Search the dblp DataBase
Nigel P. Smart :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
David May , Henk L. Muller , Nigel P. Smart Non-deterministic Processors. [Citation Graph (0, 0)][DBLP ] ACISP, 2001, pp:115-129 [Conf ] Robert Granger , Andrew J. Holt , Dan Page , Nigel P. Smart , Frederik Vercauteren Function Field Sieve in Characteristic Three. [Citation Graph (0, 0)][DBLP ] ANTS, 2004, pp:223-234 [Conf ] Robert Granger , Dan Page , Nigel P. Smart High Security Pairing-Based Cryptography Revisited. [Citation Graph (0, 0)][DBLP ] ANTS, 2006, pp:480-494 [Conf ] Z. Djabri , Nigel P. Smart A Comparison of Direct and Indirect Methods for Computing Selmer Groups of an Elliptic Curve. [Citation Graph (0, 0)][DBLP ] ANTS, 1998, pp:502-513 [Conf ] Nigel P. Smart How Difficult Is It to Solve a Thue Equation? [Citation Graph (0, 0)][DBLP ] ANTS, 1996, pp:363-373 [Conf ] James Irwin , Dan Page , Nigel P. Smart Instruction Stream Mutation for Non-Deterministic Processors. [Citation Graph (0, 0)][DBLP ] ASAP, 2002, pp:286-295 [Conf ] Pierre-Yvan Liardet , Nigel P. Smart Preventing SPA/DPA in ECC Systems Using the Jacobi Form. [Citation Graph (0, 0)][DBLP ] CHES, 2001, pp:391-401 [Conf ] P. J. Green , Richard Noad , Nigel P. Smart Further Hidden Markov Model Cryptanalysis. [Citation Graph (0, 0)][DBLP ] CHES, 2005, pp:61-74 [Conf ] Peter J. Leadbitter , Dan Page , Nigel P. Smart Attacking DSA Under a Repeated Bits Assumption. [Citation Graph (0, 0)][DBLP ] CHES, 2004, pp:428-440 [Conf ] David May , Henk L. Muller , Nigel P. Smart Random Register Renaming to Foil DPA. [Citation Graph (0, 0)][DBLP ] CHES, 2001, pp:28-38 [Conf ] Dan Page , Nigel P. Smart Hardware Implementation of Finite Fields of Characteristic Three. [Citation Graph (0, 0)][DBLP ] CHES, 2002, pp:529-539 [Conf ] Nigel P. Smart The Hessian Form of an Elliptic Curve. [Citation Graph (0, 0)][DBLP ] CHES, 2001, pp:118-125 [Conf ] Nigel P. Smart An Analysis of Goubin's Refined Power Analysis Attack. [Citation Graph (0, 0)][DBLP ] CHES, 2003, pp:281-290 [Conf ] Jacques Stern , David Pointcheval , John Malone-Lee , Nigel P. Smart Flaws in Applying Proof Methodologies to Signature Schemes. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2002, pp:93-110 [Conf ] Antoine Joux , Reynald Lercier , Nigel P. Smart , Frederik Vercauteren The Number Field Sieve in the Medium Prime Case. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2006, pp:326-344 [Conf ] Nigel P. Smart Access Control Using Pairing Based Cryptography. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2003, pp:111-121 [Conf ] Steven D. Galbraith , Florian Hess , Nigel P. Smart Extending the GHS Weil Descent Attack. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2002, pp:29-44 [Conf ] David Naccache , Nigel P. Smart , Jacques Stern Projective Coordinates Leak. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2004, pp:257-267 [Conf ] Nigel P. Smart How Secure Are Elliptic Curves over Composite Extension Fields? [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2001, pp:30-39 [Conf ] Nigel P. Smart On the Performance of Hyperelliptic Cryptosystems. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1999, pp:165-175 [Conf ] Michel Abdalla , Dario Catalano , Alexander W. Dent , John Malone-Lee , Gregory Neven , Nigel P. Smart Identity-Based Encryption Gone Wild. [Citation Graph (0, 0)][DBLP ] ICALP (2), 2006, pp:300-311 [Conf ] Adam Barnett , Nigel P. Smart Mental Poker Revisited. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2003, pp:370-383 [Conf ] Steven D. Galbraith , Nigel P. Smart A Cryptographic Application of Weil Descent. