Cryptographers' World
 

Gregory Neven


Author's Web Page Link

11 papers in database with 535 citations Star

H-number: 8

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Michel Abdalla,  Mihir Bellare,  Dario Catalano,  Eike Kiltz,  Tadayoshi Kohno,  Tanja Lange,  John Malone-Lee,  Gregory Neven,  Pascal Paillier,  Haixia Shi,  Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions, Journal of Cryptology, Volume 21(3), pp. 350 - 391, Springer, 2008.

[Cited 83 times Red Star]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Gregory Neven,  Efficient Sequential Aggregate Signed Data, pp. 52 - 69, EUROCRYPT 2008.

[Electronic Edition][Cited 8 times ]

2. Mihir Bellare,  Gregory Neven,  Identity-Based Multi-signatures from RSA, pp. 145 - 162, CT-RSA 2007.

[Electronic Edition][Cited 24 times ]

3. Elena Andreeva,  Gregory Neven,  Bart Preneel,  Thomas Shrimpton,  Seven-Property-Preserving Iterated Hashing: ROX, pp. 130 - 146, ASIACRYPT 2007.

[Electronic Edition][Cited 35 times ]

4. Michel Abdalla,  Alexander W. Dent,  John Malone-Lee,  Gregory Neven,  Duong Hieu Phan,  Nigel P. Smart,  Identity-Based Traitor Tracing, pp. 361 - 376, PKC 2007.

[Electronic Edition][Cited 8 times ]

5. Jan Camenisch,  Gregory Neven,  Abhi Shelat,  Simulatable Adaptive Oblivious Transfer, pp. 573 - 590, EUROCRYPT 2007.

[Electronic Edition][Cited 68 times Red Star]

6. Michel Abdalla,  Chanathip Namprempre,  Gregory Neven,  On the (Im)possibility of Blind Message Authentication Codes, pp. 262 - 279, CT-RSA 2006.

[Electronic Edition][Cited 9 times ]

7. Klaus Kursawe,  Gregory Neven,  Pim Tuyls,  Private Policy Negotiation, pp. 81 - 95, FC 2006.

[Electronic Edition][Cited 4 times ]

8. Michel Abdalla,  Mihir Bellare,  Dario Catalano,  Eike Kiltz,  Tadayoshi Kohno,  Tanja Lange,  John Malone-Lee,  Gregory Neven,  Pascal Paillier,  Haixia Shi,  Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions, pp. 205 - 222, CRYPTO 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 154 times Red StarRed Star]

9. Mihir Bellare,  Chanathip Namprempre,  Gregory Neven,  Security Proofs for Identity-Based Identification and Signature Schemes, pp. 268 - 286, EUROCRYPT 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 179 times Red StarRed Star]

10. Mihir Bellare,  Gregory Neven,  Transitive Signatures Based on Factoring and RSA, pp. 397 - 414, ASIACRYPT 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 46 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...