Proofs Have Straightline Extractors (in the Random Oracle Model)

    Bernhard, D., Nguyen, N. K. & Warinschi, B., 26 Jun 2017, Applied Cryptography and Network Security: 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings. Springer, p. 336-353 18 p. (Lecture Notes in Computer Science; vol. 10355).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Faster secure multi-party computation of AES and DES using lookup tables

    Keller, M., Orsini, E., Rotaru, D., Scholl, P., Soria-Vazquez, E. & Vivek, S., 26 Jun 2017, Applied Cryptography and Network Security: 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings. Springer, Cham, p. 229-249 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10355).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Turning Online Ciphers Off

    Andreeva, E., Barwell, G., Bhaumik, R., Nandi, M., Page, D. & Stam, M., 19 Jun 2017, In : Transactions on Symmetric Cryptology. 2017, 2, p. 105-142

    Research output: Contribution to journalArticle

  10. E-pub ahead of print

    Malicious Insider Threat Detection: A Conceptual Model

    Fagade, T. & Tryfonas, T., 1 Jun 2017, Security and Protection of Information 2017 (SPI). Brno, Czech Republic: University of Defence, (Security and Protection of Information).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    On the Shape of the General Error Locator Polynomial for Cyclic Codes

    Caruso, F., Orsini, E., Sala, M. & Tinnirello, C., Jun 2017, In : IEEE Transactions on Information Theory. 63, 6, p. 3641-3557 17 p.

    Research output: Contribution to journalArticle

Previous 1...3 4 5 6 7 8 9 10 ...51 Next