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 1999, pp:191-200 [Conf ] C. Dods , Nigel P. Smart , Martijn Stam Hash Based Digital Signature Schemes. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2005, pp:96-115 [Conf ] Katharina Geißler , Nigel P. Smart Computing the M = U Ut Integer Matrix Decomposition. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2003, pp:223-233 [Conf ] Nigel P. Smart The Exact Security of ECIES in the Generic Group Model. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2001, pp:73-84 [Conf ] L. Chen , Keith Harrison , David Soldera , Nigel P. Smart Applications of Multiple Trust Authorities in Pairing Based Cryptosystems. [Citation Graph (0, 0)][DBLP ] InfraSec, 2002, pp:260-275 [Conf ] L. Chen , Keith Harrison , A. Moss , David Soldera , Nigel P. Smart Certification of Public Keys within an Identity Based System. [Citation Graph (0, 0)][DBLP ] ISC, 2002, pp:322-333 [Conf ] Peter J. Leadbitter , Nigel P. Smart Analysis of the Insecurity of ECMQV with Partially Known Nonces. [Citation Graph (0, 0)][DBLP ] ISC, 2003, pp:240-251 [Conf ] Nigel P. Smart , Henk L. Muller A Wearable Public Key Infrastructure (WPKI). [Citation Graph (0, 0)][DBLP ] ISWC, 2000, pp:127-0 [Conf ] Florian Hess , Gadiel Seroussi , Nigel P. Smart Two Topics in Hyperelliptic Cryptography. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2001, pp:181-189 [Conf ] John Malone-Lee , Nigel P. Smart Modifications of ECDSA. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2002, pp:1-12 [Conf ] Joseph H. Silverman , Nigel P. Smart , Frederik Vercauteren An Algebraic Approach to NTRU (q = 2n) via Witt Vectors and Overdetermined Systems of Nonlinear Equations. [Citation Graph (0, 0)][DBLP ] SCN, 2004, pp:278-293 [Conf ] Nigel P. Smart Efficient Key Encapsulation to Multiple Parties. [Citation Graph (0, 0)][DBLP ] SCN, 2004, pp:208-219 [Conf ] Nigel P. Smart , E. J. Westwood Point Multiplication on Ordinary Elliptic Curves over Fields of Characteristic Three. [Citation Graph (0, 0)][DBLP ] Appl. Algebra Eng. Commun. Comput., 2003, v:13, n:6, pp:485-497 [Journal ] Nigel P. Smart , Frederik Vercauteren On computable isomorphisms in efficient asymmetric pairing-based systems. [Citation Graph (0, 0)][DBLP ] Discrete Applied Mathematics, 2007, v:155, n:4, pp:538-547 [Journal ] Nick Howgrave-Graham , Nigel P. Smart Lattice Attacks on Digital Signature Schemes. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 2001, v:23, n:3, pp:283-290 [Journal ] Alfred Menezes , Nigel P. Smart Security of Signature Schemes in a Multi-User Setting. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 2004, v:33, n:3, pp:261-274 [Journal ] Sattam S. Al-Riyami , John Malone-Lee , Nigel P. Smart Escrow-free encryption supporting cryptographic workflow. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2006, v:5, n:4, pp:217-229 [Journal ] Steven D. Galbraith , John Malone-Lee , Nigel P. Smart Public key signatures in the multi-user setting. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 2002, v:83, n:5, pp:263-266 [Journal ] Nigel P. Smart A note on the x-coordinate of points on an elliptic curve in characteristic two. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 2001, v:80, n:5, pp:261-263 [Journal ] Pierrick Gaudry , Florian Hess , Nigel P. Smart Constructive and Destructive Facets of Weil Descent on Elliptic Curves. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 2002, v:15, n:1, pp:19-46 [Journal ] Nigel P. Smart Elliptic Curve Cryptosystems over Small Fields of Odd Characteristic. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1999, v:12, n:2, pp:141-151 [Journal ] Nigel P. Smart The Discrete Logarithm Problem on Elliptic Curves of Trace One. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1999, v:12, n:3, pp:193-196 [Journal ] Nigel P. Smart , Samir Siksek A Fast Diffie-Hellman Protocol in Genus 2. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1999, v:12, n:1, pp:67-73 [Journal ] Nigel P. Smart Solving Discriminant Form Equations Via Unit Equations. [Citation Graph (0, 0)][DBLP ] J. Symb. Comput., 1996, v:21, n:3, pp:367-374 [Journal ] Steven D. Galbraith , S. M. Paulus , Nigel P. Smart Arithmetic on superelliptic curves. [Citation Graph (0, 0)][DBLP ] Math. Comput., 2002, v:71, n:237, pp:393-405 [Journal ] Gerhard Niklasch , Nigel P. Smart Exceptional units in a family of quartic number fields. [Citation Graph (0, 0)][DBLP ] Math. Comput., 1998, v:67, n:222, pp:759-772 [Journal ] Nigel P. Smart Determining the small solutions to S-unit equations. [Citation Graph (0, 0)][DBLP ] Math. Comput., 1999, v:68, n:228, pp:1687-1699 [Journal ] Nigel P. Smart Physical side-channel attacks on cryptographic systems. [Citation Graph (0, 0)][DBLP ] Software Focus, 2000, v:1, n:2, pp:6-13 [Journal ] Dan Page , Nigel P. Smart Parallel Cryptographic Arithmetic Using a Redundant Montgomery Representation. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2004, v:53, n:11, pp:1474-1482 [Journal ] Peter J. Leadbitter , Dan Page , Nigel P. Smart Nondeterministic Multithreading. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2007, v:56, n:7, pp:992-998 [Journal ] Florian Hess , Nigel P. Smart , Frederik Vercauteren The Eta Pairing Revisited. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2006, v:52, n:10, pp:4595-4602 [Journal ] Michel Abdalla , Alexander W. Dent , John Malone-Lee , Gregory Neven , Duong Hieu Phan , Nigel P. Smart Identity-Based Traitor Tracing. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2007, pp:361-376 [Conf ] L. Chen , Z. Cheng , Nigel P. Smart Identity-based key agreement protocols from pairings. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2007, v:6, n:4, pp:213-241 [Journal ] A Modular Security Analysis of the TLS Handshake Protocol. [Citation Graph (, )][DBLP ] Security Notions and Generic Constructions for Client Puzzles. [Citation Graph (, )][DBLP ] Secure Two-Party Computation Is Practical. [Citation Graph (, )][DBLP ] On the Design and Implementation of an Efficient DAA Scheme. [Citation Graph (, )][DBLP ] Errors Matter: Breaking RSA-Based PIN Encryption with Thirty Ciphertext Validity Queries. [Citation Graph (, )][DBLP ] Distributing the Key Distribution Centre in Sakai-Kasahara Based Systems. [Citation Graph (, )][DBLP ] Efficient 15, 360-bit RSA Using Woop-Optimised Montgomery Arithmetic. [Citation Graph (, )][DBLP ] Efficient KEMs with Partial Message Recovery. [Citation Graph (, )][DBLP ] Toward Acceleration of RSA Using 3D Graphics Hardware. [Citation Graph (, )][DBLP ] Practical Zero-Knowledge Proofs for Circuit Evaluation. [Citation Graph (, )][DBLP ] Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes. [Citation Graph (, )][DBLP ] Groth-Sahai Proofs Revisited. [Citation Graph (, )][DBLP ] Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries. [Citation Graph (, )][DBLP ] The Fiat-Shamir Transform for Group and Ring Signature Schemes. [Citation Graph (, )][DBLP ] Get Shorty via Group Signatures without Encryption. [Citation Graph (, )][DBLP ] Pairings in Trusted Computing. [Citation Graph (, )][DBLP ] Identity Based Group Signatures from Hierarchical Identity-Based Encryption. [Citation Graph (, )][DBLP ] On Proofs of Security for DAA Schemes. [Citation Graph (, )][DBLP ] Pairings for cryptographers. [Citation Graph (, )][DBLP ] Search in 0.021secs, Finished in 0.024secs