Nigel P. Smart
Orcid: 0000-0003-3567-3304Affiliations:
- KU Leuven, Belgium
- University of Bristol, UK (former)
According to our database1,
Nigel P. Smart
authored at least 213 papers
between 1996 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on idref.fr
-
on viaf.org
-
on twitter.com
-
on orcid.org
-
on id.ndl.go.jp
-
on id.loc.gov
-
on d-nb.info
-
on isni.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2025
IACR Cryptol. ePrint Arch., 2025
IACR Commun. Cryptol., 2025
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025
2024
Multiparty Computation: To Secure Privacy, Do the Math: A discussion with Nigel Smart, Joshua W. Baron, Sanjay Saravanan, Jordan Brandt, and Atefeh Mashatan.
ACM Queue, 2024
Proceedings of the Applied Cryptography and Network Security, 2024
2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the 11th Workshop on Encrypted Computing & Applied Homomorphic Cryptography, 2023
Proceedings of the 11th Workshop on Encrypted Computing & Applied Homomorphic Cryptography, 2023
Proceedings of the Cryptography and Coding - 19th IMA International Conference, 2023
Proceedings of the Cryptography and Coding - 19th IMA International Conference, 2023
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023
2022
All for one and one for all: Fully decentralised privacy-preserving dark pool trading using multi-party computation.
IACR Cryptol. ePrint Arch., 2022
Proceedings of the Security and Cryptography for Networks - 13th International Conference, 2022
Proceedings of the Financial Cryptography and Data Security, 2022
Proceedings of the Topics in Cryptology - CT-RSA 2022, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022
2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the Selected Areas in Cryptography - 28th International Conference, 2021
Proceedings of the Public-Key Cryptography - PKC 2021, 2021
Proceedings of the Progress in Cryptology - LATINCRYPT 2021, 2021
Proceedings of the Cryptography and Coding - 18th IMA International Conference, 2021
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021
Proceedings of the Topics in Cryptology - CT-RSA 2021, 2021
Proceedings of the Topics in Cryptology - CT-RSA 2021, 2021
Gladius: LWR Based Efficient Hybrid Public Key Encryption with Distributed Decryption.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021
2020
Multi-Party Computation Mechanism for Anonymous Equity Block Trading: A Secure Implementation of Turquoise Plato Uncross.
IACR Cryptol. ePrint Arch., 2020
Sashimi: Cutting up CSI-FiSh Secret Keys to Produce an Actively Secure Distributed Signing Protocol.
Proceedings of the Post-Quantum Cryptography - 11th International Conference, 2020
Overdrive2k: Efficient Secure MPC over $\mathbb {Z}_{2^k}$ from Somewhat Homomorphic Encryption.
Proceedings of the Topics in Cryptology - CT-RSA 2020, 2020
Semi-commutative Masking: A Framework for Isogeny-Based Protocols, with an Application to Fully Secure Two-Round Isogeny-Based OT.
Proceedings of the Cryptology and Network Security - 19th International Conference, 2020
2019
IACR Cryptol. ePrint Arch., 2019
Overdrive2k: Efficient Secure MPC over Z<sub>2<sup>k</sup></sub> from Somewhat Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2019
Proceedings of the Selected Areas in Cryptography - SAC 2019, 2019
Proceedings of the Selected Areas in Cryptography - SAC 2019, 2019
Proceedings of the Cryptography and Coding - 17th IMA International Conference, 2019
Proceedings of the Cryptography and Coding - 17th IMA International Conference, 2019
Error Detection in Monotone Span Programs with Application to Communication-Efficient Multi-party Computation.
Proceedings of the Topics in Cryptology - CT-RSA 2019, 2019
Proceedings of the Topics in Cryptology - CT-RSA 2019, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
Proceedings of the 7th ACM Workshop on Encrypted Computing & Applied Homomorphic Cryptography, 2019
Proceedings of the Applied Cryptography and Network Security, 2019
Adding Distributed Decryption and Key Generation to a Ring-LWE Based CCA Encryption Scheme.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019
2018
Error-Detecting in Monotone Span Programs with Application to Communication Efficient Multi-Party Computation.
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018
2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Information Security - 20th International Conference, 2017
Proceedings of the Cryptography and Coding - 16th IMA International Conference, 2017
Proceedings of the Financial Cryptography and Data Security, 2017
Proceedings of the Computer Security - ESORICS 2017, 2017
Proceedings of the Computer Security - ESORICS 2017, 2017
2016
Information Security and Cryptography, Springer, ISBN: 978-3-319-21936-3, 2016
IET Inf. Secur., 2016
Modern Cryptography and Security: An Inter-Community Dialogue (Dagstuhl Seminar 16051).
Dagstuhl Reports, 2016
Proceedings of the Theory of Cryptography - 14th International Conference, 2016
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016
Proceedings of the Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29, 2016
Proceedings of the ACM Workshop on Theory of Implementation Security, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
IACR Cryptol. ePrint Arch., 2015
High Performance Multi-Party Computation for Binary Circuits Based on Oblivious Transfer.
