1. 2020
  2. Published

    Multilinear Maps from Obfuscation

    Albrecht, M. R., Farshim, P., Han, S., Hofheinz, D., Larraia, E. & Paterson, K. G., 2 Jan 2020, In : Journal of Cryptology. p. 1-34 34 p.

    Research output: Contribution to journalArticle

  3. Published

    (One) failure is not an option: Bootstrapping the search for failures in lattice-based encryption schemes

    Virdia, F., D'Anvers, J-P. & Rossi, M., 2020, Advances in Cryptology – EUROCRYPT 2020. Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. E-pub ahead of print
  5. Published

    Implementing Grover oracles for quantum key search on AES and LowMC

    Virdia, F., Naehrig, M., Roetteler, M. & Jaques, S., 2020, Advances in Cryptology – EUROCRYPT 2020. Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Improved Classical Cryptanalysis of SIKE in Practice

    Virdia, F., Costello, C., Longa, P., Naehrig, M. & Renes, J., 2020, Public-Key Cryptography – PKC 2020. Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. E-pub ahead of print
  8. 2019
  9. Published

    A game of “Cut and Mouse”: bypassing antivirus by simulating user inputs

    Alper Genç, Z., Lenzini, G. & Sgandurra, D., 9 Dec 2019, The Annual Computer Security Applications Conference (ACSAC). ACM, p. 456-465 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Forthcoming

    Civic Empowerment through Digitalisation: the Case of Greenlandic Women

    Wendt, N., Jensen, R. B. & Coles-Kemp, L., 9 Dec 2019, (Accepted/In press) ACM CHI Conference on Human Factors in Computing Systems: CHI'20. ACM, 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Forthcoming

    Digital Liminalities: Understanding Isolated Communities on the Edge

    Jensen, R. B., Coles-Kemp, L., Wendt, N. & Lewis, M., 9 Dec 2019, (Accepted/In press) ACM CHI Conference on Human Factors in Computing Systems: CHI'20. ACM, 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Forthcoming

    Too Much Information: Questioning Security in a Post-Digital Society

    Coles-Kemp, L., Jensen, R. B. & Heath, C. P. R., 9 Dec 2019, (Accepted/In press) CHI '20: CHI Conference on Human Factors in Computing Systems. ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Forthcoming

    When the Civic Turn turns Digital: Designing Safe and Secure Refugee Resettlement

    Jensen, R. B., Coles-Kemp, L. & Talhouk, R., 9 Dec 2019, (Accepted/In press) ACM CHI Conference on Human Factors in Computing Systems: CHI'20. ACM, 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    The impact of quantum computing on real-world security: A 5G case study

    Mitchell, C., 27 Nov 2019, arXiv, 27 p.

    Research output: Working paper

  15. E-pub ahead of print

    Quantum Algorithms for the Approximate k-List Problem and their Application to Lattice Sieving

    Kirshanova, E., Mårtensson, E., Postlethwaite, E. & Roy Moulik, S., 25 Nov 2019, Advances in Cryptology -- ASIACRYPT 2019: 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings. Springer, p. 521-551 31 p. (Lecture Notes in Computer Science; vol. 11921).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Forthcoming

    Too little too late: Can we control browser fingerprinting?

    Al-Fannah, N. M. & Mitchell, C., 25 Nov 2019, (Accepted/In press) In : Journal of Intellectual Capital.

    Research output: Contribution to journalArticle

  17. E-pub ahead of print

    Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC

    Albrecht, M., Cid, C., Grassi, L., Khovratovich, D., Lüftenegger, R., Rechberger, C. & Schofnegger, M., 22 Nov 2019, ASIACRYPT 2019. p. 371-397 17 p. (Lecture Notes in Computer Science; vol. 11923).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. E-pub ahead of print

    Criminal use of cryptocurrencies: a great new threat or is cash still king?

    Butler, S., 20 Nov 2019, In : Journal of Cyber Policy. p. 1-20 20 p.

