BibTeX records: Nigel P. Smart

download as .bib file

@inproceedings{DBLP:conf/acns/CongEST24,
  author       = {Kelong Cong and
                  Karim Eldefrawy and
                  Nigel P. Smart and
                  Ben Terner},
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {The Key Lattice Framework for Concurrent Group Messaging},
  booktitle    = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14584},
  pages        = {133--162},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54773-7\_6},
  doi          = {10.1007/978-3-031-54773-7\_6},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/CongEST24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Smart23,
  author       = {Nigel P. Smart},
  title        = {Computing on Encrypted Data},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {4},
  pages        = {94--98},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3279517},
  doi          = {10.1109/MSEC.2023.3279517},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Smart23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/PointchevalS23,
  author       = {David Pointcheval and
                  Nigel P. Smart},
  title        = {Topical Collection on Computing on Encrypted Data},
  journal      = {J. Cryptol.},
  volume       = {36},
  number       = {2},
  pages        = {4},
  year         = {2023},
  url          = {https://doi.org/10.1007/s00145-023-09444-8},
  doi          = {10.1007/S00145-023-09444-8},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/PointchevalS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/GamaBOSZ23,
  author       = {Mariana Gama and
                  Emad Heydari Beni and
                  Emmanuela Orsini and
                  Nigel P. Smart and
                  Oliver Zajonc},
  editor       = {Jian Guo and
                  Ron Steinfeld},
  title        = {{MPC} with Delayed Parties over Star-Like Networks},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Guangzhou, China, December 4-8, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14438},
  pages        = {172--203},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8721-4\_6},
  doi          = {10.1007/978-981-99-8721-4\_6},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/GamaBOSZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/BraunGJOST23,
  author       = {Lennart Braun and
                  Cyprien Delpech de Saint Guilhem and
                  Robin Jadoul and
                  Emmanuela Orsini and
                  Nigel P. Smart and
                  Titouan Tanguy},
  editor       = {Elizabeth A. Quaglia},
  title        = {ZK-for-Z2K: MPC-in-the-Head Zero-Knowledge Proofs for {\textdollar}{\textbackslash}mathbb
                  \{Z\}{\_}\{2{\^{}}k\}{\textdollar}},
  booktitle    = {Cryptography and Coding - 19th {IMA} International Conference, {IMACC}
                  2023, London, UK, December 12-14, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14421},
  pages        = {137--157},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-47818-5\_8},
  doi          = {10.1007/978-3-031-47818-5\_8},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/BraunGJOST23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/Smart23,
  author       = {Nigel P. Smart},
  editor       = {Elizabeth A. Quaglia},
  title        = {Practical and Efficient FHE-Based {MPC}},
  booktitle    = {Cryptography and Coding - 19th {IMA} International Conference, {IMACC}
                  2023, London, UK, December 12-14, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14421},
  pages        = {263--283},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-47818-5\_14},
  doi          = {10.1007/978-3-031-47818-5\_14},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/Smart23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wahc/DahlDKMORSTW23,
  author       = {Morten Dahl and
                  Daniel Demmler and
                  Sarah El Kazdadi and
                  Arthur Meyre and
                  Jean{-}Baptiste Orfila and
                  Dragos Rotaru and
                  Nigel P. Smart and
                  Samuel Tap and
                  Michael Walter},
  editor       = {Michael Brenner and
                  Anamaria Costache and
                  Kurt Rohloff},
  title        = {Noah's Ark: Efficient Threshold-FHE Using Noise Flooding},
  booktitle    = {Proceedings of the 11th Workshop on Encrypted Computing {\&} Applied
                  Homomorphic Cryptography, Copenhagen, Denmark, 26 November 2023},
  pages        = {35--46},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3605759.3625259},
  doi          = {10.1145/3605759.3625259},
  timestamp    = {Mon, 18 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wahc/DahlDKMORSTW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wahc/BalenboisOS23,
  author       = {Thibault Balenbois and
                  Jean{-}Baptiste Orfila and
                  Nigel P. Smart},
  editor       = {Michael Brenner and
                  Anamaria Costache and
                  Kurt Rohloff},
  title        = {Trivial Transciphering With Trivium and {TFHE}},
  booktitle    = {Proceedings of the 11th Workshop on Encrypted Computing {\&} Applied
                  Homomorphic Cryptography, Copenhagen, Denmark, 26 November 2023},
  pages        = {69--78},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3605759.3625255},
  doi          = {10.1145/3605759.3625255},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wahc/BalenboisOS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GamaBOSZ23,
  author       = {Mariana Botelho da Gama and
                  Emad Heydari Beni and
                  Emmanuela Orsini and
                  Nigel P. Smart and
                  Oliver Zajonc},
  title        = {{MPC} With Delayed Parties Over Star-Like Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {96},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/096},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GamaBOSZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShoupS23,
  author       = {Victor Shoup and
                  Nigel P. Smart},
  title        = {Lightweight Asynchronous Verifiable Secret Sharing with Optimal Resilience},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {536},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/536},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShoupS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DahlDEMORSTW23,
  author       = {Morten Dahl and
                  Daniel Demmler and
                  Sarah El Kazdadi and
                  Arthur Meyre and
                  Jean{-}Baptiste Orfila and
                  Dragos Rotaru and
                  Nigel P. Smart and
                  Samuel Tap and
                  Michael Walter},
  title        = {Noah's Ark: Efficient Threshold-FHE Using Noise Flooding},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {815},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/815},
  timestamp    = {Tue, 19 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DahlDEMORSTW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BalenboisOS23,
  author       = {Thibault Balenbois and
                  Jean{-}Baptiste Orfila and
                  Nigel P. Smart},
  title        = {Trivial Transciphering With Trivium and {TFHE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {980},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/980},
  timestamp    = {Mon, 03 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BalenboisOS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Smart23,
  author       = {Nigel P. Smart},
  title        = {Practical and Efficient FHE-based {MPC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {981},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/981},
  timestamp    = {Mon, 03 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Smart23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BraunGJOST23,
  author       = {Lennart Braun and
                  Cyprien Delpech de Saint Guilhem and
                  Robin Jadoul and
                  Emmanuela Orsini and
                  Nigel P. Smart and
                  Titouan Tanguy},
  title        = {ZK-for-Z2K: MPC-in-the-Head Zero-Knowledge Proofs for {\(\mathbb{Z}\)}\({}_{\mbox{2\({}^{\mbox{k}}\)}}\)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1057},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1057},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BraunGJOST23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/RotaruSTVW22,
  author       = {Dragos Rotaru and
                  Nigel P. Smart and
                  Titouan Tanguy and
                  Frederik Vercauteren and
                  Tim Wood},
  title        = {Actively Secure Setup for {SPDZ}},
  journal      = {J. Cryptol.},
  volume       = {35},
  number       = {1},
  pages        = {5},
  year         = {2022},
  url          = {https://doi.org/10.1007/s00145-021-09416-w},
  doi          = {10.1007/S00145-021-09416-W},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joc/RotaruSTVW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BonteIPPS22,
  author       = {Charlotte Bonte and
                  Ilia Iliashenko and
                  Jeongeun Park and
                  Hilder V. L. Pereira and
                  Nigel P. Smart},
  editor       = {Shweta Agrawal and
                  Dongdai Lin},
  title        = {{FINAL:} Faster {FHE} Instantiated with {NTRU} and {LWE}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13792},
  pages        = {188--215},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22966-4\_7},
  doi          = {10.1007/978-3-031-22966-4\_7},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BonteIPPS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BaumJOSS22,
  author       = {Carsten Baum and
                  Robin Jadoul and
                  Emmanuela Orsini and
                  Peter Scholl and
                  Nigel P. Smart},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {Feta: Efficient Threshold Designated-Verifier Zero-Knowledge Proofs},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {293--306},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3559354},
  doi          = {10.1145/3548606.3559354},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BaumJOSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/AtapoorSA22,
  author       = {Shahla Atapoor and
                  Nigel P. Smart and
                  Younes Talibi Alaoui},
  editor       = {Steven D. Galbraith},
  title        = {Private Liquidity Matching Using {MPC}},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2022 - Cryptographers' Track at the
                  {RSA} Conference 2022, Virtual Event, March 1-2, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13161},
  pages        = {96--119},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-95312-6\_5},
  doi          = {10.1007/978-3-030-95312-6\_5},
  timestamp    = {Tue, 08 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/AtapoorSA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/GamaCPSA22,
  author       = {Mariana Botelho da Gama and
                  John Cartlidge and
                  Antigoni Polychroniadou and
                  Nigel P. Smart and
                  Younes Talibi Alaoui},
  editor       = {Ittay Eyal and
                  Juan A. Garay},
  title        = {Kicking-the-Bucket: Fast Privacy-Preserving Trading Using Buckets},
  booktitle    = {Financial Cryptography and Data Security - 26th International Conference,
                  {FC} 2022, Grenada, May 2-6, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13411},
  pages        = {20--37},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-18283-9\_2},
  doi          = {10.1007/978-3-031-18283-9\_2},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/GamaCPSA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/ChillottiOSSL22,
  author       = {Ilaria Chillotti and
                  Emmanuela Orsini and
                  Peter Scholl and
                  Nigel P. Smart and
                  Barry Van Leeuwen},
  editor       = {Clemente Galdi and
                  Stanislaw Jarecki},
  title        = {Scooby: Improved Multi-party Homomorphic Secret Sharing Based on {FHE}},
  booktitle    = {Security and Cryptography for Networks - 13th International Conference,
                  {SCN} 2022, Amalfi, Italy, September 12-14, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13409},
  pages        = {540--563},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-14791-3\_24},
  doi          = {10.1007/978-3-031-14791-3\_24},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/ChillottiOSSL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonteIPPS22,
  author       = {Charlotte Bonte and
                  Ilia Iliashenko and
                  Jeongeun Park and
                  Hilder V. L. Pereira and
                  Nigel P. Smart},
  title        = {{FINAL:} Faster {FHE} instantiated with {NTRU} and {LWE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {74},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/074},
  timestamp    = {Tue, 26 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonteIPPS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaumJOSS22,
  author       = {Carsten Baum and
                  Robin Jadoul and
                  Emmanuela Orsini and
                  Peter Scholl and
                  Nigel P. Smart},
  title        = {Feta: Efficient Threshold Designated-Verifier Zero-Knowledge Proofs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {82},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/082},
  timestamp    = {Fri, 18 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BaumJOSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChillottiOSSL22,
  author       = {Ilaria Chillotti and
                  Emmanuela Orsini and
                  Peter Scholl and
                  Nigel P. Smart and
                  Barry Van Leeuwen},
  title        = {Scooby: Improved Multi-Party Homomorphic Secret Sharing Based on {FHE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {862},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/862},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChillottiOSSL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GamaCSA22,
  author       = {Mariana Botelho da Gama and
                  John Cartlidge and
                  Nigel P. Smart and
                  Younes Talibi Alaoui},
  title        = {All for one and one for all: Fully decentralised privacy-preserving
                  dark pool trading using multi-party computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {923},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/923},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GamaCSA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CongEST22,
  author       = {Kelong Cong and
                  Karim Eldefrawy and
                  Nigel P. Smart and
                  Ben Terner},
  title        = {The Key Lattice Framework for Concurrent Group Messaging},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1531},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1531},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/CongEST22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BonteST21,
  author       = {Charlotte Bonte and
                  Nigel P. Smart and
                  Titouan Tanguy},
  title        = {Thresholdizing HashEdDSA: {MPC} to the Rescue},
  journal      = {Int. J. Inf. Sec.},
  volume       = {20},
  number       = {6},
  pages        = {879--894},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10207-021-00539-6},
  doi          = {10.1007/S10207-021-00539-6},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/BonteST21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isafm/CartlidgeSA21,
  author       = {John Cartlidge and
                  Nigel P. Smart and
                  Younes Talibi Alaoui},
  title        = {Multi-party computation mechanism for anonymous equity block trading:
                  {A} secure implementation of turquoise plato uncross},
  journal      = {Intell. Syst. Account. Finance Manag.},
  volume       = {28},
  number       = {4},
  pages        = {239--267},
  year         = {2021},
  url          = {https://doi.org/10.1002/isaf.1502},
  doi          = {10.1002/ISAF.1502},
  timestamp    = {Fri, 13 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isafm/CartlidgeSA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BurraLNNOOSS21,
  author       = {Sai Sheshank Burra and
                  Enrique Larraia and
                  Jesper Buus Nielsen and
                  Peter Sebastian Nordholt and
                  Claudio Orlandi and
                  Emmanuela Orsini and
                  Peter Scholl and
                  Nigel P. Smart},
  title        = {High-Performance Multi-party Computation for Binary Circuits Based
                  on Oblivious Transfer},
  journal      = {J. Cryptol.},
  volume       = {34},
  number       = {3},
  pages        = {34},
  year         = {2021},
  url          = {https://doi.org/10.1007/s00145-021-09403-1},
  doi          = {10.1007/S00145-021-09403-1},
  timestamp    = {Thu, 29 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BurraLNNOOSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/CongCMS21,
  author       = {Kelong Cong and
                  Daniele Cozzo and
                  Varun Maram and
                  Nigel P. Smart},
  editor       = {Mehdi Tibouchi and
                  Huaxiong Wang},
  title        = {Gladius: {LWR} Based Efficient Hybrid Public Key Encryption with Distributed
                  Decryption},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 6-10, 2021, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13093},
  pages        = {125--155},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92068-5\_5},
  doi          = {10.1007/978-3-030-92068-5\_5},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/CongCMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/CozzoSA21,
  author       = {Daniele Cozzo and
                  Nigel P. Smart and
                  Younes Talibi Alaoui},
  editor       = {Kenneth G. Paterson},
  title        = {Secure Fast Evaluation of Iterative Methods: With an Application to
                  Secure PageRank},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2021 - Cryptographers' Track at the
                  {RSA} Conference 2021, Virtual Event, May 17-20, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12704},
  pages        = {1--25},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75539-3\_1},
  doi          = {10.1007/978-3-030-75539-3\_1},
  timestamp    = {Mon, 28 Aug 2023 21:17:50 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/CozzoSA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/BagheryGOST21,
  author       = {Karim Baghery and
                  Cyprien Delpech de Saint Guilhem and
                  Emmanuela Orsini and
                  Nigel P. Smart and
                  Titouan Tanguy},
  editor       = {Kenneth G. Paterson},
  title        = {Compilation of Function Representations for Secure Computing Paradigms},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2021 - Cryptographers' Track at the
                  {RSA} Conference 2021, Virtual Event, May 17-20, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12704},
  pages        = {26--50},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75539-3\_2},
  doi          = {10.1007/978-3-030-75539-3\_2},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/BagheryGOST21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Ben-EfraimCOOSS21,
  author       = {Aner Ben{-}Efraim and
                  Kelong Cong and
                  Eran Omri and
                  Emmanuela Orsini and
                  Nigel P. Smart and
                  Eduardo Soria{-}Vazquez},
  editor       = {Anne Canteaut and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Large Scale, Actively Secure Computation from {LPN} and Free-XOR Garbled
                  Circuits},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12698},
  pages        = {33--63},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-77883-5\_2},
  doi          = {10.1007/978-3-030-77883-5\_2},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Ben-EfraimCOOSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/CongES21,
  author       = {Kelong Cong and
                  Karim Eldefrawy and
                  Nigel P. Smart},
  editor       = {Maura B. Paterson},
  title        = {Optimizing Registration Based Encryption},
  booktitle    = {Cryptography and Coding - 18th {IMA} International Conference, {IMACC}
                  2021, Virtual Event, December 14-15, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13129},
  pages        = {129--157},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92641-0\_7},
  doi          = {10.1007/978-3-030-92641-0\_7},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/CongES21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latincrypt/ArcherAS21,
  author       = {David W. Archer and
                  Shahla Atapoor and
                  Nigel P. Smart},
  editor       = {Patrick Longa and
                  Carla R{\`{a}}fols},
  title        = {The Cost of {IEEE} Arithmetic in Secure Computation},
  booktitle    = {Progress in Cryptology - {LATINCRYPT} 2021 - 7th International Conference
                  on Cryptology and Information Security in Latin America, Bogot{\'{a}},
                  Colombia, October 6-8, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12912},
  pages        = {431--452},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-88238-9\_21},
  doi          = {10.1007/978-3-030-88238-9\_21},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/latincrypt/ArcherAS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AlbrechtDDS21,
  author       = {Martin R. Albrecht and
                  Alex Davidson and
                  Amit Deo and
                  Nigel P. Smart},
  editor       = {Juan A. Garay},
  title        = {Round-Optimal Verifiable Oblivious Pseudorandom Functions from Ideal
