Dan Page
Orcid: 0000-0002-4709-7036Affiliations:
- University of Bristol, UK
According to our database1,
Dan Page
authored at least 101 papers
between 1999 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on twitter.com
-
on orcid.org
-
on github.com
On csauthors.net:
Bibliography
2024
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024
Proceedings of the 8th IEEE/ACM International Workshop on Games and Software Engineering, 2024
RISC-V Instruction Set Extensions for Multi-Precision Integer Arithmetic: A Case Study on Post-Quantum Key Exchange Using CSIDH-512.
Proceedings of the 61st ACM/IEEE Design Automation Conference, 2024
2023
Identifying Strategies to Mitigate Cybersickness in Virtual Reality Induced by Flying with an Interactive Travel Interface.
Multimodal Technol. Interact., April, 2023
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023
IACR Cryptol. ePrint Arch., 2023
2022
MIRACLE: MIcRo-ArChitectural Leakage Evaluation A study of micro-architectural power leakage across many devices.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022
Towards Micro-architectural Leakage Simulators: Reverse Engineering Micro-architectural Leakage Features Is Practical.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022
2021
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021
XDIVINSA: eXtended DIVersifying INStruction Agent to Mitigate Power Side-Channel Leakage.
IACR Cryptol. ePrint Arch., 2021
Reverse Engineering the Micro-Architectural Leakage Features of a Commercial Processor.
IACR Cryptol. ePrint Arch., 2021
2020
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the HASP@MICRO 2020: Hardware and Architectural Support for Security and Privacy, 2020
2018
IACR Cryptol. ePrint Arch., 2018
2017
2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
2014
Undergraduate Topics in Computer Science, Springer, ISBN: 978-3-319-04041-7, 2014
Digit. Investig., 2014
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014
2013
On secure embedded token design (Long Version) - Quasi-looped Yao circuits and bounded leakage.
IACR Cryptol. ePrint Arch., 2013
Light-weight primitive, feather-weight security? A cryptanalytic knock-out. (Preliminary results).
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems, 2013
Proceedings of the Workshop on Embedded Systems Security, 2013
2012
Proceedings of the Fault Analysis in Cryptography, 2012
J. Cryptogr. Eng., 2012
Erratum to: Side-channel attacks on the McEliece and Niederreiter public-key cryptosystems.
J. Cryptogr. Eng., 2012
IACR Cryptol. ePrint Arch., 2012
Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile Devices.
Proceedings of the Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, 2012
Proceedings of the 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2012
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012
2011
J. Cryptogr. Eng., 2011
Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile Devices.
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Fundamentals of Software Engineering - 4th IPM International Conference, 2011
A Unified Multiply/Accumulate Unit for Pairing-Based Cryptography over Prime, Binary and Ternary Fields.
Proceedings of the 14th Euromicro Conference on Digital System Design, 2011
Proceedings of the 20th IEEE Symposium on Computer Arithmetic, 2011
2010
An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture.
IACR Cryptol. ePrint Arch., 2010
Proceedings of the 2010 ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation, 2010
2009
Texts in Computer Science, Springer, ISBN: 978-1-84882-256-6, 2009
Proceedings of the Identity-Based Cryptography, 2009
J. Cryptol., 2009
Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications.
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the 2009 ACM SIGPLAN Symposium on Partial Evaluation and Semantics-based Program Manipulation, 2009
Proceedings of the ISSE 2009, 2009
Hardware/Software Co-design of Public-Key Cryptography for SSL Protocol Execution in Embedded Systems.
Proceedings of the Information and Communications Security, 11th International Conference, 2009
Proceedings of the 4th Workshop on Embedded Systems Security, 2009
2008
IACR Cryptol. ePrint Arch., 2008
Reassessing the TCG Specifications for Trusted Computing in Mobile and Embedded Systems.
Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust, 2008
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008
2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of the Pairing-Based Cryptography, 2007
Proceedings of the Cryptography and Coding, 2007
Proceedings of the Cryptography and Coding, 2007
2006
LMS J. Comput. Math., 2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the 16th ACM Great Lakes Symposium on VLSI 2006, Philadelphia, PA, USA, April 30, 2006
2005
Hardware and Software Normal Basis Arithmetic for Pairing-Based Cryptography in Characteristic Three.
IEEE Trans. Computers, 2005
IACR Cryptol. ePrint Arch., 2005
IACR Cryptol. ePrint Arch., 2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29, 2005
2004
IEEE Trans. Computers, 2004
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
Proceedings of the Selected Areas in Cryptography, 11th International Workshop, 2004
Proceedings of the Cryptographic Hardware and Embedded Systems, 2004
Proceedings of the Algorithmic Number Theory, 6th International Symposium, 2004
Proceedings of the Algorithmic Number Theory, 6th International Symposium, 2004
2003
Proceedings of the 14th IEEE International Conference on Application-Specific Systems, 2003
2002
Software Implementation of Finite Fields of Characteristic Three, for Use in Pairing-based Cryptosystems.
LMS J. Comput. Math., 2002
IACR Cryptol. ePrint Arch., 2002
Proceedings of the Embedded Processor Design Challenges: Systems, Architectures, Modeling, and Simulation, 2002
Proceedings of the Cryptographic Hardware and Embedded Systems, 2002
Proceedings of the 13th IEEE International Conference on Application-Specific Systems, 2002
Proceedings of the 13th IEEE International Conference on Application-Specific Systems, 2002
1999