Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Nigel P. Smart
@inproceedings{DBLP:conf/acns/CongEST24, author = {Kelong Cong and Karim Eldefrawy and Nigel P. Smart and Ben Terner}, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {The Key Lattice Framework for Concurrent Group Messaging}, booktitle = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14584}, pages = {133--162}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54773-7\_6}, doi = {10.1007/978-3-031-54773-7\_6}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/CongEST24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Smart23, author = {Nigel P. Smart}, title = {Computing on Encrypted Data}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {4}, pages = {94--98}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3279517}, doi = {10.1109/MSEC.2023.3279517}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Smart23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/PointchevalS23, author = {David Pointcheval and Nigel P. Smart}, title = {Topical Collection on Computing on Encrypted Data}, journal = {J. Cryptol.}, volume = {36}, number = {2}, pages = {4}, year = {2023}, url = {https://doi.org/10.1007/s00145-023-09444-8}, doi = {10.1007/S00145-023-09444-8}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/PointchevalS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/GamaBOSZ23, author = {Mariana Gama and Emad Heydari Beni and Emmanuela Orsini and Nigel P. Smart and Oliver Zajonc}, editor = {Jian Guo and Ron Steinfeld}, title = {{MPC} with Delayed Parties over Star-Like Networks}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14438}, pages = {172--203}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8721-4\_6}, doi = {10.1007/978-981-99-8721-4\_6}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/GamaBOSZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/BraunGJOST23, author = {Lennart Braun and Cyprien Delpech de Saint Guilhem and Robin Jadoul and Emmanuela Orsini and Nigel P. Smart and Titouan Tanguy}, editor = {Elizabeth A. Quaglia}, title = {ZK-for-Z2K: MPC-in-the-Head Zero-Knowledge Proofs for {\textdollar}{\textbackslash}mathbb \{Z\}{\_}\{2{\^{}}k\}{\textdollar}}, booktitle = {Cryptography and Coding - 19th {IMA} International Conference, {IMACC} 2023, London, UK, December 12-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14421}, pages = {137--157}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-47818-5\_8}, doi = {10.1007/978-3-031-47818-5\_8}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/BraunGJOST23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/Smart23, author = {Nigel P. Smart}, editor = {Elizabeth A. Quaglia}, title = {Practical and Efficient FHE-Based {MPC}}, booktitle = {Cryptography and Coding - 19th {IMA} International Conference, {IMACC} 2023, London, UK, December 12-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14421}, pages = {263--283}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-47818-5\_14}, doi = {10.1007/978-3-031-47818-5\_14}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/Smart23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wahc/DahlDKMORSTW23, author = {Morten Dahl and Daniel Demmler and Sarah El Kazdadi and Arthur Meyre and Jean{-}Baptiste Orfila and Dragos Rotaru and Nigel P. Smart and Samuel Tap and Michael Walter}, editor = {Michael Brenner and Anamaria Costache and Kurt Rohloff}, title = {Noah's Ark: Efficient Threshold-FHE Using Noise Flooding}, booktitle = {Proceedings of the 11th Workshop on Encrypted Computing {\&} Applied Homomorphic Cryptography, Copenhagen, Denmark, 26 November 2023}, pages = {35--46}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3605759.3625259}, doi = {10.1145/3605759.3625259}, timestamp = {Mon, 18 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wahc/DahlDKMORSTW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wahc/BalenboisOS23, author = {Thibault Balenbois and Jean{-}Baptiste Orfila and Nigel P. Smart}, editor = {Michael Brenner and Anamaria Costache and Kurt Rohloff}, title = {Trivial Transciphering With Trivium and {TFHE}}, booktitle = {Proceedings of the 11th Workshop on Encrypted Computing {\&} Applied Homomorphic Cryptography, Copenhagen, Denmark, 26 November 2023}, pages = {69--78}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3605759.3625255}, doi = {10.1145/3605759.3625255}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wahc/BalenboisOS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GamaBOSZ23, author = {Mariana Botelho da Gama and Emad Heydari Beni and Emmanuela Orsini and Nigel P. Smart and Oliver Zajonc}, title = {{MPC} With Delayed Parties Over Star-Like Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {96}, year = {2023}, url = {https://eprint.iacr.org/2023/096}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GamaBOSZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShoupS23, author = {Victor Shoup and Nigel P. Smart}, title = {Lightweight Asynchronous Verifiable Secret Sharing with Optimal Resilience}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {536}, year = {2023}, url = {https://eprint.iacr.org/2023/536}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ShoupS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DahlDEMORSTW23, author = {Morten Dahl and Daniel Demmler and Sarah El Kazdadi and Arthur Meyre and Jean{-}Baptiste Orfila and Dragos Rotaru and Nigel P. Smart and Samuel Tap and Michael Walter}, title = {Noah's Ark: Efficient Threshold-FHE Using Noise Flooding}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {815}, year = {2023}, url = {https://eprint.iacr.org/2023/815}, timestamp = {Tue, 19 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DahlDEMORSTW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BalenboisOS23, author = {Thibault Balenbois and Jean{-}Baptiste Orfila and Nigel P. Smart}, title = {Trivial Transciphering With Trivium and {TFHE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {980}, year = {2023}, url = {https://eprint.iacr.org/2023/980}, timestamp = {Mon, 03 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BalenboisOS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Smart23, author = {Nigel P. Smart}, title = {Practical and Efficient FHE-based {MPC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {981}, year = {2023}, url = {https://eprint.iacr.org/2023/981}, timestamp = {Mon, 03 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Smart23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BraunGJOST23, author = {Lennart Braun and Cyprien Delpech de Saint Guilhem and Robin Jadoul and Emmanuela Orsini and Nigel P. Smart and Titouan Tanguy}, title = {ZK-for-Z2K: MPC-in-the-Head Zero-Knowledge Proofs for {\(\mathbb{Z}\)}\({}_{\mbox{2\({}^{\mbox{k}}\)}}\)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1057}, year = {2023}, url = {https://eprint.iacr.org/2023/1057}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BraunGJOST23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/RotaruSTVW22, author = {Dragos Rotaru and Nigel P. Smart and Titouan Tanguy and Frederik Vercauteren and Tim Wood}, title = {Actively Secure Setup for {SPDZ}}, journal = {J. Cryptol.}, volume = {35}, number = {1}, pages = {5}, year = {2022}, url = {https://doi.org/10.1007/s00145-021-09416-w}, doi = {10.1007/S00145-021-09416-W}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joc/RotaruSTVW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BonteIPPS22, author = {Charlotte Bonte and Ilia Iliashenko and Jeongeun Park and Hilder V. L. Pereira and Nigel P. Smart}, editor = {Shweta Agrawal and Dongdai Lin}, title = {{FINAL:} Faster {FHE} Instantiated with {NTRU} and {LWE}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13792}, pages = {188--215}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22966-4\_7}, doi = {10.1007/978-3-031-22966-4\_7}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/BonteIPPS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BaumJOSS22, author = {Carsten Baum and Robin Jadoul and Emmanuela Orsini and Peter Scholl and Nigel P. Smart}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {Feta: Efficient Threshold Designated-Verifier Zero-Knowledge Proofs}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {293--306}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3559354}, doi = {10.1145/3548606.3559354}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BaumJOSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/AtapoorSA22, author = {Shahla Atapoor and Nigel P. Smart and Younes Talibi Alaoui}, editor = {Steven D. Galbraith}, title = {Private Liquidity Matching Using {MPC}}, booktitle = {Topics in Cryptology - {CT-RSA} 2022 - Cryptographers' Track at the {RSA} Conference 2022, Virtual Event, March 1-2, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13161}, pages = {96--119}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-95312-6\_5}, doi = {10.1007/978-3-030-95312-6\_5}, timestamp = {Tue, 08 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/AtapoorSA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/GamaCPSA22, author = {Mariana Botelho da Gama and John Cartlidge and Antigoni Polychroniadou and Nigel P. Smart and Younes Talibi Alaoui}, editor = {Ittay Eyal and Juan A. Garay}, title = {Kicking-the-Bucket: Fast Privacy-Preserving Trading Using Buckets}, booktitle = {Financial Cryptography and Data Security - 26th International Conference, {FC} 2022, Grenada, May 2-6, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13411}, pages = {20--37}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-18283-9\_2}, doi = {10.1007/978-3-031-18283-9\_2}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/GamaCPSA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/ChillottiOSSL22, author = {Ilaria Chillotti and Emmanuela Orsini and Peter Scholl and Nigel P. Smart and Barry Van Leeuwen}, editor = {Clemente Galdi and Stanislaw Jarecki}, title = {Scooby: Improved Multi-party Homomorphic Secret Sharing Based on {FHE}}, booktitle = {Security and Cryptography for Networks - 13th International Conference, {SCN} 2022, Amalfi, Italy, September 12-14, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13409}, pages = {540--563}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-14791-3\_24}, doi = {10.1007/978-3-031-14791-3\_24}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/ChillottiOSSL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonteIPPS22, author = {Charlotte Bonte and Ilia Iliashenko and Jeongeun Park and Hilder V. L. Pereira and Nigel P. Smart}, title = {{FINAL:} Faster {FHE} instantiated with {NTRU} and {LWE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {74}, year = {2022}, url = {https://eprint.iacr.org/2022/074}, timestamp = {Tue, 26 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonteIPPS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaumJOSS22, author = {Carsten Baum and Robin Jadoul and Emmanuela Orsini and Peter Scholl and Nigel P. Smart}, title = {Feta: Efficient Threshold Designated-Verifier Zero-Knowledge Proofs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {82}, year = {2022}, url = {https://eprint.iacr.org/2022/082}, timestamp = {Fri, 18 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BaumJOSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChillottiOSSL22, author = {Ilaria Chillotti and Emmanuela Orsini and Peter Scholl and Nigel P. Smart and Barry Van Leeuwen}, title = {Scooby: Improved Multi-Party Homomorphic Secret Sharing Based on {FHE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {862}, year = {2022}, url = {https://eprint.iacr.org/2022/862}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChillottiOSSL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GamaCSA22, author = {Mariana Botelho da Gama and John Cartlidge and Nigel P. Smart and Younes Talibi Alaoui}, title = {All for one and one for all: Fully decentralised privacy-preserving dark pool trading using multi-party computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {923}, year = {2022}, url = {https://eprint.iacr.org/2022/923}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GamaCSA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CongEST22, author = {Kelong Cong and Karim Eldefrawy and Nigel P. Smart and Ben Terner}, title = {The Key Lattice Framework for Concurrent Group Messaging}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1531}, year = {2022}, url = {https://eprint.iacr.org/2022/1531}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/CongEST22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BonteST21, author = {Charlotte Bonte and Nigel P. Smart and Titouan Tanguy}, title = {Thresholdizing HashEdDSA: {MPC} to the Rescue}, journal = {Int. J. Inf. Sec.}, volume = {20}, number = {6}, pages = {879--894}, year = {2021}, url = {https://doi.org/10.1007/s10207-021-00539-6}, doi = {10.1007/S10207-021-00539-6}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/BonteST21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isafm/CartlidgeSA21, author = {John Cartlidge and Nigel P. Smart and Younes Talibi Alaoui}, title = {Multi-party computation mechanism for anonymous equity block trading: {A} secure implementation of turquoise plato uncross}, journal = {Intell. Syst. Account. Finance Manag.}, volume = {28}, number = {4}, pages = {239--267}, year = {2021}, url = {https://doi.org/10.1002/isaf.1502}, doi = {10.1002/ISAF.1502}, timestamp = {Fri, 13 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isafm/CartlidgeSA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BurraLNNOOSS21, author = {Sai Sheshank Burra and Enrique Larraia and Jesper Buus Nielsen and Peter Sebastian Nordholt and Claudio Orlandi and Emmanuela Orsini and Peter Scholl and Nigel P. Smart}, title = {High-Performance Multi-party Computation for Binary Circuits Based on Oblivious Transfer}, journal = {J. Cryptol.}, volume = {34}, number = {3}, pages = {34}, year = {2021}, url = {https://doi.org/10.1007/s00145-021-09403-1}, doi = {10.1007/S00145-021-09403-1}, timestamp = {Thu, 29 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BurraLNNOOSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/CongCMS21, author = {Kelong Cong and Daniele Cozzo and Varun Maram and Nigel P. Smart}, editor = {Mehdi Tibouchi and Huaxiong Wang}, title = {Gladius: {LWR} Based Efficient Hybrid Public Key Encryption with Distributed Decryption}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {13093}, pages = {125--155}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92068-5\_5}, doi = {10.1007/978-3-030-92068-5\_5}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/CongCMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/CozzoSA21, author = {Daniele Cozzo and Nigel P. Smart and Younes Talibi Alaoui}, editor = {Kenneth G. Paterson}, title = {Secure Fast Evaluation of Iterative Methods: With an Application to Secure PageRank}, booktitle = {Topics in Cryptology - {CT-RSA} 2021 - Cryptographers' Track at the {RSA} Conference 2021, Virtual Event, May 17-20, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12704}, pages = {1--25}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75539-3\_1}, doi = {10.1007/978-3-030-75539-3\_1}, timestamp = {Mon, 28 Aug 2023 21:17:50 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/CozzoSA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/BagheryGOST21, author = {Karim Baghery and Cyprien Delpech de Saint Guilhem and Emmanuela Orsini and Nigel P. Smart and Titouan Tanguy}, editor = {Kenneth G. Paterson}, title = {Compilation of Function Representations for Secure Computing Paradigms}, booktitle = {Topics in Cryptology - {CT-RSA} 2021 - Cryptographers' Track at the {RSA} Conference 2021, Virtual Event, May 17-20, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12704}, pages = {26--50}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75539-3\_2}, doi = {10.1007/978-3-030-75539-3\_2}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/BagheryGOST21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Ben-EfraimCOOSS21, author = {Aner Ben{-}Efraim and Kelong Cong and Eran Omri and Emmanuela Orsini and Nigel P. Smart and Eduardo Soria{-}Vazquez}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Large Scale, Actively Secure Computation from {LPN} and Free-XOR Garbled Circuits}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12698}, pages = {33--63}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77883-5\_2}, doi = {10.1007/978-3-030-77883-5\_2}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Ben-EfraimCOOSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/CongES21, author = {Kelong Cong and Karim Eldefrawy and Nigel P. Smart}, editor = {Maura B. Paterson}, title = {Optimizing Registration Based Encryption}, booktitle = {Cryptography and Coding - 18th {IMA} International Conference, {IMACC} 2021, Virtual Event, December 14-15, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13129}, pages = {129--157}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92641-0\_7}, doi = {10.1007/978-3-030-92641-0\_7}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/CongES21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latincrypt/ArcherAS21, author = {David W. Archer and Shahla Atapoor and Nigel P. Smart}, editor = {Patrick Longa and Carla R{\`{a}}fols}, title = {The Cost of {IEEE} Arithmetic in Secure Computation}, booktitle = {Progress in Cryptology - {LATINCRYPT} 2021 - 7th International Conference on Cryptology and Information Security in Latin America, Bogot{\'{a}}, Colombia, October 6-8, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12912}, pages = {431--452}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88238-9\_21}, doi = {10.1007/978-3-030-88238-9\_21}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/latincrypt/ArcherAS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AlbrechtDDS21, author = {Martin R. Albrecht and Alex Davidson and Amit Deo and Nigel P. Smart}, editor = {Juan A. Garay}, title = {Round-Optimal Verifiable Oblivious Pseudorandom Functions from