                  Lattices},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12711},
  pages        = {261--289},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75248-4\_10},
  doi          = {10.1007/978-3-030-75248-4\_10},
  timestamp    = {Fri, 07 May 2021 15:40:46 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AlbrechtDDS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/JadoulSL21,
  author       = {Robin Jadoul and
                  Nigel P. Smart and
                  Barry Van Leeuwen},
  editor       = {Riham AlTawy and
                  Andreas H{\"{u}}lsing},
  title        = {{MPC} for \emph{Q}\({}_{\mbox{2}}\) Access Structures over Rings and
                  Fields},
  booktitle    = {Selected Areas in Cryptography - 28th International Conference, {SAC}
                  2021, Virtual Event, September 29 - October 1, 2021, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13203},
  pages        = {131--151},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-99277-4\_7},
  doi          = {10.1007/978-3-030-99277-4\_7},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/JadoulSL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArcherAS21,
  author       = {David W. Archer and
                  Shahla Atapoor and
                  Nigel P. Smart},
  title        = {The Cost of {IEEE} Arithmetic in Secure Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {54},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/054},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ArcherAS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CongCMS21,
  author       = {Kelong Cong and
                  Daniele Cozzo and
                  Varun Maram and
                  Nigel P. Smart},
  title        = {Gladius: {LWR} based efficient hybrid public key encryption with distributed
                  decryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {96},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/096},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/CongCMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ben-EfraimCOOSS21,
  author       = {Aner Ben{-}Efraim and
                  Kelong Cong and
                  Eran Omri and
                  Emmanuela Orsini and
                  Nigel P. Smart and
                  Eduardo Soria{-}Vazquez},
  title        = {Large Scale, Actively Secure Computation from {LPN} and Free-XOR Garbled
                  Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {120},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/120},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/Ben-EfraimCOOSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BagheryGOST21,
  author       = {Karim Baghery and
                  Cyprien Delpech de Saint Guilhem and
                  Emmanuela Orsini and
                  Nigel P. Smart and
                  Titouan Tanguy},
  title        = {Compilation of Function Representations for Secure Computing Paradigms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {195},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/195},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BagheryGOST21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CozzoSA21,
  author       = {Daniele Cozzo and
                  Nigel P. Smart and
                  Younes Talibi Alaoui},
  title        = {Secure Fast Evaluation of Iterative Methods: With an Application to
                  Secure PageRank},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {207},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/207},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CozzoSA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtapoorSA21,
  author       = {Shahla Atapoor and
                  Nigel P. Smart and
                  Younes Talibi Alaoui},
  title        = {Private Liquidity Matching using {MPC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {475},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/475},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtapoorSA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CongES21,
  author       = {Kelong Cong and
                  Karim Eldefrawy and
                  Nigel P. Smart},
  title        = {Optimizing Registration Based Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {499},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/499},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CongES21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JadoulSL21,
  author       = {Robin Jadoul and
                  Nigel P. Smart and
                  Barry Van Leeuwen},
  title        = {{MPC} for Q\({}_{\mbox{2}}\) Access Structures over Rings and Fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {841},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/841},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JadoulSL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SmartT21,
  author       = {Nigel P. Smart and
                  Emmanuel Thom{\'{e}}},
  title        = {History of Cryptographic Key Sizes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {894},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/894},
  timestamp    = {Thu, 31 Mar 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SmartT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GamaCPSA21,
  author       = {Mariana Botelho da Gama and
                  John Cartlidge and
                  Antigoni Polychroniadou and
                  Nigel P. Smart and
                  Younes Talibi Alaoui},
  title        = {Kicking-the-Bucket: Fast Privacy-Preserving Trading Using Buckets},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1549},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1549},
  timestamp    = {Fri, 10 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GamaCPSA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/debu/TroncosoPHSLLSP20,
  author       = {Carmela Troncoso and
                  Mathias Payer and
                  Jean{-}Pierre Hubaux and
                  Marcel Salath{\'{e}} and
                  James R. Larus and
                  Wouter Lueks and
                  Theresa Stadler and
                  Apostolos Pyrgelis and
                  Daniele Antonioli and
                  Ludovic Barman and
                  Sylvain Chatel and
                  Kenneth G. Paterson and
                  Srdjan Capkun and
                  David A. Basin and
                  Jan Beutel and
                  Dennis Jackson and
                  Marc Roeschlin and
                  Patrick Leu and
                  Bart Preneel and
                  Nigel P. Smart and
                  Aysajan Abidin and
                  Seda Gurses and
                  Michael Veale and
                  Cas Cremers and
                  Michael Backes and
                  Nils Ole Tippenhauer and
                  Reuben Binns and
                  Ciro Cattuto and
                  Alain Barrat and
                  Dario Fiore and
                  Manuel Barbosa and
                  Rui Oliveira and
                  Jos{\'{e}} Pereira},
  title        = {Decentralized Privacy-Preserving Proximity Tracing},
  journal      = {{IEEE} Data Eng. Bull.},
  volume       = {43},
  number       = {2},
  pages        = {36--66},
  year         = {2020},
  url          = {http://sites.computer.org/debull/A20june/p36.pdf},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/debu/TroncosoPHSLLSP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/GuilhemOPS20,
  author       = {Cyprien Delpech de Saint Guilhem and
                  Emmanuela Orsini and
                  Christophe Petit and
                  Nigel P. Smart},
  editor       = {Stephan Krenn and
                  Haya Schulmann and
                  Serge Vaudenay},
  title        = {Semi-commutative Masking: {A} Framework for Isogeny-Based Protocols,
                  with an Application to Fully Secure Two-Round Isogeny-Based {OT}},
  booktitle    = {Cryptology and Network Security - 19th International Conference, {CANS}
                  2020, Vienna, Austria, December 14-16, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12579},
  pages        = {235--258},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65411-5\_12},
  doi          = {10.1007/978-3-030-65411-5\_12},
  timestamp    = {Tue, 17 Oct 2023 10:41:56 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/GuilhemOPS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/OrsiniSV20,
  author       = {Emmanuela Orsini and
                  Nigel P. Smart and
                  Frederik Vercauteren},
  editor       = {Stanislaw Jarecki},
  title        = {Overdrive2k: Efficient Secure {MPC} over {\textdollar}{\textbackslash}mathbb
                  \{Z\}{\_}\{2{\^{}}k\}{\textdollar} from Somewhat Homomorphic Encryption},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2020 - The Cryptographers' Track at
                  the {RSA} Conference 2020, San Francisco, CA, USA, February 24-28,
                  2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12006},
  pages        = {254--283},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-40186-3\_12},
  doi          = {10.1007/978-3-030-40186-3\_12},
  timestamp    = {Tue, 03 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/OrsiniSV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/CozzoS20,
  author       = {Daniele Cozzo and
                  Nigel P. Smart},
  editor       = {Jintai Ding and
                  Jean{-}Pierre Tillich},
  title        = {Sashimi: Cutting up CSI-FiSh Secret Keys to Produce an Actively Secure
                  Distributed Signing Protocol},
  booktitle    = {Post-Quantum Cryptography - 11th International Conference, PQCrypto
                  2020, Paris, France, April 15-17, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12100},
  pages        = {169--186},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-44223-1\_10},
  doi          = {10.1007/978-3-030-44223-1\_10},
  timestamp    = {Mon, 04 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/CozzoS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-12273,
  author       = {Carmela Troncoso and
                  Mathias Payer and
                  Jean{-}Pierre Hubaux and
                  Marcel Salath{\'{e}} and
                  James R. Larus and
                  Edouard Bugnion and
                  Wouter Lueks and
                  Theresa Stadler and
                  Apostolos Pyrgelis and
                  Daniele Antonioli and
                  Ludovic Barman and
                  Sylvain Chatel and
                  Kenneth G. Paterson and
                  Srdjan Capkun and
                  David A. Basin and
                  Jan Beutel and
                  Dennis Jackson and
                  Marc Roeschlin and
                  Patrick Leu and
                  Bart Preneel and
                  Nigel P. Smart and
                  Aysajan Abidin and
                  Seda F. G{\"{u}}rses and
                  Michael Veale and
                  Cas Cremers and
                  Michael Backes and
                  Nils Ole Tippenhauer and
                  Reuben Binns and
                  Ciro Cattuto and
                  Alain Barrat and
                  Dario Fiore and
                  Manuel Barbosa and
                  Rui Oliveira and
                  Jos{\'{e}} Pereira},
  title        = {Decentralized Privacy-Preserving Proximity Tracing},
  journal      = {CoRR},
  volume       = {abs/2005.12273},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.12273},
  eprinttype    = {arXiv},
  eprint       = {2005.12273},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-12273.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonteST20,
  author       = {Charlotte Bonte and
                  Nigel P. Smart and
                  Titouan Tanguy},
  title        = {Thresholdizing HashEdDSA: {MPC} to the Rescue},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {214},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/214},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonteST20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CartlidgeSA20,
  author       = {John Cartlidge and
                  Nigel P. Smart and
                  Younes Talibi Alaoui},
  title        = {Multi-Party Computation Mechanism for Anonymous Equity Block Trading:
                  {A} Secure Implementation of Turquoise Plato Uncross},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {662},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/662},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CartlidgeSA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/LindellPSY19,
  author       = {Yehuda Lindell and
                  Benny Pinkas and
                  Nigel P. Smart and
                  Avishay Yanai},
  title        = {Efficient Constant-Round Multi-party Computation Combining {BMR} and
                  {SPDZ}},
  journal      = {J. Cryptol.},
  volume       = {32},
  number       = {3},
  pages        = {1026--1069},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00145-019-09322-2},
  doi          = {10.1007/S00145-019-09322-2},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joc/LindellPSY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KraitsbergLOSA19,
  author       = {Michael Kraitsberg and
                  Yehuda Lindell and
                  Valery Osheter and
                  Nigel P. Smart and
                  Younes Talibi Alaoui},
  editor       = {Julian Jang{-}Jaccard and
                  Fuchun Guo},
  title        = {Adding Distributed Decryption and Key Generation to a Ring-LWE Based
                  {CCA} Encryption Scheme},
  booktitle    = {Information Security and Privacy - 24th Australasian Conference, {ACISP}
                  2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11547},
  pages        = {192--210},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21548-4\_11},
  doi          = {10.1007/978-3-030-21548-4\_11},
  timestamp    = {Fri, 05 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KraitsbergLOSA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/AlyS19,
  author       = {Abdelrahaman Aly and
                  Nigel P. Smart},
  editor       = {Robert H. Deng and
                  Val{\'{e}}rie Gauthier{-}Uma{\~{n}}a and
                  Mart{\'{\i}}n Ochoa and
                  Moti Yung},
  title        = {Benchmarking Privacy Preserving Scientific Operations},
  booktitle    = {Applied Cryptography and Network Security - 17th International Conference,
                  {ACNS} 2019, Bogota, Colombia, June 5-7, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11464},
  pages        = {509--529},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21568-2\_25},
  doi          = {10.1007/978-3-030-21568-2\_25},
  timestamp    = {Fri, 31 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/AlyS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AlyORS019,
  author       = {Abdelrahaman Aly and
                  Emmanuela Orsini and
                  Dragos Rotaru and
                  Nigel P. Smart and
                  Tim Wood},
  editor       = {Michael Brenner and
                  Tancr{\`{e}}de Lepoint and
                  Kurt Rohloff},
  title        = {Zaphod: Efficiently Combining {LSSS} and Garbled Circuits in {SCALE}},
  booktitle    = {Proceedings of the 7th {ACM} Workshop on Encrypted Computing {\&}
                  Applied Homomorphic Cryptography, WAHC@CCS 2019, London, UK, November
                  11-15, 2019},
  pages        = {33--44},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3338469.3358943},
  doi          = {10.1145/3338469.3358943},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AlyORS019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SmartT19,
  author       = {Nigel P. Smart and
                  Titouan Tanguy},
  editor       = {Radu Sion and
                  Charalampos Papamanthou},
  title        = {TaaS: Commodity {MPC} via Triples-as-a-Service},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Cloud Computing
                  Security Workshop, CCSW@CCS 2019, London, UK, November 11, 2019},
  pages        = {105--116},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3338466.3358918},
  doi          = {10.1145/3338466.3358918},
  timestamp    = {Thu, 12 Oct 2023 12:32:09 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/SmartT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CartlidgeSA19,
  author       = {John Cartlidge and
                  Nigel P. Smart and
                  Younes Talibi Alaoui},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {{MPC} Joins The Dark Side},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {148--159},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329809},
  doi          = {10.1145/3321705.3329809},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CartlidgeSA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/SmartW19,
  author       = {Nigel P. Smart and
                  Tim Wood},
  editor       = {Mitsuru Matsui},
  title        = {Error Detection in Monotone Span Programs with Application to Communication-Efficient
                  Multi-party Computation},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2019 - The Cryptographers' Track at
                  the {RSA} Conference 2019, San Francisco, CA, USA, March 4-8, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11405},
  pages        = {210--229},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-12612-4\_11},
  doi          = {10.1007/978-3-030-12612-4\_11},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/SmartW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/MakriRSV19,
  author       = {Eleftheria Makri and
                  Dragos Rotaru and
                  Nigel P. Smart and
                  Frederik Vercauteren},
  editor       = {Mitsuru Matsui},
  title        = {{EPIC:} Efficient Private Image Classification (or: Learning from
                  the Masters)},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2019 - The Cryptographers' Track at
                  the {RSA} Conference 2019, San Francisco, CA, USA, March 4-8, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11405},
  pages        = {473--492},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-12612-4\_24},
  doi          = {10.1007/978-3-030-12612-4\_24},
  timestamp    = {Tue, 26 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/MakriRSV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/CozzoS19,
  author       = {Daniele Cozzo and
                  Nigel P. Smart},
  editor       = {Martin Albrecht},
  title        = {Sharing the {LUOV:} Threshold Post-quantum Signatures},
  booktitle    = {Cryptography and Coding - 17th {IMA} International Conference, {IMACC}
                  2019, Oxford, UK, December 16-18, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11929},
  pages        = {128--153},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-35199-1\_7},
  doi          = {10.1007/978-3-030-35199-1\_7},
  timestamp    = {Fri, 15 Dec 2023 20:21:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/CozzoS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/SmartA19,
  author       = {Nigel P. Smart and
                  Younes Talibi Alaoui},
  editor       = {Martin Albrecht},
  title        = {Distributing Any Elliptic Curve Based Protocol},
  booktitle    = {Cryptography and Coding - 17th {IMA} International Conference, {IMACC}
                  2019, Oxford, UK, December 16-18, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11929},
  pages        = {342--366},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-35199-1\_17},
  doi          = {10.1007/978-3-030-35199-1\_17},
  timestamp    = {Thu, 19 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/SmartA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/BaumCS19,
  author       = {Carsten Baum and
                  Daniele Cozzo and
                  Nigel P. Smart},
  editor       = {Kenneth G. Paterson and
                  Douglas Stebila},
  title        = {Using TopGear in Overdrive: {A} More Efficient ZKPoK for {SPDZ}},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2019 - 26th International Conference,
                  Waterloo, ON, Canada, August 12-16, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11959},
  pages        = {274--302},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-38471-5\_12},
  doi          = {10.1007/978-3-030-38471-5\_12},
  timestamp    = {Mon, 28 Aug 2023 21:17:39 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/BaumCS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/GuilhemMOS19,
  author       = {Cyprien Delpech de Saint Guilhem and
                  Lauren De Meyer and
                  Emmanuela Orsini and
                  Nigel P. Smart},
  editor       = {Kenneth G. Paterson and
                  Douglas Stebila},
  title        = {{BBQ:} Using {AES} in Picnic Signatures},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2019 - 26th International Conference,
                  Waterloo, ON, Canada, August 12-16, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11959},
  pages        = {669--692},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-38471-5\_27},
  doi          = {10.1007/978-3-030-38471-5\_27},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/GuilhemMOS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaumCS19,
  author       = {Carsten Baum and
                  Daniele Cozzo and
                  Nigel P. Smart},
  title        = {Using TopGear in Overdrive: {A} more efficient ZKPoK for {SPDZ}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {35},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/035},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaumCS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OrsiniSV19,
  author       = {Emmanuela Orsini and
                  Nigel P. Smart and
                  Frederik Vercauteren},
  title        = {Overdrive2k: Efficient Secure {MPC} over Z\({}_{\mbox{2\({}^{\mbox{k}}\)}}\)
                  from Somewhat Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {153},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/153},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OrsiniSV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlyS19,
