What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Gregory Neven
Google Scholar
45
publications in security and cryptology related venues
Year
Venue
Title
2020
conf/uss
Pixel: Multi-signatures for Consensus.
Manu Drijvers
Sergey Gorbunov
Gregory Neven
Hoeteck Wee
2020
conf/eurosp
Zone Encryption with Anonymous Authentication for V2V Communication.
Jan Camenisch
Manu Drijvers
Anja Lehmann
Gregory Neven
Patrick Towa
2019
conf/sp
On the Security of Two-Round Multi-Signatures.
Manu Drijvers
Kasra Edalatnejad
Bryan Ford
Eike Kiltz
Julian Loss
Gregory Neven
Igors Stepanovs
2019
conf/acns
Password-Authenticated Public-Key Encryption.
Tatiana Bradley
Jan Camenisch
Stanislaw Jarecki
Anja Lehmann
Gregory Neven
Jiayu Xu
2018
journals/joc
Robust Encryption.
Michel Abdalla
Mihir Bellare
Gregory Neven
2018
conf/acns
Floppy-Sized Group Signatures from Lattices.
Cecilia Boschini
Jan Camenisch
Gregory Neven
2018
conf/eurocrypt
The Wonderful World of Global Random Oracles.
Jan Camenisch
Manu Drijvers
Tommaso Gagliardoni
Anja Lehmann
Gregory Neven
2018
conf/asiacrypt
Compact Multi-signatures for Smaller Blockchains.
Dan Boneh
Manu Drijvers
Gregory Neven
2017
conf/ccs
Practical Quantum-Safe Voting from Lattices.
Rafaël del Pino
Vadim Lyubashevsky
Gregory Neven
Gregor Seiler
2017
conf/eurocrypt
One-Shot Verifiable Encryption from Lattices.
Vadim Lyubashevsky
Gregory Neven
2016
conf/ccs
SANA: Secure and Scalable Aggregate Network Attestation.
Moreno Ambrosin
Mauro Conti
Ahmad Ibrahim
Gregory Neven
Ahmad-Reza Sadeghi
Matthias Schunter
2016
conf/wisec
POSTER: Toward a Secure and Scalable Attestation.
Moreno Ambrosin
Mauro Conti
Ahmad Ibrahim
Gregory Neven
Ahmad-Reza Sadeghi
Matthias Schunter
2015
conf/ccs
Optimal Distributed Password Verification.
Jan Camenisch
Anja Lehmann
Gregory Neven
2015
conf/acns
Recovering Lost Device-Bound Credentials.
Foteini Baldimtsi
Jan Camenisch
Lucjan Hanzlik
Stephan Krenn
Anja Lehmann
Gregory Neven
2015
conf/pkc
Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions.
Jan Camenisch
Robert R. Enderlein
Gregory Neven
2015
conf/sacrypt
Formal Treatment of Privacy-Enhancing Credential Systems.
Jan Camenisch
Stephan Krenn
Anja Lehmann
Gert Læssøe Mikkelsen
Gregory Neven
Michael Østergaard Pedersen
2014
journals/istr
Concepts and languages for privacy-preserving attribute-based authentication.
Jan Camenisch
Maria Dubovitskaya
Robert R. Enderlein
Anja Lehmann
Gregory Neven
Christian Paquin
Franz-Stefan Preiss
2014
conf/crypto
Memento: How to Reconstruct Your Secrets from a Single Password in a Hostile Environment.
Jan Camenisch
Anja Lehmann
Anna Lysyanskaya
Gregory Neven
2014
conf/esorics
Privacy-Preserving Auditing for Attribute-Based Credentials.
Jan Camenisch
Anja Lehmann
Gregory Neven
Alfredo Rial
2014
conf/asiacrypt
Better Zero-Knowledge Proofs for Lattice Encryption and Their Application to Group Signatures.
Fabrice Benhamouda
Jan Camenisch
Stephan Krenn
Vadim Lyubashevsky
Gregory Neven
2012
conf/ccs
Practical yet universally composable two-server password-authenticated secret sharing.
Jan Camenisch
Anna Lysyanskaya
Gregory Neven
2011
journals/joc
Wildcarded Identity-Based Encryption.
Michel Abdalla
James Birkett
Dario Catalano
Alexander W. Dent
John Malone-Lee
Gregory Neven
Jacob C. N. Schuldt
Nigel P. Smart
2011
conf/pkc
Oblivious Transfer with Hidden Access Control Policies.
Jan Camenisch
Maria Dubovitskaya
Gregory Neven
Gregory M. Zaverucha
2010
conf/fc
Unlinkable Priced Oblivious Transfer with Rechargeable Wallets.
Jan Camenisch
Maria Dubovitskaya
Gregory Neven
2010
conf/icics
Fine-Grained Disclosure of Access Policies.
Claudio Agostino Ardagna
Sabrina De Capitani di Vimercati
Sara Foresti
Gregory Neven
Stefano Paraboschi
Franz-Stefan Preiss
Pierangela Samarati
Mario Verdicchio
2010
conf/tcc
Robust Encryption.
Michel Abdalla
Mihir Bellare
Gregory Neven
2009
journals/joc
Security Proofs for Identity-Based Identification and Signature Schemes.
Mihir Bellare
Chanathip Namprempre
Gregory Neven
2009
conf/ccs
Oblivious transfer with access control.
