Gregory Neven
Gregory Neven
DFINITY
Verified email at dfinity.org - Homepage
TitleCited byYear
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
M Abdalla, M Bellare, D Catalano, E Kiltz, T Kohno, T Lange, ...
Journal of Cryptology 21 (3), 350-391, 2008
9172008
Security proofs for identity-based identification and signature schemes
M Bellare, C Namprempre, G Neven
Journal of Cryptology 22 (1), 1-61, 2009
5962009
Multi-signatures in the plain public-key model and a general forking lemma
M Bellare, G Neven
Proceedings of the 13th ACM conference on Computer and communications …, 2006
4262006
Simulatable adaptive oblivious transfer
J Camenisch, G Neven
Annual International Conference on the Theory and Applications of …, 2007
2402007
Oblivious transfer with access control
J Camenisch, M Dubovitskaya, G Neven
Proceedings of the 16th ACM conference on Computer and communications …, 2009
192*2009
Protection and retrieval of encrypted multimedia content: When cryptography meets signal processing
Z Erkin, A Piva, S Katzenbeisser, RL Lagendijk, J Shokrollahi, G Neven, ...
EURASIP Journal on Information Security 2007, 17, 2007
1732007
Identity-based encryption gone wild
M Abdalla, D Catalano, AW Dent, J Malone-Lee, G Neven, NP Smart
International Colloquium on Automata, Languages, and Programming, 300-311, 2006
1222006
Robust encryption
M Abdalla, M Bellare, G Neven
Theory of Cryptography Conference, 480-497, 2010
1192010
Unrestricted aggregate signatures
M Bellare, C Namprempre, G Neven
International Colloquium on Automata, Languages, and Programming, 411-422, 2007
1112007
Identity-based multi-signatures from RSA
M Bellare, G Neven
Cryptographers’ Track at the RSA Conference, 145-162, 2007
1032007
Transitive signatures: new schemes and proofs
M Bellare, G Neven
Information Theory, IEEE Transactions on 51 (6), 2133-2151, 2005
103*2005
Identity-based cryptography
M Joye, G Neven
IOS press, 2009
992009
Seven-property-preserving iterated hashing: ROX
E Andreeva, G Neven, B Preneel, T Shrimpton
International Conference on the Theory and Application of Cryptology and …, 2007
952007
Get shorty via group signatures without encryption
P Bichsel, J Camenisch, G Neven, NP Smart, B Warinschi
International Conference on Security and Cryptography for Networks, 381-398, 2010
812010
Generalized key delegation for hierarchical identity-based encryption
M Abdalla, E Kiltz, G Neven
European Symposium on Research in Computer Security, 139-154, 2007
782007
SANA: secure and scalable aggregate network attestation
M Ambrosin, M Conti, A Ibrahim, G Neven, AR Sadeghi, M Schunter
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
762016
Exploiting cryptography for privacy-enhanced access control: A result of the PRIME project
CA Ardagna, J Camenisch, M Kohlweiss, R Leenes, G Neven, B Priem, ...
Journal of Computer Security 18 (1), 123-160, 2010
752010
Efficient Sequential Aggregate Signed Data
G Neven
Information Theory, IEEE Transactions on 57 (3), 1803-1815, 2011
712011
Practical yet universally composable two-server password-authenticated secret sharing
J Camenisch, A Lysyanskaya, G Neven
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
702012
Treatments for female sexual dysfunction and methods for identifying compounds useful for treating female sexual dysfunction
P Carpino, J Hadcock
US Patent App. 10/225,258, 2003
672003
The system can't perform the operation now. Try again later.
Articles 1–20