  author       = {Abdelrahaman Aly and
                  Nigel P. Smart},
  title        = {Benchmarking Privacy Preserving Scientific Operations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {354},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/354},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlyS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SmartA19,
  author       = {Nigel P. Smart and
                  Younes Talibi Alaoui},
  title        = {Distributing any Elliptic Curve Based Protocol: With an Application
                  to MixNets},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {768},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/768},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SmartA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuilhemMOS19,
  author       = {Cyprien Delpech de Saint Guilhem and
                  Lauren De Meyer and
                  Emmanuela Orsini and
                  Nigel P. Smart},
  title        = {{BBQ:} Using {AES} in Picnic Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {781},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/781},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuilhemMOS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SmartT19,
  author       = {Nigel P. Smart and
                  Titouan Tanguy},
  title        = {TaaS: Commodity {MPC} via Triples-as-a-Service},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {957},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/957},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SmartT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlyORSW19,
  author       = {Abdelrahaman Aly and
                  Emmanuela Orsini and
                  Dragos Rotaru and
                  Nigel P. Smart and
                  Tim Wood},
  title        = {Zaphod: Efficiently Combining {LSSS} and Garbled Circuits in {SCALE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {974},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/974},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlyORSW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CozzoS19,
  author       = {Daniele Cozzo and
                  Nigel P. Smart},
  title        = {Sharing the {LUOV:} Threshold Post-Quantum Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1060},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1060},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CozzoS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtDDS19,
  author       = {Martin R. Albrecht and
                  Alex Davidson and
                  Amit Deo and
                  Nigel P. Smart},
  title        = {Round-optimal Verifiable Oblivious Pseudorandom Functions From Ideal
                  Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1271},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1271},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlbrechtDDS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RotaruSTVW19,
  author       = {Dragos Rotaru and
                  Nigel P. Smart and
                  Titouan Tanguy and
                  Frederik Vercauteren and
                  Tim Wood},
  title        = {Actively Secure Setup for {SPDZ}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1300},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1300},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RotaruSTVW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CozzoS19a,
  author       = {Daniele Cozzo and
                  Nigel P. Smart},
  title        = {Sashimi: Cutting up CSI-FiSh secret keys to produce an actively secure
                  distributed signing protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1360},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1360},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CozzoS19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ArcherBLKNPSW18,
  author       = {David W. Archer and
                  Dan Bogdanov and
                  Yehuda Lindell and
                  Liina Kamm and
                  Kurt Nielsen and
                  Jakob Illeborg Pagter and
                  Nigel P. Smart and
                  Rebecca N. Wright},
  title        = {From Keys to Databases - Real-World Applications of Secure Multi-Party
                  Computation},
  journal      = {Comput. J.},
  volume       = {61},
  number       = {12},
  pages        = {1749--1771},
  year         = {2018},
  url          = {https://doi.org/10.1093/comjnl/bxy090},
  doi          = {10.1093/COMJNL/BXY090},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/ArcherBLKNPSW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ReparazMBANNS18,
  author       = {Oscar Reparaz and
                  Lauren De Meyer and
                  Beg{\"{u}}l Bilgin and
                  Victor Arribas and
                  Svetla Nikova and
                  Ventzislav Nikov and
                  Nigel P. Smart},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {{CAPA:} The Spirit of Beaver Against Physical Attacks},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10991},
  pages        = {121--151},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96884-1\_5},
  doi          = {10.1007/978-3-319-96884-1\_5},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ReparazMBANNS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/KellerRSW18,
  author       = {Marcel Keller and
                  Dragos Rotaru and
                  Nigel P. Smart and
                  Tim Wood},
  editor       = {Dario Catalano and
                  Roberto De Prisco},
  title        = {Reducing Communication Channels in {MPC}},
  booktitle    = {Security and Cryptography for Networks - 11th International Conference,
                  {SCN} 2018, Amalfi, Italy, September 5-7, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11035},
  pages        = {181--199},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-98113-0\_10},
  doi          = {10.1007/978-3-319-98113-0\_10},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/KellerRSW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ctrsa/2018,
  editor       = {Nigel P. Smart},
  title        = {Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers' Track at
                  the {RSA} Conference 2018, San Francisco, CA, USA, April 16-20, 2018,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10808},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76953-0},
  doi          = {10.1007/978-3-319-76953-0},
  isbn         = {978-3-319-76952-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArcherBLKNPSW18,
  author       = {David W. Archer and
                  Dan Bogdanov and
                  Yehuda Lindell and
                  Liina Kamm and
                  Kurt Nielsen and
                  Jakob Illeborg Pagter and
                  Nigel P. Smart and
                  Rebecca N. Wright},
  title        = {From Keys to Databases - Real-World Applications of Secure Multi-Party
                  Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {450},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/450},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ArcherBLKNPSW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SmartW18,
  author       = {Nigel P. Smart and
                  Tim Wood},
  title        = {Error-Detecting in Monotone Span Programs with Application to Communication
                  Efficient Multi-Party Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {467},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/467},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SmartW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuilhemOPS18,
  author       = {Cyprien Delpech de Saint Guilhem and
                  Emmanuela Orsini and
                  Christophe Petit and
                  Nigel P. Smart},
  title        = {Secure Oblivious Transfer from Semi-Commutative Masking},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {648},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/648},
  timestamp    = {Fri, 17 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GuilhemOPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KraitsbergLOSA18,
  author       = {Michael Kraitsberg and
                  Yehuda Lindell and
                  Valery Osheter and
                  Nigel P. Smart and
                  Younes Talibi Alaoui},
  title        = {Adding Distributed Decryption and Key Generation to a Ring-LWE Based
                  {CCA} Encryption Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1034},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1034},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KraitsbergLOSA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CartlidgeSA18,
  author       = {John Cartlidge and
                  Nigel P. Smart and
                  Younes Talibi Alaoui},
  title        = {{MPC} Joins the Dark Side},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1045},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1045},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CartlidgeSA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DelcourtKLNPS18,
  author       = {Marguerite Delcourt and
                  Thorsten Kleinjung and
                  Arjen K. Lenstra and
                  Shubhojyoti Nath and
                  Dan Page and
                  Nigel P. Smart},
  title        = {Using the Cloud to Determine Key Strengths - Triennial Update},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1221},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1221},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DelcourtKLNPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/RotaruSS17,
  author       = {Dragos Rotaru and
                  Nigel P. Smart and
                  Martijn Stam},
  title        = {Modes of Operation Suitable for Computing on Encrypted Data},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {3},
  pages        = {294--324},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i3.294-324},
  doi          = {10.13154/TOSC.V2017.I3.294-324},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/RotaruSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AlbrechtOPPS17,
  author       = {Martin R. Albrecht and
                  Emmanuela Orsini and
                  Kenneth G. Paterson and
                  Guy Peer and
                  Nigel P. Smart},
  editor       = {Simon N. Foley and
                  Dieter Gollmann and
                  Einar Snekkenes},
  title        = {Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts},
  booktitle    = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research
                  in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10492},
  pages        = {29--46},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66402-6\_4},
  doi          = {10.1007/978-3-319-66402-6\_4},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/AlbrechtOPPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/LeslieSS17,
  author       = {David S. Leslie and
                  Chris Sherfield and
                  Nigel P. Smart},
  editor       = {Simon N. Foley and
                  Dieter Gollmann and
                  Einar Snekkenes},
  title        = {Multi-rate Threshold FlipThem},
  booktitle    = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research
                  in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10493},
  pages        = {174--190},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66399-9\_10},
  doi          = {10.1007/978-3-319-66399-9\_10},
  timestamp    = {Tue, 06 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/LeslieSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/CostacheSV17,
  author       = {Anamaria Costache and
                  Nigel P. Smart and
                  Srinivas Vivek},
  editor       = {Aggelos Kiayias},
  title        = {Faster Homomorphic Evaluation of Discrete Fourier Transforms},
  booktitle    = {Financial Cryptography and Data Security - 21st International Conference,
                  {FC} 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10322},
  pages        = {517--529},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70972-7\_29},
  doi          = {10.1007/978-3-319-70972-7\_29},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/CostacheSV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/SchollSW17,
  author       = {Peter Scholl and
                  Nigel P. Smart and
                  Tim Wood},
  editor       = {M{\'{a}}ire O'Neill},
  title        = {When It's All Just Too Much: Outsourcing MPC-Preprocessing},
  booktitle    = {Cryptography and Coding - 16th {IMA} International Conference, {IMACC}
                  2017, Oxford, UK, December 12-14, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10655},
  pages        = {77--99},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-71045-7\_4},
  doi          = {10.1007/978-3-319-71045-7\_4},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/ima/SchollSW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/GuilhemSW17,
  author       = {Cyprien de Saint Guilhem and
                  Nigel P. Smart and
                  Bogdan Warinschi},
  editor       = {Phong Q. Nguyen and
                  Jianying Zhou},
  title        = {Generic Forward-Secure Key Agreement Without Signatures},
  booktitle    = {Information Security - 20th International Conference, {ISC} 2017,
                  Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10599},
  pages        = {114--133},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-69659-1\_7},
  doi          = {10.1007/978-3-319-69659-1\_7},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/GuilhemSW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/indocrypt/2017,
  editor       = {Arpita Patra and
                  Nigel P. Smart},
  title        = {Progress in Cryptology - {INDOCRYPT} 2017 - 18th International Conference
                  on Cryptology in India, Chennai, India, December 10-13, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10698},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-71667-1},
  doi          = {10.1007/978-3-319-71667-1},
  isbn         = {978-3-319-71666-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CostacheS17,
  author       = {Anamaria Costache and
                  Nigel P. Smart},
  title        = {Homomorphic Encryption without Gaussian Noise},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {163},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/163},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CostacheS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SchollSW17,
  author       = {Peter Scholl and
                  Nigel P. Smart and
                  Tim Wood},
  title        = {When It's All Just Too Much: Outsourcing MPC-Preprocessing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {262},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/262},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SchollSW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtOPPS17,
  author       = {Martin R. Albrecht and
                  Emmanuela Orsini and
                  Kenneth G. Paterson and
                  Guy Peer and
                  Nigel P. Smart},
  title        = {Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {354},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/354},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlbrechtOPPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KellerRSW17,
  author       = {Marcel Keller and
                  Dragos Rotaru and
                  Nigel P. Smart and
                  Tim Wood},
  title        = {Reducing Communication Channels in {MPC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {492},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/492},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KellerRSW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RotaruSS17,
  author       = {Dragos Rotaru and
                  Nigel P. Smart and
                  Martijn Stam},
  title        = {Modes of Operation Suitable for Computing on Encrypted Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {496},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/496},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RotaruSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeslieSS17,
  author       = {David S. Leslie and
                  Chris Sherfield and
                  Nigel P. Smart},
  title        = {Multi-Rate Threshold FlipThem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {611},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/611},
  timestamp    = {Wed, 12 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeslieSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuilhemSW17,
  author       = {Cyprien de Saint Guilhem and
                  Nigel P. Smart and
                  Bogdan Warinschi},
  title        = {Generic Forward-Secure Key Agreement Without Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {853},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/853},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuilhemSW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarnettSSSSVW17,
  author       = {Anthony Barnett and
                  Jay Santokhi and
                  Michael Simpson and
                  Nigel P. Smart and
                  Charlie Stainton{-}Bygrave and
                  Srinivas Vivek and
                  Adrian Waller},
  title        = {Image Classification using non-linear Support Vector Machines on Encrypted
                  Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {857},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/857},
  timestamp    = {Mon, 11 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BarnettSSSSVW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MakriRSV17,
  author       = {Eleftheria Makri and
                  Dragos Rotaru and
                  Nigel P. Smart and
                  Frederik Vercauteren},
  title        = {{PICS:} Private Image Classification with {SVM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1190},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1190},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MakriRSV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ReparazMBANNS17,
  author       = {Oscar Reparaz and
                  Lauren De Meyer and
                  Beg{\"{u}}l Bilgin and
                  Victor Arribas and
                  Svetla Nikova and
                  Ventzislav Nikov and
                  Nigel P. Smart},
  title        = {{CAPA:} The Spirit of Beaver against Physical Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1195},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1195},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ReparazMBANNS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/isc/Smart16,
  author       = {Nigel P. Smart},
  title        = {Cryptography Made Simple},
  series       = {Information Security and Cryptography},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-21936-3},
  doi          = {10.1007/978-3-319-21936-3},
  isbn         = {978-3-319-21935-6},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/Smart16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BonehPS16,
  author       = {Dan Boneh and
                  Kenny Paterson and
                  Nigel P. Smart},
  title        = {Building a Community of Real-World Cryptographers},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {14},
  number       = {6},
  pages        = {7--9},
  year         = {2016},
  url          = {https://doi.org/10.1109/MSP.2016.127},
  doi          = {10.1109/MSP.2016.127},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BonehPS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/OrsiniPS16,
  author       = {Emmanuela Orsini and
                  Joop van de Pol and
                  Nigel P. Smart},
  title        = {Bootstrapping {BGV} ciphertexts with a wider choice of \emph{p} and
                  \emph{q}},
  journal      = {{IET} Inf. Secur.},
  volume       = {10},
  number       = {6},
  pages        = {348--357},
  year         = {2016},
  url          = {https://doi.org/10.1049/iet-ifs.2015.0505},
  doi          = {10.1049/IET-IFS.2015.0505},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/OrsiniPS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Smart16,
  author       = {Nigel P. Smart},
  editor       = {Beg{\"{u}}l Bilgin and
                  Svetla Nikova and
                  Vincent Rijmen},
  title        = {Masking and {MPC:} When Crypto Theory Meets Crypto Practice},
  booktitle    = {Proceedings of the {ACM} Workshop on Theory of Implementation Security,
                  TIS@CCS 2016 Vienna, Austria, October, 2016},
  pages        = {1},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2996366.2996372},
  doi          = {10.1145/2996366.2996372},
  timestamp    = {Sat, 30 Sep 2023 09:36:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Smart16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/0001RRSS16,
  author       = {Lorenzo Grassi and
                  Christian Rechberger and
                  Dragos Rotaru and
                  Peter Scholl and
                  Nigel P. Smart},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {MPC-Friendly Symmetric Key Primitives},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {430--443},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2978332},
  doi          = {10.1145/2976749.2978332},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/0001RRSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/CostacheS16,
  author       = {Ana Costache and
                  Nigel P. Smart},
  editor       = {Kazue Sako},
  title        = {Which Ring Based Somewhat Homomorphic Encryption Scheme is Best?},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2016 - The Cryptographers' Track at
                  the {RSA} Conference 2016, San Francisco, CA, USA, February 29 - March
                  4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9610},