Ideal Lattices}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12711}, pages = {261--289}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75248-4\_10}, doi = {10.1007/978-3-030-75248-4\_10}, timestamp = {Fri, 07 May 2021 15:40:46 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AlbrechtDDS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/JadoulSL21, author = {Robin Jadoul and Nigel P. Smart and Barry Van Leeuwen}, editor = {Riham AlTawy and Andreas H{\"{u}}lsing}, title = {{MPC} for \emph{Q}\({}_{\mbox{2}}\) Access Structures over Rings and Fields}, booktitle = {Selected Areas in Cryptography - 28th International Conference, {SAC} 2021, Virtual Event, September 29 - October 1, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13203}, pages = {131--151}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-99277-4\_7}, doi = {10.1007/978-3-030-99277-4\_7}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/JadoulSL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArcherAS21, author = {David W. Archer and Shahla Atapoor and Nigel P. Smart}, title = {The Cost of {IEEE} Arithmetic in Secure Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {54}, year = {2021}, url = {https://eprint.iacr.org/2021/054}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ArcherAS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CongCMS21, author = {Kelong Cong and Daniele Cozzo and Varun Maram and Nigel P. Smart}, title = {Gladius: {LWR} based efficient hybrid public key encryption with distributed decryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {96}, year = {2021}, url = {https://eprint.iacr.org/2021/096}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/CongCMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ben-EfraimCOOSS21, author = {Aner Ben{-}Efraim and Kelong Cong and Eran Omri and Emmanuela Orsini and Nigel P. Smart and Eduardo Soria{-}Vazquez}, title = {Large Scale, Actively Secure Computation from {LPN} and Free-XOR Garbled Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {120}, year = {2021}, url = {https://eprint.iacr.org/2021/120}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/Ben-EfraimCOOSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BagheryGOST21, author = {Karim Baghery and Cyprien Delpech de Saint Guilhem and Emmanuela Orsini and Nigel P. Smart and Titouan Tanguy}, title = {Compilation of Function Representations for Secure Computing Paradigms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {195}, year = {2021}, url = {https://eprint.iacr.org/2021/195}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BagheryGOST21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CozzoSA21, author = {Daniele Cozzo and Nigel P. Smart and Younes Talibi Alaoui}, title = {Secure Fast Evaluation of Iterative Methods: With an Application to Secure PageRank}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {207}, year = {2021}, url = {https://eprint.iacr.org/2021/207}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CozzoSA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtapoorSA21, author = {Shahla Atapoor and Nigel P. Smart and Younes Talibi Alaoui}, title = {Private Liquidity Matching using {MPC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {475}, year = {2021}, url = {https://eprint.iacr.org/2021/475}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AtapoorSA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CongES21, author = {Kelong Cong and Karim Eldefrawy and Nigel P. Smart}, title = {Optimizing Registration Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {499}, year = {2021}, url = {https://eprint.iacr.org/2021/499}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CongES21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JadoulSL21, author = {Robin Jadoul and Nigel P. Smart and Barry Van Leeuwen}, title = {{MPC} for Q\({}_{\mbox{2}}\) Access Structures over Rings and Fields}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {841}, year = {2021}, url = {https://eprint.iacr.org/2021/841}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JadoulSL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SmartT21, author = {Nigel P. Smart and Emmanuel Thom{\'{e}}}, title = {History of Cryptographic Key Sizes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {894}, year = {2021}, url = {https://eprint.iacr.org/2021/894}, timestamp = {Thu, 31 Mar 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SmartT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GamaCPSA21, author = {Mariana Botelho da Gama and John Cartlidge and Antigoni Polychroniadou and Nigel P. Smart and Younes Talibi Alaoui}, title = {Kicking-the-Bucket: Fast Privacy-Preserving Trading Using Buckets}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1549}, year = {2021}, url = {https://eprint.iacr.org/2021/1549}, timestamp = {Fri, 10 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GamaCPSA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/debu/TroncosoPHSLLSP20, author = {Carmela Troncoso and Mathias Payer and Jean{-}Pierre Hubaux and Marcel Salath{\'{e}} and James R. Larus and Wouter Lueks and Theresa Stadler and Apostolos Pyrgelis and Daniele Antonioli and Ludovic Barman and Sylvain Chatel and Kenneth G. Paterson and Srdjan Capkun and David A. Basin and Jan Beutel and Dennis Jackson and Marc Roeschlin and Patrick Leu and Bart Preneel and Nigel P. Smart and Aysajan Abidin and Seda Gurses and Michael Veale and Cas Cremers and Michael Backes and Nils Ole Tippenhauer and Reuben Binns and Ciro Cattuto and Alain Barrat and Dario Fiore and Manuel Barbosa and Rui Oliveira and Jos{\'{e}} Pereira}, title = {Decentralized Privacy-Preserving Proximity Tracing}, journal = {{IEEE} Data Eng. Bull.}, volume = {43}, number = {2}, pages = {36--66}, year = {2020}, url = {http://sites.computer.org/debull/A20june/p36.pdf}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/debu/TroncosoPHSLLSP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/GuilhemOPS20, author = {Cyprien Delpech de Saint Guilhem and Emmanuela Orsini and Christophe Petit and Nigel P. Smart}, editor = {Stephan Krenn and Haya Schulmann and Serge Vaudenay}, title = {Semi-commutative Masking: {A} Framework for Isogeny-Based Protocols, with an Application to Fully Secure Two-Round Isogeny-Based {OT}}, booktitle = {Cryptology and Network Security - 19th International Conference, {CANS} 2020, Vienna, Austria, December 14-16, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12579}, pages = {235--258}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65411-5\_12}, doi = {10.1007/978-3-030-65411-5\_12}, timestamp = {Tue, 17 Oct 2023 10:41:56 +0200}, biburl = {https://dblp.org/rec/conf/cans/GuilhemOPS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/OrsiniSV20, author = {Emmanuela Orsini and Nigel P. Smart and Frederik Vercauteren}, editor = {Stanislaw Jarecki}, title = {Overdrive2k: Efficient Secure {MPC} over {\textdollar}{\textbackslash}mathbb \{Z\}{\_}\{2{\^{}}k\}{\textdollar} from Somewhat Homomorphic Encryption}, booktitle = {Topics in Cryptology - {CT-RSA} 2020 - The Cryptographers' Track at the {RSA} Conference 2020, San Francisco, CA, USA, February 24-28, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12006}, pages = {254--283}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-40186-3\_12}, doi = {10.1007/978-3-030-40186-3\_12}, timestamp = {Tue, 03 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/OrsiniSV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pqcrypto/CozzoS20, author = {Daniele Cozzo and Nigel P. Smart}, editor = {Jintai Ding and Jean{-}Pierre Tillich}, title = {Sashimi: Cutting up CSI-FiSh Secret Keys to Produce an Actively Secure Distributed Signing Protocol}, booktitle = {Post-Quantum Cryptography - 11th International Conference, PQCrypto 2020, Paris, France, April 15-17, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12100}, pages = {169--186}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-44223-1\_10}, doi = {10.1007/978-3-030-44223-1\_10}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pqcrypto/CozzoS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-12273, author = {Carmela Troncoso and Mathias Payer and Jean{-}Pierre Hubaux and Marcel Salath{\'{e}} and James R. Larus and Edouard Bugnion and Wouter Lueks and Theresa Stadler and Apostolos Pyrgelis and Daniele Antonioli and Ludovic Barman and Sylvain Chatel and Kenneth G. Paterson and Srdjan Capkun and David A. Basin and Jan Beutel and Dennis Jackson and Marc Roeschlin and Patrick Leu and Bart Preneel and Nigel P. Smart and Aysajan Abidin and Seda F. G{\"{u}}rses and Michael Veale and Cas Cremers and Michael Backes and Nils Ole Tippenhauer and Reuben Binns and Ciro Cattuto and Alain Barrat and Dario Fiore and Manuel Barbosa and Rui Oliveira and Jos{\'{e}} Pereira}, title = {Decentralized Privacy-Preserving Proximity Tracing}, journal = {CoRR}, volume = {abs/2005.12273}, year = {2020}, url = {https://arxiv.org/abs/2005.12273}, eprinttype = {arXiv}, eprint = {2005.12273}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-12273.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonteST20, author = {Charlotte Bonte and Nigel P. Smart and Titouan Tanguy}, title = {Thresholdizing HashEdDSA: {MPC} to the Rescue}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {214}, year = {2020}, url = {https://eprint.iacr.org/2020/214}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonteST20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CartlidgeSA20, author = {John Cartlidge and Nigel P. Smart and Younes Talibi Alaoui}, title = {Multi-Party Computation Mechanism for Anonymous Equity Block Trading: {A} Secure Implementation of Turquoise Plato Uncross}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {662}, year = {2020}, url = {https://eprint.iacr.org/2020/662}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CartlidgeSA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/LindellPSY19, author = {Yehuda Lindell and Benny Pinkas and Nigel P. Smart and Avishay Yanai}, title = {Efficient Constant-Round Multi-party Computation Combining {BMR} and {SPDZ}}, journal = {J. Cryptol.}, volume = {32}, number = {3}, pages = {1026--1069}, year = {2019}, url = {https://doi.org/10.1007/s00145-019-09322-2}, doi = {10.1007/S00145-019-09322-2}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joc/LindellPSY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KraitsbergLOSA19, author = {Michael Kraitsberg and Yehuda Lindell and Valery Osheter and Nigel P. Smart and Younes Talibi Alaoui}, editor = {Julian Jang{-}Jaccard and Fuchun Guo}, title = {Adding Distributed Decryption and Key Generation to a Ring-LWE Based {CCA} Encryption Scheme}, booktitle = {Information Security and Privacy - 24th Australasian Conference, {ACISP} 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11547}, pages = {192--210}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21548-4\_11}, doi = {10.1007/978-3-030-21548-4\_11}, timestamp = {Fri, 05 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KraitsbergLOSA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/AlyS19, author = {Abdelrahaman Aly and Nigel P. Smart}, editor = {Robert H. Deng and Val{\'{e}}rie Gauthier{-}Uma{\~{n}}a and Mart{\'{\i}}n Ochoa and Moti Yung}, title = {Benchmarking Privacy Preserving Scientific Operations}, booktitle = {Applied Cryptography and Network Security - 17th International Conference, {ACNS} 2019, Bogota, Colombia, June 5-7, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11464}, pages = {509--529}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21568-2\_25}, doi = {10.1007/978-3-030-21568-2\_25}, timestamp = {Fri, 31 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/AlyS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AlyORS019, author = {Abdelrahaman Aly and Emmanuela Orsini and Dragos Rotaru and Nigel P. Smart and Tim Wood}, editor = {Michael Brenner and Tancr{\`{e}}de Lepoint and Kurt Rohloff}, title = {Zaphod: Efficiently Combining {LSSS} and Garbled Circuits in {SCALE}}, booktitle = {Proceedings of the 7th {ACM} Workshop on Encrypted Computing {\&} Applied Homomorphic Cryptography, WAHC@CCS 2019, London, UK, November 11-15, 2019}, pages = {33--44}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3338469.3358943}, doi = {10.1145/3338469.3358943}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AlyORS019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SmartT19, author = {Nigel P. Smart and Titouan Tanguy}, editor = {Radu Sion and Charalampos Papamanthou}, title = {TaaS: Commodity {MPC} via Triples-as-a-Service}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Cloud Computing Security Workshop, CCSW@CCS 2019, London, UK, November 11, 2019}, pages = {105--116}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3338466.3358918}, doi = {10.1145/3338466.3358918}, timestamp = {Thu, 12 Oct 2023 12:32:09 +0200}, biburl = {https://dblp.org/rec/conf/ccs/SmartT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CartlidgeSA19, author = {John Cartlidge and Nigel P. Smart and Younes Talibi Alaoui}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {{MPC} Joins The Dark Side}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {148--159}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329809}, doi = {10.1145/3321705.3329809}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CartlidgeSA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/SmartW19, author = {Nigel P. Smart and Tim Wood}, editor = {Mitsuru Matsui}, title = {Error Detection in Monotone Span Programs with Application to Communication-Efficient Multi-party Computation}, booktitle = {Topics in Cryptology - {CT-RSA} 2019 - The Cryptographers' Track at the {RSA} Conference 2019, San Francisco, CA, USA, March 4-8, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11405}, pages = {210--229}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-12612-4\_11}, doi = {10.1007/978-3-030-12612-4\_11}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/SmartW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/MakriRSV19, author = {Eleftheria Makri and Dragos Rotaru and Nigel P. Smart and Frederik Vercauteren}, editor = {Mitsuru Matsui}, title = {{EPIC:} Efficient Private Image Classification (or: Learning from the Masters)}, booktitle = {Topics in Cryptology - {CT-RSA} 2019 - The Cryptographers' Track at the {RSA} Conference 2019, San Francisco, CA, USA, March 4-8, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11405}, pages = {473--492}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-12612-4\_24}, doi = {10.1007/978-3-030-12612-4\_24}, timestamp = {Tue, 26 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/MakriRSV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/CozzoS19, author = {Daniele Cozzo and Nigel P. Smart}, editor = {Martin Albrecht}, title = {Sharing the {LUOV:} Threshold Post-quantum Signatures}, booktitle = {Cryptography and Coding - 17th {IMA} International Conference, {IMACC} 2019, Oxford, UK, December 16-18, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11929}, pages = {128--153}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-35199-1\_7}, doi = {10.1007/978-3-030-35199-1\_7}, timestamp = {Fri, 15 Dec 2023 20:21:14 +0100}, biburl = {https://dblp.org/rec/conf/ima/CozzoS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/SmartA19, author = {Nigel P. Smart and Younes Talibi Alaoui}, editor = {Martin Albrecht}, title = {Distributing Any Elliptic Curve Based Protocol}, booktitle = {Cryptography and Coding - 17th {IMA} International Conference, {IMACC} 2019, Oxford, UK, December 16-18, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11929}, pages = {342--366}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-35199-1\_17}, doi = {10.1007/978-3-030-35199-1\_17}, timestamp = {Thu, 19 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/SmartA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/BaumCS19, author = {Carsten Baum and Daniele Cozzo and Nigel P. Smart}, editor = {Kenneth G. Paterson and Douglas Stebila}, title = {Using TopGear in Overdrive: {A} More Efficient ZKPoK for {SPDZ}}, booktitle = {Selected Areas in Cryptography - {SAC} 2019 - 26th International Conference, Waterloo, ON, Canada, August 12-16, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11959}, pages = {274--302}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-38471-5\_12}, doi = {10.1007/978-3-030-38471-5\_12}, timestamp = {Mon, 28 Aug 2023 21:17:39 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/BaumCS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/GuilhemMOS19, author = {Cyprien Delpech de Saint Guilhem and Lauren De Meyer and Emmanuela Orsini and Nigel P. Smart}, editor = {Kenneth G. Paterson and Douglas Stebila}, title = {{BBQ:} Using {AES} in Picnic Signatures}, booktitle = {Selected Areas in Cryptography - {SAC} 2019 - 26th International Conference, Waterloo, ON, Canada, August 12-16, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11959}, pages = {669--692}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-38471-5\_27}, doi = {10.1007/978-3-030-38471-5\_27}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/GuilhemMOS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaumCS19, author = {Carsten Baum and Daniele Cozzo and Nigel P. Smart}, title = {Using TopGear in Overdrive: {A} more efficient ZKPoK for {SPDZ}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {35}, year = {2019}, url = {https://eprint.iacr.org/2019/035}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaumCS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OrsiniSV19, author = {Emmanuela Orsini and Nigel P. Smart and Frederik Vercauteren}, title = {Overdrive2k: Efficient Secure {MPC} over Z\({}_{\mbox{2\({}^{\mbox{k}}\)}}\) from Somewhat Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {153}, year = {2019}, url = {https://eprint.iacr.org/2019/153}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OrsiniSV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlyS19, author = {Abdelrahaman Aly and Nigel P. Smart}, title = {Benchmarking