    Research output: Contribution to journalArticle

  19. E-pub ahead of print

    Subverting Decryption in AEAD

    Armour, M. & Poettering, B., 18 Nov 2019, Cryptography and Coding - 17th IMA International Conference, IMACC 2019, Proceedings. Albrecht, M. (ed.). Springer, p. 22-41 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11929 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Forthcoming

    Another look at some isogeny hardness assumptions

    Merz, S-P., Minko, R. & Petit, C., 16 Nov 2019, (Accepted/In press).

    Research output: Contribution to conferencePaper

  21. Published

    Case Study: Analysis and Mitigation of a Novel Sandbox-Evasion Technique

    Alper Genç, Z., Lenzini, G. & Sgandurra, D., 14 Nov 2019, Central European Cybersecurity Conference 2019. ACM, p. 1-4 4 p. 9

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    OAuthGuard: Protecting User Security and Privacy with OAuth 2.0 and OpenID Connect

    Li, W., Mitchell, C. J. & Chen, T., 11 Nov 2019, Proceedings of the Security Standardisation Research Conference 2019 (SSR 2019, an ACM CCS 2019 Workshop), London, November 11 2019. ACM, p. 35-44 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    On the Feasibility and Impact of Standardising Sparse-secret LWE Parameter Sets for Homomorphic Encryption

    Curtis, B. & Player, R., 11 Nov 2019, 7th Workshop on Encrypted Computing & Applied Homomorphic Cryptography. Springer, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    1st Workshop on Cyber-Security Arms Race (CYSARM 2019)

    Giannetsos, T. & Sgandurra, D., 6 Nov 2019, p. 2711-2712. 2 p.

    Research output: Contribution to conferenceOther

  25. E-pub ahead of print

    You Shall Not Join: A Measurement Study of Cryptocurrency Peer-to-Peer Bootstrapping Techniques

    Loe, A. & Quaglia, E., 6 Nov 2019, Proceedings of ACM CCS '19. p. 2231-2247 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Functional repair codes: a view from projective geometry

    Ng, S. & Paterson, M., Nov 2019, In : Designs, Codes and Cryptography. 87, 11, p. 2701-2722 22 p.

    Research output: Contribution to journalArticle

  27. Published

    The significance of securing as a critical component of information security: An Australian narrative

    Burdon, M. & Coles-Kemp, L., Nov 2019, In : Computers and Security. 87, p. 1-10 10 p., 101601.

    Research output: Contribution to journalArticle

  28. E-pub ahead of print

    Anomaly Detection using Pattern-of-Life Visual Metaphors

    Happa, J., Bashford-Rogers, T., Agrafiotis, I., Goldsmith, M. & Creese, S., 21 Oct 2019, In : IEEE Access. 7, p. 154018-154034 17 p.

    Research output: Contribution to journalArticle

  29. E-pub ahead of print

    A Critique of Game-Based Definitions of Receipt-Freeness for Voting

    Fraser, A., Quaglia, E. & Smyth, B., 26 Sep 2019, p. 189-205. 17 p.

    Research output: Contribution to conferencePaper

  30. Published

    Threat Analysis for Smart Homes

    Kavallieratos, G., Chowdhury, N., Katsikas, S., Gkioulos, V. & Wolthusen, S. D., 25 Sep 2019, In : Future Internet. 11, 10, p. 1-19 19 p., 207.

    Research output: Contribution to journalArticle

  31. Published

    Substitution Attacks against Message Authentication

    Armour, M. & Poettering, B., 20 Sep 2019, In : IACR Transactions on Symmetric Cryptology. 2019, 3, p. 152-168 17 p.

    Research output: Contribution to journalArticle

  32. Published

    Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks

    Grubbs, P., Lacharite, M-S., Minaud, B. & Paterson, K., 16 Sep 2019, IEEE Security & Privacy . IEEE Press, p. 1067-1083 17 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  33. E-pub ahead of print

    Feistel Structures for MPC, and More

    Albrecht, M., Grassi, L., Perrin, L., Ramacher, S., Rechberger, C., Rotaru, D., Roy, A. & Schofnegger, M., 15 Sep 2019, ESORICS 2019. p. 151-171 21 p. (Lecture Notes in Computer Science ; vol. 11736).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    Structural Controllability Recovery via the Minimum-edge Addition

    Zhang, S. & Wolthusen, S., 29 Aug 2019, p. 1-6. 6 p.