  pages        = {325--340},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-29485-8\_19},
  doi          = {10.1007/978-3-319-29485-8\_19},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/CostacheS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/CostacheSVW16,
  author       = {Anamaria Costache and
                  Nigel P. Smart and
                  Srinivas Vivek and
                  Adrian Waller},
  editor       = {Roberto Avanzi and
                  Howard M. Heys},
  title        = {Fixed-Point Arithmetic in {SHE} Schemes},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2016 - 23rd International Conference,
                  St. John's, NL, Canada, August 10-12, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10532},
  pages        = {401--422},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-69453-5\_22},
  doi          = {10.1007/978-3-319-69453-5\_22},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/CostacheSVW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/ChoudhuryOPS16,
  author       = {Ashish Choudhury and
                  Emmanuela Orsini and
                  Arpita Patra and
                  Nigel P. Smart},
  editor       = {Vassilis Zikas and
                  Roberto De Prisco},
  title        = {Linear Overhead Optimally-Resilient Robust {MPC} Using Preprocessing},
  booktitle    = {Security and Cryptography for Networks - 10th International Conference,
                  {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9841},
  pages        = {147--168},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44618-9\_8},
  doi          = {10.1007/978-3-319-44618-9\_8},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/ChoudhuryOPS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/LindellSS16,
  author       = {Yehuda Lindell and
                  Nigel P. Smart and
                  Eduardo Soria{-}Vazquez},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {More Efficient Constant-Round Multi-party Computation from {BMR} and
                  {SHE}},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9985},
  pages        = {554--581},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53641-4\_21},
  doi          = {10.1007/978-3-662-53641-4\_21},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/LindellSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/GutmannBBRS16,
  author       = {Peter Gutmann and
                  Steven M. Bellovin and
                  Matt Blaze and
                  Ronald L. Rivest and
                  Nigel P. Smart},
  title        = {An IBE-based Signcryption Scheme for Group Key Management},
  journal      = {CoRR},
  volume       = {abs/1603.09526},
  year         = {2016},
  url          = {http://arxiv.org/abs/1603.09526},
  eprinttype    = {arXiv},
  eprint       = {1603.09526},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/GutmannBBRS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/LauterSS16,
  author       = {Kristin E. Lauter and
                  Radu Sion and
                  Nigel P. Smart},
  title        = {Modern Cryptography and Security: An Inter-Community Dialogue (Dagstuhl
                  Seminar 16051)},
  journal      = {Dagstuhl Reports},
  volume       = {6},
  number       = {1},
  pages        = {207--223},
  year         = {2016},
  url          = {https://doi.org/10.4230/DagRep.6.1.207},
  doi          = {10.4230/DAGREP.6.1.207},
  timestamp    = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dagstuhl-reports/LauterSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LindellSS16,
  author       = {Yehuda Lindell and
                  Nigel P. Smart and
                  Eduardo Soria{-}Vazquez},
  title        = {More Efficient Constant-Round Multi-Party Computation from {BMR} and
                  {SHE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {156},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/156},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LindellSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CostacheSVW16,
  author       = {Anamaria Costache and
                  Nigel P. Smart and
                  Srinivas Vivek and
                  Adrian Waller},
  title        = {Fixed Point Arithmetic in {SHE} Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {250},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/250},
  timestamp    = {Mon, 11 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/CostacheSVW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrassiRRSS16,
  author       = {Lorenzo Grassi and
                  Christian Rechberger and
                  Dragos Rotaru and
                  Peter Scholl and
                  Nigel P. Smart},
  title        = {MPC-Friendly Symmetric Key Primitives},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {542},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/542},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrassiRRSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CostacheSV16,
  author       = {Anamaria Costache and
                  Nigel P. Smart and
                  Srinivas Vivek},
  title        = {Faster Homomorphic Evaluation of Discrete Fourier Transforms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1019},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1019},
  timestamp    = {Mon, 11 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/CostacheSV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LindellPSY15,
  author       = {Yehuda Lindell and
                  Benny Pinkas and
                  Nigel P. Smart and
                  Avishay Yanai},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Efficient Constant Round Multi-party Computation Combining {BMR} and
                  {SPDZ}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  pages        = {319--338},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7\_16},
  doi          = {10.1007/978-3-662-48000-7\_16},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LindellPSY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/PolSY15,
  author       = {Joop van de Pol and
                  Nigel P. Smart and
                  Yuval Yarom},
  editor       = {Kaisa Nyberg},
  title        = {Just a Little Bit More},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2015, The Cryptographer's Track at
                  the {RSA} Conference 2015, San Francisco, CA, USA, April 20-24, 2015.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9048},
  pages        = {3--21},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-16715-2\_1},
  doi          = {10.1007/978-3-319-16715-2\_1},
  timestamp    = {Thu, 14 Oct 2021 10:27:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/PolSY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/LeslieSS15,
  author       = {David S. Leslie and
                  Chris Sherfield and
                  Nigel P. Smart},
  editor       = {M. H. R. Khouzani and
                  Emmanouil A. Panaousis and
                  George Theodorakopoulos},
  title        = {Threshold FlipThem: When the Winner Does Not Need to Take All},
  booktitle    = {Decision and Game Theory for Security - 6th International Conference,
                  GameSec 2015, London, UK, November 4-5, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9406},
  pages        = {74--92},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25594-1\_5},
  doi          = {10.1007/978-3-319-25594-1\_5},
  timestamp    = {Tue, 06 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/LeslieSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/OrsiniPS15,
  author       = {Emmanuela Orsini and
                  Joop van de Pol and
                  Nigel P. Smart},
  editor       = {Jonathan Katz},
  title        = {Bootstrapping {BGV} Ciphertexts with a Wider Choice of p and q},
  booktitle    = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
                  USA, March 30 - April 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9020},
  pages        = {673--698},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46447-2\_30},
  doi          = {10.1007/978-3-662-46447-2\_30},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/OrsiniPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BurraLNNOOSS15,
  author       = {Sai Sheshank Burra and
                  Enrique Larraia and
                  Jesper Buus Nielsen and
                  Peter Sebastian Nordholt and
                  Claudio Orlandi and
                  Emmanuela Orsini and
                  Peter Scholl and
                  Nigel P. Smart},
  title        = {High Performance Multi-Party Computation for Binary Circuits Based
                  on Oblivious Transfer},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {472},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/472},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BurraLNNOOSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LindellPSY15,
  author       = {Yehuda Lindell and
                  Benny Pinkas and
                  Nigel P. Smart and
                  Avishay Yanai},
  title        = {Efficient Constant Round Multi-Party Computation Combining {BMR} and
                  {SPDZ}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {523},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/523},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LindellPSY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChoudhuryOPS15,
  author       = {Ashish Choudhury and
                  Emmanuela Orsini and
                  Arpita Patra and
                  Nigel P. Smart},
  title        = {Linear Overhead Robust {MPC} with Honest Majority Using Preprocessing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {705},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/705},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChoudhuryOPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeslieSS15,
  author       = {David S. Leslie and
                  Chris Sherfield and
                  Nigel P. Smart},
  title        = {Threshold FlipThem: When the winner does not need to take all},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {784},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/784},
  timestamp    = {Wed, 12 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeslieSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CostacheS15,
  author       = {Anamaria Costache and
                  Nigel P. Smart},
  title        = {Which Ring Based Somewhat Homomorphic Encryption Scheme is Best?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {889},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/889},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CostacheS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/utcs/PageS14,
  author       = {Daniel Page and
                  Nigel P. Smart},
  title        = {What Is Computer Science? - An Information Security Perspective},
  series       = {Undergraduate Topics in Computer Science},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-04042-4},
  doi          = {10.1007/978-3-319-04042-4},
  isbn         = {978-3-319-04041-7},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/utcs/PageS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SmartV14,
  author       = {Nigel P. Smart and
                  Frederik Vercauteren},
  title        = {Fully homomorphic {SIMD} operations},
  journal      = {Des. Codes Cryptogr.},
  volume       = {71},
  number       = {1},
  pages        = {57--81},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-012-9720-4},
  doi          = {10.1007/S10623-012-9720-4},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/SmartV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/LeeSWW14,
  author       = {Ming{-}Feng Lee and
                  Nigel P. Smart and
                  Bogdan Warinschi and
                  Gaven J. Watson},
  title        = {Anonymity guarantees of the {UMTS/LTE} authentication and connection
                  protocol},
  journal      = {Int. J. Inf. Sec.},
  volume       = {13},
  number       = {6},
  pages        = {513--527},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10207-014-0231-3},
  doi          = {10.1007/S10207-014-0231-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/LeeSWW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/MohasselSS14,
  author       = {Payman Mohassel and
                  Seyed Saeed Sadeghian and
                  Nigel P. Smart},
  editor       = {Palash Sarkar and
                  Tetsu Iwata},
  title        = {Actively Secure Private Function Evaluation},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8874},
  pages        = {486--505},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45608-8\_26},
  doi          = {10.1007/978-3-662-45608-8\_26},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/MohasselSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BengerPSY14,
  author       = {Naomi Benger and
                  Joop van de Pol and
                  Nigel P. Smart and
                  Yuval Yarom},
  editor       = {Lejla Batina and
                  Matthew Robshaw},
  title        = {"Ooh Aah... Just a Little Bit" : {A} Small Amount of Side
                  Channel Can Go a Long Way},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International
                  Workshop, Busan, South Korea, September 23-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8731},
  pages        = {75--92},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44709-3\_5},
  doi          = {10.1007/978-3-662-44709-3\_5},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BengerPSY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LarraiaOS14,
  author       = {Enrique Larraia and
                  Emmanuela Orsini and
                  Nigel P. Smart},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Dishonest Majority Multi-Party Computation for Binary Circuits},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8617},
  pages        = {495--512},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44381-1\_28},
  doi          = {10.1007/978-3-662-44381-1\_28},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LarraiaOS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/ChoudhuryPS14,
  author       = {Ashish Choudhury and
                  Arpita Patra and
                  Nigel P. Smart},
  editor       = {Michel Abdalla and
                  Roberto De Prisco},
  title        = {Reducing the Overhead of {MPC} over a Large Population},
  booktitle    = {Security and Cryptography for Networks - 9th International Conference,
                  {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8642},
  pages        = {197--217},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10879-7\_12},
  doi          = {10.1007/978-3-319-10879-7\_12},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/ChoudhuryPS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LarraiaOS14,
  author       = {Enrique Larraia and
                  Emmanuela Orsini and
                  Nigel P. Smart},
  title        = {Dishonest Majority Multi-Party Computation for Binary Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {101},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/101},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LarraiaOS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MohasselSS14,
  author       = {Payman Mohassel and
                  Seyed Saeed Sadeghian and
                  Nigel P. Smart},
  title        = {Actively Secure Private Function Evaluation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {102},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/102},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MohasselSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChoudhuryPS14,
  author       = {Ashish Choudhury and
                  Arpita Patra and
                  Nigel P. Smart},
  title        = {Reducing the Overhead of Cloud {MPC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {105},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/105},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChoudhuryPS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BengerPSY14,
  author       = {Naomi Benger and
                  Joop van de Pol and
                  Nigel P. Smart and
                  Yuval Yarom},
  title        = {"Ooh Aah... Just a Little Bit" : {A} small amount of side
                  channel can go a long way},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {161},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/161},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BengerPSY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OrsiniPS14,
  author       = {Emmanuela Orsini and
                  Joop van de Pol and
                  Nigel P. Smart},
  title        = {Bootstrapping {BGV} Ciphertexts With {A} Wider Choice of p and q},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {408},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/408},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OrsiniPS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PolSY14,
  author       = {Joop van de Pol and
                  Nigel P. Smart and
                  Yuval Yarom},
  title        = {Just a Little Bit More},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {434},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/434},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PolSY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BernhardFGSW13,
  author       = {David Bernhard and
                  Georg Fuchsbauer and
                  Essam Ghadafi and
                  Nigel P. Smart and
                  Bogdan Warinschi},
  title        = {Anonymous attestation with user-controlled linkability},
  journal      = {Int. J. Inf. Sec.},
  volume       = {12},
  number       = {3},
  pages        = {219--249},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10207-013-0191-z},
  doi          = {10.1007/S10207-013-0191-Z},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/BernhardFGSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BrzuskaFSWW13,
  author       = {Christina Brzuska and
                  Marc Fischlin and
                  Nigel P. Smart and
                  Bogdan Warinschi and
                  Stephen C. Williams},
  title        = {Less is more: relaxed yet composable security notions for key exchange},
  journal      = {Int. J. Inf. Sec.},
  volume       = {12},
  number       = {4},
  pages        = {267--297},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10207-013-0192-y},
  doi          = {10.1007/S10207-013-0192-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/BrzuskaFSWW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/GentryHPS13,
  author       = {Craig Gentry and
                  Shai Halevi and
                  Chris Peikert and
                  Nigel P. Smart},
  title        = {Field switching in BGV-style homomorphic encryption},
  journal      = {J. Comput. Secur.},
  volume       = {21},
  number       = {5},
  pages        = {663--684},
  year         = {2013},
  url          = {https://doi.org/10.3233/JCS-130480},
  doi          = {10.3233/JCS-130480},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/GentryHPS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ChoudhuryLOPS13,
  author       = {Ashish Choudhury and
                  Jake Loftus and
                  Emmanuela Orsini and
                  Arpita Patra and
                  Nigel P. Smart},
  editor       = {Kazue Sako and
                  Palash Sarkar},
  title        = {Between a Rock and a Hard Place: Interpolating between {MPC} and {FHE}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Bengaluru, India, December 1-5, 2013, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8270},
  pages        = {221--240},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-42045-0\_12},
  doi          = {10.1007/978-3-642-42045-0\_12},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ChoudhuryLOPS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Smart13,
  author       = {Nigel P. Smart},
  editor       = {Martin Franz and
                  Andreas Holzer and
                  Rupak Majumdar and
                  Bryan Parno and
                  Helmut Veith},
  title        = {A brief history of practical multi-party computation},
  booktitle    = {PETShop'13, Proceedings of the 2013 {ACM} Workshop on Language Support
                  for Privacy-Enhancing Technologies, Co-located with {CCS} 2013, November
                  4, 2013, Berlin, Germany},
  pages        = {1--2},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2517872.2517880},
  doi          = {10.1145/2517872.2517880},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Smart13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BrzuskaSWW13,
  author       = {Christina Brzuska and
                  Nigel P. Smart and
                  Bogdan Warinschi and
                  Gaven J. Watson},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {An analysis of the {EMV} channel establishment protocol},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {373--386},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516748},
  doi          = {10.1145/2508859.2516748},
  timestamp    = {Tue, 10 Nov 2020 19:58:06 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BrzuskaSWW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KellerSS13,
  author       = {Marcel Keller and
                  Peter Scholl and
                  Nigel P. Smart},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {An architecture for practical actively secure {MPC} with dishonest
                  majority},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {549--560},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516744},
  doi          = {10.1145/2508859.2516744},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KellerSS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/BondFSW13,
  author       = {Mike Bond and
                  George French and
                  Nigel P. Smart and
                  Gaven J. Watson},
  editor       = {Ed Dawson},
