What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Nigel P. Smart
Google Scholar
92
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/eurocrypt
Drifting Towards Better Error Probabilities in Fully Homomorphic Encryption Schemes.
Olivier Bernard
Marc Joye
Nigel P. Smart
Michael Walter
2025
journals/cic
Error-Simulatable Sanitization for TFHE and Applications.
Nigel P. Smart
Michael Walter
2024
journals/joc
Lightweight Asynchronous Verifiable Secret Sharing with Optimal Resilience.
Victor Shoup
Nigel P. Smart
2024
conf/acns
The Key Lattice Framework for Concurrent Group Messaging.
Kelong Cong
Karim Eldefrawy
Nigel P. Smart
Ben Terner
2023
journals/joc
Topical Collection on Computing on Encrypted Data.
David Pointcheval
Nigel P. Smart
2023
conf/asiacrypt
MPC with Delayed Parties over Star-Like Networks.
Mariana Gama
Emad Heydari Beni
Emmanuela Orsini
Nigel P. Smart
Oliver Zajonc
2022
journals/joc
Actively Secure Setup for SPDZ.
Dragos Rotaru
Nigel P. Smart
Titouan Tanguy
Frederik Vercauteren
Tim Wood
2022
conf/ccs
Feta: Efficient Threshold Designated-Verifier Zero-Knowledge Proofs.
Carsten Baum
Robin Jadoul
Emmanuela Orsini
Peter Scholl
Nigel P. Smart
2022
conf/fc
Kicking-the-Bucket: Fast Privacy-Preserving Trading Using Buckets.
Mariana Botelho da Gama
John Cartlidge
Antigoni Polychroniadou
Nigel P. Smart
Younes Talibi Alaoui
2022
conf/ctrsa
Private Liquidity Matching Using MPC.
Shahla Atapoor
Nigel P. Smart
Younes Talibi Alaoui
2022
conf/asiacrypt
FINAL: Faster FHE Instantiated with NTRU and LWE.
Charlotte Bonte
Ilia Iliashenko
Jeongeun Park
Hilder V. L. Pereira
Nigel P. Smart
2021
journals/joc
High-Performance Multi-party Computation for Binary Circuits Based on Oblivious Transfer.
Sai Sheshank Burra
Enrique Larraia
Jesper Buus Nielsen
Peter Sebastian Nordholt
Claudio Orlandi
Emmanuela Orsini
Peter Scholl
Nigel P. Smart
2021
conf/latincrypt
The Cost of IEEE Arithmetic in Secure Computation.
David W. Archer
Shahla Atapoor
Nigel P. Smart
2021
conf/pkc
Round-Optimal Verifiable Oblivious Pseudorandom Functions from Ideal Lattices.
Martin R. Albrecht
Alex Davidson
Amit Deo
Nigel P. Smart
2021
conf/ctrsa
Secure Fast Evaluation of Iterative Methods: With an Application to Secure PageRank.
Daniele Cozzo
Nigel P. Smart
Younes Talibi Alaoui
2021
conf/ctrsa
Compilation of Function Representations for Secure Computing Paradigms.
Karim Baghery
Cyprien Delpech de Saint Guilhem
Emmanuela Orsini
Nigel P. Smart
Titouan Tanguy
2021
conf/eurocrypt
Large Scale, Actively Secure Computation from LPN and Free-XOR Garbled Circuits.
Aner Ben-Efraim
Kelong Cong
Eran Omri
Emmanuela Orsini
Nigel P. Smart
Eduardo Soria-Vazquez
2021
conf/asiacrypt
Gladius: LWR Based Efficient Hybrid Public Key Encryption with Distributed Decryption.
Kelong Cong
Daniele Cozzo
Varun Maram
Nigel P. Smart
2021
conf/sacrypt
<sub>2</sub> Access Structures over Rings and Fields.
Robin Jadoul
Nigel P. Smart
Barry Van Leeuwen
2020
conf/ctrsa
Overdrive2k: Efficient Secure MPC over $\mathbb {Z}_{2^k}$ from Somewhat Homomorphic Encryption.