    Research output: Contribution to conferencePaper

  35. Published

    Examining and Constructing Attacker Categorisations: an Experimental Typology for Digital Banking

    Moeckel, C., 26 Aug 2019, Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES '19): 1st International Workshop on Information Security Methodology and Replication Studies (IWSMR 2019). Association for Computing Machinery (ACM), 93

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Location Tracking Using Smartphone Accelerometer and Magnetometer Traces

    Nguyen, D. K. A., Akram, R. N., Markantonakis, K., Luo, Z. & Watkins, C., 26 Aug 2019, The First Location Privacy Workshop (LPW 2019), the 14th International Conference on Availability, Reliability and Security (ARES 2019). Association for Computing Machinery (ACM), p. 1-9 9 p. 96

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. E-pub ahead of print

    Intrusion Detection in Robotic Swarms

    Sargeant, I. & Tomlinson, A., 24 Aug 2019, Proceedings of SAI Intelligent Systems Conference. Bi, Y., Bhatia, R. & Kapoor, S. (eds.). Springer, Vol. 2. p. 968-980 13 p. (Advances in Intelligent Systems and Computing; vol. 1038).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    On the Efficacy of New Privacy Attacks against 5G AKA

    Khan, H. & Martin, K., 16 Aug 2019, p. 431-438. 8 p.

    Research output: Contribution to conferencePaper

  39. Published

    Driver-Node based Security Analysis for Network Controllability

    Zhang, S. & Wolthusen, S., 15 Aug 2019, p. 1-6. 6 p.

    Research output: Contribution to conferencePaper

  40. E-pub ahead of print

    Parameterized Resiliency Problems

    Crampton, J., Gutin, G., Koutecky, M. & Watrigant, R., 7 Aug 2019, In : Theoretical Computer Science. p. 1-14 14 p.

    Research output: Contribution to journalArticle

  41. E-pub ahead of print

    Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality

    Inoue, Iwata, Minematsu & Poettering, B., 1 Aug 2019, p. 3-31. 29 p.

    Research output: Contribution to conferencePaper

  42. Published
  43. Published

    Sonification to Support the Monitoring Tasks of Security Operations Centres

    Axon, L., Happa, J., van Rensburg, A. J., Goldsmith, M. & Creese, S., 29 Jul 2019, In : IEEE Transactions on Dependable and Secure Computing. p. 1-17 17 p.

    Research output: Contribution to journalArticle

  44. Published
  45. Forthcoming

    Discretisation and Product Distributions in Ring-LWE

    Murphy, S. & Player, R., 20 Jul 2019, (Accepted/In press).

    Research output: Working paper

  46. Published

    Improved Security Notions for Proxy Re-Encryption to Enforce Access Control

    Lee, E., 20 Jul 2019, Progress in Cryptology – LATINCRYPT 2017: International Conference on Cryptology and Information Security in Latin America. Springer, p. 66-85 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    Cyber War, Supply Chains, and Realism in Lithuania

    Agha, D., 17 Jul 2019

    Research output: Other contribution

  48. Submitted

    Encountering precarity, uncertainty and everyday anxiety as part of the postgraduate research journey

    Robinson, N. & Butler-Rees, A., 1 Jul 2019, (Submitted) In : Emotion, Space and Society.

    Research output: Contribution to journalArticle

  49. Published

    A New Approach to Modelling Centralised Reputation Systems

    Garms, L. & Quaglia, E., 29 Jun 2019, p. 429-447. 19 p.

    Research output: Contribution to conferencePaper

  50. Published
  51. E-pub ahead of print

    A Session Hijacking Attack against a Device-Assisted Physical Layer Key Agreement

    HU, Q., DU, B., Markantonakis, K. & Hancke, G., 19 Jun 2019, In : IEEE Transactions on Industrial Informatics. p. 1-11 11 p.

    Research output: Contribution to journalArticle

  52. Published
  53. Forthcoming

    Exploring Trade-offs in Batch Bounded Distance Decoding

    Albrecht, M., Curtis, B. & Wunderer, T., 17 Jun 2019, (Accepted/In press) SAC 2019. Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Published

    Cyber Security for Small Businesses: A Review Of the Advice

    Agha, D., Rowell, J. & Choudhury, R., 13 Jun 2019.