  title        = {The Low-Call Diet: Authenticated Encryption for Call Counting {HSM}
                  Users},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2013 - The Cryptographers' Track at
                  the {RSA} Conference 2013, San Francisco,CA, USA, February 25-March
                  1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7779},
  pages        = {359--374},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36095-4\_23},
  doi          = {10.1007/978-3-642-36095-4\_23},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/BondFSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/DamgardKLPSS13,
  author       = {Ivan Damg{\aa}rd and
                  Marcel Keller and
                  Enrique Larraia and
                  Valerio Pastro and
                  Peter Scholl and
                  Nigel P. Smart},
  editor       = {Jason Crampton and
                  Sushil Jajodia and
                  Keith Mayes},
  title        = {Practical Covertly Secure {MPC} for Dishonest Majority - Or: Breaking
                  the {SPDZ} Limits},
  booktitle    = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research
                  in Computer Security, Egham, UK, September 9-13, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8134},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40203-6\_1},
  doi          = {10.1007/978-3-642-40203-6\_1},
  timestamp    = {Wed, 25 Sep 2019 18:03:15 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/DamgardKLPSS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/PolS13,
  author       = {Joop van de Pol and
                  Nigel P. Smart},
  editor       = {Martijn Stam},
  title        = {Estimating Key Sizes for High Dimensional Lattice-Based Systems},
  booktitle    = {Cryptography and Coding - 14th {IMA} International Conference, {IMACC}
                  2013, Oxford, UK, December 17-19, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8308},
  pages        = {290--303},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-45239-0\_17},
  doi          = {10.1007/978-3-642-45239-0\_17},
  timestamp    = {Wed, 18 Mar 2020 16:00:57 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/PolS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeeSWW13,
  author       = {Ming{-}Feng Lee and
                  Nigel P. Smart and
                  Bogdan Warinschi and
                  Gaven J. Watson},
  title        = {Anonymity Guarantees of the {UMTS/LTE} Authentication and Connection
                  Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {27},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/027},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeeSWW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrzuskaSWW13,
  author       = {Christina Brzuska and
                  Nigel P. Smart and
                  Bogdan Warinschi and
                  Gaven J. Watson},
  title        = {An Analysis of the {EMV} Channel Establishment Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {31},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/031},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrzuskaSWW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChoudhuryLOPS13,
  author       = {Ashish Choudhury and
                  Jake Loftus and
                  Emmanuela Orsini and
                  Arpita Patra and
                  Nigel P. Smart},
  title        = {Between a Rock and a Hard Place: Interpolating Between {MPC} and {FHE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {85},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/085},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChoudhuryLOPS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KellerSS13,
  author       = {Marcel Keller and
                  Peter Scholl and
                  Nigel P. Smart},
  title        = {An architecture for practical actively secure {MPC} with dishonest
                  majority},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {143},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/143},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KellerSS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PolS13,
  author       = {Joop van de Pol and
                  Nigel P. Smart},
  title        = {Estimating Key Sizes For High Dimensional Lattice Based Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {630},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/630},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PolS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/FioreGS12,
  author       = {Dario Fiore and
                  Rosario Gennaro and
                  Nigel P. Smart},
  title        = {Relations between the security models for certificateless encryption
                  and ID-based key agreement},
  journal      = {Int. J. Inf. Sec.},
  volume       = {11},
  number       = {1},
  pages        = {1--22},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10207-011-0149-y},
  doi          = {10.1007/S10207-011-0149-Y},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/FioreGS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DamgardPSZ12,
  author       = {Ivan Damg{\aa}rd and
                  Valerio Pastro and
                  Nigel P. Smart and
                  Sarah Zakarias},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {Multiparty Computation from Somewhat Homomorphic Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {643--662},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_38},
  doi          = {10.1007/978-3-642-32009-5\_38},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DamgardPSZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GentryHS12,
  author       = {Craig Gentry and
                  Shai Halevi and
                  Nigel P. Smart},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {Homomorphic Evaluation of the {AES} Circuit},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {850--867},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_49},
  doi          = {10.1007/978-3-642-32009-5\_49},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GentryHS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/DegabrieleLPSS12,
  author       = {Jean Paul Degabriele and
                  Anja Lehmann and
                  Kenneth G. Paterson and
                  Nigel P. Smart and
                  Mario Strefler},
  editor       = {Orr Dunkelman},
  title        = {On the Joint Security of Encryption and Signature in {EMV}},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2012 - The Cryptographers' Track at
                  the {RSA} Conference 2012, San Francisco, CA, USA, February 27 - March
                  2, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7178},
  pages        = {116--135},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-27954-6\_8},
  doi          = {10.1007/978-3-642-27954-6\_8},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/DegabrieleLPSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GentryHS12,
  author       = {Craig Gentry and
                  Shai Halevi and
                  Nigel P. Smart},
  editor       = {David Pointcheval and
                  Thomas Johansson},
  title        = {Fully Homomorphic Encryption with Polylog Overhead},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Cambridge, UK, April 15-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7237},
  pages        = {465--482},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29011-4\_28},
  doi          = {10.1007/978-3-642-29011-4\_28},
  timestamp    = {Sun, 12 Nov 2023 02:15:08 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GentryHS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/KleinjungLPS12,
  author       = {Thorsten Kleinjung and
                  Arjen K. Lenstra and
                  Dan Page and
                  Nigel P. Smart},
  editor       = {Steven D. Galbraith and
                  Mridul Nandi},
  title        = {Using the Cloud to Determine Key Strengths},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2012, 13th International Conference
                  on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7668},
  pages        = {17--39},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34931-7\_3},
  doi          = {10.1007/978-3-642-34931-7\_3},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/KleinjungLPS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/GhadafiS12,
  author       = {Essam Ghadafi and
                  Nigel P. Smart},
  editor       = {Dieter Gollmann and
                  Felix C. Freiling},
  title        = {Efficient Two-Move Blind Signatures in the Common Reference String
                  Model},
  booktitle    = {Information Security - 15th International Conference, {ISC} 2012,
                  Passau, Germany, September 19-21, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7483},
  pages        = {274--289},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33383-5\_17},
  doi          = {10.1007/978-3-642-33383-5\_17},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/GhadafiS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GentryHS12,
  author       = {Craig Gentry and
                  Shai Halevi and
                  Nigel P. Smart},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {Better Bootstrapping in Fully Homomorphic Encryption},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_1},
  doi          = {10.1007/978-3-642-30057-8\_1},
  timestamp    = {Mon, 16 Nov 2020 15:55:52 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/GentryHS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/GentryHPS12,
  author       = {Craig Gentry and
                  Shai Halevi and
                  Chris Peikert and
                  Nigel P. Smart},
  editor       = {Ivan Visconti and
                  Roberto De Prisco},
  title        = {Ring Switching in BGV-Style Homomorphic Encryption},
  booktitle    = {Security and Cryptography for Networks - 8th International Conference,
                  {SCN} 2012, Amalfi, Italy, September 5-7, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7485},
  pages        = {19--37},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32928-9\_2},
  doi          = {10.1007/978-3-642-32928-9\_2},
  timestamp    = {Thu, 23 Jun 2022 19:58:57 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/GentryHPS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/DamgardKLMS12,
  author       = {Ivan Damg{\aa}rd and
                  Marcel Keller and
                  Enrique Larraia and
                  Christian Miles and
                  Nigel P. Smart},
  editor       = {Ivan Visconti and
                  Roberto De Prisco},
  title        = {Implementing {AES} via an Actively/Covertly Secure Dishonest-Majority
                  {MPC} Protocol},
  booktitle    = {Security and Cryptography for Networks - 8th International Conference,
                  {SCN} 2012, Amalfi, Italy, September 5-7, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7485},
  pages        = {241--263},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32928-9\_14},
  doi          = {10.1007/978-3-642-32928-9\_14},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/DamgardKLMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GentryHS12,
  author       = {Craig Gentry and
                  Shai Halevi and
                  Nigel P. Smart},
  title        = {Homomorphic Evaluation of the {AES} Circuit},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {99},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/099},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GentryHS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GentryHS12a,
  author       = {Craig Gentry and
                  Shai Halevi and
                  Nigel P. Smart},
  title        = {Ring Switching in BGV-Style Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {240},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/240},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GentryHS12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrzuskaFSWW12,
  author       = {Christina Brzuska and
                  Marc Fischlin and
                  Nigel P. Smart and
                  Bogdan Warinschi and
                  Stephen C. Williams},
  title        = {Less is More: Relaxed yet Composable Security Notions for Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {242},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/242},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrzuskaFSWW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardKLMS12,
  author       = {Ivan Damg{\aa}rd and
                  Marcel Keller and
                  Enrique Larraia and
                  Christian Miles and
                  Nigel P. Smart},
  title        = {Implementing {AES} via an Actively/Covertly Secure Dishonest-Majority
                  {MPC} Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {262},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/262},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardKLMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BondFSW12,
  author       = {Mike Bond and
                  George French and
                  Nigel P. Smart and
                  Gaven J. Watson},
  title        = {The low-call diet: Authenticated Encryption for call counting {HSM}
                  users},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {497},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/497},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BondFSW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardKLPSS12,
  author       = {Ivan Damg{\aa}rd and
                  Marcel Keller and
                  Enrique Larraia and
                  Valerio Pastro and
                  Peter Scholl and
                  Nigel P. Smart},
  title        = {Practical Covertly Secure {MPC} for Dishonest Majority - or: Breaking
                  the {SPDZ} Limits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {642},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/642},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardKLPSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/AbdallaBCDMNSS11,
  author       = {Michel Abdalla and
                  James Birkett and
                  Dario Catalano and
                  Alexander W. Dent and
                  John Malone{-}Lee and
                  Gregory Neven and
                  Jacob C. N. Schuldt and
                  Nigel P. Smart},
  title        = {Wildcarded Identity-Based Encryption},
  journal      = {J. Cryptol.},
  volume       = {24},
  number       = {1},
  pages        = {42--82},
  year         = {2011},
  url          = {https://doi.org/10.1007/s00145-010-9060-3},
  doi          = {10.1007/S00145-010-9060-3},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/AbdallaBCDMNSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/LoftusS11,
  author       = {Jake Loftus and
                  Nigel P. Smart},
  editor       = {Abderrahmane Nitaj and
                  David Pointcheval},
  title        = {Secure Outsourced Computation},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2011 - 4th International Conference
                  on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6737},
  pages        = {1--20},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21969-6\_1},
  doi          = {10.1007/978-3-642-21969-6\_1},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/LoftusS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/SchollS11,
  author       = {Peter Scholl and
                  Nigel P. Smart},
  editor       = {Liqun Chen},
  title        = {Improved Key Generation for Gentry's Fully Homomorphic Encryption
                  Scheme},
  booktitle    = {Cryptography and Coding - 13th {IMA} International Conference, {IMACC}
                  2011, Oxford, UK, December 12-15, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7089},
  pages        = {10--22},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25516-8\_2},
  doi          = {10.1007/978-3-642-25516-8\_2},
  timestamp    = {Wed, 18 Mar 2020 16:00:56 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/SchollS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/LoftusMSV11,
  author       = {Jake Loftus and
                  Alexander May and
                  Nigel P. Smart and
                  Frederik Vercauteren},
  editor       = {Ali Miri and
                  Serge Vaudenay},
  title        = {On CCA-Secure Somewhat Homomorphic Encryption},
  booktitle    = {Selected Areas in Cryptography - 18th International Workshop, {SAC}
                  2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7118},
  pages        = {55--72},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-28496-0\_4},
  doi          = {10.1007/978-3-642-28496-0\_4},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/LoftusMSV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/PinkasSS11,
  author       = {Benny Pinkas and
                  Ahmad{-}Reza Sadeghi and
                  Nigel P. Smart},
  title        = {Secure Computing in the Cloud (Dagstuhl Seminar 11491)},
  journal      = {Dagstuhl Reports},
  volume       = {1},
  number       = {12},
  pages        = {1--10},
  year         = {2011},
  url          = {https://doi.org/10.4230/DagRep.1.12.1},
  doi          = {10.4230/DAGREP.1.12.1},
  timestamp    = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dagstuhl-reports/PinkasSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SmartV11,
  author       = {Nigel P. Smart and
                  Frederik Vercauteren},
  title        = {Fully Homomorphic {SIMD} Operations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {133},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/133},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SmartV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KleinjungLPS11,
  author       = {Thorsten Kleinjung and
                  Arjen K. Lenstra and
                  Dan Page and
                  Nigel P. Smart},
  title        = {Using the Cloud to Determine Key Strengths},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {254},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/254},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KleinjungLPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SchollS11,
  author       = {Peter Scholl and
                  Nigel P. Smart},
  title        = {Improved Key Generation For Gentry's Fully Homomorphic Encryption
                  Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {471},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/471},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SchollS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardPSZ11,
  author       = {Ivan Damg{\aa}rd and
                  Valerio Pastro and
                  Nigel P. Smart and
                  Sarah Zakarias},
  title        = {Multiparty Computation from Somewhat Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {535},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/535},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardPSZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GentryHS11,
  author       = {Craig Gentry and
                  Shai Halevi and
                  Nigel P. Smart},
  title        = {Fully Homomorphic Encryption with Polylog Overhead},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {566},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/566},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GentryHS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DegabrieleLPSS11,
  author       = {Jean Paul Degabriele and
                  Anja Lehmann and
                  Kenneth G. Paterson and
                  Nigel P. Smart and
                  Mario Strefler},
  title        = {On the Joint Security of Encryption and Signature in {EMV}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {615},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/615},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DegabrieleLPSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernhardFGSW11,
  author       = {David Bernhard and
                  Georg Fuchsbauer and
                  Essam Ghadafi and
                  Nigel P. Smart and
                  Bogdan Warinschi},
  title        = {Anonymous attestation with user-controlled linkability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {658},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/658},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernhardFGSW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GentryHS11a,
  author       = {Craig Gentry and
                  Shai Halevi and
                  Nigel P. Smart},
  title        = {Better Bootstrapping in Fully Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {680},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/680},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GentryHS11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/MorrisseySW10,
  author       = {Paul Morrissey and
                  Nigel P. Smart and
                  Bogdan Warinschi},
  title        = {The {TLS} Handshake Protocol: {A} Modular Analysis},
  journal      = {J. Cryptol.},
  volume       = {23},
  number       = {2},
  pages        = {187--223},
  year         = {2010},
  url          = {https://doi.org/10.1007/s00145-009-9052-3},
  doi          = {10.1007/S00145-009-9052-3},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/MorrisseySW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/ChenPS10,
  author       = {Liqun Chen and
                  Dan Page and
                  Nigel P. Smart},
  editor       = {Dieter Gollmann and
                  Jean{-}Louis Lanet and
                  Julien Iguchi{-}Cartigny},
  title        = {On the Design and Implementation of an Efficient {DAA} Scheme},
  booktitle    = {Smart Card Research and Advanced Application, 9th {IFIP} {WG} 8.8/11.2
                  International Conference, {CARDIS} 2010, Passau, Germany, April 14-16,
                  2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6035},
  pages        = {223--237},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12510-2\_16},
