Skip to content

Dr Daniel PagePh.D.(Bristol)

Senior Lecturer in Computer Science

21 - 30 out of 68Page size: 10
  1. 2011
  2. Published

    Can code polymorphism limit information leakage?

    Amarilli, A., Muller, S., Naccache, D., Page, D., Rauzy, P. & Tunstall, M., 2011, Workshop on Information Security Theory and Practice - WISTP 2011. Springer Berlin Heidelberg, Vol. 6633. p. 1-21

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Side-channel attacks on the McEliece and Niederreiter public-key cryptosystems

    Avanzi, R. M., Hoerder, S., Page, D. & Tunstall, M., 2011, In : Journal of Cryptographic Engineering. 1, 4, p. 271-281

    Research output: Contribution to journalArticle

  4. Published

    Type checking cryptography implementations

    Barbosa, M. B. M., Moss, A. D., Page, D., Rodrigues, N. & Silva, P. F., 2011, Fundamentals of Software Engineering - FSEN 2011. Springer Berlin Heidelberg, Vol. 7141. p. 316-334

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. 2010
  6. Published

    Bridging the gap between symbolic and efficient AES implementations

    Moss, A. & Page, D., 2010, Partial Evaluation and Program Manipulation - PEPM 2010. Association for Computing Machinery (ACM), p. 101-110

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    On the design and implementation of an efficient DAA scheme

    Chen, L., Page, D. & Smart, N., 2010, Smart Card Research and Advanced Application Conference - CARDIS 2010. Springer Berlin Heidelberg, Vol. 6035. p. 223-237 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Using compilers to enhance cryptographic product development

    Bangerter, E., Barbosa, M., Bernstein, D. J., Damgard, I., Page, D., Pagter, J. I., Sadeghi, A-R. & Sovio, S., 2010, Information Security Solutions Europe - ISSE 2010. Vieweg+Teubner, p. 291-301

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. 2009
  10. Published

    Constructive and destructive use of compilers in elliptic curve cryptography

    Barbosa, M. B. M., Moss, A. D. & Page, D., Apr 2009, In : Journal of Cryptology. 22, 2, p. 259-281 23 p.

    Research output: Contribution to journalArticle

  11. Published

    Hardware/software co-design of public-key cryptography for SSL protocol execution in embedded systems

    Koschuch, M., Groszschaedl, J., Page, D., Grabher, P., Hudler, M. & Kruger, M., 2009, Information and Communication Systems - ICICS 2009. Springer Berlin Heidelberg, Vol. 5927. p. 63-79

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Non-deterministic processors: FPGA-based analysis of area, performance and security

    Grabher, P., Groszschaedl, J. & Page, D., 2009, Workshop on Embedded Systems Security - WESS. Association for Computing Machinery (ACM), p. 1--10

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Program interpolation

    Moss, A. & Page, D., 2009, Partial Evaluation and Program Manipulation - PEPM. Association for Computing Machinery (ACM), p. 31-40

    Research output: Chapter in Book/Report/Conference proceedingConference contribution