Folgen
Gregory Neven
Gregory Neven
DFINITY
Bestätigte E-Mail-Adresse bei dfinity.org - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
M Abdalla, M Bellare, D Catalano, E Kiltz, T Kohno, T Lange, ...
Journal of Cryptology 21 (3), 350-391, 2008
11452008
Security proofs for identity-based identification and signature schemes
M Bellare, C Namprempre, G Neven
Journal of Cryptology 22 (1), 1-61, 2009
7332009
Multi-signatures in the plain public-key model and a general forking lemma
M Bellare, G Neven
Proceedings of the 13th ACM conference on Computer and communications …, 2006
7092006
Compact multi-signatures for smaller blockchains
D Boneh, M Drijvers, G Neven
Advances in Cryptology–ASIACRYPT 2018: 24th International Conference on the …, 2018
2902018
Simulatable adaptive oblivious transfer
J Camenisch, G Neven, A Shelat
Advances in Cryptology-EUROCRYPT 2007: 26th Annual International Conference …, 2007
2902007
Oblivious transfer with access control
J Camenisch, M Dubovitskaya, G Neven
Proceedings of the 16th ACM conference on Computer and communications …, 2009
248*2009
Protection and retrieval of encrypted multimedia content: When cryptography meets signal processing
Z Erkin, A Piva, S Katzenbeisser, RL Lagendijk, J Shokrollahi, G Neven, ...
EURASIP Journal on Information Security 2007, 1-20, 2007
2162007
Robust encryption
M Abdalla, M Bellare, G Neven
Theory of Cryptography: 7th Theory of Cryptography Conference, TCC 2010 …, 2010
184*2010
SANA: secure and scalable aggregate network attestation
M Ambrosin, M Conti, A Ibrahim, G Neven, AR Sadeghi, M Schunter
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
1612016
Identity-based encryption gone wild
M Abdalla, D Catalano, AW Dent, J Malone-Lee, G Neven, NP Smart
Automata, Languages and Programming: 33rd International Colloquium, ICALP …, 2006
1602006
Unrestricted aggregate signatures
M Bellare, C Namprempre, G Neven
Automata, Languages and Programming: 34th International Colloquium, ICALP …, 2007
1582007
Identity-based multi-signatures from RSA
M Bellare, G Neven
Topics in Cryptology–CT-RSA 2007: The Cryptographers’ Track at the RSA …, 2006
1402006
Get shorty via group signatures without encryption
P Bichsel, J Camenisch, G Neven, NP Smart, B Warinschi
Security and Cryptography for Networks: 7th International Conference, SCN …, 2010
1322010
Distributed single sign-on
J Camenisch, Y Gilad, A Lehmann, G Neven
US Patent 10,164,964, 2018
1272018
Better zero-knowledge proofs for lattice encryption and their application to group signatures
F Benhamouda, J Camenisch, S Krenn, V Lyubashevsky, G Neven
Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014
1212014
Transitive signatures: new schemes and proofs
M Bellare, G Neven
Information Theory, IEEE Transactions on 51 (6), 2133-2151, 2005
118*2005
Identity-based cryptography
M Joye, G Neven
IOS press, 2009
1152009
Efficient Sequential Aggregate Signed Data
G Neven
Information Theory, IEEE Transactions on 57 (3), 1803-1815, 2011
1112011
Seven-property-preserving iterated hashing: ROX
E Andreeva, G Neven, B Preneel, T Shrimpton
Advances in Cryptology–ASIACRYPT 2007: 13th International Conference on the …, 2007
1032007
Generalized key delegation for hierarchical identity-based encryption
M Abdalla, E Kiltz, G Neven
Computer Security–ESORICS 2007: 12th European Symposium On Research In …, 2007
1002007
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20