Cryptographers' World
 

Nigel P. Smart


Author's Web Page Link

27 papers in database with 1422 citations StarStar

Editor of 1 conference proceedings book

H-number: 19

Conference Proceedings

 
1. Nigel P. Smart, editor, Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings. Springer, 2008. ISBN 3-540-78966-9.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Kamel Bentahar,  Pooya Farshim,  John Malone-Lee,  Nigel P. Smart,  Generic Constructions of Identity-Based and Certificateless KEMs, Journal of Cryptology, Volume 21(2), pp. 178 - 199, Springer, 2008.

[Cited 53 times Red Star]

2. Alfred Menezes,  Nigel P. Smart,  Security of Signature Schemes in a Multi-User Setting, Designs, Codes and Cryptography, Volume 33(3), pp. 261 - 274, Springer, 2004.

[Electronic Edition][Cited 31 times ]

3. Pierrick Gaudry,  Florian Hess,  Nigel P. Smart,  Constructive and Destructive Facets of Weil Descent on Elliptic Curves, Journal of Cryptology, Volume 15(1), pp. 19 - 46, Springer, 2002.

[Cited 203 times Red StarRed Star]

4. Nick Howgrave-Graham,  Nigel P. Smart,  Lattice Attacks on Digital Signature Schemes, Designs, Codes and Cryptography, Volume 23(3), pp. 283 - 290, Springer, 2001.

[Electronic Edition][Cited 78 times Red Star]

5. Nigel P. Smart,  The Discrete Logarithm Problem on Elliptic Curves of Trace One, Journal of Cryptology, Volume 12(3), pp. 193 - 196, Springer, 1999.

[Cited 203 times Red StarRed Star]

6. Nigel P. Smart,  Elliptic Curve Cryptosystems over Small Fields of Odd Characteristic, Journal of Cryptology, Volume 12(2), pp. 141 - 151, Springer, 1999.

[Cited 63 times Red Star]

7. Nigel P. Smart,  Samir Siksek,  A Fast Diffie-Hellman Protocol in Genus 2, Journal of Cryptology, Volume 12(1), pp. 67 - 73, Springer, 1999.

[Cited 6 times ]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Benny Pinkas,  Thomas Schneider,  Nigel P. Smart,  Stephen C. Williams,  Secure Two-Party Computation Is Practical, pp. 250 - 267, ASIACRYPT 2009.

[Electronic Edition][Cited 19 times ]

2. Liqun Chen,  Paul Morrissey,  Nigel P. Smart,  Bogdan Warinschi,  Security Notions and Generic Constructions for Client Puzzles, pp. 505 - 523, ASIACRYPT 2009.

[Electronic Edition][Cited 7 times ]

3. Paul Morrissey,  Nigel P. Smart,  Bogdan Warinschi,  A Modular Security Analysis of the TLS Handshake Protocol, pp. 55 - 73, ASIACRYPT 2008.

[Electronic Edition][Cited 10 times ]

4. Michel Abdalla,  Alexander W. Dent,  John Malone-Lee,  Gregory Neven,  Duong Hieu Phan,  Nigel P. Smart,  Identity-Based Traitor Tracing, pp. 361 - 376, PKC 2007.

[Electronic Edition][Cited 8 times ]

5. Antoine Joux,  Reynald Lercier,  Nigel P. Smart,  Frederik Vercauteren,  The Number Field Sieve in the Medium Prime Case, pp. 326 - 344, CRYPTO 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 19 times ]

6. P. J. Green,  Richard Noad,  Nigel P. Smart,  Further Hidden Markov Model Cryptanalysis, pp. 61 - 74, CHES 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 9 times ]

7. Peter J. Leadbitter,  Dan Page,  Nigel P. Smart,  Attacking DSA Under a Repeated Bits Assumption, pp. 428 - 440, CHES 2004.

[Electronic Edition][Cited 5 times ]

8. David Naccache,  Nigel P. Smart,  Jacques Stern,  Projective Coordinates Leak, pp. 257 - 267, EUROCRYPT 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 20 times ]

9. Nigel P. Smart,  An Analysis of Goubin's Refined Power Analysis Attack, pp. 281 - 290, CHES 2003.

[Electronic Edition][Cited 35 times ]

10. Nigel P. Smart,  Access Control Using Pairing Based Cryptography, pp. 111 - 121, CT-RSA 2003.

[Electronic Edition][Cited 65 times Red Star]

11. John Malone-Lee,  Nigel P. Smart,  Modifications of ECDSA, pp. 1 - 12, SAC 2002.

[Electronic Edition][Cited 4 times ]

12. Jacques Stern,  David Pointcheval,  John Malone-Lee,  Nigel P. Smart,  Flaws in Applying Proof Methodologies to Signature Schemes, pp. 93 - 110, CRYPTO 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 74 times Red Star]

13. Dan Page,  Nigel P. Smart,  Hardware Implementation of Finite Fields of Characteristic Three, pp. 529 - 539, CHES 2002.

[Electronic Edition][Cited 59 times Red Star]

14. Steven D. Galbraith,  Florian Hess,  Nigel P. Smart,  Extending the GHS Weil Descent Attack, pp. 29 - 44, EUROCRYPT 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 64 times Red Star]

15. Florian Hess,  Gadiel Seroussi,  Nigel P. Smart,  Two Topics in Hyperelliptic Cryptography, pp. 181 - 189, SAC 2001.

[Electronic Edition][Cited 22 times ]

16. Nigel P. Smart,  How Secure Are Elliptic Curves over Composite Extension Fields?, pp. 30 - 39, EUROCRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 50 times Red Star]

17. Pierre-Yvan Liardet,  Nigel P. Smart,  Preventing SPA/DPA in ECC Systems Using the Jacobi Form, pp. 391 - 401, CHES 2001.

[Electronic Edition][Cited 142 times Red StarRed Star]

18. David May,  Henk L. Muller,  Nigel P. Smart,  Random Register Renaming to Foil DPA, pp. 28 - 38, CHES 2001.

[Electronic Edition][Cited 59 times Red Star]

19. Nigel P. Smart,  The Hessian Form of an Elliptic Curve, pp. 118 - 125, CHES 2001.

[Electronic Edition][Cited 68 times Red Star]

20. Nigel P. Smart,  On the Performance of Hyperelliptic Cryptosystems, pp. 165 - 175, EUROCRYPT 1999.

[Electronic Edition][Cited 46 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...