Privacy Preserving Scientific Operations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {354}, year = {2019}, url = {https://eprint.iacr.org/2019/354}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlyS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SmartA19, author = {Nigel P. Smart and Younes Talibi Alaoui}, title = {Distributing any Elliptic Curve Based Protocol: With an Application to MixNets}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {768}, year = {2019}, url = {https://eprint.iacr.org/2019/768}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SmartA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuilhemMOS19, author = {Cyprien Delpech de Saint Guilhem and Lauren De Meyer and Emmanuela Orsini and Nigel P. Smart}, title = {{BBQ:} Using {AES} in Picnic Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {781}, year = {2019}, url = {https://eprint.iacr.org/2019/781}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuilhemMOS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SmartT19, author = {Nigel P. Smart and Titouan Tanguy}, title = {TaaS: Commodity {MPC} via Triples-as-a-Service}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {957}, year = {2019}, url = {https://eprint.iacr.org/2019/957}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SmartT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlyORSW19, author = {Abdelrahaman Aly and Emmanuela Orsini and Dragos Rotaru and Nigel P. Smart and Tim Wood}, title = {Zaphod: Efficiently Combining {LSSS} and Garbled Circuits in {SCALE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {974}, year = {2019}, url = {https://eprint.iacr.org/2019/974}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlyORSW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CozzoS19, author = {Daniele Cozzo and Nigel P. Smart}, title = {Sharing the {LUOV:} Threshold Post-Quantum Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1060}, year = {2019}, url = {https://eprint.iacr.org/2019/1060}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CozzoS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlbrechtDDS19, author = {Martin R. Albrecht and Alex Davidson and Amit Deo and Nigel P. Smart}, title = {Round-optimal Verifiable Oblivious Pseudorandom Functions From Ideal Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1271}, year = {2019}, url = {https://eprint.iacr.org/2019/1271}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlbrechtDDS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RotaruSTVW19, author = {Dragos Rotaru and Nigel P. Smart and Titouan Tanguy and Frederik Vercauteren and Tim Wood}, title = {Actively Secure Setup for {SPDZ}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1300}, year = {2019}, url = {https://eprint.iacr.org/2019/1300}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RotaruSTVW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CozzoS19a, author = {Daniele Cozzo and Nigel P. Smart}, title = {Sashimi: Cutting up CSI-FiSh secret keys to produce an actively secure distributed signing protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1360}, year = {2019}, url = {https://eprint.iacr.org/2019/1360}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CozzoS19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ArcherBLKNPSW18, author = {David W. Archer and Dan Bogdanov and Yehuda Lindell and Liina Kamm and Kurt Nielsen and Jakob Illeborg Pagter and Nigel P. Smart and Rebecca N. Wright}, title = {From Keys to Databases - Real-World Applications of Secure Multi-Party Computation}, journal = {Comput. J.}, volume = {61}, number = {12}, pages = {1749--1771}, year = {2018}, url = {https://doi.org/10.1093/comjnl/bxy090}, doi = {10.1093/COMJNL/BXY090}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/ArcherBLKNPSW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ReparazMBANNS18, author = {Oscar Reparaz and Lauren De Meyer and Beg{\"{u}}l Bilgin and Victor Arribas and Svetla Nikova and Ventzislav Nikov and Nigel P. Smart}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {{CAPA:} The Spirit of Beaver Against Physical Attacks}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10991}, pages = {121--151}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96884-1\_5}, doi = {10.1007/978-3-319-96884-1\_5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ReparazMBANNS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/KellerRSW18, author = {Marcel Keller and Dragos Rotaru and Nigel P. Smart and Tim Wood}, editor = {Dario Catalano and Roberto De Prisco}, title = {Reducing Communication Channels in {MPC}}, booktitle = {Security and Cryptography for Networks - 11th International Conference, {SCN} 2018, Amalfi, Italy, September 5-7, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11035}, pages = {181--199}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98113-0\_10}, doi = {10.1007/978-3-319-98113-0\_10}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/scn/KellerRSW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ctrsa/2018, editor = {Nigel P. Smart}, title = {Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers' Track at the {RSA} Conference 2018, San Francisco, CA, USA, April 16-20, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10808}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76953-0}, doi = {10.1007/978-3-319-76953-0}, isbn = {978-3-319-76952-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArcherBLKNPSW18, author = {David W. Archer and Dan Bogdanov and Yehuda Lindell and Liina Kamm and Kurt Nielsen and Jakob Illeborg Pagter and Nigel P. Smart and Rebecca N. Wright}, title = {From Keys to Databases - Real-World Applications of Secure Multi-Party Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {450}, year = {2018}, url = {https://eprint.iacr.org/2018/450}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ArcherBLKNPSW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SmartW18, author = {Nigel P. Smart and Tim Wood}, title = {Error-Detecting in Monotone Span Programs with Application to Communication Efficient Multi-Party Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {467}, year = {2018}, url = {https://eprint.iacr.org/2018/467}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SmartW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuilhemOPS18, author = {Cyprien Delpech de Saint Guilhem and Emmanuela Orsini and Christophe Petit and Nigel P. Smart}, title = {Secure Oblivious Transfer from Semi-Commutative Masking}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {648}, year = {2018}, url = {https://eprint.iacr.org/2018/648}, timestamp = {Fri, 17 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GuilhemOPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KraitsbergLOSA18, author = {Michael Kraitsberg and Yehuda Lindell and Valery Osheter and Nigel P. Smart and Younes Talibi Alaoui}, title = {Adding Distributed Decryption and Key Generation to a Ring-LWE Based {CCA} Encryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1034}, year = {2018}, url = {https://eprint.iacr.org/2018/1034}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KraitsbergLOSA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CartlidgeSA18, author = {John Cartlidge and Nigel P. Smart and Younes Talibi Alaoui}, title = {{MPC} Joins the Dark Side}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1045}, year = {2018}, url = {https://eprint.iacr.org/2018/1045}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CartlidgeSA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DelcourtKLNPS18, author = {Marguerite Delcourt and Thorsten Kleinjung and Arjen K. Lenstra and Shubhojyoti Nath and Dan Page and Nigel P. Smart}, title = {Using the Cloud to Determine Key Strengths - Triennial Update}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1221}, year = {2018}, url = {https://eprint.iacr.org/2018/1221}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DelcourtKLNPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/RotaruSS17, author = {Dragos Rotaru and Nigel P. Smart and Martijn Stam}, title = {Modes of Operation Suitable for Computing on Encrypted Data}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {3}, pages = {294--324}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i3.294-324}, doi = {10.13154/TOSC.V2017.I3.294-324}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/RotaruSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/AlbrechtOPPS17, author = {Martin R. Albrecht and Emmanuela Orsini and Kenneth G. Paterson and Guy Peer and Nigel P. Smart}, editor = {Simon N. Foley and Dieter Gollmann and Einar Snekkenes}, title = {Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts}, booktitle = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10492}, pages = {29--46}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66402-6\_4}, doi = {10.1007/978-3-319-66402-6\_4}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/AlbrechtOPPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/LeslieSS17, author = {David S. Leslie and Chris Sherfield and Nigel P. Smart}, editor = {Simon N. Foley and Dieter Gollmann and Einar Snekkenes}, title = {Multi-rate Threshold FlipThem}, booktitle = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10493}, pages = {174--190}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66399-9\_10}, doi = {10.1007/978-3-319-66399-9\_10}, timestamp = {Tue, 06 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/LeslieSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/CostacheSV17, author = {Anamaria Costache and Nigel P. Smart and Srinivas Vivek}, editor = {Aggelos Kiayias}, title = {Faster Homomorphic Evaluation of Discrete Fourier Transforms}, booktitle = {Financial Cryptography and Data Security - 21st International Conference, {FC} 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10322}, pages = {517--529}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70972-7\_29}, doi = {10.1007/978-3-319-70972-7\_29}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/CostacheSV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/SchollSW17, author = {Peter Scholl and Nigel P. Smart and Tim Wood}, editor = {M{\'{a}}ire O'Neill}, title = {When It's All Just Too Much: Outsourcing MPC-Preprocessing}, booktitle = {Cryptography and Coding - 16th {IMA} International Conference, {IMACC} 2017, Oxford, UK, December 12-14, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10655}, pages = {77--99}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-71045-7\_4}, doi = {10.1007/978-3-319-71045-7\_4}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/ima/SchollSW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/GuilhemSW17, author = {Cyprien de Saint Guilhem and Nigel P. Smart and Bogdan Warinschi}, editor = {Phong Q. Nguyen and Jianying Zhou}, title = {Generic Forward-Secure Key Agreement Without Signatures}, booktitle = {Information Security - 20th International Conference, {ISC} 2017, Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10599}, pages = {114--133}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-69659-1\_7}, doi = {10.1007/978-3-319-69659-1\_7}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/GuilhemSW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/indocrypt/2017, editor = {Arpita Patra and Nigel P. Smart}, title = {Progress in Cryptology - {INDOCRYPT} 2017 - 18th International Conference on Cryptology in India, Chennai, India, December 10-13, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10698}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-71667-1}, doi = {10.1007/978-3-319-71667-1}, isbn = {978-3-319-71666-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CostacheS17, author = {Anamaria Costache and Nigel P. Smart}, title = {Homomorphic Encryption without Gaussian Noise}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {163}, year = {2017}, url = {http://eprint.iacr.org/2017/163}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CostacheS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SchollSW17, author = {Peter Scholl and Nigel P. Smart and Tim Wood}, title = {When It's All Just Too Much: Outsourcing MPC-Preprocessing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {262}, year = {2017}, url = {http://eprint.iacr.org/2017/262}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SchollSW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlbrechtOPPS17, author = {Martin R. Albrecht and Emmanuela Orsini and Kenneth G. Paterson and Guy Peer and Nigel P. Smart}, title = {Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {354}, year = {2017}, url = {http://eprint.iacr.org/2017/354}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlbrechtOPPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KellerRSW17, author = {Marcel Keller and Dragos Rotaru and Nigel P. Smart and Tim Wood}, title = {Reducing Communication Channels in {MPC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {492}, year = {2017}, url = {http://eprint.iacr.org/2017/492}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KellerRSW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RotaruSS17, author = {Dragos Rotaru and Nigel P. Smart and Martijn Stam}, title = {Modes of Operation Suitable for Computing on Encrypted Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {496}, year = {2017}, url = {http://eprint.iacr.org/2017/496}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RotaruSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeslieSS17, author = {David S. Leslie and Chris Sherfield and Nigel P. Smart}, title = {Multi-Rate Threshold FlipThem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {611}, year = {2017}, url = {http://eprint.iacr.org/2017/611}, timestamp = {Wed, 12 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeslieSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuilhemSW17, author = {Cyprien de Saint Guilhem and Nigel P. Smart and Bogdan Warinschi}, title = {Generic Forward-Secure Key Agreement Without Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {853}, year = {2017}, url = {http://eprint.iacr.org/2017/853}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuilhemSW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarnettSSSSVW17, author = {Anthony Barnett and Jay Santokhi and Michael Simpson and Nigel P. Smart and Charlie Stainton{-}Bygrave and Srinivas Vivek and Adrian Waller}, title = {Image Classification using non-linear Support Vector Machines on Encrypted Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {857}, year = {2017}, url = {http://eprint.iacr.org/2017/857}, timestamp = {Mon, 11 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BarnettSSSSVW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MakriRSV17, author = {Eleftheria Makri and Dragos Rotaru and Nigel P. Smart and Frederik Vercauteren}, title = {{PICS:} Private Image Classification with {SVM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1190}, year = {2017}, url = {http://eprint.iacr.org/2017/1190}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MakriRSV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ReparazMBANNS17, author = {Oscar Reparaz and Lauren De Meyer and Beg{\"{u}}l Bilgin and Victor Arribas and Svetla Nikova and Ventzislav Nikov and Nigel P. Smart}, title = {{CAPA:} The Spirit of Beaver against Physical Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1195}, year = {2017}, url = {http://eprint.iacr.org/2017/1195}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ReparazMBANNS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/isc/Smart16, author = {Nigel P. Smart}, title = {Cryptography Made Simple}, series = {Information Security and Cryptography}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-21936-3}, doi = {10.1007/978-3-319-21936-3}, isbn = {978-3-319-21935-6}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/Smart16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BonehPS16, author = {Dan Boneh and Kenny Paterson and Nigel P. Smart}, title = {Building a Community of Real-World Cryptographers}, journal = {{IEEE} Secur. Priv.}, volume = {14}, number = {6}, pages = {7--9}, year = {2016}, url = {https://doi.org/10.1109/MSP.2016.127}, doi = {10.1109/MSP.2016.127}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/BonehPS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/OrsiniPS16, author = {Emmanuela Orsini and Joop van de Pol and Nigel P. Smart}, title = {Bootstrapping {BGV} ciphertexts with a wider choice of \emph{p} and \emph{q}}, journal = {{IET} Inf. Secur.}, volume = {10}, number = {6}, pages = {348--357}, year = {2016}, url = {https://doi.org/10.1049/iet-ifs.2015.0505}, doi = {10.1049/IET-IFS.2015.0505}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/OrsiniPS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Smart16, author = {Nigel P. Smart}, editor = {Beg{\"{u}}l Bilgin and Svetla Nikova and Vincent Rijmen}, title = {Masking and {MPC:} When Crypto Theory Meets Crypto Practice}, booktitle = {Proceedings of the {ACM} Workshop on Theory of Implementation Security, TIS@CCS 2016 Vienna, Austria, October, 2016}, pages = {1}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2996366.2996372}, doi = {10.1145/2996366.2996372}, timestamp = {Sat, 30 Sep 2023 09:36:07 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Smart16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/0001RRSS16, author = {Lorenzo Grassi and Christian Rechberger and Dragos Rotaru and Peter Scholl and Nigel P. Smart}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {MPC-Friendly Symmetric Key Primitives}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {430--443}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978332}, doi = {10.1145/2976749.2978332}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/0001RRSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/CostacheS16, author = {Ana Costache and Nigel P. Smart}, editor = {Kazue Sako}, title = {Which Ring Based Somewhat Homomorphic Encryption Scheme is Best?