  doi          = {10.1007/978-3-642-12510-2\_16},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/ChenPS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/Smart10,
  author       = {Nigel P. Smart},
  editor       = {Josef Pieprzyk},
  title        = {Errors Matter: Breaking RSA-Based {PIN} Encryption with Thirty Ciphertext
                  Validity Queries},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2010, The Cryptographers' Track at
                  the {RSA} Conference 2010, San Francisco, CA, USA, March 1-5, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5985},
  pages        = {15--25},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11925-5\_2},
  doi          = {10.1007/978-3-642-11925-5\_2},
  timestamp    = {Sun, 02 Jun 2019 21:22:43 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/Smart10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pairing/FioreGS10,
  author       = {Dario Fiore and
                  Rosario Gennaro and
                  Nigel P. Smart},
  editor       = {Marc Joye and
                  Atsuko Miyaji and
                  Akira Otsuka},
  title        = {Constructing Certificateless Encryption and ID-Based Encryption from
                  ID-Based Key Agreement},
  booktitle    = {Pairing-Based Cryptography - Pairing 2010 - 4th International Conference,
                  Yamanaka Hot Spring, Japan, December 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6487},
  pages        = {167--186},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17455-1\_11},
  doi          = {10.1007/978-3-642-17455-1\_11},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pairing/FioreGS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GhadafiSW10,
  author       = {Essam Ghadafi and
                  Nigel P. Smart and
                  Bogdan Warinschi},
  editor       = {Phong Q. Nguyen and
                  David Pointcheval},
  title        = {Groth-Sahai Proofs Revisited},
  booktitle    = {Public Key Cryptography - {PKC} 2010, 13th International Conference
                  on Practice and Theory in Public Key Cryptography, Paris, France,
                  May 26-28, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6056},
  pages        = {177--192},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13013-7\_11},
  doi          = {10.1007/978-3-642-13013-7\_11},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/GhadafiSW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/SmartV10,
  author       = {Nigel P. Smart and
                  Frederik Vercauteren},
  editor       = {Phong Q. Nguyen and
                  David Pointcheval},
  title        = {Fully Homomorphic Encryption with Relatively Small Key and Ciphertext
                  Sizes},
  booktitle    = {Public Key Cryptography - {PKC} 2010, 13th International Conference
                  on Practice and Theory in Public Key Cryptography, Paris, France,
                  May 26-28, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6056},
  pages        = {420--443},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13013-7\_25},
  doi          = {10.1007/978-3-642-13013-7\_25},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/SmartV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/LeeSW10,
  author       = {Ming{-}Feng Lee and
                  Nigel P. Smart and
                  Bogdan Warinschi},
  editor       = {Juan A. Garay and
                  Roberto De Prisco},
  title        = {The Fiat-Shamir Transform for Group and Ring Signature Schemes},
  booktitle    = {Security and Cryptography for Networks, 7th International Conference,
                  {SCN} 2010, Amalfi, Italy, September 13-15, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6280},
  pages        = {363--380},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15317-4\_23},
  doi          = {10.1007/978-3-642-15317-4\_23},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/LeeSW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/BichselCNSW10,
  author       = {Patrik Bichsel and
                  Jan Camenisch and
                  Gregory Neven and
                  Nigel P. Smart and
                  Bogdan Warinschi},
  editor       = {Juan A. Garay and
                  Roberto De Prisco},
  title        = {Get Shorty via Group Signatures without Encryption},
  booktitle    = {Security and Cryptography for Networks, 7th International Conference,
                  {SCN} 2010, Amalfi, Italy, September 13-15, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6280},
  pages        = {381--398},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15317-4\_24},
  doi          = {10.1007/978-3-642-15317-4\_24},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/BichselCNSW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeeSW10,
  author       = {Ming{-}Feng Lee and
                  Nigel P. Smart and
                  Bogdan Warinschi},
  title        = {The Fiat-Shamir Transform for Group and Ring Signature Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {358},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/358},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeeSW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LoftusMSV10,
  author       = {Jake Loftus and
                  Alexander May and
                  Nigel P. Smart and
                  Frederik Vercauteren},
  title        = {On CCA-Secure Fully Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {560},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/560},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LoftusMSV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GhadafiS10,
  author       = {Essam Ghadafi and
                  Nigel P. Smart},
  title        = {Efficient Two-Move Blind Signatures in the Common Reference String
                  Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {568},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/568},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GhadafiS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/NevenSW09,
  author       = {Gregory Neven and
                  Nigel P. Smart and
                  Bogdan Warinschi},
  title        = {Hash function requirements for Schnorr signatures},
  journal      = {J. Math. Cryptol.},
  volume       = {3},
  number       = {1},
  pages        = {69--87},
  year         = {2009},
  url          = {https://doi.org/10.1515/JMC.2009.004},
  doi          = {10.1515/JMC.2009.004},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/NevenSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/PinkasSSW09,
  author       = {Benny Pinkas and
                  Thomas Schneider and
                  Nigel P. Smart and
                  Stephen C. Williams},
  editor       = {Mitsuru Matsui},
  title        = {Secure Two-Party Computation Is Practical},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {250--267},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_15},
  doi          = {10.1007/978-3-642-10366-7\_15},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/PinkasSSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ChenMSW09,
  author       = {Liqun Chen and
                  Paul Morrissey and
                  Nigel P. Smart and
                  Bogdan Warinschi},
  editor       = {Mitsuru Matsui},
  title        = {Security Notions and Generic Constructions for Client Puzzles},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {505--523},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_30},
  doi          = {10.1007/978-3-642-10366-7\_30},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ChenMSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/GeislerS09,
  author       = {Martin Geisler and
                  Nigel P. Smart},
  editor       = {Matthew Geoffrey Parker},
  title        = {Distributing the Key Distribution Centre in Sakai-Kasahara Based Systems},
  booktitle    = {Cryptography and Coding, 12th {IMA} International Conference, Cryptography
                  and Coding 2009, Cirencester, UK, December 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5921},
  pages        = {252--262},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10868-6\_15},
  doi          = {10.1007/978-3-642-10868-6\_15},
  timestamp    = {Wed, 01 Sep 2021 10:36:08 +0200},
  biburl       = {https://dblp.org/rec/conf/ima/GeislerS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/GhadafiSW09,
  author       = {Essam Ghadafi and
                  Nigel P. Smart and
                  Bogdan Warinschi},
  editor       = {Matthew Geoffrey Parker},
  title        = {Practical Zero-Knowledge Proofs for Circuit Evaluation},
  booktitle    = {Cryptography and Coding, 12th {IMA} International Conference, Cryptography
                  and Coding 2009, Cirencester, UK, December 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5921},
  pages        = {469--494},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10868-6\_28},
  doi          = {10.1007/978-3-642-10868-6\_28},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/GhadafiSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pairing/SmartW09,
  author       = {Nigel P. Smart and
                  Bogdan Warinschi},
  editor       = {Hovav Shacham and
                  Brent Waters},
  title        = {Identity Based Group Signatures from Hierarchical Identity-Based Encryption},
  booktitle    = {Pairing-Based Cryptography - Pairing 2009, Third International Conference,
                  Palo Alto, CA, USA, August 12-14, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5671},
  pages        = {150--170},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03298-1\_11},
  doi          = {10.1007/978-3-642-03298-1\_11},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/pairing/SmartW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SmartW09,
  author       = {Nigel P. Smart and
                  Bogdan Warinschi},
  title        = {Identity Based Group Signatures from Hierarchical Identity-Based Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {313},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/313},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SmartW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Pinkas0SW09,
  author       = {Benny Pinkas and
                  Thomas Schneider and
                  Nigel P. Smart and
                  Stephen C. Williams},
  title        = {Secure Two-Party Computation is Practical},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {314},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/314},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Pinkas0SW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Smart09,
  author       = {Nigel P. Smart},
  title        = {Breaking RSA-based {PIN} Encryption with thirty ciphertext validity
                  queries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {315},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/315},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Smart09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenMSW09,
  author       = {Liqun Chen and
                  Paul Morrissey and
                  Nigel P. Smart and
                  Bogdan Warinschi},
  title        = {Security Notions and Generic Constructions for Client Puzzles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {331},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/331},
  timestamp    = {Thu, 28 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenMSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SmartV09,
  author       = {Nigel P. Smart and
                  Frederik Vercauteren},
  title        = {Fully Homomorphic Encryption with Relatively Small Key and Ciphertext
                  Sizes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {571},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/571},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SmartV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenPS09,
  author       = {Liqun Chen and
                  Dan Page and
                  Nigel P. Smart},
  title        = {On the Design and Implementation of an Efficient {DAA} Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {598},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/598},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenPS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GhadafiSW09,
  author       = {Essam Ghadafi and
                  Nigel P. Smart and
                  Bogdan Warinschi},
  title        = {Groth-Sahai proofs revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {599},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/599},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GhadafiSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FioreGS09,
  author       = {Dario Fiore and
                  Rosario Gennaro and
                  Nigel P. Smart},
  title        = {Constructing Certificateless Encryption and ID-Based Encryption from
                  ID-Based Key Agreement},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {600},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/600},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FioreGS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dam/GalbraithPS08,
  author       = {Steven D. Galbraith and
                  Kenneth G. Paterson and
                  Nigel P. Smart},
  title        = {Pairings for cryptographers},
  journal      = {Discret. Appl. Math.},
  volume       = {156},
  number       = {16},
  pages        = {3113--3121},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.dam.2007.12.010},
  doi          = {10.1016/J.DAM.2007.12.010},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dam/GalbraithPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/SmartOP08,
  author       = {Nigel P. Smart and
                  Elisabeth Oswald and
                  Daniel Page},
  title        = {Randomised representations},
  journal      = {{IET} Inf. Secur.},
  volume       = {2},
  number       = {2},
  pages        = {19--27},
  year         = {2008},
  url          = {https://doi.org/10.1049/iet-ifs:20070017},
  doi          = {10.1049/IET-IFS:20070017},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/SmartOP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BentaharFMS08,
  author       = {Kamel Bentahar and
                  Pooya Farshim and
                  John Malone{-}Lee and
                  Nigel P. Smart},
  title        = {Generic Constructions of Identity-Based and Certificateless KEMs},
  journal      = {J. Cryptol.},
  volume       = {21},
  number       = {2},
  pages        = {178--199},
  year         = {2008},
  url          = {https://doi.org/10.1007/s00145-007-9000-z},
  doi          = {10.1007/S00145-007-9000-Z},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BentaharFMS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jucs/ChenSWWDLMMMPPS08,
  author       = {Liqun Chen and
                  Willy Susilo and
                  Huaxiong Wang and
                  Duncan S. Wong and
                  Ed Dawson and
                  Xuejia Lai and
                  Masahiro Mambo and
                  Atsuko Miyaji and
                  Yi Mu and
                  David Pointcheval and
                  Bart Preneel and
                  Nigel P. Smart},
  title        = {Cryptography in Computer System Security},
  journal      = {J. Univers. Comput. Sci.},
  volume       = {14},
  number       = {3},
  pages        = {314--317},
  year         = {2008},
  url          = {http://www.jucs.org/jucs\_14\_3/cryptography\_in\_computer\_system},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jucs/ChenSWWDLMMMPPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/MorrisseySW08,
  author       = {Paul Morrissey and
                  Nigel P. Smart and
                  Bogdan Warinschi},
  editor       = {Josef Pieprzyk},
  title        = {A Modular Security Analysis of the {TLS} Handshake Protocol},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2008, 14th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Melbourne, Australia, December 7-11, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5350},
  pages        = {55--73},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89255-7\_5},
  doi          = {10.1007/978-3-540-89255-7\_5},
  timestamp    = {Sun, 02 Jun 2019 21:16:53 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/MorrisseySW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pairing/ChenMS08,
  author       = {Liqun Chen and
                  Paul Morrissey and
                  Nigel P. Smart},
  editor       = {Steven D. Galbraith and
                  Kenneth G. Paterson},
  title        = {Pairings in Trusted Computing},
  booktitle    = {Pairing-Based Cryptography - Pairing 2008, Second International Conference,
                  Egham, UK, September 1-3, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5209},
  pages        = {1--17},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85538-5\_1},
  doi          = {10.1007/978-3-540-85538-5\_1},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pairing/ChenMS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/ChenMS08,
  author       = {Liqun Chen and
                  Paul Morrissey and
                  Nigel P. Smart},
  editor       = {Joonsang Baek and
                  Feng Bao and
                  Kefei Chen and
                  Xuejia Lai},
  title        = {On Proofs of Security for {DAA} Schemes},
  booktitle    = {Provable Security, Second International Conference, ProvSec 2008,
                  Shanghai, China, October 30 - November 1, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5324},
  pages        = {156--175},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88733-1\_11},
  doi          = {10.1007/978-3-540-88733-1\_11},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/ChenMS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/LindellPS08,
  author       = {Yehuda Lindell and
                  Benny Pinkas and
                  Nigel P. Smart},
  editor       = {Rafail Ostrovsky and
                  Roberto De Prisco and
                  Ivan Visconti},
  title        = {Implementing Two-Party Computation Efficiently with Security Against
                  Malicious Adversaries},
  booktitle    = {Security and Cryptography for Networks, 6th International Conference,
                  {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5229},
  pages        = {2--20},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85855-3\_2},
  doi          = {10.1007/978-3-540-85855-3\_2},
  timestamp    = {Tue, 25 Feb 2020 11:33:46 +0100},
  biburl       = {https://dblp.org/rec/conf/scn/LindellPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2008,
  editor       = {Nigel P. Smart},
  title        = {Advances in Cryptology - {EUROCRYPT} 2008, 27th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Istanbul, Turkey, April 13-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4965},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78967-3},
  doi          = {10.1007/978-3-540-78967-3},
  isbn         = {978-3-540-78966-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MorrisseySW08,
  author       = {Paul Morrissey and
                  Nigel P. Smart and
                  Bogdan Warinschi},
  title        = {A Modular Security Analysis of the {TLS} Handshake Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {236},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/236},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MorrisseySW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dam/SmartV07,
  author       = {Nigel P. Smart and
                  Frederik Vercauteren},
  title        = {On computable isomorphisms in efficient asymmetric pairing-based systems},
  journal      = {Discret. Appl. Math.},
  volume       = {155},
  number       = {4},
  pages        = {538--547},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.dam.2006.07.004},
  doi          = {10.1016/J.DAM.2006.07.004},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dam/SmartV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ChenCS07,
  author       = {Liqun Chen and
                  Zhaohui Cheng and
                  Nigel P. Smart},
  title        = {Identity-based key agreement protocols from pairings},
  journal      = {Int. J. Inf. Sec.},
  volume       = {6},
  number       = {4},
  pages        = {213--241},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10207-006-0011-9},
  doi          = {10.1007/S10207-006-0011-9},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/ChenCS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/moc/TourignyS07,
  author       = {Yves Tourigny and
                  Nigel P. Smart},
  title        = {A multidimensional continued fraction based on a high-order recurrence
                  relation},
  journal      = {Math. Comput.},
  volume       = {76},
  number       = {260},
  pages        = {1995--2022},
  year         = {2007},
  url          = {https://doi.org/10.1090/S0025-5718-07-02020-0},
  doi          = {10.1090/S0025-5718-07-02020-0},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/moc/TourignyS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/LeadbitterPS07,
  author       = {Peter James Leadbitter and
                  Dan Page and
                  Nigel P. Smart},
  title        = {Nondeterministic Multithreading},
  journal      = {{IEEE} Trans. Computers},
  volume       = {56},
  number       = {7},
  pages        = {992--998},
  year         = {2007},
  url          = {https://doi.org/10.1109/TC.2007.1049},
  doi          = {10.1109/TC.2007.1049},
  timestamp    = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/LeadbitterPS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/BjorstadDS07,
  author       = {Tor E. Bj{\o}rstad and
                  Alexander W. Dent and
                  Nigel P. Smart},
  editor       = {Steven D. Galbraith},
  title        = {Efficient KEMs with Partial Message Recovery},
  booktitle    = {Cryptography and Coding, 11th {IMA} International Conference, Cirencester,
                  UK, December 18-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4887},
