Volgen
Gregory Neven
Gregory Neven
DFINITY
Geverifieerd e-mailadres voor dfinity.org - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
M Abdalla, M Bellare, D Catalano, E Kiltz, T Kohno, T Lange, ...
Journal of Cryptology 21 (3), 350-391, 2008
11032008
Security proofs for identity-based identification and signature schemes
M Bellare, C Namprempre, G Neven
Journal of Cryptology 22 (1), 1-61, 2009
6982009
Multi-signatures in the plain public-key model and a general forking lemma
M Bellare, G Neven
Proceedings of the 13th ACM conference on Computer and communications …, 2006
6192006
Simulatable adaptive oblivious transfer
J Camenisch, G Neven
Annual International Conference on the Theory and Applications of …, 2007
2772007
Oblivious transfer with access control
J Camenisch, M Dubovitskaya, G Neven
Proceedings of the 16th ACM conference on Computer and communications …, 2009
241*2009
Protection and retrieval of encrypted multimedia content: When cryptography meets signal processing
Z Erkin, A Piva, S Katzenbeisser, RL Lagendijk, J Shokrollahi, G Neven, ...
EURASIP Journal on Information Security 2007, 1-20, 2007
2062007
Compact multi-signatures for smaller blockchains
D Boneh, M Drijvers, G Neven
International Conference on the Theory and Application of Cryptology and …, 2018
1892018
Robust encryption
M Abdalla, M Bellare, G Neven
Theory of Cryptography Conference, 480-497, 2010
159*2010
Identity-based encryption gone wild
M Abdalla, D Catalano, AW Dent, J Malone-Lee, G Neven, NP Smart
International Colloquium on Automata, Languages, and Programming, 300-311, 2006
1502006
SANA: Secure and scalable aggregate network attestation
M Ambrosin, M Conti, A Ibrahim, G Neven, AR Sadeghi, M Schunter
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
1452016
Unrestricted aggregate signatures
M Bellare, C Namprempre, G Neven
International Colloquium on Automata, Languages, and Programming, 411-422, 2007
1452007
Get shorty via group signatures without encryption
P Bichsel, J Camenisch, G Neven, NP Smart, B Warinschi
International Conference on Security and Cryptography for Networks, 381-398, 2010
1252010
Identity-based multi-signatures from RSA
M Bellare, G Neven
Cryptographers’ Track at the RSA Conference, 145-162, 2007
1222007
Transitive signatures: new schemes and proofs
M Bellare, G Neven
Information Theory, IEEE Transactions on 51 (6), 2133-2151, 2005
116*2005
Better zero-knowledge proofs for lattice encryption and their application to group signatures
F Benhamouda, J Camenisch, S Krenn, V Lyubashevsky, G Neven
International Conference on the Theory and Application of Cryptology and …, 2014
1122014
Identity-based cryptography
M Joye, G Neven
IOS press, 2009
1092009
Seven-property-preserving iterated hashing: ROX
E Andreeva, G Neven, B Preneel, T Shrimpton
International Conference on the Theory and Application of Cryptology and …, 2007
1032007
Efficient Sequential Aggregate Signed Data
G Neven
Information Theory, IEEE Transactions on 57 (3), 1803-1815, 2011
992011
Generalized key delegation for hierarchical identity-based encryption
M Abdalla, E Kiltz, G Neven
European Symposium on Research in Computer Security, 139-154, 2007
962007
Fully anonymous attribute tokens from lattices
J Camenisch, G Neven, M Rückert
International Conference on Security and Cryptography for Networks, 57-75, 2012
882012
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20