Dan Page
Dan Page
Computer Science, University of Bristol
Verified email at - Homepage
Cited by
Cited by
Theoretical use of cache memory as a cryptanalytic side-channel
D Page
Cryptology ePrint Archive, 2002
Partitioned cache architecture as a side-channel defence mechanism
D Page
Cryptography ePrint Archive, Report 280, 2005
SoC it to EM: electromagnetic side-channel attacks on a complex system-on-chip
J Longo, E De Mulder, D Page, M Tunstall
Cryptographic Hardware and Embedded Systems--CHES 2015: 17th International …, 2015
Defending against cache-based side-channel attacks
D Page
Information Security Technical Report 8 (1), 30-44, 2003
A fault attack on pairing-based cryptography
D Page, F Vercauteren
IEEE Transactions on Computers 55 (9), 1075-1080, 2006
On the design and implementation of an efficient DAA scheme
L Chen, D Page, NP Smart
International Conference on Smart Card Research and Advanced Applications …, 2010
High security pairing-based cryptography revisited
R Granger, D Page, NP Smart
Algorithmic Number Theory: 7th International Symposium, ANTS-VII, Berlin …, 2006
A comparison of MNT curves and supersingular curves
D Page, NP Smart, F Vercauteren
Applicable Algebra in Engineering, Communication and Computing 17 (5), 379-392, 2006
Hardware and software normal basis arithmetic for pairing-based cryptography in characteristic three
R Granger, D Page, M Stam
IEEE Transactions on Computers 54 (7), 852-860, 2005
Hardware implementation of finite fields of characteristic three
D Page, NP Smart
International Workshop on Cryptographic Hardware and Embedded Systems, 529-539, 2002
Compiler assisted masking
A Moss, E Oswald, D Page, M Tunstall
Cryptographic Hardware and Embedded Systems–CHES 2012: 14th International …, 2012
Toward acceleration of RSA using 3D graphics hardware
A Moss, D Page, NP Smart
IMA International Conference on Cryptography and Coding, 364-383, 2007
On small characteristic algebraic tori in pairing-based cryptography
R Granger, D Page, M Stam
LMS Journal of Computation and Mathematics 9, 64-85, 2006
Software implementation of finite fields of characteristic three, for use in pairing-based cryptosystems
K Harrison, D Page, NP Smart
LMS Journal of Computation and Mathematics 5, 181-193, 2002
Side-channel analysis of cryptographic software via early-terminating multiplications
J Großschädl, E Oswald, D Page, M Tunstall
Information, Security and Cryptology–ICISC 2009: 12th International …, 2010
Instruction stream mutation for non-deterministic processors
J Irwin, D Page, NP Smart
Proceedings IEEE International Conference on Application-Specific Systems …, 2002
Hardware acceleration of the Tate pairing in characteristic three
P Grabher, D Page
Cryptographic Hardware and Embedded Systems–CHES 2005: 7th International …, 2005
Side-channel attacks on the McEliece and Niederreiter public-key cryptosystems
R Avanzi, S Hoerder, D Page, M Tunstall
Journal of Cryptographic Engineering 1, 271-281, 2011
A practical introduction to computer architecture
D Page
Springer Science & Business Media, 2009
On software parallel implementation of cryptographic pairings
P Grabher, J Großschädl, D Page
International Workshop on Selected Areas in Cryptography, 35-50, 2008
The system can't perform the operation now. Try again later.
Articles 1–20