Jan Camenisch
Maria Dubovitskaya
Gregory Neven
2008
journals/joc
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions.
Michel Abdalla
Mihir Bellare
Dario Catalano
Eike Kiltz
Tadayoshi Kohno
Tanja Lange
John Malone-Lee
Gregory Neven
Pascal Paillier
Haixia Shi
2008
conf/eurocrypt
Efficient Sequential Aggregate Signed Data.
Gregory Neven
2007
conf/acisp
Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards.
James Birkett
Alexander W. Dent
Gregory Neven
Jacob C. N. Schuldt
2007
conf/esorics
Generalized Key Delegation for Hierarchical Identity-Based Encryption.
Michel Abdalla
Eike Kiltz
Gregory Neven
2007
conf/pkc
Identity-Based Traitor Tracing.
Michel Abdalla
Alexander W. Dent
John Malone-Lee
Gregory Neven
Duong Hieu Phan
Nigel P. Smart
2007
conf/ctrsa
Identity-Based Multi-signatures from RSA.
Mihir Bellare
Gregory Neven
2007
conf/eurocrypt
Simulatable Adaptive Oblivious Transfer.
Jan Camenisch
Gregory Neven
Abhi Shelat
2007
conf/asiacrypt
Seven-Property-Preserving Iterated Hashing: ROX.
Elena Andreeva
Gregory Neven
Bart Preneel
Thomas Shrimpton
2006
conf/ccs
Multi-signatures in the plain public-Key model and a general forking lemma.
Mihir Bellare
Gregory Neven
2006
conf/fc
Private Policy Negotiation.
Klaus Kursawe
Gregory Neven
Pim Tuyls
2006
conf/ctrsa
On the (Im)possibility of Blind Message Authentication Codes.
Michel Abdalla
Chanathip Namprempre
Gregory Neven
2005
conf/crypto
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions.
Michel Abdalla
Mihir Bellare
Dario Catalano
Eike Kiltz
Tadayoshi Kohno
Tanja Lange
John Malone-Lee
Gregory Neven
Pascal Paillier
Haixia Shi
2004
conf/eurocrypt
Security Proofs for Identity-Based Identification and Signature Schemes.
Mihir Bellare
Chanathip Namprempre
Gregory Neven
2003
conf/sec
Secure Vickrey Auctions without a Trusted Third Party.
Bart De Decker
Gregory Neven
Frank Piessens
2002
conf/asiacrypt
Transitive Signatures Based on Factoring and RSA.
Mihir Bellare
Gregory Neven
2001
conf/sec
On Securely Scheduling a Meeting.
T. Herlea
Joris Claessens
Bart Preneel
Gregory Neven
Frank Piessens
Bart De Decker
2000
conf/sec
On the Practical Feasibiltiy of Secure Distributed Computing: A Case Study.
Gregory Neven
Frank Piessens
Bart De Decker
Coauthors
Abhi Shelat
(1)
Ahmad Ibrahim
(2)
Ahmad-Reza Sadeghi
(2)
Alexander W. Dent
(3)
Alfredo Rial
(1)
Anja Lehmann
(9)
Anna Lysyanskaya
(2)
Bart De Decker
(3)
Bart Preneel
(2)
Bryan Ford
(1)
Cecilia Boschini
(1)
Chanathip Namprempre
(3)
Christian Paquin
(1)
Claudio Agostino Ardagna
(1)
Dan Boneh
(1)
Dario Catalano
(3)
Duong Hieu Phan
(1)
Eike Kiltz
(4)
Elena Andreeva
(1)
Fabrice Benhamouda
(1)
Foteini Baldimtsi
(1)
Frank Piessens
(3)
Franz-Stefan Preiss
(2)
Gert Læssøe Mikkelsen
(1)
Gregor Seiler
(1)
Gregory M. Zaverucha
(1)
Gregory Neven
(45)
Haixia Shi
(2)
Hoeteck Wee
(1)
Igors Stepanovs
(1)
Jacob C. N. Schuldt
(2)
James Birkett
(2)
Jan Camenisch
(17)
Jiayu Xu
(1)
John Malone-Lee
(4)
Joris Claessens
(1)
Julian Loss
(1)
Kasra Edalatnejad
(1)
Klaus Kursawe
(1)
Lucjan Hanzlik
(1)
Manu Drijvers
(5)
Maria Dubovitskaya
(4)
Mario Verdicchio
(1)
Matthias Schunter
(2)
Mauro Conti
(2)
Michael Østergaard Pedersen
(1)
Michel Abdalla
(8)
Mihir Bellare
(9)
Moreno Ambrosin
(2)
Nigel P. Smart
(2)
Pascal Paillier
(2)
Patrick Towa
(1)
Pierangela Samarati
(1)
Pim Tuyls
(1)
Rafaël del Pino
(1)
Robert R. Enderlein
(2)
Sabrina De Capitani di Vimercati
(1)
Sara Foresti
(1)
Sergey Gorbunov
(1)
Stanislaw Jarecki
(1)
Stefano Paraboschi
(1)
Stephan Krenn
(3)
T. Herlea
(1)
Tadayoshi Kohno
(2)
Tanja Lange
(2)
Tatiana Bradley
(1)
Thomas Shrimpton
(1)
Tommaso Gagliardoni
(1)
Vadim Lyubashevsky
(3)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to