Skip to content

Dr Daniel PagePh.D.(Bristol)

Senior Lecturer in Computer Science

1 - 10 out of 68Page size: 10
  1. 2017
  2. Published

    Turning Online Ciphers Off

    Andreeva, E., Barwell, G., Bhaumik, R., Nandi, M., Page, D. & Stam, M., 19 Jun 2017, In : Transactions on Symmetric Cryptology. 2017, 2, p. 105-142

    Research output: Contribution to journalArticle

  3. 2015
  4. Published

    Rogue Decryption Failures: Reconciling AE Robustness Notions

    Barwell, G., Page, D. & Stam, M., Dec 2015, Cryptography and Coding - IMACC 2015: 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings. Groth, J. (ed.). Springer, Vol. 9496. p. 94-111 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    SoC It to EM: ElectroMagnetic Side-Channel Attacks on a Complex System-on-Chip

    Longo, J., De Mulder, E., Page, D. & Tunstall, M., 1 Sep 2015, Cryptographic Hardware and Embedded Systems - CHES 2015. 1 ed. Springer, Vol. 9293. p. 620-640 21 p. (Lecture Notes in Computer Science; vol. 9293).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. 2014
  7. Published

    Simulatable Leakage: Analysis, Pitfalls, and New Constructions

    Longo, J., Martin, D. P., Oswald, M. E., Page, D., Stam, M. & Tunstall, M., 7 Dec 2014, Advances in Cryptology - ASIACRYPT 2014. Springer Berlin Heidelberg, Vol. 8873. p. 223-242 (Lecture Notes in Computer Science; vol. 8873).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Digital Investigations for IPv6-Based Wireless Sensor Networks

    Kumar, V., Oikonomou, G., Tryfonas, T., Page, D. & Phillips, I., Aug 2014, In : Digital Investigation. 11, Supplement 2, p. S66-S75 12 p.

    Research output: Contribution to journalSpecial issue

  9. Published

    What is Computer Science? An Information Security Perspective

    Page, D. & Smart, N., 2014, Springer Verlag. (Undergraduate Topics in Computer Science)

    Research output: Book/ReportAuthored book

  10. 2013
  11. Published

    Light-weight primitive, feather-weight security: a cryptanalytic knock-out

    Banciu, V., Hoerder, S. & Page, D., 2013, Workshop on Embedded Systems Security - WESS 2013. Association for Computing Machinery (ACM), p. 1--10

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    On secure embedded token design: Quasi-looped Yao circuits and bounded leakage

    Hoerder, S., Järvinen, K. & Page, D., 2013, Workshop in Information Security Theory and Practice - WISTP 2013. Springer Berlin Heidelberg, Vol. 7886. p. 112-128

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. 2012
  14. Published

    Compiler assisted masking

    Moss, A. D., Oswald, E., Page, D. & Tunstall, M., 2012, Cryptographic Hardware and Embedded Systems - CHES. Springer Berlin Heidelberg, Vol. 7428. p. 58-75

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Efficient Java implementation of elliptic curve cryptography for J2ME-enabled mobile devices

    Groszschaedl, J., Page, D. & Tillich, S., 2012, Workshop in Information Security Theory and Practice - WISTP 2012. Springer Berlin Heidelberg, Vol. 7322. p. 189--207

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1 2 3 4 5 6 7 Next