1. Paper › Research › Peer-reviewed
  2. E-pub ahead of print

    Factoring Products of Braids via Garside Normal Form

    Merz, S-P. & Petit, C., 6 Apr 2019, p. 646-678. 33 p.

    Research output: Contribution to conferencePaperpeer-review

  3. Published

    Fair and Transparent Blockchain based Tendering Framework - A Step Towards Open Governance

    Hardwick, F. S., Akram, R. N. & Markantonakis, K., 2018, p. 1-6. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  4. Published

    Gesture recognition implemented on a personal limited device

    Ducray, B., Cobourne, S., Mayes, K. & Markantonakis, K., 2017, p. 1-6. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  5. Published

    Good Vibrations: Artificial Ambience-Based Relay Attack Detection

    Gurulian, I., Markantonakis, K., Frank, E. & Akram, R. N., 2018, p. 1-9. 9 p.

    Research output: Contribution to conferencePaperpeer-review

  6. Published

    Hashing Solutions Instead of Generating Problems: On the Interactive Certification of RSA Moduli

    Auerbach, B. & Poettering, B., 2018, p. 403-430. 28 p.

    Research output: Contribution to conferencePaperpeer-review

  7. E-pub ahead of print

    High Precision Laser Fault Injection using Low-cost Components

    Kelly, M. & Mayes, K., 25 Dec 2020, p. 1-10. 10 p.

    Research output: Contribution to conferencePaperpeer-review

  8. Published

    Highly Efficient Privacy-Preserving Key Agreement for Wireless Body Area Networks

    Khan, H., Dowling, B. & Martin, K., 6 Sep 2018, p. 1064-1069. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  9. Published

    Human-Computer Interaction for Security Research: The Case of EU E-Banking Systems

    Moeckel, C. & Faulkner, X., 5 Sep 2011, p. 406-409. 4 p.

    Research output: Contribution to conferencePaperpeer-review

  10. Published

    Hybrid Encryption in a Multi-user Setting, Revisited

    Giacon, F., Kiltz, E. & Poettering, B., 2018, p. 159-189. 31 p.

    Research output: Contribution to conferencePaperpeer-review

  11. Published

    Implementation of Temporally Aware Behaviour-Based Security in Smart Cards

    Sirett, W. G., Markantonakis, K. & Mayes, K., Nov 2006.

    Research output: Contribution to conferencePaperpeer-review

  12. Published

    Iterative recovery of controllability via maximum matching

    Zhang, S. & Wolthusen, S., 15 Jan 2018, p. 328-333. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  13. Published

    KEM Combiners

    Giacon, F., Heuer, F. & Poettering, B., 2018, p. 190-218. 29 p.

    Research output: Contribution to conferencePaperpeer-review

  14. E-pub ahead of print

    Leaky Controller: Cross-VM Memory Controller Covert Channel on Multi-Core Systems

    Semal, B., Markantonakis, K., Akram, R. N. & Kalbantner, J., 14 Sep 2020, p. 3-16. 14 p.

    Research output: Contribution to conferencePaperpeer-review

  15. E-pub ahead of print

    Lossy Trapdoor Permutations with Improved Lossiness

    Auerbach, B., Kiltz, E., Poettering, B. & Schoenen, S., 3 Feb 2019, p. 230-250. 21 p.

    Research output: Contribution to conferencePaperpeer-review

  16. Published

    Making defeating CAPTCHAs harder for bots

    Al-Fannah, N. M., 11 Jan 2018, p. 1-8. 8 p.

    Research output: Contribution to conferencePaperpeer-review

  17. Forthcoming

    Malware vs Anti-Malware Battle - Gotta Evade 'em All!

    Chaffey, E. J. & Sgandurra, D., 29 Aug 2020, (Accepted/In press).

    Research output: Contribution to conferencePaperpeer-review

  18. E-pub ahead of print

    May The Force Be With You: Force-Based Relay Attack Detection

    Gurulian, I., Hancke, G., Markantonakis, K. & Akram, R. N., 26 Jan 2018, p. 142-159. 18 p.

    Research output: Contribution to conferencePaperpeer-review

  19. Published

    New Most Efficient State Recovery Attacks on an eSTREAM Candidate F-FCSR-H v2 and F-FCSR-H Stream Ciphers

    Ali, A., 21 Feb 2011, p. 240--246. 7 p.

    Research output: Contribution to conferencePaperpeer-review

  20. Published

    Not All Browsers are Created Equal: Comparing Web Browser Fingerprintability

    Al-Fannah, N. M. & Li, W., 2017, p. 105-120. 16 p.

    Research output: Contribution to conferencePaperpeer-review

  21. Published

    Notes on GGH13 Without the Presence of Ideals

    Davidson, A., Albrecht, M. & Larraia de Vega, E., 2017, p. 135-158. 24 p.

    Research output: Contribution to conferencePaperpeer-review

  22. Published

    Off-line NFC Tag Authentication

    Saeed, Q. & Walter, C., 2012, p. 730-735.

    Research output: Contribution to conferencePaperpeer-review

  23. E-pub ahead of print

    On Adaptive Attacks against Jao-Urbanik’s Isogeny-Based Protocol

    Basso, A., Kutas, P., Merz, S. P., Petit, C. & Weitkämper, C., 5 Jul 2020, p. 195-213. 19 p.

    Research output: Contribution to conferencePaperpeer-review

  24. Forthcoming

    On Index Calculus Algorithms for Subfield Curves

    Galbraith, S. D., Granger, R., Merz, S-P. & Petit, C., 18 Sep 2020, (Accepted/In press).

    Research output: Contribution to conferencePaperpeer-review

  25. Published

    On the Efficacy of New Privacy Attacks against 5G AKA

    Khan, H. & Martin, K., 16 Aug 2019, p. 431-438. 8 p.

    Research output: Contribution to conferencePaperpeer-review

  26. Published

    On the One-Per-Message Unforgeability of (EC)DSA and Its Variants

    Fersch, M., Kiltz, E. & Poettering, B., 2017, p. 519-534. 16 p.

    Research output: Contribution to conferencePaperpeer-review