}, booktitle = {Topics in Cryptology - {CT-RSA} 2016 - The Cryptographers' Track at the {RSA} Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9610}, pages = {325--340}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-29485-8\_19}, doi = {10.1007/978-3-319-29485-8\_19}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/CostacheS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/CostacheSVW16, author = {Anamaria Costache and Nigel P. Smart and Srinivas Vivek and Adrian Waller}, editor = {Roberto Avanzi and Howard M. Heys}, title = {Fixed-Point Arithmetic in {SHE} Schemes}, booktitle = {Selected Areas in Cryptography - {SAC} 2016 - 23rd International Conference, St. John's, NL, Canada, August 10-12, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10532}, pages = {401--422}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-69453-5\_22}, doi = {10.1007/978-3-319-69453-5\_22}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/CostacheSVW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/ChoudhuryOPS16, author = {Ashish Choudhury and Emmanuela Orsini and Arpita Patra and Nigel P. Smart}, editor = {Vassilis Zikas and Roberto De Prisco}, title = {Linear Overhead Optimally-Resilient Robust {MPC} Using Preprocessing}, booktitle = {Security and Cryptography for Networks - 10th International Conference, {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9841}, pages = {147--168}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44618-9\_8}, doi = {10.1007/978-3-319-44618-9\_8}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/ChoudhuryOPS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/LindellSS16, author = {Yehuda Lindell and Nigel P. Smart and Eduardo Soria{-}Vazquez}, editor = {Martin Hirt and Adam D. Smith}, title = {More Efficient Constant-Round Multi-party Computation from {BMR} and {SHE}}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9985}, pages = {554--581}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53641-4\_21}, doi = {10.1007/978-3-662-53641-4\_21}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/LindellSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/GutmannBBRS16, author = {Peter Gutmann and Steven M. Bellovin and Matt Blaze and Ronald L. Rivest and Nigel P. Smart}, title = {An IBE-based Signcryption Scheme for Group Key Management}, journal = {CoRR}, volume = {abs/1603.09526}, year = {2016}, url = {http://arxiv.org/abs/1603.09526}, eprinttype = {arXiv}, eprint = {1603.09526}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/GutmannBBRS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dagstuhl-reports/LauterSS16, author = {Kristin E. Lauter and Radu Sion and Nigel P. Smart}, title = {Modern Cryptography and Security: An Inter-Community Dialogue (Dagstuhl Seminar 16051)}, journal = {Dagstuhl Reports}, volume = {6}, number = {1}, pages = {207--223}, year = {2016}, url = {https://doi.org/10.4230/DagRep.6.1.207}, doi = {10.4230/DAGREP.6.1.207}, timestamp = {Wed, 07 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dagstuhl-reports/LauterSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LindellSS16, author = {Yehuda Lindell and Nigel P. Smart and Eduardo Soria{-}Vazquez}, title = {More Efficient Constant-Round Multi-Party Computation from {BMR} and {SHE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {156}, year = {2016}, url = {http://eprint.iacr.org/2016/156}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LindellSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CostacheSVW16, author = {Anamaria Costache and Nigel P. Smart and Srinivas Vivek and Adrian Waller}, title = {Fixed Point Arithmetic in {SHE} Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {250}, year = {2016}, url = {http://eprint.iacr.org/2016/250}, timestamp = {Mon, 11 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/CostacheSVW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrassiRRSS16, author = {Lorenzo Grassi and Christian Rechberger and Dragos Rotaru and Peter Scholl and Nigel P. Smart}, title = {MPC-Friendly Symmetric Key Primitives}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {542}, year = {2016}, url = {http://eprint.iacr.org/2016/542}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GrassiRRSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CostacheSV16, author = {Anamaria Costache and Nigel P. Smart and Srinivas Vivek}, title = {Faster Homomorphic Evaluation of Discrete Fourier Transforms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1019}, year = {2016}, url = {http://eprint.iacr.org/2016/1019}, timestamp = {Mon, 11 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/CostacheSV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LindellPSY15, author = {Yehuda Lindell and Benny Pinkas and Nigel P. Smart and Avishay Yanai}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Efficient Constant Round Multi-party Computation Combining {BMR} and {SPDZ}}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {319--338}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_16}, doi = {10.1007/978-3-662-48000-7\_16}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LindellPSY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/PolSY15, author = {Joop van de Pol and Nigel P. Smart and Yuval Yarom}, editor = {Kaisa Nyberg}, title = {Just a Little Bit More}, booktitle = {Topics in Cryptology - {CT-RSA} 2015, The Cryptographer's Track at the {RSA} Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9048}, pages = {3--21}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-16715-2\_1}, doi = {10.1007/978-3-319-16715-2\_1}, timestamp = {Thu, 14 Oct 2021 10:27:48 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/PolSY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/LeslieSS15, author = {David S. Leslie and Chris Sherfield and Nigel P. Smart}, editor = {M. H. R. Khouzani and Emmanouil A. Panaousis and George Theodorakopoulos}, title = {Threshold FlipThem: When the Winner Does Not Need to Take All}, booktitle = {Decision and Game Theory for Security - 6th International Conference, GameSec 2015, London, UK, November 4-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9406}, pages = {74--92}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25594-1\_5}, doi = {10.1007/978-3-319-25594-1\_5}, timestamp = {Tue, 06 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/LeslieSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/OrsiniPS15, author = {Emmanuela Orsini and Joop van de Pol and Nigel P. Smart}, editor = {Jonathan Katz}, title = {Bootstrapping {BGV} Ciphertexts with a Wider Choice of p and q}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {673--698}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_30}, doi = {10.1007/978-3-662-46447-2\_30}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/OrsiniPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BurraLNNOOSS15, author = {Sai Sheshank Burra and Enrique Larraia and Jesper Buus Nielsen and Peter Sebastian Nordholt and Claudio Orlandi and Emmanuela Orsini and Peter Scholl and Nigel P. Smart}, title = {High Performance Multi-Party Computation for Binary Circuits Based on Oblivious Transfer}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {472}, year = {2015}, url = {http://eprint.iacr.org/2015/472}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BurraLNNOOSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LindellPSY15, author = {Yehuda Lindell and Benny Pinkas and Nigel P. Smart and Avishay Yanai}, title = {Efficient Constant Round Multi-Party Computation Combining {BMR} and {SPDZ}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {523}, year = {2015}, url = {http://eprint.iacr.org/2015/523}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LindellPSY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChoudhuryOPS15, author = {Ashish Choudhury and Emmanuela Orsini and Arpita Patra and Nigel P. Smart}, title = {Linear Overhead Robust {MPC} with Honest Majority Using Preprocessing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {705}, year = {2015}, url = {http://eprint.iacr.org/2015/705}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChoudhuryOPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeslieSS15, author = {David S. Leslie and Chris Sherfield and Nigel P. Smart}, title = {Threshold FlipThem: When the winner does not need to take all}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {784}, year = {2015}, url = {http://eprint.iacr.org/2015/784}, timestamp = {Wed, 12 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeslieSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CostacheS15, author = {Anamaria Costache and Nigel P. Smart}, title = {Which Ring Based Somewhat Homomorphic Encryption Scheme is Best?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {889}, year = {2015}, url = {http://eprint.iacr.org/2015/889}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CostacheS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/utcs/PageS14, author = {Daniel Page and Nigel P. Smart}, title = {What Is Computer Science? - An Information Security Perspective}, series = {Undergraduate Topics in Computer Science}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-04042-4}, doi = {10.1007/978-3-319-04042-4}, isbn = {978-3-319-04041-7}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/utcs/PageS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/SmartV14, author = {Nigel P. Smart and Frederik Vercauteren}, title = {Fully homomorphic {SIMD} operations}, journal = {Des. Codes Cryptogr.}, volume = {71}, number = {1}, pages = {57--81}, year = {2014}, url = {https://doi.org/10.1007/s10623-012-9720-4}, doi = {10.1007/S10623-012-9720-4}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/SmartV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/LeeSWW14, author = {Ming{-}Feng Lee and Nigel P. Smart and Bogdan Warinschi and Gaven J. Watson}, title = {Anonymity guarantees of the {UMTS/LTE} authentication and connection protocol}, journal = {Int. J. Inf. Sec.}, volume = {13}, number = {6}, pages = {513--527}, year = {2014}, url = {https://doi.org/10.1007/s10207-014-0231-3}, doi = {10.1007/S10207-014-0231-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/LeeSWW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/MohasselSS14, author = {Payman Mohassel and Seyed Saeed Sadeghian and Nigel P. Smart}, editor = {Palash Sarkar and Tetsu Iwata}, title = {Actively Secure Private Function Evaluation}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8874}, pages = {486--505}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45608-8\_26}, doi = {10.1007/978-3-662-45608-8\_26}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/MohasselSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BengerPSY14, author = {Naomi Benger and Joop van de Pol and Nigel P. Smart and Yuval Yarom}, editor = {Lejla Batina and Matthew Robshaw}, title = {"Ooh Aah... Just a Little Bit" : {A} Small Amount of Side Channel Can Go a Long Way}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8731}, pages = {75--92}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44709-3\_5}, doi = {10.1007/978-3-662-44709-3\_5}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BengerPSY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LarraiaOS14, author = {Enrique Larraia and Emmanuela Orsini and Nigel P. Smart}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Dishonest Majority Multi-Party Computation for Binary Circuits}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8617}, pages = {495--512}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44381-1\_28}, doi = {10.1007/978-3-662-44381-1\_28}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LarraiaOS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/ChoudhuryPS14, author = {Ashish Choudhury and Arpita Patra and Nigel P. Smart}, editor = {Michel Abdalla and Roberto De Prisco}, title = {Reducing the Overhead of {MPC} over a Large Population}, booktitle = {Security and Cryptography for Networks - 9th International Conference, {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8642}, pages = {197--217}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10879-7\_12}, doi = {10.1007/978-3-319-10879-7\_12}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/ChoudhuryPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LarraiaOS14, author = {Enrique Larraia and Emmanuela Orsini and Nigel P. Smart}, title = {Dishonest Majority Multi-Party Computation for Binary Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {101}, year = {2014}, url = {http://eprint.iacr.org/2014/101}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LarraiaOS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MohasselSS14, author = {Payman Mohassel and Seyed Saeed Sadeghian and Nigel P. Smart}, title = {Actively Secure Private Function Evaluation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {102}, year = {2014}, url = {http://eprint.iacr.org/2014/102}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MohasselSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChoudhuryPS14, author = {Ashish Choudhury and Arpita Patra and Nigel P. Smart}, title = {Reducing the Overhead of Cloud {MPC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {105}, year = {2014}, url = {http://eprint.iacr.org/2014/105}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChoudhuryPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BengerPSY14, author = {Naomi Benger and Joop van de Pol and Nigel P. Smart and Yuval Yarom}, title = {"Ooh Aah... Just a Little Bit" : {A} small amount of side channel can go a long way}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {161}, year = {2014}, url = {http://eprint.iacr.org/2014/161}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BengerPSY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OrsiniPS14, author = {Emmanuela Orsini and Joop van de Pol and Nigel P. Smart}, title = {Bootstrapping {BGV} Ciphertexts With {A} Wider Choice of p and q}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {408}, year = {2014}, url = {http://eprint.iacr.org/2014/408}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OrsiniPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PolSY14, author = {Joop van de Pol and Nigel P. Smart and Yuval Yarom}, title = {Just a Little Bit More}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {434}, year = {2014}, url = {http://eprint.iacr.org/2014/434}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PolSY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BernhardFGSW13, author = {David Bernhard and Georg Fuchsbauer and Essam Ghadafi and Nigel P. Smart and Bogdan Warinschi}, title = {Anonymous attestation with user-controlled linkability}, journal = {Int. J. Inf. Sec.}, volume = {12}, number = {3}, pages = {219--249}, year = {2013}, url = {https://doi.org/10.1007/s10207-013-0191-z}, doi = {10.1007/S10207-013-0191-Z}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/BernhardFGSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BrzuskaFSWW13, author = {Christina Brzuska and Marc Fischlin and Nigel P. Smart and Bogdan Warinschi and Stephen C. Williams}, title = {Less is more: relaxed yet composable security notions for key exchange}, journal = {Int. J. Inf. Sec.}, volume = {12}, number = {4}, pages = {267--297}, year = {2013}, url = {https://doi.org/10.1007/s10207-013-0192-y}, doi = {10.1007/S10207-013-0192-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/BrzuskaFSWW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/GentryHPS13, author = {Craig Gentry and Shai Halevi and Chris Peikert and Nigel P. Smart}, title = {Field switching in BGV-style homomorphic encryption}, journal = {J. Comput. Secur.