Skip to content

Cryptography and Information Security

Organisational unit: Research Grouping

81 - 90 out of 510Page size: 10
  1. 2017
  2. Published

    “Come Together!”: Interactions of Language Networks and Multilingual Communities on Twitter

    Albishry, N., Crick, T. & Tryfonas, T., 2017, Computational Collective Intelligence - 9th International Conference, ICCCI 2017, Proceedings. Springer-Verlag Berlin, Vol. 10449 LNAI. p. 469-478 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10449 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. 2016
  4. Published

    A Methodology for the Characterisation of Leakages in Combinatorial Logic

    Bertoni, G. & Martinoli, M., 18 Nov 2016, Security, Privacy, and Applied Cryptography Engineering: 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings. Springer Verlag, p. 363-382 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10076).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations

    Martin, D., Mather, L., Oswald, E. & Stam, M., 16 Nov 2016, Advances in Cryptology - ASIACRYPT 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I. Cheon, J. H. & Takagi, T. (eds.). Springer, p. 548-572 25 p. (Lecture Notes in Computer Science; vol. 10031).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Universally Composable Cryptographic Role-Based Access Control

    Liu, B. & Warinschi, B., 16 Nov 2016, Provable Security - ProvSec 2016: 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings. Chen, L. & Han, J. (eds.). Springer, p. 61-80 20 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Adaptive proofs of knowledge in the random oracle model

    Bernhard, D., Fischlin, M. & Warinschi, B., Nov 2016, In : IET Information Security. 10, 6, p. 319-331 13 p.

    Research output: Contribution to journalArticle

  8. Published

    More Efficient Constant-Round Multi-Party Computation from BMR and SHE

    Lindell, Y., Smart, N. & Soria-Vázquez, E., Nov 2016, Theory of Cryptography: 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part I. Springer, p. 554-581 28 p. (Lecture Notes in Computer Science; vol. 9985).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Bootstrapping BGV Ciphertexts with a Wider Choice of p and q

    Orsini, E. A., Smart, N. P. & van de Pol, J., 27 Oct 2016, In : IET Information Security. 10, 6, p. 348-357

    Research output: Contribution to journalArticle

  10. Published

    MASCOT: Faster Malicious Arithmetic Secure Computation with Oblivious Transfer

    Keller, M., Orsini, E. & Scholl, P., 24 Oct 2016, CCS '16: Proceedings of the 23rd ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), Vol. 24-28-October-2016. p. 830-842 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    MPC-Friendly Symmetric Key Primitives

    Grassi, L., Rechberger, C., Rotaru, D., Scholl, P. & Smart, N., 24 Oct 2016, ACM Conference on Computer and Communications Security - CCS 2016. Association for Computing Machinery (ACM), p. 430-443 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Efficient Secure Multiparty Computation with Identifiable Abort

    Orsini, E. A., Scholl, P. & Baum, C., 22 Oct 2016, Theory of Cryptography: 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part I. Springer, p. 461-490 30 p. (Lectures Notes in Computer Science; vol. 9985).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1...5 6 7 8 9 10 11 12 ...51 Next