Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions M Abdalla, M Bellare, D Catalano, E Kiltz, T Kohno, T Lange, ... Journal of Cryptology 21 (3), 350-391, 2008 | 1145 | 2008 |
Security proofs for identity-based identification and signature schemes M Bellare, C Namprempre, G Neven Journal of Cryptology 22 (1), 1-61, 2009 | 733 | 2009 |
Multi-signatures in the plain public-key model and a general forking lemma M Bellare, G Neven Proceedings of the 13th ACM conference on Computer and communications …, 2006 | 709 | 2006 |
Compact multi-signatures for smaller blockchains D Boneh, M Drijvers, G Neven Advances in Cryptology–ASIACRYPT 2018: 24th International Conference on the …, 2018 | 290 | 2018 |
Simulatable adaptive oblivious transfer J Camenisch, G Neven, A Shelat Advances in Cryptology-EUROCRYPT 2007: 26th Annual International Conference …, 2007 | 290 | 2007 |
Oblivious transfer with access control J Camenisch, M Dubovitskaya, G Neven Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 248* | 2009 |
Protection and retrieval of encrypted multimedia content: When cryptography meets signal processing Z Erkin, A Piva, S Katzenbeisser, RL Lagendijk, J Shokrollahi, G Neven, ... EURASIP Journal on Information Security 2007, 1-20, 2007 | 216 | 2007 |
Robust encryption M Abdalla, M Bellare, G Neven Theory of Cryptography: 7th Theory of Cryptography Conference, TCC 2010 …, 2010 | 184* | 2010 |
SANA: secure and scalable aggregate network attestation M Ambrosin, M Conti, A Ibrahim, G Neven, AR Sadeghi, M Schunter Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 161 | 2016 |
Identity-based encryption gone wild M Abdalla, D Catalano, AW Dent, J Malone-Lee, G Neven, NP Smart Automata, Languages and Programming: 33rd International Colloquium, ICALP …, 2006 | 160 | 2006 |
Unrestricted aggregate signatures M Bellare, C Namprempre, G Neven Automata, Languages and Programming: 34th International Colloquium, ICALP …, 2007 | 158 | 2007 |
Identity-based multi-signatures from RSA M Bellare, G Neven Topics in Cryptology–CT-RSA 2007: The Cryptographers’ Track at the RSA …, 2006 | 140 | 2006 |
Get shorty via group signatures without encryption P Bichsel, J Camenisch, G Neven, NP Smart, B Warinschi Security and Cryptography for Networks: 7th International Conference, SCN …, 2010 | 132 | 2010 |
Distributed single sign-on J Camenisch, Y Gilad, A Lehmann, G Neven US Patent 10,164,964, 2018 | 127 | 2018 |
Better zero-knowledge proofs for lattice encryption and their application to group signatures F Benhamouda, J Camenisch, S Krenn, V Lyubashevsky, G Neven Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014 | 121 | 2014 |
Transitive signatures: new schemes and proofs M Bellare, G Neven Information Theory, IEEE Transactions on 51 (6), 2133-2151, 2005 | 118* | 2005 |
Identity-based cryptography M Joye, G Neven IOS press, 2009 | 115 | 2009 |
Efficient Sequential Aggregate Signed Data G Neven Information Theory, IEEE Transactions on 57 (3), 1803-1815, 2011 | 111 | 2011 |
Seven-property-preserving iterated hashing: ROX E Andreeva, G Neven, B Preneel, T Shrimpton Advances in Cryptology–ASIACRYPT 2007: 13th International Conference on the …, 2007 | 103 | 2007 |
Generalized key delegation for hierarchical identity-based encryption M Abdalla, E Kiltz, G Neven Computer Security–ESORICS 2007: 12th European Symposium On Research In …, 2007 | 100 | 2007 |