  pages        = {233--256},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77272-9\_15},
  doi          = {10.1007/978-3-540-77272-9\_15},
  timestamp    = {Wed, 18 Mar 2020 16:00:59 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/BjorstadDS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/BentaharS07,
  author       = {Kamel Bentahar and
                  Nigel P. Smart},
  editor       = {Steven D. Galbraith},
  title        = {Efficient 15, 360-bit {RSA} Using Woop-Optimised Montgomery Arithmetic},
  booktitle    = {Cryptography and Coding, 11th {IMA} International Conference, Cirencester,
                  UK, December 18-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4887},
  pages        = {346--363},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77272-9\_21},
  doi          = {10.1007/978-3-540-77272-9\_21},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/BentaharS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/MossPS07,
  author       = {Andrew Moss and
                  Dan Page and
                  Nigel P. Smart},
  editor       = {Steven D. Galbraith},
  title        = {Toward Acceleration of {RSA} Using 3D Graphics Hardware},
  booktitle    = {Cryptography and Coding, 11th {IMA} International Conference, Cirencester,
                  UK, December 18-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4887},
  pages        = {364--383},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77272-9\_22},
  doi          = {10.1007/978-3-540-77272-9\_22},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/MossPS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AbdallaDMNPS07,
  author       = {Michel Abdalla and
                  Alexander W. Dent and
                  John Malone{-}Lee and
                  Gregory Neven and
                  Duong Hieu Phan and
                  Nigel P. Smart},
  editor       = {Tatsuaki Okamoto and
                  Xiaoyun Wang},
  title        = {Identity-Based Traitor Tracing},
  booktitle    = {Public Key Cryptography - {PKC} 2007, 10th International Conference
                  on Practice and Theory in Public-Key Cryptography, Beijing, China,
                  April 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4450},
  pages        = {361--376},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71677-8\_24},
  doi          = {10.1007/978-3-540-71677-8\_24},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AbdallaDMNPS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MossPS07,
  author       = {Andrew Moss and
                  Dan Page and
                  Nigel P. Smart},
  title        = {Executing Modular Exponentiation on a Graphics Accelerator},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {187},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/187},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MossPS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/Al-RiyamiMS06,
  author       = {Sattam S. Al{-}Riyami and
                  John Malone{-}Lee and
                  Nigel P. Smart},
  title        = {Escrow-free encryption supporting cryptographic workflow},
  journal      = {Int. J. Inf. Sec.},
  volume       = {5},
  number       = {4},
  pages        = {217--229},
  year         = {2006},
  url          = {https://doi.org/10.1007/s10207-006-0002-x},
  doi          = {10.1007/S10207-006-0002-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/Al-RiyamiMS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/HessSV06,
  author       = {Florian Hess and
                  Nigel P. Smart and
                  Frederik Vercauteren},
  title        = {The Eta Pairing Revisited},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {52},
  number       = {10},
  pages        = {4595--4602},
  year         = {2006},
  url          = {https://doi.org/10.1109/TIT.2006.881709},
  doi          = {10.1109/TIT.2006.881709},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/HessSV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ants/GrangerPS06,
  author       = {Robert Granger and
                  Dan Page and
                  Nigel P. Smart},
  editor       = {Florian Hess and
                  Sebastian Pauli and
                  Michael E. Pohst},
  title        = {High Security Pairing-Based Cryptography Revisited},
  booktitle    = {Algorithmic Number Theory, 7th International Symposium, ANTS-VII,
                  Berlin, Germany, July 23-28, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4076},
  pages        = {480--494},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11792086\_34},
  doi          = {10.1007/11792086\_34},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ants/GrangerPS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/JouxLSV06,
  author       = {Antoine Joux and
                  Reynald Lercier and
                  Nigel P. Smart and
                  Frederik Vercauteren},
  editor       = {Cynthia Dwork},
  title        = {The Number Field Sieve in the Medium Prime Case},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2006, 26th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 20-24,
                  2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4117},
  pages        = {326--344},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11818175\_19},
  doi          = {10.1007/11818175\_19},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/JouxLSV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/AbdallaCDMNS06,
  author       = {Michel Abdalla and
                  Dario Catalano and
                  Alexander W. Dent and
                  John Malone{-}Lee and
                  Gregory Neven and
                  Nigel P. Smart},
  editor       = {Michele Bugliesi and
                  Bart Preneel and
                  Vladimiro Sassone and
                  Ingo Wegener},
  title        = {Identity-Based Encryption Gone Wild},
  booktitle    = {Automata, Languages and Programming, 33rd International Colloquium,
                  {ICALP} 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4052},
  pages        = {300--311},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11787006\_26},
  doi          = {10.1007/11787006\_26},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/AbdallaCDMNS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrangerPS06,
  author       = {Robert Granger and
                  Dan Page and
                  Nigel P. Smart},
  title        = {High Security Pairing-Based Cryptography Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {59},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/059},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrangerPS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HessSV06,
  author       = {Florian Hess and
                  Nigel P. Smart and
                  Frederik Vercauteren},
  title        = {The Eta Pairing Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {110},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/110},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HessSV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithPS06,
  author       = {Steven D. Galbraith and
                  Kenneth G. Paterson and
                  Nigel P. Smart},
  title        = {Pairings for Cryptographers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {165},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/165},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithPS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrangerS06,
  author       = {Robert Granger and
                  Nigel P. Smart},
  title        = {On Computing Products of Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {172},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/172},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrangerS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenCS06a,
  author       = {Liqun Chen and
                  Zhaohui Cheng and
                  Nigel P. Smart},
  title        = {Identity-based Key Agreement Protocols From Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {199},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/199},
  timestamp    = {Sat, 28 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenCS06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaCDMNS06,
  author       = {Michel Abdalla and
                  Dario Catalano and
                  Alexander W. Dent and
                  John Malone{-}Lee and
                  Gregory Neven and
                  Nigel P. Smart},
  title        = {Identity-Based Encryption Gone Wild},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {304},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/304},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaCDMNS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GreenNS05,
  author       = {P. J. Green and
                  Richard Noad and
                  Nigel P. Smart},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {Further Hidden Markov Model Cryptanalysis},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {61--74},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_5},
  doi          = {10.1007/11545262\_5},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GreenNS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/DodsSS05,
  author       = {C. Dods and
                  Nigel P. Smart and
                  Martijn Stam},
  editor       = {Nigel P. Smart},
  title        = {Hash Based Digital Signature Schemes},
  booktitle    = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester,
                  UK, December 19-21, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3796},
  pages        = {96--115},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11586821\_8},
  doi          = {10.1007/11586821\_8},
  timestamp    = {Wed, 18 Mar 2020 16:00:57 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/DodsSS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ima/2005,
  editor       = {Nigel P. Smart},
  title        = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester,
                  UK, December 19-21, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3796},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11586821},
  doi          = {10.1007/11586821},
  isbn         = {3-540-30276-X},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BentaharFMS05,
  author       = {Kamel Bentahar and
                  Pooya Farshim and
                  John Malone{-}Lee and
                  Nigel P. Smart},
  title        = {Generic Constructions of Identity-Based and Certificateless KEMs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {58},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/058},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BentaharFMS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SmartV05,
  author       = {Nigel P. Smart and
                  Frederik Vercauteren},
  title        = {On Computable Isomorphisms in Efficient Asymmetric Pairing Based Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {116},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/116},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SmartV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarbosaNPS05,
  author       = {Manuel Barbosa and
                  Richard Noad and
                  Daniel Page and
                  Nigel P. Smart},
  title        = {First Steps Toward a Cryptography-Aware Language and Compiler},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {160},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/160},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarbosaNPS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenCMS05,
  author       = {Liqun Chen and
                  Zhaohui Cheng and
                  John Malone{-}Lee and
                  Nigel P. Smart},
  title        = {An Efficient {ID-KEM} Based On The Sakai-Kasahara Key Construction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {224},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/224},
  timestamp    = {Sat, 28 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenCMS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MenezesS04,
  author       = {Alfred Menezes and
                  Nigel P. Smart},
  title        = {Security of Signature Schemes in a Multi-User Setting},
  journal      = {Des. Codes Cryptogr.},
  volume       = {33},
  number       = {3},
  pages        = {261--274},
  year         = {2004},
  url          = {https://doi.org/10.1023/B:DESI.0000036250.18062.3f},
  doi          = {10.1023/B:DESI.0000036250.18062.3F},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/MenezesS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/lmsjcm/MuzereauSV04,
  author       = {A. Muzereau and
                  Nigel P. Smart and
                  Frederik Vercauteren},
  title        = {The Equivalence between the {DHP} and {DLP} for Elliptic Curves Used
                  in Practical Applications},
  journal      = {{LMS} J. Comput. Math.},
  volume       = {7},
  pages        = {50--72},
  year         = {2004},
  url          = {https://doi.org/10.1112/s1461157000001042},
  doi          = {10.1112/S1461157000001042},
  timestamp    = {Wed, 03 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/lmsjcm/MuzereauSV04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/PageS04,
  author       = {Dan Page and
                  Nigel P. Smart},
  title        = {Parallel Cryptographic Arithmetic Using a Redundant Montgomery Representation},
  journal      = {{IEEE} Trans. Computers},
  volume       = {53},
  number       = {11},
  pages        = {1474--1482},
  year         = {2004},
  url          = {https://doi.org/10.1109/TC.2004.100},
  doi          = {10.1109/TC.2004.100},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/PageS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ants/GrangerHPSV04,
  author       = {Robert Granger and
                  Andrew J. Holt and
                  Dan Page and
                  Nigel P. Smart and
                  Frederik Vercauteren},
  editor       = {Duncan A. Buell},
  title        = {Function Field Sieve in Characteristic Three},
  booktitle    = {Algorithmic Number Theory, 6th International Symposium, ANTS-VI, Burlington,
                  VT, USA, June 13-18, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3076},
  pages        = {223--234},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24847-7\_16},
  doi          = {10.1007/978-3-540-24847-7\_16},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ants/GrangerHPSV04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/LeadbitterPS04,
  author       = {Peter James Leadbitter and
                  Dan Page and
                  Nigel P. Smart},
  editor       = {Marc Joye and
                  Jean{-}Jacques Quisquater},
  title        = {Attacking {DSA} Under a Repeated Bits Assumption},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International
                  Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3156},
  pages        = {428--440},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28632-5\_31},
  doi          = {10.1007/978-3-540-28632-5\_31},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/LeadbitterPS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/NaccacheSS04,
  author       = {David Naccache and
                  Nigel P. Smart and
                  Jacques Stern},
  editor       = {Christian Cachin and
                  Jan Camenisch},
  title        = {Projective Coordinates Leak},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Interlaken,
                  Switzerland, May 2-6, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3027},
  pages        = {257--267},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24676-3\_16},
  doi          = {10.1007/978-3-540-24676-3\_16},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/NaccacheSS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/Smart04,
  author       = {Nigel P. Smart},
  editor       = {Carlo Blundo and
                  Stelvio Cimato},
  title        = {Efficient Key Encapsulation to Multiple Parties},
  booktitle    = {Security in Communication Networks, 4th International Conference,
                  {SCN} 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3352},
  pages        = {208--219},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30598-9\_15},
  doi          = {10.1007/978-3-540-30598-9\_15},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/Smart04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/SilvermanSV04,
  author       = {Joseph H. Silverman and
                  Nigel P. Smart and
                  Frederik Vercauteren},
  editor       = {Carlo Blundo and
                  Stelvio Cimato},
  title        = {An Algebraic Approach to {NTRU} (q = 2n) via Witt Vectors and Overdetermined
                  Systems of Nonlinear Equations},
  booktitle    = {Security in Communication Networks, 4th International Conference,
                  {SCN} 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3352},
  pages        = {278--293},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30598-9\_20},
  doi          = {10.1007/978-3-540-30598-9\_20},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/SilvermanSV04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PageSV04,
  author       = {Dan Page and
                  Nigel P. Smart and
                  Frederik Vercauteren},
  title        = {A comparison of {MNT} curves and supersingular curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {165},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/165},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PageSV04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Al-RiyamiMS04,
  author       = {Sattam S. Al{-}Riyami and
                  John Malone{-}Lee and
                  Nigel P. Smart},
  title        = {Escrow-Free Encryption Supporting Cryptographic Workflow},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {258},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/258},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Al-RiyamiMS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aaecc/SmartW03,
  author       = {Nigel P. Smart and
                  E. J. Westwood},
  title        = {Point Multiplication on Ordinary Elliptic Curves over Fields of Characteristic
                  Three},
  journal      = {Appl. Algebra Eng. Commun. Comput.},
  volume       = {13},
  number       = {6},
  pages        = {485--497},
  year         = {2003},
  url          = {https://doi.org/10.1007/s00200-002-0114-0},
  doi          = {10.1007/S00200-002-0114-0},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/aaecc/SmartW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Smart03,
  author       = {Nigel P. Smart},
  editor       = {Colin D. Walter and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {An Analysis of Goubin's Refined Power Analysis Attack},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International
                  Workshop, Cologne, Germany, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2779},
  pages        = {281--290},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45238-6\_23},
  doi          = {10.1007/978-3-540-45238-6\_23},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Smart03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/Smart03,
  author       = {Nigel P. Smart},
  editor       = {Marc Joye},
  title        = {Access Control Using Pairing Based Cryptography},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2003, The Cryptographers' Track at
                  the {RSA} Conference 2003, San Francisco, CA, USA, April 13-17, 2003,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2612},
  pages        = {111--121},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36563-X\_8},
  doi          = {10.1007/3-540-36563-X\_8},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/Smart03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/GeisslerS03,
  author       = {Katharina Gei{\ss}ler and
                  Nigel P. Smart},
  editor       = {Kenneth G. Paterson},
  title        = {Computing the {M} = {U} U\({}^{\mbox{t}}\) Integer Matrix Decomposition},
  booktitle    = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester,
                  UK, December 16-18, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2898},
  pages        = {223--233},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40974-8\_18},
  doi          = {10.1007/978-3-540-40974-8\_18},
  timestamp    = {Wed, 18 Mar 2020 16:01:02 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/GeisslerS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/BarnettS03,
  author       = {Adam Barnett and
                  Nigel P. Smart},
  editor       = {Kenneth G. Paterson},
  title        = {Mental Poker Revisited},
  booktitle    = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester,
                  UK, December 16-18, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2898},
  pages        = {370--383},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40974-8\_29},
  doi          = {10.1007/978-3-540-40974-8\_29},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/BarnettS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/LeadbitterS03,
  author       = {Peter James Leadbitter and
                  Nigel P. Smart},
  editor       = {Colin Boyd and
                  Wenbo Mao},
  title        = {Analysis of the Insecurity of {ECMQV} with Partially Known Nonces},
  booktitle    = {Information Security, 6th International Conference, {ISC} 2003, Bristol,
                  UK, October 1-3, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2851},
  pages        = {240--251},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/10958513\_19},
  doi          = {10.1007/10958513\_19},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/LeadbitterS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaccacheSS03,
  author       = {David Naccache and
                  Nigel P. Smart and
                  Jacques Stern},
  title        = {Projective Coordinates Leak},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {191},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/191},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NaccacheSS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/GalbraithMS02,
