Dr Colin Walter

  1. 2015
  2. Published

    Business risks of software vulnerabilities: Four sources of risk are relevant for evaluating the influence of software vulnerabilities on businesses

    Kramer, H. & Walter, C., Mar 2015, Computer Weekly, p. 1-11 11 p.

    Research output: Contribution to non-peer-reviewed publicationInternet publication

  3. 2013
  4. Published

    An Overview of PIC Microcontrollers and Their Suitability for Cryptographic Algorithms

    Msgna, M. & Walter, C., 13 Sep 2013, Secure Smart Embedded Devices, Platforms and Applications. Markantonakis, K. & Mayes, K. (eds.). Springer, p. 475-495 20 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  5. Published

    An NFC based consumer-level counterfeit detection framework

    Saeed, Q., Walter, C. & Bilal, Z., 2013, The 11th International Conference on Privacy, Security and Trust (PST 2013). IEEE, p. 135-142

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. 2012
  7. Published

    An Attack on Signed NFC Records and Some Necessary Revisions of NFC Specifications

    Saeed, Q. & Walter, C., Mar 2012, In : International Journal for Information Security Research. 2, 1/2, p. 325-334

    Research output: Contribution to journalArticle

  8. Published

    A Duality in Space Usage between Left-to-Right and Right-to-Left Exponentiation

    Walter, C. D., 2012, CT-RSA. Dunkelman, O. (ed.). Springer, Vol. 7178. p. 84-97 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Off-line NFC Tag Authentication

    Saeed, Q. & Walter, C., 2012, p. 730-735.

    Research output: Contribution to conferencePaper

  10. 2011
  11. Published

    A Record Composition/Decomposition Attack on the NDEF Signature Record Type Definition

    Saeed, M. Q. & Walter, C. D., 2011, 6th Internat. Conf. for Internet Technology and Secured Transactions (ICITST-2011). p. 283 - 287

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Fast Scalar Multiplication for ECC over GF(it p) using Division Chains

    Walter, C. D., 2011, WISA 2010. Chung, Y. & Yung, M. (eds.). Springer, Vol. 6513. p. 61-75 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Modular Arithmetic

    Contini, S., Koç, Ç. K. & Walter, C. D., 2011, Encyclopedia of Cryptography and Security (2nd Ed.). Tilborg, H. C. A. V. & Jajodia, S. (eds.). Springer, p. 795-798 4 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  14. 2009
  15. Published

    Optimal Recovery of Secret Keys from Weak Side Channel Traces

    Schindler, W. & Walter, C. D., 2009, 12th IMA Int. Conf. on Cryptography and Coding. Parker, M. G. (ed.). Springer, Vol. 5921. p. 446-468 23 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. 2008
  17. Published

    Leakage from Montgomery Multiplication

    Walter, C. D., 2008, Cryptographic Engineering. Koç, Ç. (ed.). Springer, p. 431-449 19 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  18. Published

    Longer Randomly Blinded RSA Keys may be Weaker than Shorter Ones

    Walter, C. D., 2008, WISA 2007. Kim, S., Yung, M. & Lee, H-W. (eds.). Springer, Vol. 4867. p. 303-316 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Randomised Exponentiation Algorithms

    Walter, C. D., 2008, Cryptographic Engineering. Koç, Ç. (ed.). Springer, p. 451-473 23 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  20. Published

    Recovering Secret Keys from Weak Side Channel Traces of Differing Lengths

    Walter, C. D., 2008, CHES 2008. Oswald, E. & Rohatgi, P. (eds.). Springer, Vol. 5154. p. 214-227 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. 2005
  22. Published

    Data Dependent Power Use in Multipliers

    Walter, C. D. & Samyde, D., 2005, 17th IEEE Symposium on Computer Arithmetic. IEEE Computer Society Press, p. 4-12 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Modular Arithmetic

    Contini, S., Koç, Ç. K. & Walter, C. D., 2005, Encyclopedia of Cryptography and Security. Tilborg, H. C. A. V. (ed.). Springer

