Essam Ghadafi
Essam Ghadafi
Senior Lecturer, Newcastle University
Bestätigte E-Mail-Adresse bei
Zitiert von
Zitiert von
Short accountable ring signatures based on DDH
J Bootle, A Cerulli, P Chaidos, E Ghadafi, J Groth, C Petit
Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2016
Foundations of Fully Dynamic Group Signatures
J Bootle, A Cerulli, P Chaidos, E Ghadafi, J Groth
ACNS 2016, 2016
Anonymous attestation with user-controlled linkability
D Bernhard, G Fuchsbauer, E Ghadafi, NP Smart, B Warinschi
International Journal of Information Security 12, 219-249, 2013
Groth–sahai proofs revisited
E Ghadafi, NP Smart, B Warinschi
Public Key Cryptography–PKC 2010: 13th International Conference on Practice …, 2010
Decentralized Traceable Attribute-Based Signatures.
A El Kaafarani, E Ghadafi, D Khader
CT-RSA 14, 327-348, 2014
Linear-time zero-knowledge proofs for arithmetic circuit satisfiability
J Bootle, A Cerulli, E Ghadafi, J Groth, M Hajiabadi, SK Jakobsen
Advances in Cryptology–ASIACRYPT 2017: 23rd International Conference on the …, 2017
Stronger security notions for decentralized traceable attribute-based signatures and more efficient constructions
E Ghadafi
Topics in Cryptology–-CT-RSA 2015: The Cryptographer's Track at the RSA …, 2015
Efficient distributed tag-based encryption and its application to group signatures with efficient distributed traceability
E Ghadafi
Progress in Cryptology-LATINCRYPT 2014: Third International Conference on …, 2015
Efficient signatures of knowledge and DAA in the standard model
D Bernhard, G Fuchsbauer, E Ghadafi
Applied Cryptography and Network Security: 11th International Conference …, 2013
Short structure-preserving signatures
E Ghadafi
Topics in Cryptology-CT-RSA 2016: The Cryptographers' Track at the RSA …, 2016
Attribute-based signatures with user-controlled linkability
A El Kaafarani, L Chen, E Ghadafi, J Davenport
Cryptology and Network Security: 13th International Conference, CANS 2014 …, 2014
Sub-linear blind ring signatures without random oracles
EM Ghadafi
Cryptography and Coding: 14th IMA International Conference, IMACC 2013 …, 2013
Formalizing group blind signatures and practical constructions without random oracles
E Ghadafi
Information Security and Privacy: 18th Australasian Conference, ACISP 2013 …, 2013
Towards a classification of non-interactive computational assumptions in cyclic groups
E Ghadafi, J Groth
Advances in Cryptology–ASIACRYPT 2017: 23rd International Conference on the …, 2017
Efficient Round-Optimal Blind Signatures in the Standard Model
E Ghadafi
International Conference on Financial Cryptography and Data Security, 2017
Efficient two-move blind signatures in the common reference string model
E Ghadafi, NP Smart
Information Security: 15th International Conference, ISC 2012, Passau …, 2012
Attribute-based signatures with user-controlled linkability without random oracles
A El Kaafarani, E Ghadafi
Cryptography and Coding: 16th IMA International Conference, IMACC 2017 …, 2017
Functionality-preserving adversarial machine learning for robust classification in cybersecurity and intrusion detection domains: A survey
A McCarthy, E Ghadafi, P Andriotis, P Legg
Journal of Cybersecurity and Privacy 2 (1), 154-190, 2022
More efficient structure-preserving signatures-or: bypassing the type-III lower bounds
E Ghadafi
Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017
Final report on unified theoretical framework of efficient zero-knowledge proofs of knowledge
NP Smart, E Bangerter, E Ghadafi, S Krenn, T Sadeghi, AR Schneider, ...
CACE project deliverable, 2009
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20