A. Byrne, N. Meloni, F. Crowe, W. P. Marnane, A. Tisserand, and E. M. Popovici. SPA resistant elliptic curve cryptosystem using addition chains. In Information Technology 2007 --- ITNG '07, pages 995--1000. IEEE, 2007.


M. Joye and M. Tunstall. Securing OpenSSL against micro-architectural attacks. In J. Hernando, E. Fernández-Medina, and M. Malek, editors, International Conference on Security and Cryptography --- SECRYPT 2007, pages 189--196. INSTICC Press, 2007.


M. Keller and W. Marnane. Hardware architectures for the tate pairing over GF(2m). Computer & Electrical Engineering, Special Issue on Security of Computer and Networks, 33(5-6):392--406, 2007.


T. Kerins, E. M. Popovici, and W. P. Marnane. Versatile hardware architectures for GF(pm) arithmetic in public key cryptography. Integration the VLSI Journal: Embedded Cryptographic Hardware, 40(1):28--35, January 2007.


M. Keller and W. Marnane. Low power elliptic curve cryptography. In N. Azémard and L. J. Svensson, editors, International Workshop on Power and Timing Modeling, Optimization and Simulation --- PATMOS 2007, volume 4644 of Lecture Notes in Computer Science, pages 310-319. Springer-Verlag, 2007.


C. M. Lucey and C. C. Murphy. Constraint based design of 2-channel paraunitary filter banks of a given length over GF(2r). IEEE Transactions on Signal Processing, 55(5):1940-1944, 2007.


R. P. McEvoy, M. Tunstall, C. C. Murphy, and W. P. Marnane. Differential power analysis of HMAC based on SHA-2, and countermeasures. In S. Kim, M. Yung, and H.-W. Lee, editors, Workshop on Information Security Applications --- WISA 2007, volume 4867 of Lecture Notes in Computer Science, pages 317-332. Springer-Verlag, 2007.


R. P. McEvoy, M. Tunstall, C. Whelan, N. Hanley, C. C. Murphy and W. P. Marnane, Differential Power Analysis of the HMAC Algorithm, Presented at the Rump Session of Cryptographic Hardware and Embedded Systems --- CHES 2007.


W. P. Marnane, Hardware Complexity of Cryptographic Algorithms, Elliptic Curve Cryptography --- ECC 2007, Dublin 2007.


K. Nguyen and M. Tunstall. Montgomerymultiplication with redundancy check. In L. Breveglieri, S. Gueron, I. Koren, D. Naccache, and J.-P. Seifert, editors, Fault Diagnosis and Tolerance in Cryptography 2007 --- FDTC 07, pages 30--36. IEEE, 2007.



R. Ronan, C. O'hEigeartaigh, C. Murphy, M. Scott, and T. Kerins. Hardware acceleration of the tate pairing on a genus 2 hyperelliptic curve. Elsevier Journal of Systems Architecture, Special Issue on Embedded Hardware for Cryptosystems, 53(2--3), February/March 2007.



R. Ronan, C. O'hEigeartaigh, C. Murphy, T. Kerins, and P. S. L. M. Barretto. A reconfigurable processor for the cryptographic h T pairing in characteristic 3. In Information Technology 2007 --- ITNG '07, pages 11--16. IEEE, 2007.



M. Tunstall and O. Benoit. Efficient use of random delays in embedded software. In D. Sauveron, K. Markantonakis, A. Bilas, and J.-J. Quisquater, editors, Information Security Theory and Practices 2007 --- Smart Cards, Mobile and Ubiquitous Computing Systems --- WISTP 2007, volume 4462 of Lecture Notes in Computer Science, pages 27--38. Springer-Verlag, 2007.



M. Tunstall, N. Hanley, R. P. McEvoy, C. Whelan, C. C. Murphy, and W. P. Marnane. Correlation power analysis of large word sizes. In IET Irish Signals and System Conference --- ISSC 2007, pages 145--150. IET, 2007.

Close X