    Research output: Contribution to conferencePoster

  55. Published

    Sound regular expression semantics for dynamic symbolic execution of JavaScript

    Loring, B., Mitchell, D. & Kinder, J., 8 Jun 2019, PLDI'19: Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation. ACM, p. 425-438 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. E-pub ahead of print

    On Deception-Based Protection Against Cryptographic Ransomware

    Alper Genç, Z., Lenzini, G. & Sgandurra, D., 6 Jun 2019, DIMVA 2019: 16th Conference on Detection of Intrusions and Malware & Vulnerability Assessment. Springer, p. 219-239 21 p. (Lecture Notes in Computer Science; vol. 11543).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. E-pub ahead of print

    An Evaluation of the Security of the Bitcoin Peer-To-Peer Network

    Tapsell, J., Akram, R. N. & Markantonakis, K., 3 Jun 2019, p. 1-6. 6 p.

    Research output: Contribution to conferencePaper

  58. E-pub ahead of print

    E-Voting With Blockchain: An E-Voting Protocol with Decentralisation and Voter Privacy

    Hardwick, F. S., Gioulis, A., Akram, R. N. & Markantonakis, K., 3 Jun 2019, p. 1-7. 7 p.

    Research output: Contribution to conferencePaper

  59. Published

    Hearing attacks in network data: An effectiveness study

    Axon, L., Happa, J., Goldsmith, M. & Creese, S., Jun 2019, In : Computers and Security. 83, p. 367-388 22 p.

    Research output: Contribution to journalArticle

  60. Published

    Removing epoxy underfill between neighbouring components using acid for component chip-off

    Heckmann, T., McEvoy, J., Markantonakis, K., Akram, R. N. & Naccache, D., Jun 2019, In : digital investigation. 29, p. 198-209 12 p.

    Research output: Contribution to journalArticle

  61. E-pub ahead of print

    Strong Post-Compromise Secure Proxy Re-Encryption

    Davidson, A., Deo, A., Lee, E. & Martin, K., 30 May 2019, Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Proceedings. Jang-Jaccard, J. & Guo, F. (eds.). Springer-Verlag, p. 58-77 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11547 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. E-pub ahead of print

    δ-subgaussian Random Variables in Cryptography

    Murphy, S. & Player, R., 30 May 2019, ACISP 2019 -- The 24th Australasian Conference on Information Security and Privacy. Springer, p. 251-268 18 p. (LNCS; vol. 11547).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. Published

    Bounded and Approximate Strong Satisfiability in Workflows

    Crampton, J., Gutin, G. & Majumdar, D., 28 May 2019, Proceedings of ACM SACMAT 2019. ACM, p. 179-184 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Published
  65. E-pub ahead of print

    Modelling the Privacy Impact of External Knowledge for Sensor Data in the Industrial Internet of Things

    Darwish, S., Nouretdinov, I. & Wolthusen, S., 14 May 2019, Security and Privacy Trends in the Industrial Internet of Things. p. 223-243 21 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  66. E-pub ahead of print

    Remote Credential Management with Mutual Attestation for Trusted Execution Environments

    Shepherd, C., Akram, R. N. & Markantonakis, K., 12 May 2019, 12th IFIP International Conference on Information Security Theory and Practice (WISTP '18). Springer, p. 157-173 17 p. (Lecture Notes in Computer Science; vol. 11469).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. Published

    Ensuring Secure Application Execution and Platform Specific Execution in Embedded Devices

    Lee, R., Markantonakis, K. & Akram, R. N., 7 May 2019, In : ACM Transactions on Embedded Computing Systems. 18, 3, p. 1-21 21 p., 26.

    Research output: Contribution to journalArticle

  68. Unpublished
  69. Published

    Accessing a New Land: Designing for a Social Conceptualisation of Access

    Coles-Kemp, L. & Jensen, R. B., 2 May 2019, ACM CHI Conference on Human Factors in Computing Systems: CHI'19. ACM, p. 1-12 12 p. 181

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Published

    Relations are more than Bytes: Re-thinking the Benefits of Smart Services with People and Things

    Heath, C. P., Crivellaro, C. & Coles-Kemp, L., 2 May 2019, CHI Conference on Human Factors in Computing Systems Proceedings: CHI 2019. ACM, p. 1-12 12 p. 308

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. E-pub ahead of print

    Teaching as a Collaborative Practice: Reframing Security Practitioners as Navigators

    Williams, P. & Coles-Kemp, L., 27 Apr 2019, Transactions on Edutainment . Pan, Z. (ed.). Springer, Vol. XV. p. 108-128 21 p. (Lecture Notes in Computer Science; vol. XV).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  72. E-pub ahead of print

    An Analysis of NIST SP 800-90A

    Woodage, J. & Shumow, D., 24 Apr 2019, Advances in Cryptology - EUROCRYPT 2019. Ishai, Y. & Rijmen, V. (eds.). p. 151-180 30 p. (Lecture Notes in Computer Science; vol. 11477).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  73. E-pub ahead of print

    The General Sieve Kernel and New Records in Lattice Reduction

    Albrecht, M., Ducas, L., Herold, G., Kirshanova, E., Postlethwaite, E. & Stevens, M., 24 Apr 2019, EUROCRYPT 2019. p. 717-746 30 p. (Lecture Notes in Computer Science; vol. 11477).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. Published

    Cyber Security Threats and Challenges in Collaborative Mixed-Reality

    Happa, J., Glencross, M. & Steed, A., 9 Apr 2019, In : Frontiers in ICT. 6, p. 1-20 20 p., 5.

    Research output: Contribution to journalArticle

  75. E-pub ahead of print

    Factoring Products of Braids via Garside Normal Form

    Merz, S-P. & Petit, C., 6 Apr 2019, p. 646-678. 33 p.

    Research output: Contribution to conferencePaper

  76. E-pub ahead of print

    Group Signatures with Selective Linkability

    Garms, L. & Lehmann, A., 6 Apr 2019, 22nd International Conference on Practice and Theory of Public Key Cryptography. p. 190-220 31 p. (Lecture Notes in Computer Science; vol. 11442).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Published

    Safety in Numbers: On the Need for Robust Diffie-Hellman Parameter Validation

    Galbraith, S., Massimo, J. & Paterson, K., 6 Apr 2019, 22nd IACR Conference on Practice and Theory in Public Key Cryptography 2019. Springer, p. 379-407 29 p. (Lecture Notes in Computer Science; vol. 11443).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. Published

    The Estonian Data Embassy and the Applicability of the Vienna Convention: An Exploratory Analysis

    Robinson, N., Kask, L. & Krimmer, R., 3 Apr 2019, p. 391-396. 6 p.

    Research output: Contribution to conferencePaper

  79. Unpublished

    Cold Boot Attacks on Post-Quantum Schemes

    Villanueva Polanco, R., 8 Mar 2019, (Unpublished)

    Research output: ThesisDoctoral Thesis

  80. Published

    libInterMAC: Beyond Confidentiality and Integrity in Practice

    Albrecht, M., Hansen, T. & Paterson, K., 8 Mar 2019, In : IACR Transactions on Symmetric Cryptology. 2019, 1, p. 46-83 38 p.

    Research output: Contribution to journalArticle

  81. Published

    Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion

    Ankele, R., Dobraunig, C., Guo, J., Lambooij, E., Leander, G. & Todo, Y., 8 Mar 2019, IACR Transactions on Symmetric Cryptology. 1 ed. Paris, France: Ruhr-Universität Bochum, Vol. 2019. p. 192-235 44 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. Published

    Majority vote ensembles of conformal predictors

    Cherubin, G., Mar 2019, In : Machine Learning. 108, 3, p. 475–488 14 p.

    Research output: Contribution to journalArticle

  83. Published

    Security issues in a group key establishment protocol

    Mitchell, C. J., Mar 2019, In : The Computer Journal. 62, 3, p. 373-376 4 p.

    Research output: Contribution to journalArticle

  84. Unpublished

    Randomness in Cryptography: Theory Meets Practice

    Hutchinson, D., 23 Feb 2019, (Unpublished) 174 p.

