Nigel Smart
Nigel Smart
Verified email at kuleuven.be - Homepage
TitleCited byYear
Elliptic curves in cryptography
Ian F.. Blake, G Seroussi, NP Smart
Cambridge University Press, 1999
2018*1999
Fully homomorphic encryption with relatively small key and ciphertext sizes
N Smart, F Vercauteren
Public Key Cryptography–PKC 2010, 420-443, 2010
8952010
Pairings for cryptographers
SD Galbraith, KG Paterson, NP Smart
Discrete Applied Mathematics 156 (16), 3113-3121, 2008
7702008
Multiparty computation from somewhat homomorphic encryption
I Damgård, V Pastro, N Smart, S Zakarias
Advances in Cryptology–CRYPTO 2012, 643-662, 2012
6702012
Advances in Elliptic Curve Cryptography, volume 317 of London Mathematical Society Lecture Note Series
IF Blake, G Seroussi, NP Smart
Cambridge University Press, Cambridge 19 (20), 666, 2005
670*2005
Homomorphic Evaluation of the AES Circuit
C Gentry, S Halevi, NP Smart
Advances in Cryptology - CRYPTO 2012, 2012
6432012
Identity-based authenticated key agreement protocol based on Weil pairing
NP Smart
Electronics Letters 38 (13), 630-632, 2002
6132002
Identity-based key agreement protocols from pairings
L Chen, Z Cheng, NP Smart
International Journal of Information Security 6 (4), 213-241, 2007
5192007
The Eta pairing revisited
F Hess, NP Smart, F Vercauteren
Information Theory, IEEE Transactions on 52 (10), 4595-4602, 2006
5082006
Fully homomorphic SIMD operations
NP Smart, F Vercauteren
Designs, Codes and Cryptography 71, 57-81, 2014
4862014
Fully Homomorphic Encryption with Polylog Overhead
C Gentry, S Halevi, NP Smart
Advances in Cryptology - EUROCRYPT, 2012, 2012
4622012
The discrete logarithm problem on elliptic curves of trace one
NP Smart
Journal of cryptology 12 (3), 193-196, 1999
4561999
Secure two-party computation is practical
B Pinkas, T Schneider, N Smart, S Williams
Advances in Cryptology–ASIACRYPT 2009, 250-267, 2009
4512009
Constructive and destructive facets of Weil descent on elliptic curves
P Gaudry, F Hess, NP Smart
Journal of Cryptology 15 (1), 19-46, 2002
4132002
Cryptography: an introduction
NP Smart
McGraw-Hill, 2003
3012003
Practical Covertly Secure MPC for Dishonest Majority–or: Breaking the SPDZ Limits
I Damgard, M Keller, E Larraia, V Pastro, P Scholl, NP Smart
ESORICS 2013, 2013
2682013
The algorithmic resolution of Diophantine equations
NP Smart
Cambridge Univ Pr, 1998
254*1998
Preventing SPA/DPA in ECC systems using the Jacobi form
P Liardet, N Smart
Cryptographic Hardware and Embedded Systems—CHES 2001, 391-401, 2001
2402001
Lattice attacks on digital signature schemes
NA Howgrave-Graham, NP Smart
Designs, Codes and Cryptography 23 (3), 283-290, 2001
2202001
Better Bootstrapping in Fully Homomorphic Encryption
C Gentry, S Halevi, NP Smart
Public Key Cryptography – PKC 2012, 1-16, 2011
1952011
The system can't perform the operation now. Try again later.
Articles 1–20