}, volume = {21}, number = {5}, pages = {663--684}, year = {2013}, url = {https://doi.org/10.3233/JCS-130480}, doi = {10.3233/JCS-130480}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/GentryHPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ChoudhuryLOPS13, author = {Ashish Choudhury and Jake Loftus and Emmanuela Orsini and Arpita Patra and Nigel P. Smart}, editor = {Kazue Sako and Palash Sarkar}, title = {Between a Rock and a Hard Place: Interpolating between {MPC} and {FHE}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8270}, pages = {221--240}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-42045-0\_12}, doi = {10.1007/978-3-642-42045-0\_12}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/ChoudhuryLOPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Smart13, author = {Nigel P. Smart}, editor = {Martin Franz and Andreas Holzer and Rupak Majumdar and Bryan Parno and Helmut Veith}, title = {A brief history of practical multi-party computation}, booktitle = {PETShop'13, Proceedings of the 2013 {ACM} Workshop on Language Support for Privacy-Enhancing Technologies, Co-located with {CCS} 2013, November 4, 2013, Berlin, Germany}, pages = {1--2}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2517872.2517880}, doi = {10.1145/2517872.2517880}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Smart13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BrzuskaSWW13, author = {Christina Brzuska and Nigel P. Smart and Bogdan Warinschi and Gaven J. Watson}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {An analysis of the {EMV} channel establishment protocol}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {373--386}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516748}, doi = {10.1145/2508859.2516748}, timestamp = {Tue, 10 Nov 2020 19:58:06 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BrzuskaSWW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KellerSS13, author = {Marcel Keller and Peter Scholl and Nigel P. Smart}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {An architecture for practical actively secure {MPC} with dishonest majority}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {549--560}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516744}, doi = {10.1145/2508859.2516744}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KellerSS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/BondFSW13, author = {Mike Bond and George French and Nigel P. Smart and Gaven J. Watson}, editor = {Ed Dawson}, title = {The Low-Call Diet: Authenticated Encryption for Call Counting {HSM} Users}, booktitle = {Topics in Cryptology - {CT-RSA} 2013 - The Cryptographers' Track at the {RSA} Conference 2013, San Francisco,CA, USA, February 25-March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7779}, pages = {359--374}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36095-4\_23}, doi = {10.1007/978-3-642-36095-4\_23}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/BondFSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/DamgardKLPSS13, author = {Ivan Damg{\aa}rd and Marcel Keller and Enrique Larraia and Valerio Pastro and Peter Scholl and Nigel P. Smart}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {Practical Covertly Secure {MPC} for Dishonest Majority - Or: Breaking the {SPDZ} Limits}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {1--18}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_1}, doi = {10.1007/978-3-642-40203-6\_1}, timestamp = {Wed, 25 Sep 2019 18:03:15 +0200}, biburl = {https://dblp.org/rec/conf/esorics/DamgardKLPSS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/PolS13, author = {Joop van de Pol and Nigel P. Smart}, editor = {Martijn Stam}, title = {Estimating Key Sizes for High Dimensional Lattice-Based Systems}, booktitle = {Cryptography and Coding - 14th {IMA} International Conference, {IMACC} 2013, Oxford, UK, December 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8308}, pages = {290--303}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-45239-0\_17}, doi = {10.1007/978-3-642-45239-0\_17}, timestamp = {Wed, 18 Mar 2020 16:00:57 +0100}, biburl = {https://dblp.org/rec/conf/ima/PolS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeeSWW13, author = {Ming{-}Feng Lee and Nigel P. Smart and Bogdan Warinschi and Gaven J. Watson}, title = {Anonymity Guarantees of the {UMTS/LTE} Authentication and Connection Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {27}, year = {2013}, url = {http://eprint.iacr.org/2013/027}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeeSWW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrzuskaSWW13, author = {Christina Brzuska and Nigel P. Smart and Bogdan Warinschi and Gaven J. Watson}, title = {An Analysis of the {EMV} Channel Establishment Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {31}, year = {2013}, url = {http://eprint.iacr.org/2013/031}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrzuskaSWW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChoudhuryLOPS13, author = {Ashish Choudhury and Jake Loftus and Emmanuela Orsini and Arpita Patra and Nigel P. Smart}, title = {Between a Rock and a Hard Place: Interpolating Between {MPC} and {FHE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {85}, year = {2013}, url = {http://eprint.iacr.org/2013/085}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChoudhuryLOPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KellerSS13, author = {Marcel Keller and Peter Scholl and Nigel P. Smart}, title = {An architecture for practical actively secure {MPC} with dishonest majority}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {143}, year = {2013}, url = {http://eprint.iacr.org/2013/143}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KellerSS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PolS13, author = {Joop van de Pol and Nigel P. Smart}, title = {Estimating Key Sizes For High Dimensional Lattice Based Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {630}, year = {2013}, url = {http://eprint.iacr.org/2013/630}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PolS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/FioreGS12, author = {Dario Fiore and Rosario Gennaro and Nigel P. Smart}, title = {Relations between the security models for certificateless encryption and ID-based key agreement}, journal = {Int. J. Inf. Sec.}, volume = {11}, number = {1}, pages = {1--22}, year = {2012}, url = {https://doi.org/10.1007/s10207-011-0149-y}, doi = {10.1007/S10207-011-0149-Y}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/FioreGS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DamgardPSZ12, author = {Ivan Damg{\aa}rd and Valerio Pastro and Nigel P. Smart and Sarah Zakarias}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {Multiparty Computation from Somewhat Homomorphic Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {643--662}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_38}, doi = {10.1007/978-3-642-32009-5\_38}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DamgardPSZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GentryHS12, author = {Craig Gentry and Shai Halevi and Nigel P. Smart}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {Homomorphic Evaluation of the {AES} Circuit}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {850--867}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_49}, doi = {10.1007/978-3-642-32009-5\_49}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GentryHS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/DegabrieleLPSS12, author = {Jean Paul Degabriele and Anja Lehmann and Kenneth G. Paterson and Nigel P. Smart and Mario Strefler}, editor = {Orr Dunkelman}, title = {On the Joint Security of Encryption and Signature in {EMV}}, booktitle = {Topics in Cryptology - {CT-RSA} 2012 - The Cryptographers' Track at the {RSA} Conference 2012, San Francisco, CA, USA, February 27 - March 2, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7178}, pages = {116--135}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-27954-6\_8}, doi = {10.1007/978-3-642-27954-6\_8}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/DegabrieleLPSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GentryHS12, author = {Craig Gentry and Shai Halevi and Nigel P. Smart}, editor = {David Pointcheval and Thomas Johansson}, title = {Fully Homomorphic Encryption with Polylog Overhead}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {465--482}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_28}, doi = {10.1007/978-3-642-29011-4\_28}, timestamp = {Sun, 12 Nov 2023 02:15:08 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/GentryHS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/KleinjungLPS12, author = {Thorsten Kleinjung and Arjen K. Lenstra and Dan Page and Nigel P. Smart}, editor = {Steven D. Galbraith and Mridul Nandi}, title = {Using the Cloud to Determine Key Strengths}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2012, 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7668}, pages = {17--39}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34931-7\_3}, doi = {10.1007/978-3-642-34931-7\_3}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/KleinjungLPS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/GhadafiS12, author = {Essam Ghadafi and Nigel P. Smart}, editor = {Dieter Gollmann and Felix C. Freiling}, title = {Efficient Two-Move Blind Signatures in the Common Reference String Model}, booktitle = {Information Security - 15th International Conference, {ISC} 2012, Passau, Germany, September 19-21, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7483}, pages = {274--289}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33383-5\_17}, doi = {10.1007/978-3-642-33383-5\_17}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/GhadafiS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GentryHS12, author = {Craig Gentry and Shai Halevi and Nigel P. Smart}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {Better Bootstrapping in Fully Homomorphic Encryption}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {1--16}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_1}, doi = {10.1007/978-3-642-30057-8\_1}, timestamp = {Mon, 16 Nov 2020 15:55:52 +0100}, biburl = {https://dblp.org/rec/conf/pkc/GentryHS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/GentryHPS12, author = {Craig Gentry and Shai Halevi and Chris Peikert and Nigel P. Smart}, editor = {Ivan Visconti and Roberto De Prisco}, title = {Ring Switching in BGV-Style Homomorphic Encryption}, booktitle = {Security and Cryptography for Networks - 8th International Conference, {SCN} 2012, Amalfi, Italy, September 5-7, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7485}, pages = {19--37}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32928-9\_2}, doi = {10.1007/978-3-642-32928-9\_2}, timestamp = {Thu, 23 Jun 2022 19:58:57 +0200}, biburl = {https://dblp.org/rec/conf/scn/GentryHPS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/DamgardKLMS12, author = {Ivan Damg{\aa}rd and Marcel Keller and Enrique Larraia and Christian Miles and Nigel P. Smart}, editor = {Ivan Visconti and Roberto De Prisco}, title = {Implementing {AES} via an Actively/Covertly Secure Dishonest-Majority {MPC} Protocol}, booktitle = {Security and Cryptography for Networks - 8th International Conference, {SCN} 2012, Amalfi, Italy, September 5-7, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7485}, pages = {241--263}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32928-9\_14}, doi = {10.1007/978-3-642-32928-9\_14}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/DamgardKLMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GentryHS12, author = {Craig Gentry and Shai Halevi and Nigel P. Smart}, title = {Homomorphic Evaluation of the {AES} Circuit}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {99}, year = {2012}, url = {http://eprint.iacr.org/2012/099}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GentryHS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GentryHS12a, author = {Craig Gentry and Shai Halevi and Nigel P. Smart}, title = {Ring Switching in BGV-Style Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {240}, year = {2012}, url = {http://eprint.iacr.org/2012/240}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GentryHS12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrzuskaFSWW12, author = {Christina Brzuska and Marc Fischlin and Nigel P. Smart and Bogdan Warinschi and Stephen C. Williams}, title = {Less is More: Relaxed yet Composable Security Notions for Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {242}, year = {2012}, url = {http://eprint.iacr.org/2012/242}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrzuskaFSWW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardKLMS12, author = {Ivan Damg{\aa}rd and Marcel Keller and Enrique Larraia and Christian Miles and Nigel P. Smart}, title = {Implementing {AES} via an Actively/Covertly Secure Dishonest-Majority {MPC} Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {262}, year = {2012}, url = {http://eprint.iacr.org/2012/262}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardKLMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BondFSW12, author = {Mike Bond and George French and Nigel P. Smart and Gaven J. Watson}, title = {The low-call diet: Authenticated Encryption for call counting {HSM} users}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {497}, year = {2012}, url = {http://eprint.iacr.org/2012/497}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BondFSW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardKLPSS12, author = {Ivan Damg{\aa}rd and Marcel Keller and Enrique Larraia and Valerio Pastro and Peter Scholl and Nigel P. Smart}, title = {Practical Covertly Secure {MPC} for Dishonest Majority - or: Breaking the {SPDZ} Limits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {642}, year = {2012}, url = {http://eprint.iacr.org/2012/642}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardKLPSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/AbdallaBCDMNSS11, author = {Michel Abdalla and James Birkett and Dario Catalano and Alexander W. Dent and John Malone{-}Lee and Gregory Neven and Jacob C. N. Schuldt and Nigel P. Smart}, title = {Wildcarded Identity-Based Encryption}, journal = {J. Cryptol.}, volume = {24}, number = {1}, pages = {42--82}, year = {2011}, url = {https://doi.org/10.1007/s00145-010-9060-3}, doi = {10.1007/S00145-010-9060-3}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/AbdallaBCDMNSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/LoftusS11, author = {Jake Loftus and Nigel P. Smart}, editor = {Abderrahmane Nitaj and David Pointcheval}, title = {Secure Outsourced Computation}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2011 - 4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6737}, pages = {1--20}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21969-6\_1}, doi = {10.1007/978-3-642-21969-6\_1}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/LoftusS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/SchollS11, author = {Peter Scholl and Nigel P. Smart}, editor = {Liqun Chen}, title = {Improved Key Generation for Gentry's Fully Homomorphic Encryption Scheme}, booktitle = {Cryptography and Coding - 13th {IMA} International Conference, {IMACC} 2011, Oxford, UK, December 12-15, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7089}, pages = {10--22}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25516-8\_2}, doi = {10.1007/978-3-642-25516-8\_2}, timestamp = {Wed, 18 Mar 2020 16:00:56 +0100}, biburl = {https://dblp.org/rec/conf/ima/SchollS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/LoftusMSV11, author = {Jake Loftus and Alexander May and Nigel P. Smart and Frederik Vercauteren}, editor = {Ali Miri and Serge Vaudenay}, title = {On CCA-Secure Somewhat Homomorphic Encryption}, booktitle = {Selected Areas in Cryptography - 18th International Workshop, {SAC} 2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7118}, pages = {55--72}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-28496-0\_4}, doi = {10.1007/978-3-642-28496-0\_4}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/LoftusMSV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dagstuhl-reports/PinkasSS11, author = {Benny Pinkas and Ahmad{-}Reza Sadeghi and Nigel P. Smart}, title = {Secure Computing in the Cloud (Dagstuhl Seminar 11491)}, journal = {Dagstuhl Reports}, volume = {1}, number = {12}, pages = {1--10}, year = {2011}, url = {https://doi.org/10.4230/DagRep.1.12.1}, doi = {10.4230/DAGREP.1.12.1}, timestamp = {Wed, 07 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dagstuhl-reports/PinkasSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SmartV11, author = {Nigel P. Smart and Frederik Vercauteren}, title = {Fully Homomorphic {SIMD} Operations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {133}, year = {2011}, url = {http://eprint.iacr.org/2011/133}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SmartV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KleinjungLPS11, author = {Thorsten Kleinjung and Arjen K. Lenstra and Dan Page and Nigel P. Smart}, title = {Using the Cloud to Determine Key Strengths}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {254}, year = {2011}, url = {http://eprint.iacr.org/2011/254}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KleinjungLPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SchollS11, author = {Peter Scholl and Nigel P. Smart}, title = {Improved Key Generation For Gentry's Fully Homomorphic Encryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {471}, year = {2011}, url = {http://eprint.iacr.org/2011/471}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SchollS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardPSZ11, author = {Ivan Damg{\aa}rd and Valerio Pastro and Nigel P. Smart and Sarah Zakarias}, title = {Multiparty Computation from Somewhat Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {535}, year = {2011}, url = {http://eprint.iacr.org/2011/535}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardPSZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GentryHS11, author = {Craig Gentry and Shai Halevi and Nigel P. Smart}, title = {Fully Homomorphic Encryption with Polylog Overhead}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {566}, year = {2011}, url = {http://eprint.iacr.org/2011/566}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GentryHS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DegabrieleLPSS11, author = {Jean Paul Degabriele and Anja Lehmann and Kenneth G. Paterson and Nigel P. Smart and Mario Strefler}, title = {On the Joint Security of Encryption and Signature in {EMV}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {615}, year = {2011}, url = {http://eprint.iacr.org/2011/615}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DegabrieleLPSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernhardFGSW11, author = {David Bernhard and Georg Fuchsbauer and Essam Ghadafi and Nigel P. Smart and Bogdan Warinschi}, title = {Anonymous attestation with user-controlled linkability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {658}, year = {2011}, url = {http://eprint.iacr.org/2011/658}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernhardFGSW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GentryHS11a, author = {Craig Gentry and Shai Halevi and Nigel P. Smart}, title = {Better Bootstrapping in Fully Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {680}, year = {2011}, url = {http://eprint.iacr.org/2011/680}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GentryHS11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/MorrisseySW10, author = {Paul Morrissey and Nigel P. Smart and Bogdan Warinschi}, title = {The {TLS} Handshake Protocol: {A} Modular Analysis}, journal = {J. Cryptol.