Elliptic curves in cryptography Ian F.. Blake, G Seroussi, NP Smart Cambridge University Press, 1999 | 2376* | 1999 |
Multiparty computation from somewhat homomorphic encryption I Damgård, V Pastro, N Smart, S Zakarias Advances in Cryptology–CRYPTO 2012, 643-662, 2012 | 1621 | 2012 |
Fully homomorphic encryption with relatively small key and ciphertext sizes N Smart, F Vercauteren Public Key Cryptography–PKC 2010, 420-443, 2010 | 1216 | 2010 |
Pairings for cryptographers SD Galbraith, KG Paterson, NP Smart Discrete Applied Mathematics 156 (16), 3113-3121, 2008 | 1131 | 2008 |
Homomorphic Evaluation of the AES Circuit C Gentry, S Halevi, NP Smart Advances in Cryptology - CRYPTO 2012, 2012 | 1064 | 2012 |
Fully homomorphic SIMD operations NP Smart, F Vercauteren Designs, Codes and Cryptography 71, 57-81, 2014 | 945 | 2014 |
Advances in Elliptic Curve Cryptography, volume 317 of London Mathematical Society Lecture Note Series IF Blake, G Seroussi, NP Smart Cambridge University Press, Cambridge 19 (20), 666, 2005 | 794* | 2005 |
Fully Homomorphic Encryption with Polylog Overhead C Gentry, S Halevi, NP Smart Advances in Cryptology - EUROCRYPT, 2012, 2012 | 703 | 2012 |
Identity-based authenticated key agreement protocol based on Weil pairing NP Smart Electronics Letters 38 (13), 630-632, 2002 | 699 | 2002 |
Secure two-party computation is practical B Pinkas, T Schneider, N Smart, S Williams Advances in Cryptology–ASIACRYPT 2009, 250-267, 2009 | 636 | 2009 |
Practical Covertly Secure MPC for Dishonest Majority–or: Breaking the SPDZ Limits I Damgard, M Keller, E Larraia, V Pastro, P Scholl, NP Smart ESORICS 2013, 2013 | 624 | 2013 |
Identity-based key agreement protocols from pairings L Chen, Z Cheng, NP Smart International Journal of Information Security 6 (4), 213-241, 2007 | 611 | 2007 |
The Eta pairing revisited F Hess, NP Smart, F Vercauteren Information Theory, IEEE Transactions on 52 (10), 4595-4602, 2006 | 611 | 2006 |
The discrete logarithm problem on elliptic curves of trace one NP Smart Journal of cryptology 12 (3), 193-196, 1999 | 578 | 1999 |
Constructive and destructive facets of Weil descent on elliptic curves P Gaudry, F Hess, NP Smart Journal of Cryptology 15 (1), 19-46, 2002 | 470 | 2002 |
Cryptography: an introduction NP Smart McGraw-Hill, 2003 | 403 | 2003 |
The algorithmic resolution of Diophantine equations NP Smart Cambridge Univ Pr, 1998 | 362* | 1998 |
Decentralized privacy-preserving proximity tracing C Troncoso, M Payer, JP Hubaux, M Salathé, J Larus, E Bugnion, ... arXiv preprint arXiv:2005.12273, 2020 | 354 | 2020 |
Lattice attacks on digital signature schemes NA Howgrave-Graham, NP Smart Designs, Codes and Cryptography 23 (3), 283-290, 2001 | 312 | 2001 |
Better Bootstrapping in Fully Homomorphic Encryption C Gentry, S Halevi, NP Smart Public Key Cryptography – PKC 2012, 1-16, 2011 | 310 | 2011 |