Emmanuela Orsini
Nigel P. Smart
Frederik Vercauteren
2020
conf/cans
Semi-commutative Masking: A Framework for Isogeny-Based Protocols, with an Application to Fully Secure Two-Round Isogeny-Based OT.
Cyprien Delpech de Saint Guilhem
Emmanuela Orsini
Christophe Petit
Nigel P. Smart
2019
journals/joc
Efficient Constant-Round Multi-party Computation Combining BMR and SPDZ.
Yehuda Lindell
Benny Pinkas
Nigel P. Smart
Avishay Yanai
2019
conf/ccs
TaaS: Commodity MPC via Triples-as-a-Service.
Nigel P. Smart
Titouan Tanguy
2019
conf/ccs
Zaphod: Efficiently Combining LSSS and Garbled Circuits in SCALE.
Abdelrahaman Aly
Emmanuela Orsini
Dragos Rotaru
Nigel P. Smart
Tim Wood
2019
conf/ccs
MPC Joins The Dark Side.
John Cartlidge
Nigel P. Smart
Younes Talibi Alaoui
2019
conf/acisp
Adding Distributed Decryption and Key Generation to a Ring-LWE Based CCA Encryption Scheme.
Michael Kraitsberg
Yehuda Lindell
Valery Osheter
Nigel P. Smart
Younes Talibi Alaoui
2019
conf/acns
Benchmarking Privacy Preserving Scientific Operations.
Abdelrahaman Aly
Nigel P. Smart
2019
conf/ctrsa
Error Detection in Monotone Span Programs with Application to Communication-Efficient Multi-party Computation.
Nigel P. Smart
Tim Wood
2019
conf/ctrsa
EPIC: Efficient Private Image Classification (or: Learning from the Masters).
Eleftheria Makri
Dragos Rotaru
Nigel P. Smart
Frederik Vercauteren
2019
conf/sacrypt
BBQ: Using AES in Picnic Signatures.
Cyprien Delpech de Saint Guilhem
Lauren De Meyer
Emmanuela Orsini
Nigel P. Smart
2019
conf/sacrypt
Using TopGear in Overdrive: A More Efficient ZKPoK for SPDZ.
Carsten Baum
Daniele Cozzo
Nigel P. Smart
2018
conf/crypto
CAPA: The Spirit of Beaver Against Physical Attacks.
Oscar Reparaz
Lauren De Meyer
Begül Bilgin
Victor Arribas
Svetla Nikova
Ventzislav Nikov
Nigel P. Smart
2017
journals/tosc
Modes of Operation Suitable for Computing on Encrypted Data.
Dragos Rotaru
Nigel P. Smart
Martijn Stam
2017
conf/fc
Faster Homomorphic Evaluation of Discrete Fourier Transforms.
Anamaria Costache
Nigel P. Smart
Srinivas Vivek
2017
conf/esorics
Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts.
Martin R. Albrecht
Emmanuela Orsini
Kenneth G. Paterson
Guy Peer
Nigel P. Smart
2017
conf/esorics
Multi-rate Threshold FlipThem.
David S. Leslie
Chris Sherfield
Nigel P. Smart
2016
conf/ccs
MPC-Friendly Symmetric Key Primitives.
Lorenzo Grassi
Christian Rechberger
Dragos Rotaru
Peter Scholl
Nigel P. Smart
2016
conf/ccs
Masking and MPC: When Crypto Theory Meets Crypto Practice.
Nigel P. Smart
2016
conf/ctrsa
Which Ring Based Somewhat Homomorphic Encryption Scheme is Best?
Ana Costache
Nigel P. Smart
2016
conf/sacrypt
Fixed-Point Arithmetic in SHE Schemes.
Anamaria Costache
Nigel P. Smart
Srinivas Vivek
Adrian Waller
2016
conf/tcc
More Efficient Constant-Round Multi-party Computation from BMR and SHE.
Yehuda Lindell
Nigel P. Smart
Eduardo Soria-Vazquez
2015
conf/crypto
Efficient Constant Round Multi-party Computation Combining BMR and SPDZ.