}, volume = {23}, number = {2}, pages = {187--223}, year = {2010}, url = {https://doi.org/10.1007/s00145-009-9052-3}, doi = {10.1007/S00145-009-9052-3}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/MorrisseySW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/ChenPS10, author = {Liqun Chen and Dan Page and Nigel P. Smart}, editor = {Dieter Gollmann and Jean{-}Louis Lanet and Julien Iguchi{-}Cartigny}, title = {On the Design and Implementation of an Efficient {DAA} Scheme}, booktitle = {Smart Card Research and Advanced Application, 9th {IFIP} {WG} 8.8/11.2 International Conference, {CARDIS} 2010, Passau, Germany, April 14-16, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6035}, pages = {223--237}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12510-2\_16}, doi = {10.1007/978-3-642-12510-2\_16}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/ChenPS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/Smart10, author = {Nigel P. Smart}, editor = {Josef Pieprzyk}, title = {Errors Matter: Breaking RSA-Based {PIN} Encryption with Thirty Ciphertext Validity Queries}, booktitle = {Topics in Cryptology - {CT-RSA} 2010, The Cryptographers' Track at the {RSA} Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5985}, pages = {15--25}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11925-5\_2}, doi = {10.1007/978-3-642-11925-5\_2}, timestamp = {Sun, 02 Jun 2019 21:22:43 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/Smart10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pairing/FioreGS10, author = {Dario Fiore and Rosario Gennaro and Nigel P. Smart}, editor = {Marc Joye and Atsuko Miyaji and Akira Otsuka}, title = {Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement}, booktitle = {Pairing-Based Cryptography - Pairing 2010 - 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6487}, pages = {167--186}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17455-1\_11}, doi = {10.1007/978-3-642-17455-1\_11}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pairing/FioreGS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GhadafiSW10, author = {Essam Ghadafi and Nigel P. Smart and Bogdan Warinschi}, editor = {Phong Q. Nguyen and David Pointcheval}, title = {Groth-Sahai Proofs Revisited}, booktitle = {Public Key Cryptography - {PKC} 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6056}, pages = {177--192}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13013-7\_11}, doi = {10.1007/978-3-642-13013-7\_11}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GhadafiSW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/SmartV10, author = {Nigel P. Smart and Frederik Vercauteren}, editor = {Phong Q. Nguyen and David Pointcheval}, title = {Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes}, booktitle = {Public Key Cryptography - {PKC} 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6056}, pages = {420--443}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13013-7\_25}, doi = {10.1007/978-3-642-13013-7\_25}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/SmartV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/LeeSW10, author = {Ming{-}Feng Lee and Nigel P. Smart and Bogdan Warinschi}, editor = {Juan A. Garay and Roberto De Prisco}, title = {The Fiat-Shamir Transform for Group and Ring Signature Schemes}, booktitle = {Security and Cryptography for Networks, 7th International Conference, {SCN} 2010, Amalfi, Italy, September 13-15, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6280}, pages = {363--380}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15317-4\_23}, doi = {10.1007/978-3-642-15317-4\_23}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/scn/LeeSW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/BichselCNSW10, author = {Patrik Bichsel and Jan Camenisch and Gregory Neven and Nigel P. Smart and Bogdan Warinschi}, editor = {Juan A. Garay and Roberto De Prisco}, title = {Get Shorty via Group Signatures without Encryption}, booktitle = {Security and Cryptography for Networks, 7th International Conference, {SCN} 2010, Amalfi, Italy, September 13-15, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6280}, pages = {381--398}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15317-4\_24}, doi = {10.1007/978-3-642-15317-4\_24}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/BichselCNSW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeeSW10, author = {Ming{-}Feng Lee and Nigel P. Smart and Bogdan Warinschi}, title = {The Fiat-Shamir Transform for Group and Ring Signature Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {358}, year = {2010}, url = {http://eprint.iacr.org/2010/358}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeeSW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LoftusMSV10, author = {Jake Loftus and Alexander May and Nigel P. Smart and Frederik Vercauteren}, title = {On CCA-Secure Fully Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {560}, year = {2010}, url = {http://eprint.iacr.org/2010/560}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LoftusMSV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GhadafiS10, author = {Essam Ghadafi and Nigel P. Smart}, title = {Efficient Two-Move Blind Signatures in the Common Reference String Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {568}, year = {2010}, url = {http://eprint.iacr.org/2010/568}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GhadafiS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/NevenSW09, author = {Gregory Neven and Nigel P. Smart and Bogdan Warinschi}, title = {Hash function requirements for Schnorr signatures}, journal = {J. Math. Cryptol.}, volume = {3}, number = {1}, pages = {69--87}, year = {2009}, url = {https://doi.org/10.1515/JMC.2009.004}, doi = {10.1515/JMC.2009.004}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/NevenSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/PinkasSSW09, author = {Benny Pinkas and Thomas Schneider and Nigel P. Smart and Stephen C. Williams}, editor = {Mitsuru Matsui}, title = {Secure Two-Party Computation Is Practical}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5912}, pages = {250--267}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10366-7\_15}, doi = {10.1007/978-3-642-10366-7\_15}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/PinkasSSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ChenMSW09, author = {Liqun Chen and Paul Morrissey and Nigel P. Smart and Bogdan Warinschi}, editor = {Mitsuru Matsui}, title = {Security Notions and Generic Constructions for Client Puzzles}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5912}, pages = {505--523}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10366-7\_30}, doi = {10.1007/978-3-642-10366-7\_30}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/ChenMSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/GeislerS09, author = {Martin Geisler and Nigel P. Smart}, editor = {Matthew Geoffrey Parker}, title = {Distributing the Key Distribution Centre in Sakai-Kasahara Based Systems}, booktitle = {Cryptography and Coding, 12th {IMA} International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5921}, pages = {252--262}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10868-6\_15}, doi = {10.1007/978-3-642-10868-6\_15}, timestamp = {Wed, 01 Sep 2021 10:36:08 +0200}, biburl = {https://dblp.org/rec/conf/ima/GeislerS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/GhadafiSW09, author = {Essam Ghadafi and Nigel P. Smart and Bogdan Warinschi}, editor = {Matthew Geoffrey Parker}, title = {Practical Zero-Knowledge Proofs for Circuit Evaluation}, booktitle = {Cryptography and Coding, 12th {IMA} International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5921}, pages = {469--494}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10868-6\_28}, doi = {10.1007/978-3-642-10868-6\_28}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/GhadafiSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pairing/SmartW09, author = {Nigel P. Smart and Bogdan Warinschi}, editor = {Hovav Shacham and Brent Waters}, title = {Identity Based Group Signatures from Hierarchical Identity-Based Encryption}, booktitle = {Pairing-Based Cryptography - Pairing 2009, Third International Conference, Palo Alto, CA, USA, August 12-14, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5671}, pages = {150--170}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03298-1\_11}, doi = {10.1007/978-3-642-03298-1\_11}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/pairing/SmartW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SmartW09, author = {Nigel P. Smart and Bogdan Warinschi}, title = {Identity Based Group Signatures from Hierarchical Identity-Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {313}, year = {2009}, url = {http://eprint.iacr.org/2009/313}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SmartW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Pinkas0SW09, author = {Benny Pinkas and Thomas Schneider and Nigel P. Smart and Stephen C. Williams}, title = {Secure Two-Party Computation is Practical}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {314}, year = {2009}, url = {http://eprint.iacr.org/2009/314}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Pinkas0SW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Smart09, author = {Nigel P. Smart}, title = {Breaking RSA-based {PIN} Encryption with thirty ciphertext validity queries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {315}, year = {2009}, url = {http://eprint.iacr.org/2009/315}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Smart09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenMSW09, author = {Liqun Chen and Paul Morrissey and Nigel P. Smart and Bogdan Warinschi}, title = {Security Notions and Generic Constructions for Client Puzzles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {331}, year = {2009}, url = {http://eprint.iacr.org/2009/331}, timestamp = {Thu, 28 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenMSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SmartV09, author = {Nigel P. Smart and Frederik Vercauteren}, title = {Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {571}, year = {2009}, url = {http://eprint.iacr.org/2009/571}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SmartV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenPS09, author = {Liqun Chen and Dan Page and Nigel P. Smart}, title = {On the Design and Implementation of an Efficient {DAA} Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {598}, year = {2009}, url = {http://eprint.iacr.org/2009/598}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenPS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GhadafiSW09, author = {Essam Ghadafi and Nigel P. Smart and Bogdan Warinschi}, title = {Groth-Sahai proofs revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {599}, year = {2009}, url = {http://eprint.iacr.org/2009/599}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GhadafiSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FioreGS09, author = {Dario Fiore and Rosario Gennaro and Nigel P. Smart}, title = {Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {600}, year = {2009}, url = {http://eprint.iacr.org/2009/600}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FioreGS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dam/GalbraithPS08, author = {Steven D. Galbraith and Kenneth G. Paterson and Nigel P. Smart}, title = {Pairings for cryptographers}, journal = {Discret. Appl. Math.}, volume = {156}, number = {16}, pages = {3113--3121}, year = {2008}, url = {https://doi.org/10.1016/j.dam.2007.12.010}, doi = {10.1016/J.DAM.2007.12.010}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dam/GalbraithPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/SmartOP08, author = {Nigel P. Smart and Elisabeth Oswald and Daniel Page}, title = {Randomised representations}, journal = {{IET} Inf. Secur.}, volume = {2}, number = {2}, pages = {19--27}, year = {2008}, url = {https://doi.org/10.1049/iet-ifs:20070017}, doi = {10.1049/IET-IFS:20070017}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/SmartOP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BentaharFMS08, author = {Kamel Bentahar and Pooya Farshim and John Malone{-}Lee and Nigel P. Smart}, title = {Generic Constructions of Identity-Based and Certificateless KEMs}, journal = {J. Cryptol.}, volume = {21}, number = {2}, pages = {178--199}, year = {2008}, url = {https://doi.org/10.1007/s00145-007-9000-z}, doi = {10.1007/S00145-007-9000-Z}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BentaharFMS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jucs/ChenSWWDLMMMPPS08, author = {Liqun Chen and Willy Susilo and Huaxiong Wang and Duncan S. Wong and Ed Dawson and Xuejia Lai and Masahiro Mambo and Atsuko Miyaji and Yi Mu and David Pointcheval and Bart Preneel and Nigel P. Smart}, title = {Cryptography in Computer System Security}, journal = {J. Univers. Comput. Sci.}, volume = {14}, number = {3}, pages = {314--317}, year = {2008}, url = {http://www.jucs.org/jucs\_14\_3/cryptography\_in\_computer\_system}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jucs/ChenSWWDLMMMPPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/MorrisseySW08, author = {Paul Morrissey and Nigel P. Smart and Bogdan Warinschi}, editor = {Josef Pieprzyk}, title = {A Modular Security Analysis of the {TLS} Handshake Protocol}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5350}, pages = {55--73}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89255-7\_5}, doi = {10.1007/978-3-540-89255-7\_5}, timestamp = {Sun, 02 Jun 2019 21:16:53 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/MorrisseySW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pairing/ChenMS08, author = {Liqun Chen and Paul Morrissey and Nigel P. Smart}, editor = {Steven D. Galbraith and Kenneth G. Paterson}, title = {Pairings in Trusted Computing}, booktitle = {Pairing-Based Cryptography - Pairing 2008, Second International Conference, Egham, UK, September 1-3, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5209}, pages = {1--17}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85538-5\_1}, doi = {10.1007/978-3-540-85538-5\_1}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pairing/ChenMS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/ChenMS08, author = {Liqun Chen and Paul Morrissey and Nigel P. Smart}, editor = {Joonsang Baek and Feng Bao and Kefei Chen and Xuejia Lai}, title = {On Proofs of Security for {DAA} Schemes}, booktitle = {Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5324}, pages = {156--175}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88733-1\_11}, doi = {10.1007/978-3-540-88733-1\_11}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/ChenMS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/LindellPS08, author = {Yehuda Lindell and Benny Pinkas and Nigel P. Smart}, editor = {Rafail Ostrovsky and Roberto De Prisco and Ivan Visconti}, title = {Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries}, booktitle = {Security and Cryptography for Networks, 6th International Conference, {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5229}, pages = {2--20}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85855-3\_2}, doi = {10.1007/978-3-540-85855-3\_2}, timestamp = {Tue, 25 Feb 2020 11:33:46 +0100}, biburl = {https://dblp.org/rec/conf/scn/LindellPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2008, editor = {Nigel P. Smart}, title = {Advances in Cryptology - {EUROCRYPT} 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4965}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78967-3}, doi = {10.1007/978-3-540-78967-3}, isbn = {978-3-540-78966-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MorrisseySW08, author = {Paul Morrissey and Nigel P. Smart and Bogdan Warinschi}, title = {A Modular Security Analysis of the {TLS} Handshake Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {236}, year = {2008}, url = {http://eprint.iacr.org/2008/236}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MorrisseySW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dam/SmartV07, author = {Nigel P. Smart and Frederik Vercauteren}, title = {On computable isomorphisms in efficient asymmetric pairing-based systems}, journal = {Discret. Appl. Math.}, volume = {155}, number = {4}, pages = {538--547}, year = {2007}, url = {https://doi.org/10.1016/j.dam.2006.07.004}, doi = {10.1016/J.DAM.2006.07.004}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dam/SmartV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/ChenCS07, author = {Liqun Chen and Zhaohui Cheng and Nigel P. Smart}, title = {Identity-based key agreement protocols from pairings}, journal = {Int. J. Inf. Sec.}, volume = {6}, number = {4}, pages = {213--241}, year = {2007}, url = {https://doi.org/10.1007/s10207-006-0011-9}, doi = {10.1007/S10207-006-0011-9}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/ChenCS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/moc/TourignyS07, author = {Yves Tourigny and Nigel P. Smart}, title = {A multidimensional continued fraction based on a high-order recurrence relation}, journal = {Math. Comput.