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  24. Published

    Montgomery Arithmetic

    Koç, Ç. K. & Walter, C. D., 2005, Encyclopedia of Cryptography and Security. Tilborg, H. C. A. V. (ed.). Springer

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  25. 2004
  26. Published

    Issues of Security with the Oswald-Aigner Exponentiation Algorithm

    Walter, C. D., 2004, CT-RSA 2004. Okamoto, T. (ed.). Springer, Vol. 2964. p. 208-221 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Simple Power Analysis of Unified Code for ECC Double and Add

    Walter, C. D., 2004, CHES 2004. Joye, M. & Quisquater, J-J. (eds.). Springer, Vol. 3156. p. 191-204 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. 2003
  29. Published
  30. Published

    Fast Fourier Transforms using the Complex Logarithmic Number System

    Arnold, M. G., Bailey, T. A., Cowles, J. R. & Walter, C. D., 2003, In : VLSI Signal Processing. 33, 3, p. 325-335 11 p.

    Research output: Contribution to journalArticle

  31. Published

    Longer Keys May Facilitate Side Channel Attacks

    Walter, C. D., 2003, Selected Areas in Cryptography. Matsui, M. & Zuccherato, R. J. (eds.). Springer, Vol. 3006. p. 42-57 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    More Detail for a Combined Timing and Power Attack against Implementations of RSA

    Schindler, W. & Walter, C. D., 2003, 9th IMA Int. Conf. on Cryptography and Coding. Paterson, K. G. (ed.). Springer, Vol. 2898. p. 245-263 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Security Constraints on the Oswald-Aigner Exponentiation Algorithm

    Walter, C. D., 2003, In : IACR Cryptology ePrint Archive. 2003, p. 13 1 p.

    Research output: Contribution to journalArticle

  34. Published

    Seeing through MIST Given a Small Fraction of an RSA Private Key

    Walter, C. D., 2003, CT-RSA 2003. Joye, M. (ed.). Springer, Vol. 2612. p. 391-402 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Some Security Aspects of the MIST Randomized Exponentiation Algorithm

    Walter, C. D., 2003, CHES 2002. Jr., B. S. K., Koç, Ç. K. & Paar, C. (eds.). Springer, Vol. 2523. p. 276-290 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. 2002
  37. Published

    Breaking the Liardet-Smart Randomized Exponentiation Algorithm

    Walter, C. D., 2002, CARDIS '02. USENIX, p. 59-68 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    MIST: An Efficient, Randomized Exponentiation Algorithm for Resisting Power Analysis

    Walter, C. D., 2002, CT-RSA 2002. Preneel, B. (ed.). Springer, Vol. 2271. p. 53-66 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    Precise Bounds for Montgomery Modular Multiplication and some Potentially Insecure RSA Moduli

    Walter, C. D., 2002, CT-RSA 2002. Preneel, B. (ed.). Springer, Vol. 2271. p. 30-39 10 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. 2001
  41. Published

    Distinguishing Exponent Digits by Observing Modular Subtractions

    Walter, C. D. & Thompson, S., 2001, CT-RSA 2001. Naccache, D. (ed.). Springer, Vol. 2020. p. 192-207 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Sliding Windows Succumbs to Big Mac Attack

    Walter, C. D., 2001, CHES 2001. Koç, Ç. K., Naccache, D. & Paar, C. (eds.). Springer, Vol. 2162. p. 286-299 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    Unrestricted Faithful Rounding is Good Enough for Some LNS Applications

    Arnold, M. G. & Walter, C. D., 2001, 15th IEEE Symposium on Computer Arithmetic. IEEE Computer Society Press, p. 237-246 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. 2000
  45. Published

    Improved Linear Systolic Array for Fast Modular Exponentiation

    Walter, C. D., 1 Sep 2000, In : IEE Proc. Computers and Digital Techniques. 147, 5, p. 323-328 6 p.

    Research output: Contribution to journalArticle

  46. Published

    Data Integrity in Hardware for Modular Arithmetic

    Walter, C. D., 2000, CHES 2000. Koç, Ç. K. & Paar, C. (eds.). Springer, Vol. 1965. p. 204-215 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. 1999
  48. Published

    Montgomery Exponentiation Needs No Final Subtractions

    Walter, C. D., 1 Oct 1999, In : Electronics Letters. 35, 21, p. 1831-1832 2 p.

    Research output: Contribution to journalArticle

  49. Published

    Efficient Automata-Driven Pattern-Matching for Equational Programs

    Nedjah, N., Walter, C. D. & Eldridge, S. E., 1999, In : Softw., Pract. Exper.. 29, 9, p. 793-813 21 p.

    Research output: Contribution to journalArticle

  50. Published

    Moduli for Testing Implementations of the RSA Cryptosystem

    Walter, C. D., 1999, 14th IEEE Symposium on Computer Arithmetic. IEEE Computer Society Press, p. 78-85 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    Montgomery's Multiplication Technique: How to Make It Smaller and Faster

    Walter, C. D., 1999, CHES '99. Koç, Ç. K. & Paar, C. (eds.). Springer, Vol. 1717. p. 80-93 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. 1998
  53. Published

    Techniques for the Hardware Implementation of Modular Multiplication

    Walter, C. D., 1 Oct 1998, Proc. 2nd IMACS Internat. Conf. on Circuits, Systems Computers. Vol. 2. p. 945-949 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Published

    Exponentiation Using Division Chains

    Walter, C. D., 1998, In : IEEE Transactions on Computers. 47, 7, p. 757-765 9 p.

    Research output: Contribution to journalArticle

  55. Published

    Techniques for the Hardware Implementation of Modular Multiplication

    Walter, C. D., 1998, Recent Advances in Information Science and Technology. Mastorakis, N. (ed.). World Scientific, p. 157-161 5 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  56. 1997
  57. Published

    Analysis of Delays in Converting from a Redundant Representation

    Walter, C. D., 1 Jul 1997, In : IEE Proc. Computers and Digital Techniques. 144, 4, p. 219-221 3 p.

    Research output: Contribution to journalArticle

  58. Published

    Exponentiation using Division Chains

    Walter, C. D., 1997, 13th IEEE Symposium on Computer Arithmetic. IEEE Computer Society Press, p. 92-97 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Published

    Optimal Left-to-Right Pattern-Matching Automata

    Nedjah, N., Walter, C. D. & Eldridge, S. E., 1997, ALP '97 - HOA '97. Hanus, M., Heering, J. & Meinke, K. (eds.). Springer, Vol. 1298. p. 273-286 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Published

    Space/Time Trade-Offs for Higher Radix Modular Multiplication using Repeated Addition

    Walter, C. D., 1997, In : IEEE Transactions on Computers. 46, 2, p. 139-141 3 p.

    Research output: Contribution to journalArticle

  61. 1995
  62. Published

    Optimal Parameters for Fully On-Line Arithmetic

    Walter, C. D., 1995, In : International J. of Computer Mathematics. 56, p. 11-18 8 p.

    Research output: Contribution to journalArticle

  63. Published

    Still Faster Modular Multiplication

    Walter, C. D., 1995, In : Electronics Letters. 31, 4, p. 263-264 2 p.

    Research output: Contribution to journalArticle

  64. Published

    Verification of Hardware combining Multiplication, Division Square Root

    Walter, C. D., 1995, In : Microprocessors and Microsystems. 19, p. 243-245 3 p.

    Research output: Contribution to journalArticle

  65. 1994
  66. Published

    Improving Average Delay for On-Line Algorithms

    Walter, C. D., 1994, In : Electronics Letters. 30, 23, p. 1925-6 1 p.

    Research output: Contribution to journalArticle

  67. Published

    Logarithmic Speed Modular Multiplication

    Walter, C. D., 1994, In : Electronics Letters. 30, 17, p. 1397-1398 2 p.

    Research output: Contribution to journalArticle

  68. 1993
  69. Published

    Hardware Implementation of Montgomery's Modular Multiplication Algorithm

    Eldridge, S. E. & Walter, C. D., 1993, In : IEEE Transactions on Computers. 42, 6, p. 693-699 7 p.

    Research output: Contribution to journalArticle

  70. Published

    Systolic Modular Multiplication

    Walter, C. D., 1993, In : IEEE Transactions on Computers. 42, 3, p. 376-378 3 p.

    Research output: Contribution to journalArticle

  71. 1992
  72. Published

    Faster Modular Multiplication by Operand Scaling

    Walter, C. D., 1992, CRYPTO '91. Feigenbaum, J. (ed.). Springer, Vol. 576. p. 313-323 11 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. 1991
  74. Published

    Fast Modular Multiplication using 2-Power Radix

    Walter, C. D., 1991, In : International J. of Computer Mathematics. 3, p. 21-28 8 p.

    Research output: Contribution to journalArticle

  75. Published

    Formal Methods

    Walter, C. D., 1991, Concise Encyclopedia of Software Engineering. Morris, D. & Tamm, B. (eds.). Pergamon Press, p. 135-138 4 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  76. Published

    Formal Specification and Verification of Software

    Walter, C. D. & Eldridge, S. E., 1991, Concise Encyclopedia of Software Engineering. Morris, D. & Tamm, B. (eds.). Pergamon Press, p. 331-338 8 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  77. 1990
  78. Published

    A Verification of Brickell's Fast Modular Multiplication Algorithm

    Walter, C. D. & Eldridge, S. E., 1990, In : Internat. J. of Computer Maths. 33, p. 153-169 17 p.

    Research output: Contribution to journalArticle

  79. 1986
  80. Published

    A First Course in Formal Logic and its Applications in Computer Science

    Dowsing, R., Rayward-Smith, V. J. & Walter, C. D., 1986, Blackwell Scientific Publications, Oxford.

    Research output: Book/ReportBook

  81. Published

    Adjacency Matrices

    Walter, C. D., 1986, In : SIAM Journal on Algebraic and Discrete Methods. 7, p. 18-29 12 p.

    Research output: Contribution to journalArticle

  82. 1983
  83. Published

    Intersection numbers for coherent configurations and the spectrum of a graph

    Walter, C. D., 1983, In : Journal of Combinatorial Theory, Series B. 35, 2, p. 201-204 4 p.

    Research output: Contribution to journalArticle

  84. 1980
  85. Published

    Pure fields of degree 9 with class number prime to 3

    Walter, C. D., 1980, In : Annales de l'Institut Fourier, Grenoble. 30, p. 1-16 16 p.

    Research output: Contribution to journalArticle

  86. 1979
  87. Published

    Brauer's class number relation

    Walter, C. D., 1979, In : Acta Arithmetica. 35, p. 33-40 8 p.

    Research output: Contribution to journalArticle

  88. Published

    Kuroda's class number relation

    Walter, C. D., 1979, In : Acta Arithmetica. 35, p. 41-51 11 p.

    Research output: Contribution to journalArticle

  89. Published

    The ambiguous class group and the genus group of certain non-normal extensions

    Walter, C. D., 1979, In : Mathematika. 26, p. 113-124 12 p.

    Research output: Contribution to journalArticle

  90. 1977
  91. Published

    A class number relation in Frobenius extensions of number fields

    Walter, C. D., 1977, In : Mathematika. 24, p. 216-225 10 p.

    Research output: Contribution to journalArticle

  92. Published

    The class number of pure fields of prime degree (addendum)

    Parry, C. J. & Walter, C. D., 1977, In : Mathematika. 24, p. 122 1 p.

    Research output: Contribution to journalArticle

  93. 1976
  94. Published

    Class Number Relations in Algebraic Number Fields

    Walter, C. D., 1 Apr 1976, University of Cambridge.

    Research output: Book/ReportCommissioned report

  95. Published

    The class number of pure fields of prime degree

    Parry, C. J. & Walter, C. D., 1976, In : Mathematika. 23, p. 220-226 7 p.

    Research output: Contribution to journalArticle