Yehuda Lindell
Benny Pinkas
Nigel P. Smart
Avishay Yanai
2015
conf/pkc
Bootstrapping BGV Ciphertexts with a Wider Choice of p and q.
Emmanuela Orsini
Joop van de Pol
Nigel P. Smart
2015
conf/ctrsa
Just a Little Bit More.
Joop van de Pol
Nigel P. Smart
Yuval Yarom
2014
conf/crypto
Dishonest Majority Multi-Party Computation for Binary Circuits.
Enrique Larraia
Emmanuela Orsini
Nigel P. Smart
2014
conf/ches
"Ooh Aah... Just a Little Bit" : A Small Amount of Side Channel Can Go a Long Way.
Naomi Benger
Joop van de Pol
Nigel P. Smart
Yuval Yarom
2014
conf/asiacrypt
Actively Secure Private Function Evaluation.
Payman Mohassel
Seyed Saeed Sadeghian
Nigel P. Smart
2013
conf/ccs
An analysis of the EMV channel establishment protocol.
Christina Brzuska
Nigel P. Smart
Bogdan Warinschi
Gaven J. Watson
2013
conf/ccs
An architecture for practical actively secure MPC with dishonest majority.
Marcel Keller
Peter Scholl
Nigel P. Smart
2013
conf/ccs
A brief history of practical multi-party computation.
Nigel P. Smart
2013
conf/esorics
Practical Covertly Secure MPC for Dishonest Majority - Or: Breaking the SPDZ Limits.
Ivan Damgård
Marcel Keller
Enrique Larraia
Valerio Pastro
Peter Scholl
Nigel P. Smart
2013
conf/ctrsa
The Low-Call Diet: Authenticated Encryption for Call Counting HSM Users.
Mike Bond
George French
Nigel P. Smart
Gaven J. Watson
2013
conf/asiacrypt
Between a Rock and a Hard Place: Interpolating between MPC and FHE.
Ashish Choudhury
Jake Loftus
Emmanuela Orsini
Arpita Patra
Nigel P. Smart
2012
conf/crypto
Homomorphic Evaluation of the AES Circuit.
Craig Gentry
Shai Halevi
Nigel P. Smart
2012
conf/crypto
Multiparty Computation from Somewhat Homomorphic Encryption.
Ivan Damgård
Valerio Pastro
Nigel P. Smart
Sarah Zakarias
2012
conf/pkc
Better Bootstrapping in Fully Homomorphic Encryption.
Craig Gentry
Shai Halevi
Nigel P. Smart
2012
conf/ctrsa
On the Joint Security of Encryption and Signature in EMV.
Jean Paul Degabriele
Anja Lehmann
Kenneth G. Paterson
Nigel P. Smart
Mario Strefler
2012
conf/eurocrypt
Fully Homomorphic Encryption with Polylog Overhead.
Craig Gentry
Shai Halevi
Nigel P. Smart
2011
journals/joc
Wildcarded Identity-Based Encryption.
Michel Abdalla
James Birkett
Dario Catalano
Alexander W. Dent
John Malone-Lee
Gregory Neven
Jacob C. N. Schuldt
Nigel P. Smart
2011
conf/africacrypt
Secure Outsourced Computation.
Jake Loftus
Nigel P. Smart
2011
conf/sacrypt
On CCA-Secure Somewhat Homomorphic Encryption.
Jake Loftus
Alexander May
Nigel P. Smart
Frederik Vercauteren
2010
journals/joc
The TLS Handshake Protocol: A Modular Analysis.
Paul Morrissey
Nigel P. Smart
Bogdan Warinschi
2010
conf/pkc
Groth-Sahai Proofs Revisited.
Essam Ghadafi
Nigel P. Smart
Bogdan Warinschi
2010
conf/pkc
Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes.
Nigel P. Smart
Frederik Vercauteren
2010
conf/ctrsa
Errors Matter: Breaking RSA-Based PIN Encryption with Thirty Ciphertext Validity Queries.
Nigel P. Smart
2009
conf/asiacrypt
Security Notions and Generic Constructions for Client Puzzles.
Liqun Chen
Paul Morrissey
Nigel P. Smart
Bogdan Warinschi
2009
conf/asiacrypt
Secure Two-Party Computation Is Practical.
Benny Pinkas
Thomas Schneider
Nigel P. Smart
Stephen C. Williams
2008
journals/joc
Generic Constructions of Identity-Based and Certificateless KEMs.
Kamel Bentahar
Pooya Farshim
John Malone-Lee
Nigel P. Smart
2008
conf/provsec
On Proofs of Security for DAA Schemes.
Liqun Chen
Paul Morrissey
Nigel P. Smart
2008
conf/asiacrypt
A Modular Security Analysis of the TLS Handshake Protocol.
Paul Morrissey
Nigel P. Smart
Bogdan Warinschi
2007
conf/pkc
Identity-Based Traitor Tracing.
Michel Abdalla
Alexander W. Dent
John Malone-Lee
Gregory Neven
Duong Hieu Phan
Nigel P. Smart
2006
conf/crypto
The Number Field Sieve in the Medium Prime Case.
Antoine Joux
Reynald Lercier
Nigel P. Smart
Frederik Vercauteren
2005
conf/ches
Further Hidden Markov Model Cryptanalysis.
P. J. Green
Richard Noad
Nigel P. Smart
2004
conf/ches
Attacking DSA Under a Repeated Bits Assumption.
Peter James Leadbitter
Dan Page
Nigel P. Smart
2004
conf/eurocrypt
Projective Coordinates Leak.
David Naccache
Nigel P. Smart
Jacques Stern
2003
conf/ches
An Analysis of Goubin's Refined Power Analysis Attack.
Nigel P. Smart
2003
conf/ctrsa
Access Control Using Pairing Based Cryptography.
Nigel P. Smart
2002
journals/joc
Constructive and Destructive Facets of Weil Descent on Elliptic Curves.
Pierrick Gaudry
Florian Hess
Nigel P. Smart
2002
conf/crypto
Flaws in Applying Proof Methodologies to Signature Schemes.
Jacques Stern
David Pointcheval
John Malone-Lee
Nigel P. Smart
2002
conf/ches
Hardware Implementation of Finite Fields of Characteristic Three.
Dan Page
Nigel P. Smart
2002
conf/eurocrypt
Extending the GHS Weil Descent Attack.
Steven D. Galbraith
Florian Hess
Nigel P. Smart
2002
conf/sacrypt
Modifications of ECDSA.
John Malone-Lee
Nigel P. Smart
2001
conf/acisp
Non-deterministic Processors.
David May
Henk L. Muller
Nigel P. Smart
2001
conf/ches
Random Register Renaming to Foil DPA.
David May
Henk L. Muller
Nigel P. Smart
2001
conf/ches
The Hessian Form of an Elliptic Curve.
Nigel P. Smart
2001
conf/ches
Preventing SPA/DPA in ECC Systems Using the Jacobi Form.
Pierre-Yvan Liardet
Nigel P. Smart
2001
conf/eurocrypt
How Secure Are Elliptic Curves over Composite Extension Fields?
Nigel P. Smart
2001
conf/sacrypt
Two Topics in Hyperelliptic Cryptography.
Florian Hess
Gadiel Seroussi
Nigel P. Smart
1999
journals/joc
Elliptic Curve Cryptosystems over Small Fields of Odd Characteristic.
Nigel P. Smart
1999
journals/joc
The Discrete Logarithm Problem on Elliptic Curves of Trace One.
Nigel P. Smart
1999
journals/joc
A Fast Diffie-Hellman Protocol in Genus 2.
Nigel P. Smart
Samir Siksek
1999
conf/eurocrypt
On the Performance of Hyperelliptic Cryptosystems.