  author       = {Steven D. Galbraith and
                  John Malone{-}Lee and
                  Nigel P. Smart},
  title        = {Public key signatures in the multi-user setting},
  journal      = {Inf. Process. Lett.},
  volume       = {83},
  number       = {5},
  pages        = {263--266},
  year         = {2002},
  url          = {https://doi.org/10.1016/S0020-0190(01)00338-6},
  doi          = {10.1016/S0020-0190(01)00338-6},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/GalbraithMS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/GaudryHS02,
  author       = {Pierrick Gaudry and
                  Florian Hess and
                  Nigel P. Smart},
  title        = {Constructive and Destructive Facets of Weil Descent on Elliptic Curves},
  journal      = {J. Cryptol.},
  volume       = {15},
  number       = {1},
  pages        = {19--46},
  year         = {2002},
  url          = {https://doi.org/10.1007/s00145-001-0011-x},
  doi          = {10.1007/S00145-001-0011-X},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/GaudryHS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/lmsjcm/HarrisonPS02,
  author       = {Keith Harrison and
                  Dan Page and
                  Nigel P. Smart},
  title        = {Software Implementation of Finite Fields of Characteristic Three,
                  for Use in Pairing-based Cryptosystems},
  journal      = {{LMS} J. Comput. Math.},
  volume       = {5},
  pages        = {181--193},
  year         = {2002},
  url          = {https://doi.org/10.1112/s1461157000000747},
  doi          = {10.1112/S1461157000000747},
  timestamp    = {Fri, 05 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/lmsjcm/HarrisonPS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/moc/GalbraithPS02,
  author       = {Steven D. Galbraith and
                  Sachar M. Paulus and
                  Nigel P. Smart},
  title        = {Arithmetic on superelliptic curves},
  journal      = {Math. Comput.},
  volume       = {71},
  number       = {237},
  pages        = {393--405},
  year         = {2002},
  url          = {https://doi.org/10.1090/S0025-5718-00-01297-7},
  doi          = {10.1090/S0025-5718-00-01297-7},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/moc/GalbraithPS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asap/IrwinPS02,
  author       = {James Irwin and
                  Dan Page and
                  Nigel P. Smart},
  title        = {Instruction Stream Mutation for Non-Deterministic Processors},
  booktitle    = {13th {IEEE} International Conference on Application-Specific Systems,
                  Architectures, and Processors {(ASAP} 2002), 17-19 July 2002, San
                  Jose, CA, {USA}},
  pages        = {286--295},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/ASAP.2002.1030727},
  doi          = {10.1109/ASAP.2002.1030727},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asap/IrwinPS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/PageS02,
  author       = {Dan Page and
                  Nigel P. Smart},
  editor       = {Burton S. Kaliski Jr. and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Hardware Implementation of Finite Fields of Characteristic Three},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International
                  Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2523},
  pages        = {529--539},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36400-5\_38},
  doi          = {10.1007/3-540-36400-5\_38},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/PageS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/SternPMS02,
  author       = {Jacques Stern and
                  David Pointcheval and
                  John Malone{-}Lee and
                  Nigel P. Smart},
  editor       = {Moti Yung},
  title        = {Flaws in Applying Proof Methodologies to Signature Schemes},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2002, 22nd Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 18-22,
                  2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2442},
  pages        = {93--110},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45708-9\_7},
  doi          = {10.1007/3-540-45708-9\_7},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/SternPMS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GalbraithHS02,
  author       = {Steven D. Galbraith and
                  Florian Hess and
                  Nigel P. Smart},
  editor       = {Lars R. Knudsen},
  title        = {Extending the {GHS} Weil Descent Attack},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2002, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Amsterdam,
                  The Netherlands, April 28 - May 2, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2332},
  pages        = {29--44},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-46035-7\_3},
  doi          = {10.1007/3-540-46035-7\_3},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GalbraithHS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infrasec/ChenHSS02,
  author       = {Liqun Chen and
                  Keith Harrison and
                  David Soldera and
                  Nigel P. Smart},
  editor       = {George I. Davida and
                  Yair Frankel and
                  Owen Rees},
  title        = {Applications of Multiple Trust Authorities in Pairing Based Cryptosystems},
  booktitle    = {Infrastructure Security, International Conference, InfraSec 2002 Bristol,
                  UK, October 1-3, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2437},
  pages        = {260--275},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45831-X\_18},
  doi          = {10.1007/3-540-45831-X\_18},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infrasec/ChenHSS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/ChenHMSS02,
  author       = {Liqun Chen and
                  Keith Harrison and
                  Andrew Moss and
                  David Soldera and
                  Nigel P. Smart},
  editor       = {Agnes Hui Chan and
                  Virgil D. Gligor},
  title        = {Certification of Public Keys within an Identity Based System},
  booktitle    = {Information Security, 5th International Conference, {ISC} 2002 Sao
                  Paulo, Brazil, September 30 - October 2, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2433},
  pages        = {322--333},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45811-5\_25},
  doi          = {10.1007/3-540-45811-5\_25},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/ChenHMSS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/Malone-LeeS02,
  author       = {John Malone{-}Lee and
                  Nigel P. Smart},
  editor       = {Kaisa Nyberg and
                  Howard M. Heys},
  title        = {Modifications of {ECDSA}},
  booktitle    = {Selected Areas in Cryptography, 9th Annual International Workshop,
                  {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002.
                  Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2595},
  pages        = {1--12},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36492-7\_1},
  doi          = {10.1007/3-540-36492-7\_1},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/Malone-LeeS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SmartW02,
  author       = {Nigel P. Smart and
                  E. J. Westwood},
  title        = {Point Multiplication on Ordinary Elliptic Curves over Fields of Characteristic
                  Three},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {114},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/114},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SmartW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeadbitterS02,
  author       = {Peter James Leadbitter and
                  Nigel P. Smart},
  title        = {Cryptanalysis of {MQV} with partially known nonces},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {145},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/145},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeadbitterS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Howgrave-GrahamS01,
  author       = {Nick Howgrave{-}Graham and
                  Nigel P. Smart},
  title        = {Lattice Attacks on Digital Signature Schemes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {23},
  number       = {3},
  pages        = {283--290},
  year         = {2001},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Howgrave-GrahamS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/Smart01,
  author       = {Nigel P. Smart},
  title        = {A note on the x-coordinate of points on an elliptic curve in characteristic
                  two},
  journal      = {Inf. Process. Lett.},
  volume       = {80},
  number       = {5},
  pages        = {261--263},
  year         = {2001},
  url          = {https://doi.org/10.1016/S0020-0190(01)00169-7},
  doi          = {10.1016/S0020-0190(01)00169-7},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/Smart01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MayMS01,
  author       = {David May and
                  Henk L. Muller and
                  Nigel P. Smart},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Non-deterministic Processors},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {115--129},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_11},
  doi          = {10.1007/3-540-47719-5\_11},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/MayMS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/MayMS01,
  author       = {David May and
                  Henk L. Muller and
                  Nigel P. Smart},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  David Naccache and
                  Christof Paar},
  title        = {Random Register Renaming to Foil {DPA}},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2001, Third International
                  Workshop, Paris, France, May 14-16, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2162},
  pages        = {28--38},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44709-1\_4},
  doi          = {10.1007/3-540-44709-1\_4},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/MayMS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Smart01,
  author       = {Nigel P. Smart},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  David Naccache and
                  Christof Paar},
  title        = {The Hessian Form of an Elliptic Curve},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2001, Third International
                  Workshop, Paris, France, May 14-16, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2162},
  pages        = {118--125},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44709-1\_11},
  doi          = {10.1007/3-540-44709-1\_11},
  timestamp    = {Mon, 24 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/Smart01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/LiardetS01,
  author       = {Pierre{-}Yvan Liardet and
                  Nigel P. Smart},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  David Naccache and
                  Christof Paar},
  title        = {Preventing {SPA/DPA} in {ECC} Systems Using the Jacobi Form},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2001, Third International
                  Workshop, Paris, France, May 14-16, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2162},
  pages        = {391--401},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44709-1\_32},
  doi          = {10.1007/3-540-44709-1\_32},
  timestamp    = {Mon, 24 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/LiardetS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Smart01,
  author       = {Nigel P. Smart},
  editor       = {Birgit Pfitzmann},
  title        = {How Secure Are Elliptic Curves over Composite Extension Fields?},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2001, International Conference
                  on the Theory and Application of Cryptographic Techniques, Innsbruck,
                  Austria, May 6-10, 2001, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {2045},
  pages        = {30--39},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44987-6\_3},
  doi          = {10.1007/3-540-44987-6\_3},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Smart01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/Smart01,
  author       = {Nigel P. Smart},
  editor       = {Bahram Honary},
  title        = {The Exact Security of {ECIES} in the Generic Group Model},
  booktitle    = {Cryptography and Coding, 8th {IMA} International Conference, Cirencester,
                  UK, December 17-19, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2260},
  pages        = {73--84},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45325-3\_8},
  doi          = {10.1007/3-540-45325-3\_8},
  timestamp    = {Wed, 18 Mar 2020 16:01:01 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/Smart01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/HessSS01,
  author       = {Florian Hess and
                  Gadiel Seroussi and
                  Nigel P. Smart},
  editor       = {Serge Vaudenay and
                  Amr M. Youssef},
  title        = {Two Topics in Hyperelliptic Cryptography},
  booktitle    = {Selected Areas in Cryptography, 8th Annual International Workshop,
                  {SAC} 2001 Toronto, Ontario, Canada, August 16-17, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2259},
  pages        = {181--189},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45537-X\_14},
  doi          = {10.1007/3-540-45537-X\_14},
  timestamp    = {Tue, 01 Jun 2021 15:22:31 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/HessSS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithHS01,
  author       = {Steven D. Galbraith and
                  Florian Hess and
                  Nigel P. Smart},
  title        = {Extending the {GHS} Weil Descent Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {54},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/054},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithHS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Smart01,
  author       = {Nigel P. Smart},
  title        = {An Identity Based Authenticated Key Agreement Protocol Based on the
                  Weil Pairing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {111},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/111},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Smart01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sofo/Smart00,
  author       = {Nigel P. Smart},
  title        = {Physical side-channel attacks on cryptographic systems},
  journal      = {Softw. Focus},
  volume       = {1},
  number       = {2},
  pages        = {6--13},
  year         = {2000},
  url          = {https://doi.org/10.1002/1529-7950(200012)1:2\&\#60;6::AID-SWF10\&\#62;3.0.CO;2-W},
  doi          = {10.1002/1529-7950(200012)1:2\&\#60;6::AID-SWF10\&\#62;3.0.CO;2-W},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sofo/Smart00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iswc/SmartM00,
  author       = {Nigel P. Smart and
                  Henk L. Muller},
  title        = {A Wearable Public Key Infrastructure {(WPKI)}},
  booktitle    = {Fourth International Symposium on Wearable Computers {(ISWC} 2000),
                  Atlanta, Georgia, USA, 18-21 October 2000, Proceedings},
  pages        = {127--138},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ISWC.2000.888474},
  doi          = {10.1109/ISWC.2000.888474},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iswc/SmartM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/SmartS99,
  author       = {Nigel P. Smart and
                  Samir Siksek},
  title        = {A Fast Diffie-Hellman Protocol in Genus 2},
  journal      = {J. Cryptol.},
  volume       = {12},
  number       = {1},
  pages        = {67--73},
  year         = {1999},
  url          = {https://doi.org/10.1007/PL00003818},
  doi          = {10.1007/PL00003818},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/SmartS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Smart99,
  author       = {Nigel P. Smart},
  title        = {Elliptic Curve Cryptosystems over Small Fields of Odd Characteristic},
  journal      = {J. Cryptol.},
  volume       = {12},
  number       = {2},
  pages        = {141--151},
  year         = {1999},
  url          = {https://doi.org/10.1007/PL00003820},
  doi          = {10.1007/PL00003820},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Smart99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Smart99a,
  author       = {Nigel P. Smart},
  title        = {The Discrete Logarithm Problem on Elliptic Curves of Trace One},
  journal      = {J. Cryptol.},
  volume       = {12},
  number       = {3},
  pages        = {193--196},
  year         = {1999},
  url          = {https://doi.org/10.1007/s001459900052},
  doi          = {10.1007/S001459900052},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Smart99a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/moc/Smart99,
  author       = {Nigel P. Smart},
  title        = {Determining the small solutions to S-unit equations},
  journal      = {Math. Comput.},
  volume       = {68},
  number       = {228},
  pages        = {1687--1699},
  year         = {1999},
  url          = {https://doi.org/10.1090/S0025-5718-99-01140-0},
  doi          = {10.1090/S0025-5718-99-01140-0},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/moc/Smart99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Smart99,
  author       = {Nigel P. Smart},
  editor       = {Jacques Stern},
  title        = {On the Performance of Hyperelliptic Cryptosystems},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '99, International Conference
                  on the Theory and Application of Cryptographic Techniques, Prague,
                  Czech Republic, May 2-6, 1999, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1592},
  pages        = {165--175},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48910-X\_12},
  doi          = {10.1007/3-540-48910-X\_12},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Smart99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/GalbraithS99,
  author       = {Steven D. Galbraith and
                  Nigel P. Smart},
  editor       = {Michael Walker},
  title        = {A Cryptographic Application of Weil Descent},
  booktitle    = {Cryptography and Coding, 7th {IMA} International Conference, Cirencester,
                  UK, December 20-22, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1746},
  pages        = {191--200},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-46665-7\_23},
  doi          = {10.1007/3-540-46665-7\_23},
  timestamp    = {Wed, 18 Mar 2020 16:00:59 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/GalbraithS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0018238,
  author       = {Nigel P. Smart},
  title        = {The algorithmic resolution of diophantine equations - a computational
                  cookbook},
  series       = {London Mathematical Society student texts},
  volume       = {41},
  publisher    = {Cambridge University Press},
  year         = {1998},
  isbn         = {978-0-521-64633-8},
  timestamp    = {Mon, 22 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/0018238.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/em/WoodcockS98,
  author       = {Christopher F. Woodcock and
                  Nigel P. Smart},
  title        = {p-adic Chaos and Random Number Generation},
  journal      = {Exp. Math.},
  volume       = {7},
  number       = {4},
  pages        = {333--342},
  year         = {1998},
  url          = {https://doi.org/10.1080/10586458.1998.10504379},
  doi          = {10.1080/10586458.1998.10504379},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/em/WoodcockS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/moc/NiklaschS98,
  author       = {Gerhard Niklasch and
                  Nigel P. Smart},
  title        = {Exceptional units in a family of quartic number fields},
  journal      = {Math. Comput.},
  volume       = {67},
  number       = {222},
  pages        = {759--772},
  year         = {1998},
  url          = {https://doi.org/10.1090/S0025-5718-98-00958-2},
  doi          = {10.1090/S0025-5718-98-00958-2},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/moc/NiklaschS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ants/DjabriS98,
  author       = {Z. Djabri and
                  Nigel P. Smart},
  editor       = {Joe Buhler},
  title        = {A Comparison of Direct and Indirect Methods for Computing Selmer Groups
                  of an Elliptic Curve},
  booktitle    = {Algorithmic Number Theory, Third International Symposium, ANTS-III,
                  Portland, Oregon, USA, June 21-25, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1423},
  pages        = {502--513},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054888},
  doi          = {10.1007/BFB0054888},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ants/DjabriS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsc/Smart96,
  author       = {Nigel P. Smart},
  title        = {Solving Discriminant Form Equations Via Unit Equations},
  journal      = {J. Symb. Comput.},
  volume       = {21},
  number       = {3},
  pages        = {367--374},
  year         = {1996},
  url          = {https://doi.org/10.1006/jsco.1996.0018},
  doi          = {10.1006/JSCO.1996.0018},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsc/Smart96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ants/Smart96,
  author       = {Nigel P. Smart},
  editor       = {Henri Cohen},
  title        = {How Difficult Is It to Solve a Thue Equation?},
  booktitle    = {Algorithmic Number Theory, Second International Symposium, ANTS-II,
                  Talence, France, May 18-23, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1122},
  pages        = {363--373},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-61581-4\_67},
  doi          = {10.1007/3-540-61581-4\_67},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ants/Smart96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics