Professor Carlos Cid

  1. 2017
  2. E-pub ahead of print

    An Efficient Toolkit for Computing Private Set Operations

    Davidson, A. & Cid, C. 31 May 2017 Information Security and Privacy: 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part II. Pieprzyk, J. & Suriadi, S. (eds.). Springer Heidelberg, Vol. 2, p. 261-278 18 p. (Lecture Notes in Computer Science; vol. 10343)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Cloud Storage File Recoverability

    Gorke, C., Janson, C., Armknecht, F. & Cid, C. 2 Apr 2017 SCC '17 Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing. New York, NY, USA: ACM, p. 19-26 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. 2016
  5. Published

    A Model for Secure and Mutually Beneficial Software Vulnerability Sharing

    Davidson, A., Fenn, G. & Cid, C. 24 Oct 2016 WISCS '16 Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security. ACM, p. 3-14 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Hybrid Publicly Verifiable Computation

    Alderman, J., Janson, C., Crampton, J. & Cid, C. 2 Feb 2016 Topics in Cryptology - CT-RSA 2016. Sako, K. (ed.). Springer, Vol. 9610, p. 147-163 17 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. 2015
  8. Published

    Algebraic Cryptanalysis and RFID Authentication

    Cid, C., Ferreira, L., Procter, G. & Robshaw, M. 21 Nov 2015 The 11th Workshop on RFID Security - RFIDSec 2015. Springer, Vol. 9440, p. 104-121 18 p. (Lecture Notes in Computer Science; vol. 9440)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes

    Procter, G. & Cid, C. Oct 2015 In : Journal of Cryptology. 28, 4, p. 769–795 27 p.

    Research output: Contribution to journalArticle

  10. Published

    On the complexity of the BKW algorithm on LWE

    Albrecht, M., Cid, C., Faugere, J-C., Fitzpatrick, R. & Perret, L. Feb 2015 In : Designs, Codes and Cryptography. 74, 2, p. 325-354 30 p.

    Research output: Contribution to journalArticle

  11. Published

    Access Control in Publicly Verifiable Outsourced Computation

    Alderman, J., Janson, C., Cid, C. & Crampton, J. 2015 Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security - ASIACCS 2015. ACM, p. 657-662

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Forthcoming

    Picking v.s. Guessing Secrets: A Game-Theoretic Analysis

    Khouzani, A., Mardziel, P., Cid, C. & Srivatsa, M. 2015 IEEE 28th Computer Security Foundations Symposium. 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. 2014
  14. Published

    Optimal Contracts for Outsourced Computation

    Pham, V., Rezaei Khouzani, M. & Cid, C. Nov 2014 Proceedings of GameSec 2014 - Fifth Conference on Decision and Game Theory for Security. Springer, Vol. 8840, p. 79-98 20 p. (Lecture Notes in Computer Science - LNCS; vol. 8840)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Strategic Discovery and Sharing of Vulnerabilities in Competitive Environments

    Rezaei Khouzani, M., Pham, V. & Cid, C. Nov 2014 Proceedings of GameSec 2014 - Fifth Conference on Decision and Game Theory for Security. Springer, Vol. 8840, p. 59-78 20 p. (Lecture Notes in Computer Science - LNCS; vol. 8840)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Incentive Engineering for Outsourced Computation in the Face of Collusion

    Rezaei Khouzani, M., Pham, V. & Cid, C. 2014 Proceedings of WEIS 2014 – 13th Annual Workshop on the Economics of Information Security,. 21 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Revocation in Publicly Verifiable Outsourced Computation

    Alderman, J., Janson, C., Cid, C. & Crampton, J. 2014 Proceedings of the 10th International Conference on Information Security and Cryptology - Inscrypt 2014. Springer, Vol. 8957, p. 51-71 (Lecture Notes in Computer Science - LNCS; vol. 8957)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. 2013
  19. Published

    Multi-Client Non-Interactive Verifiable Computation

    Choi, S. G., Katz, J., Kumaresan, R. & Cid, C. Feb 2013 Theory of Cryptography: 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings. Sahai, A. (ed.). Springer, p. 499-518 20 p. (Lecture Notes in Computer Science; vol. 7785)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Memory Access Pattern Protection for Resource-Constrained Devices

    Nakano, Y., Cid, C., Kiyomoto, S. & Miyake, Y. 2013 Proceedings of CARDIS 2012. Springer, Vol. 7771, p. 188-202 15 p. (Lecture Notes in Computer Science; no. 7771)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    On Weak Keys and Forgery Attacks against Polynomial-based MAC Schemes

    Procter, G. & Cid, C. 2013 Fast Software Encryption, 20th International Workshop, FSE 2013. Springer, Vol. 8424, p. 287-304 18 p. (Lecture Notes in Computer Science - LNCS)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. 2012
  23. Published

    Are We Compromised? Modelling Security Assessment Games

    Pham, V. & Cid, C. Nov 2012 Decision and Game Theory for Security - Third International Conference, GameSec 2012. Springer, p. 234-247 14 p. (Lecture Notes in Computer Science - LNCS; vol. 7638)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    On the relation between the MXL family of algorithms and Groebner basis algorithms

    Albrecht, M., Cid, C., Faugere, J-C. & Perret, L. Aug 2012 In : Journal of Symbolic Computation. 47, 8, p. 926-941 16 p.

    Research output: Contribution to journalArticle

  25. Published

    The eSTREAM Portfolio in 2012: ECRYPT II report D.SYM.10

    Cid, C. & Robshaw, M. J. B. 16 Jan 2012 ECRYPT II. 18 p.

    Research output: Book/ReportOther report

  26. 2011
  27. Published

    End-to-end Cryptographic Security Systems for Payments

    Cid, C. Jan 2011 E-finance & Payments Law & Policy newsletter, 5, 01

    Research output: Contribution to non-peer-reviewed publicationNewspaper article

  28. Published

    Analysis of Message Injection in Stream Cipher-based Hash Functions

    Nakano, Y., Cid, C., Fukushima, K. & Kiyomoto, S. 2011 Applied Cryptography and Network Security - 9th International Conference, ACNS 2011. Springer, Vol. 6715, p. 498-513 15 p. (Lecture Notes in Computer Science - LNCS; vol. 6715)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Cold Boot Key Recovery by Solving Polynomial Systems with Noise

    Albrecht, M. & Cid, C. 2011 Applied Cryptography and Network Security - 9th International Conference, ACNS 2011. Springer, p. 57-72 16 p. (Lecture Notes in Computer Science - LNCS; vol. 6715)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Cryptanalysis of three matrix-based key establishment protocols

    Blackburn, S., Cid, C. & Mullan, C. 2011 In : Journal of Mathematical Cryptology. 5, 2, p. 159–168 11 p.

    Research output: Contribution to journalArticle

  31. Published

    Group Theory in Cryptography

    Blackburn, S., Cid, C. & Mullan, C. 2011 Group St Andrews 2009 in Bath. The London Mathematical Society, Vol. 387, p. 133-149 17 p. (LMS Lecture Note Series; vol. 387)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. 2010
  33. Published

    Algebraic Precomputations in Differential and Integral Cryptanalysis

    Albrecht, M., Cid, C., Dullien, T., Faugere, J-C. & Perret, L. 2010 Information Security and Cryptology - 6th International Conference, Inscrypt 2010. Springer, Vol. 6584, p. 387-403 17 p. (Lecture Notes in Computer Science - LNCS; vol. 6584)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    Nonlinear Equivalence of Stream Ciphers

    Rønjom, S. & Cid, C. 2010 Fast Software Encryption: 17th International Workshop, FSE 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers. Springer, p. 40-54 15 p. (Lecture Notes in Computer Science; vol. 6147)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    The MIFARE Classic story

    Mayes, K. E. & Cid, C. 2010 In : Information Security Technical Report. 15, 1, p. 8 - 12

    Research output: Contribution to journalArticle

  36. 2009
  37. Published

    The eSTREAM Portfolio - 2009 Annual Update: ECRYPT II report D.SYM.3

    Cid, C. & Robshaw, M. J. B. 1 Oct 2009 ECRYPT II. 10 p.

    Research output: Book/ReportOther report

  38. Published

    Algebraic Techniques in Differential Cryptanalysis

    Albrecht, M. & Cid, C. 2009 Fast Software Encryption: 16th International Workshop, FSE 2009 Leuven, Belgium, February 22-25, 2009: Revised Selected Papers. Dunkelman, O. (ed.). Springer, p. 193-208 16 p. (Lecture Notes in Computer Science - LNCS; vol. 5665)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    Block Ciphers: Algebraic Cryptanalysis and Gröbner Bases

    Cid, C. & Weinmann, R-P. 2009 Gröbner Bases, Coding, and Cryptography. Springer, p. 307-327 21 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  40. Published

    Cryptanalysis of the MST3 public key cryptosystem

    Blackburn, S. R., Cid, C. & Mullan, C. 2009 In : Journal of Mathematical Cryptology. 3, 4, p. 321-338 18 p.

    Research output: Contribution to journalArticle

  41. Published

    The RAKAPOSHI Stream Cipher

    Cid, C., Kiyomoto, S. & Kurihara, J. 2009 Information and Communications Security, 11th International Conference, ICICS 2009. Springer, Vol. 5927, p. 32-46 15 p. (Lecture Notes in Computer Sciences - LNCS; vol. 5927)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. 2008
  43. Published

    Algebraic Cryptanalysis of Symmetric Primitives: ECRYPT report D.STVL.7

    Cid, C. 18 Jul 2008 ECRYPT. 42 p.

    Research output: Book/ReportOther report

  44. Published
  45. 2007
  46. Published

    An Analysis of the Hermes8 Stream Ciphers

    Babbage, S., Cid, C., Pramstaller, N. & Raddum, H. 2007 Proceedings of the 12th Australasian Conference on Information Security and Privacy, ACISP 2007. Springer, Vol. 4586, p. 1-10 11 p. (Lecture Notes in Computer Science - LNCS; vol. 4586)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. 2006
  48. Published

    AES Security Report: ECRYPT Report D.STVL.2

    Cid, C. & Gilbert, H. 30 Jan 2006 ECRYPT. 73 p.

    Research output: Book/ReportOther report

  49. Published

    Algebraic Aspects of the Advanced Encryption Standard

    Cid, C., Murphy, S. & Robshaw, M. 2006 Springer.

    Research output: Book/ReportBook

  50. Published

    Cryptanalysis of a cryptosystem based on Drinfeld modules

    Blackburn, S. R., Cid, C. & Galbraith, S. G. 2006 In : IEE Proc. Information Security. 153, 1, p. 12-14 3 p.

    Research output: Contribution to journalArticle

  51. Published

    Cryptanalysis of Pomaranch

    Cid, C., Gilbert, H. & Johansson, T. 2006 In : IEE Proc. Information Security. 153, 2, p. 51-53 4 p.

    Research output: Contribution to journalArticle

  52. Published

    Recent developments in cryptographic hash functions: Security implications and future directions

    Cid, C. 2006 In : Information Security Technical Report. 11, 2, p. 100 - 107 8 p.

    Research output: Contribution to journalArticle

  53. 2005
  54. Published

    An Analysis of the XSL Algorithm

    Cid, C. & Gaetan, L. Dec 2005 Advances in Cryptology - ASIACRYPT 2005. Springer, Vol. 3788, p. 333-352 20 p. (Lecture Notes in Computer Science - LNCS; vol. 3788)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Published

    An Algebraic Framework for Cipher Embeddings

    Cid, C., Murphy, S. & Robshaw, M. J. B. 2005 Proceedings of Cryptography and Coding, 10th IMA International Conference, 2005. Smart, N. (ed.). Springer, Vol. 3796, p. 278-289 12 p. (Lecture Notes in Computer Science; vol. 3796)

    Research output: Chapter in Book/Report/Conference proceedingChapter

  56. Published

    Small Scale Variants of the AES

    Cid, C., Murphy, S. & Robshaw, M. J. B. 2005 Fast Software Encryption, 12th International Workshop, FSE 2005. Springer, Vol. 3557, p. 145-162 18 p. (Lecture Notes in Computer Science; vol. 3557)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. 2004
  58. Published

    Computational and Algebraic Aspects of the Advanced Encryption Standard

    Cid, C., Murphy, S. & Robshaw, M. J. B. 2004 Proceedings of the Seventh International Workshop on Computer Algebra in Scientific Computing, CASC 2004. p. 93-103 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Published

    Some Algebraic Aspects of the Advanced Encryption Standard

    Cid, C. 2004 Advanced Encryption Standard - AES 2004, 4th International Conference. Berlin: Springer, Vol. 3373, p. 58-66 9 p. (Lecture Notes in Computer Science; vol. 3373)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. 2003
  61. Published

    The Maple Package “Janet”: I. Polynomials Systems

    Blinkow, Y., Cid, C., Gerdt, V., Plesken, W. & Robertz, D. 2003 Proceedings of the Sixth International Workshop on Computer Algebra in Scientific Computing, CASC’ 2003. 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. Published

    The Maple Package “Janet”: II. Linear Partial Differential Systems

    Blinkow, Y., Cid, C., Gerdt, V., Plesken, W. & Robertz, D. 2003 Proceedings of the Sixth International Workshop on Computer Algebra in Scientific Computing, CASC’ 2003. 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. 2002
  64. Published

    Torsion-free metabelian groups with commutator quotient C_p^n x C_p^m

    Cid, C. 2002 In : Journal of Algebra. 248, p. 15-36 22 p.

    Research output: Contribution to journalArticle

  65. 2001
  66. Published

    Computation of Five- and Six-Dimensional Bieberbach Groups

    Cid, C. & Schulz, T. 2001 In : EXPERIMENTAL MATHEMATICS. 10, 1, p. 109-115 7 p.

    Research output: Contribution to journalArticle

  67. Published

    Invariants of Finite Groups and Involutive Division

    Cid, C. & Plesken, W. 2001 Computer Algebra in Scientific Computing CASC 2001. Springer, p. 123-135 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. 2000
  69. Published

    Bieberbach groups with finite commutator quotient and point-group C_p^n x C_p^m

    Cid, C. 2000 In : Journal of Group Theory. 3, 2, p. 113-125 13 p.

    Research output: Contribution to journalArticle

  70. 1999
  71. Published

    Grupos de Bieberbach Metabelianos com Quociente Derivado Finito

    Cid, C. 14 Jul 1999 90 p.

    Research output: ThesisDoctoral Thesis