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015
Proceedings of the Decision and Game Theory for Security - 6th International Conference, 2015
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015
2014
Undergraduate Topics in Computer Science, Springer, ISBN: 978-3-319-04041-7, 2014
Proceedings of the Security and Cryptography for Networks - 9th International Conference, 2014
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2014, 2014
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014
2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Cryptography and Coding - 14th IMA International Conference, 2013
Proceedings of the Computer Security - ESORICS 2013, 2013
Proceedings of the Topics in Cryptology - CT-RSA 2013, 2013
Proceedings of the PETShop'13, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013
2012
Relations between the security models for certificateless encryption and ID-based key agreement.
Int. J. Inf. Sec., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012
Proceedings of the Public Key Cryptography - PKC 2012, 2012
Proceedings of the Information Security - 15th International Conference, 2012
Proceedings of the Progress in Cryptology, 2012
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012
2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Selected Areas in Cryptography - 18th International Workshop, 2011
Proceedings of the Cryptography and Coding - 13th IMA International Conference, 2011
Proceedings of the Progress in Cryptology - AFRICACRYPT 2011, 2011
2010
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010
Proceedings of the Public Key Cryptography, 2010
Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement.
Proceedings of the Pairing-Based Cryptography - Pairing 2010, 2010
Errors Matter: Breaking RSA-Based PIN Encryption with Thirty Ciphertext Validity Queries.
Proceedings of the Topics in Cryptology, 2010
Proceedings of the Smart Card Research and Advanced Application, 2010
2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Pairing-Based Cryptography, 2009
Proceedings of the Cryptography and Coding, 2009
Proceedings of the Cryptography and Coding, 2009
Proceedings of the Advances in Cryptology, 2009
Proceedings of the Advances in Cryptology, 2009
2008
Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries.
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008
Proceedings of the Provable Security, Second International Conference, 2008
Proceedings of the Advances in Cryptology, 2008
2007
Math. Comput., 2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of the Cryptography and Coding, 2007
Proceedings of the Cryptography and Coding, 2007
Proceedings of the Cryptography and Coding, 2007
2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Automata, Languages and Programming, 33rd International Colloquium, 2006
Proceedings of the Advances in Cryptology, 2006
Proceedings of the Algorithmic Number Theory, 7th International Symposium, 2006
2005
IACR Cryptol. ePrint Arch., 2005
IACR Cryptol. ePrint Arch., 2005
IACR Cryptol. ePrint Arch., 2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the Cryptography and Coding, 2005
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29, 2005
2004
IEEE Trans. Computers, 2004
The Equivalence between the DHP and DLP for Elliptic Curves Used in Practical Applications.
LMS J. Comput. Math., 2004
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
Proceedings of the Security in Communication Networks, 4th International Conference, 2004
An Algebraic Approach to NTRU (q = 2n) via Witt Vectors and Overdetermined Systems of Nonlinear Equations.
Proceedings of the Security in Communication Networks, 4th International Conference, 2004
Proceedings of the Cryptographic Hardware and Embedded Systems, 2004
Proceedings of the Algorithmic Number Theory, 6th International Symposium, 2004
2003
Point Multiplication on Ordinary Elliptic Curves over Fields of Characteristic Three.
Appl. Algebra Eng. Commun. Comput., 2003
Proceedings of the Information Security, 6th International Conference, 2003
Proceedings of the Cryptography and Coding, 2003
Proceedings of the Topics in Cryptology, 2003
Proceedings of the Cryptographic Hardware and Embedded Systems, 2003
2002
Software Implementation of Finite Fields of Characteristic Three, for Use in Pairing-based Cryptosystems.
LMS J. Comput. Math., 2002
J. Cryptol., 2002
Proceedings of the Information Security, 5th International Conference, 2002
Proceedings of the Infrastructure Security, International Conference, 2002
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002
Proceedings of the Advances in Cryptology, 2002
Proceedings of the Cryptographic Hardware and Embedded Systems, 2002
Proceedings of the 13th IEEE International Conference on Application-Specific Systems, 2002
2001
Inf. Process. Lett., 2001
IACR Cryptol. ePrint Arch., 2001
Lattice Attacks on Digital Signature Schemes.
Des. Codes Cryptogr., 2001
Proceedings of the Selected Areas in Cryptography, 8th Annual International Workshop, 2001
Proceedings of the Cryptography and Coding, 2001
Proceedings of the Advances in Cryptology, 2001
Proceedings of the Cryptographic Hardware and Embedded Systems, 2001
Proceedings of the Cryptographic Hardware and Embedded Systems, 2001
Proceedings of the Cryptographic Hardware and Embedded Systems, 2001
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001
2000
Proceedings of the Fourth International Symposium on Wearable Computers (ISWC 2000), 2000
1999
J. Cryptol., 1999
Proceedings of the Cryptography and Coding, 1999
Proceedings of the Advances in Cryptology, 1999
1998
A Comparison of Direct and Indirect Methods for Computing Selmer Groups of an Elliptic Curve.
Proceedings of the Algorithmic Number Theory, Third International Symposium, 1998
The algorithmic resolution of diophantine equations - a computational cookbook.
London Mathematical Society student texts 41, Cambridge University Press, ISBN: 978-0-521-64633-8, 1998
1996
Proceedings of the Algorithmic Number Theory, Second International Symposium, 1996