    Research output: ThesisDoctoral Thesis

  85. Published

    Not-equal: Democratizing research in digital innovation for social justice

    Crivellaro, C., Coles-Kemp, L., Dix, A. & Light, A., 22 Feb 2019, In : Interactions. 26, 2, p. 70-73 4 p.

    Research output: Contribution to journalArticle

  86. E-pub ahead of print

    Lossy Trapdoor Permutations with Improved Lossiness

    Auerbach, B., Kiltz, E., Poettering, B. & Schoenen, S., 3 Feb 2019, p. 230-250. 21 p.

    Research output: Contribution to conferencePaper

  87. E-pub ahead of print

    Novel implementation of defence strategy of relay attack based on cloud in RFID systems

    Xu, H., Shen, W., Li, P., Mayes, K., Wang, R., Li, D. & Yang, S., 30 Jan 2019, In : International Journal of Information and Computer Security. 11, 2, p. 120-144 25 p.

    Research output: Contribution to journalArticle

  88. E-pub ahead of print

    Mind the Gap - A Closer Look at the Security of Block Ciphers against Differential Cryptanalysis

    Ankele, R. & Kölbl, S., 13 Jan 2019, Selected Areas in Cryptography 2018. Lecture Notes in Computer Science ed. Calgary, Canada: Springer, Vol. 11349. p. 163-190 28 p. (Lecture Notes in Computer Science; vol. 11349).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Published

    Documenting Greenland: Popular Geopolitics on Film

    Dodds, K-J. & Jensen, R. B., 4 Jan 2019, Arctic Cinemas and the Documentary Ethos. Kaganovsky, L., MacKenzie, S. & Westerstahl Stenport, A. (eds.). Bloomington: University of Indiana Press, 29 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  90. Submitted

    A Central Limit Framework for Ring-LWE Decryption

    Murphy, S. & Player, R., 2019, (Submitted).

    Research output: Working paper

  91. In preparation

    Achieving secure and efficient lattice-based public-key encryption: the impact of the secret-key distribution

    Bhattacharya, S., Garcia-Morchon, O., Player, R. & Tolhuizen, L., 2019, (In preparation) Eprint.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. Published

    Analogue

    Squire, R., Searles-Adey, P. & Jensen, R. B., 2019, Society and Space

    Research output: Other contribution

  93. Unpublished

    Analysis and Manipulation of Android Apps and Malware in Real-Time

    Khan, S., 2019, (Unpublished) 205 p.

    Research output: ThesisDoctoral Thesis

  94. Unpublished

    Black-box Security: Measuring Black-box Information Leakage via Machine Learning

    Cherubin, G., 2019, (Unpublished)

    Research output: ThesisDoctoral Thesis

  95. Unpublished
  96. Unpublished

    Generic Access Control of Cloud Storage Using Attribute-Based Cryptography

    Xu, Z., 2019, (Unpublished)

    Research output: ThesisDoctoral Thesis

  97. In preparation

    Homomorphic noise growth in practice: comparing BGV and FV

    Costache, A., Laine, K. & Player, R., 2019, (In preparation) Eprint.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Unpublished

    Language in the Age of Algorithmic Reproduction: A Critique of Linguistic Capitalism

    Thornton, P., 2019, (Unpublished)

    Research output: ThesisDoctoral Thesis

  99. Unpublished

    Machine Learning Techniques for Evolving Threats

    Jordaney, R., 2019, (Unpublished)

    Research output: ThesisDoctoral Thesis

  100. Published

    Making Digital Technology Research Human: Learning from Clowning as a Social Research Intervention

    Coles-Kemp, L. & Stang, F., 2019, In : Rivista Italiana di Studi sull’Umorismo (RISU). 2, 1, p. 35-45 11 p.

    Research output: Contribution to journalArticle

  101. Unpublished

    On Enhancing the Security of Time Constrained Mobile Contactless Transactions

    Gurulian, I., 2019, (Unpublished)

    Research output: ThesisDoctoral Thesis

  102. Submitted

    Quantum speedups for lattice sieves are tenuous at best

    Albrecht, M., Gheorghiu, V., Postlethwaite, E. & Schanck, J., 2019, (Submitted)

    Research output: Other contribution

Previous 1 2 3 4 5 6 7 8 ...20 Next