}, volume = {76}, number = {260}, pages = {1995--2022}, year = {2007}, url = {https://doi.org/10.1090/S0025-5718-07-02020-0}, doi = {10.1090/S0025-5718-07-02020-0}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/moc/TourignyS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/LeadbitterPS07, author = {Peter James Leadbitter and Dan Page and Nigel P. Smart}, title = {Nondeterministic Multithreading}, journal = {{IEEE} Trans. Computers}, volume = {56}, number = {7}, pages = {992--998}, year = {2007}, url = {https://doi.org/10.1109/TC.2007.1049}, doi = {10.1109/TC.2007.1049}, timestamp = {Mon, 13 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/LeadbitterPS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/BjorstadDS07, author = {Tor E. Bj{\o}rstad and Alexander W. Dent and Nigel P. Smart}, editor = {Steven D. Galbraith}, title = {Efficient KEMs with Partial Message Recovery}, booktitle = {Cryptography and Coding, 11th {IMA} International Conference, Cirencester, UK, December 18-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4887}, pages = {233--256}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77272-9\_15}, doi = {10.1007/978-3-540-77272-9\_15}, timestamp = {Wed, 18 Mar 2020 16:00:59 +0100}, biburl = {https://dblp.org/rec/conf/ima/BjorstadDS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/BentaharS07, author = {Kamel Bentahar and Nigel P. Smart}, editor = {Steven D. Galbraith}, title = {Efficient 15, 360-bit {RSA} Using Woop-Optimised Montgomery Arithmetic}, booktitle = {Cryptography and Coding, 11th {IMA} International Conference, Cirencester, UK, December 18-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4887}, pages = {346--363}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77272-9\_21}, doi = {10.1007/978-3-540-77272-9\_21}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/BentaharS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/MossPS07, author = {Andrew Moss and Dan Page and Nigel P. Smart}, editor = {Steven D. Galbraith}, title = {Toward Acceleration of {RSA} Using 3D Graphics Hardware}, booktitle = {Cryptography and Coding, 11th {IMA} International Conference, Cirencester, UK, December 18-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4887}, pages = {364--383}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77272-9\_22}, doi = {10.1007/978-3-540-77272-9\_22}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/MossPS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AbdallaDMNPS07, author = {Michel Abdalla and Alexander W. Dent and John Malone{-}Lee and Gregory Neven and Duong Hieu Phan and Nigel P. Smart}, editor = {Tatsuaki Okamoto and Xiaoyun Wang}, title = {Identity-Based Traitor Tracing}, booktitle = {Public Key Cryptography - {PKC} 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4450}, pages = {361--376}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71677-8\_24}, doi = {10.1007/978-3-540-71677-8\_24}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AbdallaDMNPS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MossPS07, author = {Andrew Moss and Dan Page and Nigel P. Smart}, title = {Executing Modular Exponentiation on a Graphics Accelerator}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {187}, year = {2007}, url = {http://eprint.iacr.org/2007/187}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MossPS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/Al-RiyamiMS06, author = {Sattam S. Al{-}Riyami and John Malone{-}Lee and Nigel P. Smart}, title = {Escrow-free encryption supporting cryptographic workflow}, journal = {Int. J. Inf. Sec.}, volume = {5}, number = {4}, pages = {217--229}, year = {2006}, url = {https://doi.org/10.1007/s10207-006-0002-x}, doi = {10.1007/S10207-006-0002-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/Al-RiyamiMS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/HessSV06, author = {Florian Hess and Nigel P. Smart and Frederik Vercauteren}, title = {The Eta Pairing Revisited}, journal = {{IEEE} Trans. Inf. Theory}, volume = {52}, number = {10}, pages = {4595--4602}, year = {2006}, url = {https://doi.org/10.1109/TIT.2006.881709}, doi = {10.1109/TIT.2006.881709}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/HessSV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ants/GrangerPS06, author = {Robert Granger and Dan Page and Nigel P. Smart}, editor = {Florian Hess and Sebastian Pauli and Michael E. Pohst}, title = {High Security Pairing-Based Cryptography Revisited}, booktitle = {Algorithmic Number Theory, 7th International Symposium, ANTS-VII, Berlin, Germany, July 23-28, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4076}, pages = {480--494}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11792086\_34}, doi = {10.1007/11792086\_34}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ants/GrangerPS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/JouxLSV06, author = {Antoine Joux and Reynald Lercier and Nigel P. Smart and Frederik Vercauteren}, editor = {Cynthia Dwork}, title = {The Number Field Sieve in the Medium Prime Case}, booktitle = {Advances in Cryptology - {CRYPTO} 2006, 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4117}, pages = {326--344}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11818175\_19}, doi = {10.1007/11818175\_19}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/JouxLSV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/AbdallaCDMNS06, author = {Michel Abdalla and Dario Catalano and Alexander W. Dent and John Malone{-}Lee and Gregory Neven and Nigel P. Smart}, editor = {Michele Bugliesi and Bart Preneel and Vladimiro Sassone and Ingo Wegener}, title = {Identity-Based Encryption Gone Wild}, booktitle = {Automata, Languages and Programming, 33rd International Colloquium, {ICALP} 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {4052}, pages = {300--311}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11787006\_26}, doi = {10.1007/11787006\_26}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/AbdallaCDMNS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrangerPS06, author = {Robert Granger and Dan Page and Nigel P. Smart}, title = {High Security Pairing-Based Cryptography Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {59}, year = {2006}, url = {http://eprint.iacr.org/2006/059}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GrangerPS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HessSV06, author = {Florian Hess and Nigel P. Smart and Frederik Vercauteren}, title = {The Eta Pairing Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {110}, year = {2006}, url = {http://eprint.iacr.org/2006/110}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HessSV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalbraithPS06, author = {Steven D. Galbraith and Kenneth G. Paterson and Nigel P. Smart}, title = {Pairings for Cryptographers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {165}, year = {2006}, url = {http://eprint.iacr.org/2006/165}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalbraithPS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrangerS06, author = {Robert Granger and Nigel P. Smart}, title = {On Computing Products of Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {172}, year = {2006}, url = {http://eprint.iacr.org/2006/172}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GrangerS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenCS06a, author = {Liqun Chen and Zhaohui Cheng and Nigel P. Smart}, title = {Identity-based Key Agreement Protocols From Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {199}, year = {2006}, url = {http://eprint.iacr.org/2006/199}, timestamp = {Sat, 28 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenCS06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaCDMNS06, author = {Michel Abdalla and Dario Catalano and Alexander W. Dent and John Malone{-}Lee and Gregory Neven and Nigel P. Smart}, title = {Identity-Based Encryption Gone Wild}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {304}, year = {2006}, url = {http://eprint.iacr.org/2006/304}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaCDMNS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GreenNS05, author = {P. J. Green and Richard Noad and Nigel P. Smart}, editor = {Josyula R. Rao and Berk Sunar}, title = {Further Hidden Markov Model Cryptanalysis}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {61--74}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_5}, doi = {10.1007/11545262\_5}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/GreenNS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/DodsSS05, author = {C. Dods and Nigel P. Smart and Martijn Stam}, editor = {Nigel P. Smart}, title = {Hash Based Digital Signature Schemes}, booktitle = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester, UK, December 19-21, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3796}, pages = {96--115}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11586821\_8}, doi = {10.1007/11586821\_8}, timestamp = {Wed, 18 Mar 2020 16:00:57 +0100}, biburl = {https://dblp.org/rec/conf/ima/DodsSS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ima/2005, editor = {Nigel P. Smart}, title = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester, UK, December 19-21, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3796}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11586821}, doi = {10.1007/11586821}, isbn = {3-540-30276-X}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BentaharFMS05, author = {Kamel Bentahar and Pooya Farshim and John Malone{-}Lee and Nigel P. Smart}, title = {Generic Constructions of Identity-Based and Certificateless KEMs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {58}, year = {2005}, url = {http://eprint.iacr.org/2005/058}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BentaharFMS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SmartV05, author = {Nigel P. Smart and Frederik Vercauteren}, title = {On Computable Isomorphisms in Efficient Asymmetric Pairing Based Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {116}, year = {2005}, url = {http://eprint.iacr.org/2005/116}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SmartV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarbosaNPS05, author = {Manuel Barbosa and Richard Noad and Daniel Page and Nigel P. Smart}, title = {First Steps Toward a Cryptography-Aware Language and Compiler}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {160}, year = {2005}, url = {http://eprint.iacr.org/2005/160}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarbosaNPS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenCMS05, author = {Liqun Chen and Zhaohui Cheng and John Malone{-}Lee and Nigel P. Smart}, title = {An Efficient {ID-KEM} Based On The Sakai-Kasahara Key Construction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {224}, year = {2005}, url = {http://eprint.iacr.org/2005/224}, timestamp = {Sat, 28 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenCMS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MenezesS04, author = {Alfred Menezes and Nigel P. Smart}, title = {Security of Signature Schemes in a Multi-User Setting}, journal = {Des. Codes Cryptogr.}, volume = {33}, number = {3}, pages = {261--274}, year = {2004}, url = {https://doi.org/10.1023/B:DESI.0000036250.18062.3f}, doi = {10.1023/B:DESI.0000036250.18062.3F}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/MenezesS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/lmsjcm/MuzereauSV04, author = {A. Muzereau and Nigel P. Smart and Frederik Vercauteren}, title = {The Equivalence between the {DHP} and {DLP} for Elliptic Curves Used in Practical Applications}, journal = {{LMS} J. Comput. Math.}, volume = {7}, pages = {50--72}, year = {2004}, url = {https://doi.org/10.1112/s1461157000001042}, doi = {10.1112/S1461157000001042}, timestamp = {Wed, 03 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/lmsjcm/MuzereauSV04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/PageS04, author = {Dan Page and Nigel P. Smart}, title = {Parallel Cryptographic Arithmetic Using a Redundant Montgomery Representation}, journal = {{IEEE} Trans. Computers}, volume = {53}, number = {11}, pages = {1474--1482}, year = {2004}, url = {https://doi.org/10.1109/TC.2004.100}, doi = {10.1109/TC.2004.100}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/PageS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ants/GrangerHPSV04, author = {Robert Granger and Andrew J. Holt and Dan Page and Nigel P. Smart and Frederik Vercauteren}, editor = {Duncan A. Buell}, title = {Function Field Sieve in Characteristic Three}, booktitle = {Algorithmic Number Theory, 6th International Symposium, ANTS-VI, Burlington, VT, USA, June 13-18, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3076}, pages = {223--234}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24847-7\_16}, doi = {10.1007/978-3-540-24847-7\_16}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ants/GrangerHPSV04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/LeadbitterPS04, author = {Peter James Leadbitter and Dan Page and Nigel P. Smart}, editor = {Marc Joye and Jean{-}Jacques Quisquater}, title = {Attacking {DSA} Under a Repeated Bits Assumption}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3156}, pages = {428--440}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28632-5\_31}, doi = {10.1007/978-3-540-28632-5\_31}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/LeadbitterPS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/NaccacheSS04, author = {David Naccache and Nigel P. Smart and Jacques Stern}, editor = {Christian Cachin and Jan Camenisch}, title = {Projective Coordinates Leak}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3027}, pages = {257--267}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24676-3\_16}, doi = {10.1007/978-3-540-24676-3\_16}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/NaccacheSS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/Smart04, author = {Nigel P. Smart}, editor = {Carlo Blundo and Stelvio Cimato}, title = {Efficient Key Encapsulation to Multiple Parties}, booktitle = {Security in Communication Networks, 4th International Conference, {SCN} 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3352}, pages = {208--219}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30598-9\_15}, doi = {10.1007/978-3-540-30598-9\_15}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/scn/Smart04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/SilvermanSV04, author = {Joseph H. Silverman and Nigel P. Smart and Frederik Vercauteren}, editor = {Carlo Blundo and Stelvio Cimato}, title = {An Algebraic Approach to {NTRU} (q = 2n) via Witt Vectors and Overdetermined Systems of Nonlinear Equations}, booktitle = {Security in Communication Networks, 4th International Conference, {SCN} 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3352}, pages = {278--293}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30598-9\_20}, doi = {10.1007/978-3-540-30598-9\_20}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/SilvermanSV04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PageSV04, author = {Dan Page and Nigel P. Smart and Frederik Vercauteren}, title = {A comparison of {MNT} curves and supersingular curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {165}, year = {2004}, url = {http://eprint.iacr.org/2004/165}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PageSV04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Al-RiyamiMS04, author = {Sattam S. Al{-}Riyami and John Malone{-}Lee and Nigel P. Smart}, title = {Escrow-Free Encryption Supporting Cryptographic Workflow}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {258}, year = {2004}, url = {http://eprint.iacr.org/2004/258}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Al-RiyamiMS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aaecc/SmartW03, author = {Nigel P. Smart and E. J. Westwood}, title = {Point Multiplication on Ordinary Elliptic Curves over Fields of Characteristic Three}, journal = {Appl. Algebra Eng. Commun. Comput.}, volume = {13}, number = {6}, pages = {485--497}, year = {2003}, url = {https://doi.org/10.1007/s00200-002-0114-0}, doi = {10.1007/S00200-002-0114-0}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/aaecc/SmartW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Smart03, author = {Nigel P. Smart}, editor = {Colin D. Walter and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {An Analysis of Goubin's Refined Power Analysis Attack}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2779}, pages = {281--290}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45238-6\_23}, doi = {10.1007/978-3-540-45238-6\_23}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/Smart03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/Smart03, author = {Nigel P. Smart}, editor = {Marc Joye}, title = {Access Control Using Pairing Based Cryptography}, booktitle = {Topics in Cryptology - {CT-RSA} 2003, The Cryptographers' Track at the {RSA} Conference 2003, San Francisco, CA, USA, April 13-17, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2612}, pages = {111--121}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36563-X\_8}, doi = {10.1007/3-540-36563-X\_8}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/Smart03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/GeisslerS03, author = {Katharina Gei{\ss}ler and Nigel P. Smart}, editor = {Kenneth G. Paterson}, title = {Computing the {M} = {U} U\({}^{\mbox{t}}\) Integer Matrix Decomposition}, booktitle = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester, UK, December 16-18, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2898}, pages = {223--233}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40974-8\_18}, doi = {10.1007/978-3-540-40974-8\_18}, timestamp = {Wed, 18 Mar 2020 16:01:02 +0100}, biburl = {https://dblp.org/rec/conf/ima/GeisslerS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/BarnettS03, author = {Adam Barnett and Nigel P. Smart}, editor = {Kenneth G. Paterson}, title = {Mental Poker Revisited}, booktitle = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester, UK, December 16-18, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2898}, pages = {370--383}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40974-8\_29}, doi = {10.1007/978-3-540-40974-8\_29}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/BarnettS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/LeadbitterS03, author = {Peter James Leadbitter and Nigel P. Smart}, editor = {Colin Boyd and Wenbo Mao}, title = {Analysis of the Insecurity of {ECMQV} with Partially Known Nonces}, booktitle = {Information Security, 6th International Conference, {ISC} 2003, Bristol, UK, October 1-3, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2851}, pages = {240--251}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/10958513\_19}, doi = {10.1007/10958513\_19}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/LeadbitterS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NaccacheSS03, author = {David Naccache and Nigel P. Smart and Jacques Stern}, title = {Projective Coordinates Leak}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {191}, year = {2003}, url = {http://eprint.iacr.org/2003/191}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NaccacheSS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/GalbraithMS02, author = {Steven D. Galbraith and John Malone{-}Lee and Nigel P. Smart}, title = {Public key signatures in the multi-user setting}, journal = {Inf. Process. Lett.