Follow
Gareth T. Davies
Gareth T. Davies
Verified email at uni-wuppertal.de - Homepage
Title
Cited by
Cited by
Year
Side channels in deduplication: Trade-offs between leakage and efficiency
F Armknecht, C Boyd, GT Davies, K Gjøsteen, M Toorani
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
272017
Fast and secure updatable encryption
C Boyd, GT Davies, K Gjøsteen, Y Jiang
Annual International Cryptology Conference, 464-493, 2020
22*2020
Encryption schemes secure under related-key and key-dependent message attacks
F Böhl, GT Davies, D Hofheinz
International Workshop on Public Key Cryptography, 483-500, 2014
132014
KDM security in the hybrid framework
GT Davies, M Stam
Cryptographers’ Track at the RSA Conference, 461-480, 2014
102014
Symmetric Key Exchange with Full Forward Security and Robust Synchronization
C Boyd, GT Davies, B Kock, K Gellert, T Jager, L Millerjord
International Conference on the Theory and Application of Cryptology and …, 2021
72021
Zero-knowledge proof of decryption for FHE ciphertexts
C Carr, A Costache, GT Davies, K Gjøsteen, M Strand
Cryptology ePrint Archive, 2018
72018
Offline Assisted Group Key Exchange
C Boyd, GT Davies, K Gjøsteen, Y Jiang
International Conference on Information Security, 2018
62018
Security notions for cloud storage and deduplication
C Boyd, GT Davies, K Gjøsteen, H Raddum, M Toorani
International Conference on Provable Security, 347-365, 2018
52018
RKA-KDM secure encryption from public-key encryption
F Böhl, GT Davies, D Hofheinz
Cryptology ePrint Archive, 2013
22013
Client-oblivious OPRAM
GT Davies, C Janson, DP Martin
International Conference on Information and Communications Security, 312-330, 2020
12020
PERKS: Persistent and Distributed Key Acquisition for Secure Storage from Passwords
GT Davies, J Pijnenburg
Cryptology ePrint Archive, 2022
2022
Cloud-assisted asynchronous key transport with post-quantum security
GT Davies, H Galteland, K Gjøsteen, Y Jiang
Australasian Conference on Information Security and Privacy, 82-101, 2020
2020
Definitions for Plaintext-Existence Hiding in Cloud Storage
C Boyd, GT Davies, K Gjøsteen, H Raddum, M Toorani
Proceedings of the 13th International Conference on Availability …, 2018
2018
Using Cryptography to Control your Data at a Distance
C Boyd, GT Davies, K Gjøsteen, H Raddum, M Toorani
ERCIM NEWS, 17-18, 2016
2016
Encryption in the presence of key-dependent messages and related-key attacks
GT Davies
University of Bristol, 2015
2015
The system can't perform the operation now. Try again later.
Articles 1–15