Follow
Essam Ghadafi
Essam Ghadafi
Senior Lecturer, Newcastle University
Verified email at ncl.ac.uk
Title
Cited by
Cited by
Year
Short accountable ring signatures based on DDH
J Bootle, A Cerulli, P Chaidos, E Ghadafi, J Groth, C Petit
European Symposium on Research in Computer Security, 243-265, 2015
1412015
Foundations of Fully Dynamic Group Signatures
J Bootle, A Cerulli, P Chaidos, E Ghadafi, J Groth
ACNS 2016, 2016
1272016
Anonymous attestation with user-controlled linkability
D Bernhard, G Fuchsbauer, E Ghadafi, NP Smart, B Warinschi
International Journal of Information Security 12, 219-249, 2013
952013
Linear-time zero-knowledge proofs for arithmetic circuit satisfiability
J Bootle, A Cerulli, E Ghadafi, J Groth, M Hajiabadi, SK Jakobsen
International Conference on the Theory and Application of Cryptology and …, 2017
872017
Decentralized traceable attribute-based signatures
A El Kaafarani, E Ghadafi, D Khader
Topics in Cryptology–CT-RSA 2014: The Cryptographer’s Track at the RSA …, 2014
842014
Groth–sahai proofs revisited
E Ghadafi, NP Smart, B Warinschi
Public Key Cryptography–PKC 2010: 13th International Conference on Practice …, 2010
842010
Stronger security notions for decentralized traceable attribute-based signatures and more efficient constructions
E Ghadafi
Topics in Cryptology–-CT-RSA 2015: The Cryptographer's Track at the RSA …, 2015
482015
Efficient distributed tag-based encryption and its application to group signatures with efficient distributed traceability
E Ghadafi
International Conference on Cryptology and Information Security in Latin …, 2014
382014
Efficient signatures of knowledge and DAA in the standard model
D Bernhard, G Fuchsbauer, E Ghadafi
Applied Cryptography and Network Security: 11th International Conference …, 2013
352013
Short structure-preserving signatures
E Ghadafi
Cryptographers’ Track at the RSA Conference, 305-321, 2016
262016
Functionality-preserving adversarial machine learning for robust classification in cybersecurity and intrusion detection domains: A survey
A McCarthy, E Ghadafi, P Andriotis, P Legg
Journal of Cybersecurity and Privacy 2 (1), 154-190, 2022
252022
Efficient Round-Optimal Blind Signatures in the Standard Model
E Ghadafi
International Conference on Financial Cryptography and Data Security, 2017
222017
Attribute-based signatures with user-controlled linkability
A El Kaafarani, L Chen, E Ghadafi, J Davenport
Cryptology and Network Security: 13th International Conference, CANS 2014 …, 2014
222014
Formalizing group blind signatures and practical constructions without random oracles
E Ghadafi
Information Security and Privacy: 18th Australasian Conference, ACISP 2013 …, 2013
202013
Sub-linear blind ring signatures without random oracles
EM Ghadafi
IMA International Conference on Cryptography and Coding, 304-323, 2013
192013
Towards a classification of non-interactive computational assumptions in cyclic groups
E Ghadafi, J Groth
International Conference on the Theory and Application of Cryptology and …, 2017
182017
Foundations of fully dynamic group signatures
J Bootle, A Cerulli, P Chaidos, E Ghadafi, J Groth
Journal of Cryptology 33, 1822-1870, 2020
162020
Efficient two-move blind signatures in the common reference string model
E Ghadafi, NP Smart
International Conference on Information Security, 274-289, 2012
152012
Attribute-based signatures with user-controlled linkability without random oracles
A El Kaafarani, E Ghadafi
Cryptography and Coding: 16th IMA International Conference, IMACC 2017 …, 2017
132017
Defending against adversarial machine learning attacks using hierarchical learning: A case study on network traffic attack classification
A McCarthy, E Ghadafi, P Andriotis, P Legg
Journal of Information Security and Applications 72, 103398, 2023
122023
The system can't perform the operation now. Try again later.
Articles 1–20