1
0
0
(1 - 29 von 42
)
History | escar EU conference | Embedded Security in Cars
www.escar.info
The escar conference started in and due to its continuous success the conference was organized internationally in three locations – Europe, USA and Asia –...
Accepted Papers
acns2015.cs.columbia.edu
International Conference on Applied Cryptography and Network Security
Financial Cryptography and Data Security: 10th International ...books.google.ca › books
books.google.ca
... Berlin Heidelberg considers this piece of data as sensitive might quickly raise Private Policy Negotiation Klaus Kursawe, Gregory Neven, Pim Tuyls.
Progress in Cryptology – LATINCRYPT 2012: 2nd International...
books.google.de
This book constitutes the proceedings of the 2nd International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2012, held in...
Provable Security: 4th International Conference, ProvSec 2010,...
books.google.de
This book constitutes the proceedings of the 4th provable security conference held in Malacca, Malaysia in October The 17 papers presented were carefully...
Progress in Cryptology – LATINCRYPT 2012: 2nd International ...books.google.ca › books
books.google.ca
... Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10, 2012, Proceedings Alejandro Hevia, Gregory Neven ...
dblp: Gregory Neven
dblp.uni-trier.de
Alejandro Hevia, Gregory Neven: Progress in Cryptology - LATINCRYPT nd International Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10, Proceedings.
Security Proofs for Identity-Based Identification and Signature...
link.springer.com
This paper provides either security proofs or attacks for a large number of identity-based identification and signature schemes defined either explicitly or...
Robust Encryption | SpringerLink
link.springer.com
We provide a provable-security treatment of “robust” encryption. Robustness means it is hard to produce a ciphertext that is valid for two different users....
Wikipedia: Forking lemma - Wikipedia
The forking lemma was later generalized by Mihir Bellare and Gregory Neven. The forking lemma has been used to prove the security of a variety of digital signature schemes
Publication: SANA: Secure and Scalable Aggregate Network Attestation...
www.schunter.org
“Moreno Ambrosin, Mauro Conti, Ahmad Ibrahim, Gregory Neven, Ahmad-Reza Sadeghi, and Matthias Schunter: SANA: Secure and Scalable Aggregate Network Attestation, ACM Conference on Computer and Communications Security, ACM Press ” Abstract: Large numbers of smart connected ...
Gregory Neven - Google Scholar Citationsscholar.google.com › citations
scholar.google.com
M Abdalla, M Bellare, D Catalano, E Kiltz, T Kohno, T Lange, ... Journal of Cryptology 21 (3), Security proofs for identity-based ...
Forking lemma explained
everything.explained.today
The forking lemma was later generalized by Mihir Bellare and Gregory Neven. The forking lemma has been used to prove the security of a variety of digital signature schemes and other random-oracle based cryptographic constructions. Statement of the lemma. The generalized version of the lemma is stated as follows.
Julian Loss - dbs-lindbs-lin.ruhr-uni-bochum.de › crypto_publ › html-dateien
dbs-lin.ruhr-uni-bochum.de
Manu Drijvers, Kasra Edalatnejad, Bryan Ford, Eike Kiltz, Julian Loss, Gregory Neven, Igors Stepanovs. On the Security of Two-Round Multi-Signatures.
PUBLICATIONS
www.julianloss.com
Manu Drijvers, Kasra Edalatnejad, Bryan Ford, Eike Kiltz, Julian Loss, Gregory Neven, Igors Stepanovs.On the Security of Two-Round Multi-Signatures. S&P
Hash Function Requirements for Schnorr Signatures - Gregory Neven -...
moam.info
the security of the Schnorr signature scheme in the standard, i.e., A digital signature scheme is a tuple of algor...
Asymmetric cryptography in the random oracle model. Gregory ...docplayer.net › Asymm...
docplayer.net
Asymmetric cryptography in the random oracle model Gregory Neven IBM Zurich Research Laboratory Overview Provable security: the concept Digital ...
Hash Function Requirements for Schnorr Signatures - University of ...research-information.bris.ac.uk › publications › has...
research-information.bris.ac.uk
Gregory Neven, Nigel Smart, Bogdan Warinschi · Department of Computer Science · Cryptography and Information Security. Research output: Contribution to ...
Identity-Based Signatures - IOS Press Ebooksebooks.iospress.nl › volumearticle
ebooks.iospress.nl
Eike Kiltz, Gregory Neven. Pages DOI Category. Chapter III. Series. Cryptology and Information Security Series.
CANS th International Conference on Cryptology and Network...
cans2016.di.unimi.it
Committees for 15th International Conference on Cryptology and Network Security - Milan, Italy -- November, 2015
Cryptology and Information Security Series | IOS Press
www.iospress.com
Polytech University USA. Chris Mitchell RHUL United Kingdom. David Naccache Ecole Normale Superieure France. Gregory Neven IBM Research Switzerland.
On the Security of Two-Round Multi-Signatures - Bryan Fordbford.info › pub › sec › two-round-multisig-abs
bford.info
On the Security of Two-Round Multi-Signatures. Manu Drijvers, Kasra Edalatnejad, Bryan Ford, Eike Kiltz, Julian Loss, Gregory Neven, and Igors Stepanovs.
Sergey Gorbunov
cs.uwaterloo.ca
Manu Drijvers, Sergey Gorbunov, Gregory Neven, and Hoeteck Wee USENIX Security Pencil - Workshop on Privacy Enhancing Cryptography in Ledgers 2019
International State of the Art in Cryptography - Security
crypto.di.uoa.gr
Gregory Neven (IBM Research, Switzerland). Rene Peralta (NIST, USA). Duong-Hieu Phan (U. Paris 8, France). Krzysztof Pietrzak (IST, Austria). Benny Pinkas ...
Scientific Publications – PRISMACLOUD
prismacloud.eu
The main idea and ambition of PRISMACLOUD is to enable end-to-end security for cloud users and provide tools to protect their privacy with the best technical...
IOS Press Ebooks - Cryptology and Information Security Series
ebooks.iospress.nl
Volume 2, 2009, ISBN (print) (online) Identity-Based Cryptography: Edited by Marc Joye, Gregory Neven: Contents
Alle Infos zum Namen "Gregory Neven"
sortiert nach Relevanz / Datum