Nigel P. Smart
Coauthors
Abdelrahaman Aly
(2)
Adrian Waller
(1)
Alex Davidson
(1)
Alexander May
(1)
Alexander W. Dent
(2)
Amit Deo
(1)
Ana Costache
(1)
Anamaria Costache
(2)
Aner Ben-Efraim
(1)
Anja Lehmann
(1)
Antigoni Polychroniadou
(1)
Antoine Joux
(1)
Arpita Patra
(1)
Ashish Choudhury
(1)
Avishay Yanai
(2)
Barry Van Leeuwen
(1)
Begül Bilgin
(1)
Ben Terner
(1)
Benny Pinkas
(3)
Bogdan Warinschi
(5)
Carsten Baum
(2)
Charlotte Bonte
(1)
Chris Sherfield
(1)
Christian Rechberger
(1)
Christina Brzuska
(1)
Christophe Petit
(1)
Claudio Orlandi
(1)
Craig Gentry
(3)
Cyprien Delpech de Saint Guilhem
(3)
Dan Page
(2)
Daniele Cozzo
(3)
Dario Catalano
(1)
David May
(2)
David Naccache
(1)
David Pointcheval
(2)
David S. Leslie
(1)
David W. Archer
(1)
Dragos Rotaru
(5)
Duong Hieu Phan
(1)
Eduardo Soria-Vazquez
(2)
Eleftheria Makri
(1)
Emad Heydari Beni
(1)
Emmanuela Orsini
(13)
Enrique Larraia
(3)
Eran Omri
(1)
Essam Ghadafi
(1)
Florian Hess
(3)
Frederik Vercauteren
(6)
Gadiel Seroussi
(1)
Gaven J. Watson
(2)
George French
(1)
Gregory Neven
(2)
Guy Peer
(1)
Henk L. Muller
(2)
Hilder V. L. Pereira
(1)
Ilia Iliashenko
(1)
Ivan Damgård
(2)
Jacob C. N. Schuldt
(1)
Jacques Stern
(2)
Jake Loftus
(3)
James Birkett
(1)
Jean Paul Degabriele
(1)
Jeongeun Park
(1)
Jesper Buus Nielsen
(1)
John Cartlidge
(2)
John Malone-Lee
(5)
Joop van de Pol
(3)
Kamel Bentahar
(1)
Karim Baghery
(1)
Karim Eldefrawy
(1)
Kelong Cong
(3)
Kenneth G. Paterson
(2)
Lauren De Meyer
(2)
Liqun Chen
(2)
Lorenzo Grassi
(1)
Marc Joye
(1)
Marcel Keller
(2)
Mariana Botelho da Gama
(1)
Mariana Gama
(1)
Mario Strefler
(1)
Martijn Stam
(1)
Martin R. Albrecht
(2)
Michael Kraitsberg
(1)
Michael Walter
(2)
Michel Abdalla
(2)
Mike Bond
(1)
Naomi Benger
(1)
Nigel P. Smart
(92)
Oliver Zajonc
(1)
Olivier Bernard
(1)
Oscar Reparaz
(1)
P. J. Green
(1)
Paul Morrissey
(4)
Payman Mohassel
(1)
Peter James Leadbitter
(1)
Peter Scholl
(5)
Peter Sebastian Nordholt
(1)
Pierre-Yvan Liardet
(1)
Pierrick Gaudry
(1)
Pooya Farshim
(1)
Reynald Lercier
(1)
Richard Noad
(1)
Robin Jadoul
(2)
Sai Sheshank Burra
(1)
Samir Siksek
(1)
Sarah Zakarias
(1)
Seyed Saeed Sadeghian
(1)
Shahla Atapoor
(2)
Shai Halevi
(3)
Srinivas Vivek
(2)
Stephen C. Williams
(1)
Steven D. Galbraith
(1)
Svetla Nikova
(1)
Thomas Schneider
(1)
Tim Wood
(3)
Titouan Tanguy
(3)
Valerio Pastro
(2)
Valery Osheter
(1)
Varun Maram
(1)
Ventzislav Nikov
(1)
Victor Arribas
(1)
Victor Shoup
(1)
Yehuda Lindell
(4)
Younes Talibi Alaoui
(5)
Yuval Yarom
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to