}, volume = {83}, number = {5}, pages = {263--266}, year = {2002}, url = {https://doi.org/10.1016/S0020-0190(01)00338-6}, doi = {10.1016/S0020-0190(01)00338-6}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/GalbraithMS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/GaudryHS02, author = {Pierrick Gaudry and Florian Hess and Nigel P. Smart}, title = {Constructive and Destructive Facets of Weil Descent on Elliptic Curves}, journal = {J. Cryptol.}, volume = {15}, number = {1}, pages = {19--46}, year = {2002}, url = {https://doi.org/10.1007/s00145-001-0011-x}, doi = {10.1007/S00145-001-0011-X}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/GaudryHS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/lmsjcm/HarrisonPS02, author = {Keith Harrison and Dan Page and Nigel P. Smart}, title = {Software Implementation of Finite Fields of Characteristic Three, for Use in Pairing-based Cryptosystems}, journal = {{LMS} J. Comput. Math.}, volume = {5}, pages = {181--193}, year = {2002}, url = {https://doi.org/10.1112/s1461157000000747}, doi = {10.1112/S1461157000000747}, timestamp = {Fri, 05 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/lmsjcm/HarrisonPS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/moc/GalbraithPS02, author = {Steven D. Galbraith and Sachar M. Paulus and Nigel P. Smart}, title = {Arithmetic on superelliptic curves}, journal = {Math. Comput.}, volume = {71}, number = {237}, pages = {393--405}, year = {2002}, url = {https://doi.org/10.1090/S0025-5718-00-01297-7}, doi = {10.1090/S0025-5718-00-01297-7}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/moc/GalbraithPS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asap/IrwinPS02, author = {James Irwin and Dan Page and Nigel P. Smart}, title = {Instruction Stream Mutation for Non-Deterministic Processors}, booktitle = {13th {IEEE} International Conference on Application-Specific Systems, Architectures, and Processors {(ASAP} 2002), 17-19 July 2002, San Jose, CA, {USA}}, pages = {286--295}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/ASAP.2002.1030727}, doi = {10.1109/ASAP.2002.1030727}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asap/IrwinPS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/PageS02, author = {Dan Page and Nigel P. Smart}, editor = {Burton S. Kaliski Jr. and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Hardware Implementation of Finite Fields of Characteristic Three}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2523}, pages = {529--539}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36400-5\_38}, doi = {10.1007/3-540-36400-5\_38}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/PageS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/SternPMS02, author = {Jacques Stern and David Pointcheval and John Malone{-}Lee and Nigel P. Smart}, editor = {Moti Yung}, title = {Flaws in Applying Proof Methodologies to Signature Schemes}, booktitle = {Advances in Cryptology - {CRYPTO} 2002, 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2442}, pages = {93--110}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45708-9\_7}, doi = {10.1007/3-540-45708-9\_7}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/SternPMS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GalbraithHS02, author = {Steven D. Galbraith and Florian Hess and Nigel P. Smart}, editor = {Lars R. Knudsen}, title = {Extending the {GHS} Weil Descent Attack}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2332}, pages = {29--44}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-46035-7\_3}, doi = {10.1007/3-540-46035-7\_3}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GalbraithHS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infrasec/ChenHSS02, author = {Liqun Chen and Keith Harrison and David Soldera and Nigel P. Smart}, editor = {George I. Davida and Yair Frankel and Owen Rees}, title = {Applications of Multiple Trust Authorities in Pairing Based Cryptosystems}, booktitle = {Infrastructure Security, International Conference, InfraSec 2002 Bristol, UK, October 1-3, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2437}, pages = {260--275}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45831-X\_18}, doi = {10.1007/3-540-45831-X\_18}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infrasec/ChenHSS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/ChenHMSS02, author = {Liqun Chen and Keith Harrison and Andrew Moss and David Soldera and Nigel P. Smart}, editor = {Agnes Hui Chan and Virgil D. Gligor}, title = {Certification of Public Keys within an Identity Based System}, booktitle = {Information Security, 5th International Conference, {ISC} 2002 Sao Paulo, Brazil, September 30 - October 2, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2433}, pages = {322--333}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45811-5\_25}, doi = {10.1007/3-540-45811-5\_25}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/ChenHMSS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/Malone-LeeS02, author = {John Malone{-}Lee and Nigel P. Smart}, editor = {Kaisa Nyberg and Howard M. Heys}, title = {Modifications of {ECDSA}}, booktitle = {Selected Areas in Cryptography, 9th Annual International Workshop, {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2595}, pages = {1--12}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36492-7\_1}, doi = {10.1007/3-540-36492-7\_1}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/Malone-LeeS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SmartW02, author = {Nigel P. Smart and E. J. Westwood}, title = {Point Multiplication on Ordinary Elliptic Curves over Fields of Characteristic Three}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {114}, year = {2002}, url = {http://eprint.iacr.org/2002/114}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SmartW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeadbitterS02, author = {Peter James Leadbitter and Nigel P. Smart}, title = {Cryptanalysis of {MQV} with partially known nonces}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {145}, year = {2002}, url = {http://eprint.iacr.org/2002/145}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeadbitterS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Howgrave-GrahamS01, author = {Nick Howgrave{-}Graham and Nigel P. Smart}, title = {Lattice Attacks on Digital Signature Schemes}, journal = {Des. Codes Cryptogr.}, volume = {23}, number = {3}, pages = {283--290}, year = {2001}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Howgrave-GrahamS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/Smart01, author = {Nigel P. Smart}, title = {A note on the x-coordinate of points on an elliptic curve in characteristic two}, journal = {Inf. Process. Lett.}, volume = {80}, number = {5}, pages = {261--263}, year = {2001}, url = {https://doi.org/10.1016/S0020-0190(01)00169-7}, doi = {10.1016/S0020-0190(01)00169-7}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/Smart01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MayMS01, author = {David May and Henk L. Muller and Nigel P. Smart}, editor = {Vijay Varadharajan and Yi Mu}, title = {Non-deterministic Processors}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {115--129}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_11}, doi = {10.1007/3-540-47719-5\_11}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/MayMS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/MayMS01, author = {David May and Henk L. Muller and Nigel P. Smart}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and David Naccache and Christof Paar}, title = {Random Register Renaming to Foil {DPA}}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2001, Third International Workshop, Paris, France, May 14-16, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2162}, pages = {28--38}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44709-1\_4}, doi = {10.1007/3-540-44709-1\_4}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/MayMS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Smart01, author = {Nigel P. Smart}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and David Naccache and Christof Paar}, title = {The Hessian Form of an Elliptic Curve}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2001, Third International Workshop, Paris, France, May 14-16, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2162}, pages = {118--125}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44709-1\_11}, doi = {10.1007/3-540-44709-1\_11}, timestamp = {Mon, 24 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/Smart01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/LiardetS01, author = {Pierre{-}Yvan Liardet and Nigel P. Smart}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and David Naccache and Christof Paar}, title = {Preventing {SPA/DPA} in {ECC} Systems Using the Jacobi Form}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2001, Third International Workshop, Paris, France, May 14-16, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2162}, pages = {391--401}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44709-1\_32}, doi = {10.1007/3-540-44709-1\_32}, timestamp = {Mon, 24 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/LiardetS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Smart01, author = {Nigel P. Smart}, editor = {Birgit Pfitzmann}, title = {How Secure Are Elliptic Curves over Composite Extension Fields?}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2001, International Conference on the Theory and Application of Cryptographic Techniques, Innsbruck, Austria, May 6-10, 2001, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {2045}, pages = {30--39}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44987-6\_3}, doi = {10.1007/3-540-44987-6\_3}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Smart01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/Smart01, author = {Nigel P. Smart}, editor = {Bahram Honary}, title = {The Exact Security of {ECIES} in the Generic Group Model}, booktitle = {Cryptography and Coding, 8th {IMA} International Conference, Cirencester, UK, December 17-19, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2260}, pages = {73--84}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45325-3\_8}, doi = {10.1007/3-540-45325-3\_8}, timestamp = {Wed, 18 Mar 2020 16:01:01 +0100}, biburl = {https://dblp.org/rec/conf/ima/Smart01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/HessSS01, author = {Florian Hess and Gadiel Seroussi and Nigel P. Smart}, editor = {Serge Vaudenay and Amr M. Youssef}, title = {Two Topics in Hyperelliptic Cryptography}, booktitle = {Selected Areas in Cryptography, 8th Annual International Workshop, {SAC} 2001 Toronto, Ontario, Canada, August 16-17, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2259}, pages = {181--189}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45537-X\_14}, doi = {10.1007/3-540-45537-X\_14}, timestamp = {Tue, 01 Jun 2021 15:22:31 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/HessSS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalbraithHS01, author = {Steven D. Galbraith and Florian Hess and Nigel P. Smart}, title = {Extending the {GHS} Weil Descent Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {54}, year = {2001}, url = {http://eprint.iacr.org/2001/054}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalbraithHS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Smart01, author = {Nigel P. Smart}, title = {An Identity Based Authenticated Key Agreement Protocol Based on the Weil Pairing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {111}, year = {2001}, url = {http://eprint.iacr.org/2001/111}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Smart01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sofo/Smart00, author = {Nigel P. Smart}, title = {Physical side-channel attacks on cryptographic systems}, journal = {Softw. Focus}, volume = {1}, number = {2}, pages = {6--13}, year = {2000}, url = {https://doi.org/10.1002/1529-7950(200012)1:2\&\#60;6::AID-SWF10\&\#62;3.0.CO;2-W}, doi = {10.1002/1529-7950(200012)1:2\&\#60;6::AID-SWF10\&\#62;3.0.CO;2-W}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sofo/Smart00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iswc/SmartM00, author = {Nigel P. Smart and Henk L. Muller}, title = {A Wearable Public Key Infrastructure {(WPKI)}}, booktitle = {Fourth International Symposium on Wearable Computers {(ISWC} 2000), Atlanta, Georgia, USA, 18-21 October 2000, Proceedings}, pages = {127--138}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ISWC.2000.888474}, doi = {10.1109/ISWC.2000.888474}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iswc/SmartM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/SmartS99, author = {Nigel P. Smart and Samir Siksek}, title = {A Fast Diffie-Hellman Protocol in Genus 2}, journal = {J. Cryptol.}, volume = {12}, number = {1}, pages = {67--73}, year = {1999}, url = {https://doi.org/10.1007/PL00003818}, doi = {10.1007/PL00003818}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/SmartS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Smart99, author = {Nigel P. Smart}, title = {Elliptic Curve Cryptosystems over Small Fields of Odd Characteristic}, journal = {J. Cryptol.}, volume = {12}, number = {2}, pages = {141--151}, year = {1999}, url = {https://doi.org/10.1007/PL00003820}, doi = {10.1007/PL00003820}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Smart99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Smart99a, author = {Nigel P. Smart}, title = {The Discrete Logarithm Problem on Elliptic Curves of Trace One}, journal = {J. Cryptol.}, volume = {12}, number = {3}, pages = {193--196}, year = {1999}, url = {https://doi.org/10.1007/s001459900052}, doi = {10.1007/S001459900052}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Smart99a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/moc/Smart99, author = {Nigel P. Smart}, title = {Determining the small solutions to S-unit equations}, journal = {Math. Comput.}, volume = {68}, number = {228}, pages = {1687--1699}, year = {1999}, url = {https://doi.org/10.1090/S0025-5718-99-01140-0}, doi = {10.1090/S0025-5718-99-01140-0}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/moc/Smart99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Smart99, author = {Nigel P. Smart}, editor = {Jacques Stern}, title = {On the Performance of Hyperelliptic Cryptosystems}, booktitle = {Advances in Cryptology - {EUROCRYPT} '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1592}, pages = {165--175}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48910-X\_12}, doi = {10.1007/3-540-48910-X\_12}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Smart99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/GalbraithS99, author = {Steven D. Galbraith and Nigel P. Smart}, editor = {Michael Walker}, title = {A Cryptographic Application of Weil Descent}, booktitle = {Cryptography and Coding, 7th {IMA} International Conference, Cirencester, UK, December 20-22, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1746}, pages = {191--200}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-46665-7\_23}, doi = {10.1007/3-540-46665-7\_23}, timestamp = {Wed, 18 Mar 2020 16:00:59 +0100}, biburl = {https://dblp.org/rec/conf/ima/GalbraithS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/daglib/0018238, author = {Nigel P. Smart}, title = {The algorithmic resolution of diophantine equations - a computational cookbook}, series = {London Mathematical Society student texts}, volume = {41}, publisher = {Cambridge University Press}, year = {1998}, isbn = {978-0-521-64633-8}, timestamp = {Mon, 22 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/daglib/0018238.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/em/WoodcockS98, author = {Christopher F. Woodcock and Nigel P. Smart}, title = {p-adic Chaos and Random Number Generation}, journal = {Exp. Math.}, volume = {7}, number = {4}, pages = {333--342}, year = {1998}, url = {https://doi.org/10.1080/10586458.1998.10504379}, doi = {10.1080/10586458.1998.10504379}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/em/WoodcockS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/moc/NiklaschS98, author = {Gerhard Niklasch and Nigel P. Smart}, title = {Exceptional units in a family of quartic number fields}, journal = {Math. Comput.}, volume = {67}, number = {222}, pages = {759--772}, year = {1998}, url = {https://doi.org/10.1090/S0025-5718-98-00958-2}, doi = {10.1090/S0025-5718-98-00958-2}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/moc/NiklaschS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ants/DjabriS98, author = {Z. Djabri and Nigel P. Smart}, editor = {Joe Buhler}, title = {A Comparison of Direct and Indirect Methods for Computing Selmer Groups of an Elliptic Curve}, booktitle = {Algorithmic Number Theory, Third International Symposium, ANTS-III, Portland, Oregon, USA, June 21-25, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1423}, pages = {502--513}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054888}, doi = {10.1007/BFB0054888}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ants/DjabriS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsc/Smart96, author = {Nigel P. Smart}, title = {Solving Discriminant Form Equations Via Unit Equations}, journal = {J. Symb. Comput.}, volume = {21}, number = {3}, pages = {367--374}, year = {1996}, url = {https://doi.org/10.1006/jsco.1996.0018}, doi = {10.1006/JSCO.1996.0018}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsc/Smart96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ants/Smart96, author = {Nigel P. Smart}, editor = {Henri Cohen}, title = {How Difficult Is It to Solve a Thue Equation?}, booktitle = {Algorithmic Number Theory, Second International Symposium, ANTS-II, Talence, France, May 18-23, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1122}, pages = {363--373}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-61581-4\_67}, doi = {10.1007/3-540-61581-4\_67}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ants/Smart96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.