Short accountable ring signatures based on DDH J Bootle, A Cerulli, P Chaidos, E Ghadafi, J Groth, C Petit European Symposium on Research in Computer Security, 243-265, 2015 | 144 | 2015 |
Foundations of Fully Dynamic Group Signatures J Bootle, A Cerulli, P Chaidos, E Ghadafi, J Groth ACNS 2016, 2016 | 129 | 2016 |
Anonymous attestation with user-controlled linkability D Bernhard, G Fuchsbauer, E Ghadafi, NP Smart, B Warinschi International Journal of Information Security 12, 219-249, 2013 | 97 | 2013 |
Linear-time zero-knowledge proofs for arithmetic circuit satisfiability J Bootle, A Cerulli, E Ghadafi, J Groth, M Hajiabadi, SK Jakobsen International Conference on the Theory and Application of Cryptology and …, 2017 | 92 | 2017 |
Decentralized traceable attribute-based signatures A El Kaafarani, E Ghadafi, D Khader Topics in Cryptology–CT-RSA 2014: The Cryptographer’s Track at the RSA …, 2014 | 85 | 2014 |
Groth–sahai proofs revisited E Ghadafi, NP Smart, B Warinschi Public Key Cryptography–PKC 2010: 13th International Conference on Practice …, 2010 | 84 | 2010 |
Stronger security notions for decentralized traceable attribute-based signatures and more efficient constructions E Ghadafi Topics in Cryptology–-CT-RSA 2015: The Cryptographer's Track at the RSA …, 2015 | 48 | 2015 |
Efficient distributed tag-based encryption and its application to group signatures with efficient distributed traceability E Ghadafi International Conference on Cryptology and Information Security in Latin …, 2014 | 39 | 2014 |
Efficient signatures of knowledge and DAA in the standard model D Bernhard, G Fuchsbauer, E Ghadafi Applied Cryptography and Network Security: 11th International Conference …, 2013 | 35 | 2013 |
Functionality-preserving adversarial machine learning for robust classification in cybersecurity and intrusion detection domains: A survey A McCarthy, E Ghadafi, P Andriotis, P Legg Journal of Cybersecurity and Privacy 2 (1), 154-190, 2022 | 31 | 2022 |
Short structure-preserving signatures E Ghadafi Cryptographers’ Track at the RSA Conference, 305-321, 2016 | 26 | 2016 |
Efficient Round-Optimal Blind Signatures in the Standard Model E Ghadafi International Conference on Financial Cryptography and Data Security, 2017 | 23 | 2017 |
Attribute-based signatures with user-controlled linkability A El Kaafarani, L Chen, E Ghadafi, J Davenport Cryptology and Network Security: 13th International Conference, CANS 2014 …, 2014 | 22 | 2014 |
Formalizing group blind signatures and practical constructions without random oracles E Ghadafi Information Security and Privacy: 18th Australasian Conference, ACISP 2013 …, 2013 | 20 | 2013 |
Towards a classification of non-interactive computational assumptions in cyclic groups E Ghadafi, J Groth International Conference on the Theory and Application of Cryptology and …, 2017 | 19 | 2017 |
Sub-linear blind ring signatures without random oracles EM Ghadafi IMA International Conference on Cryptography and Coding, 304-323, 2013 | 19 | 2013 |
Foundations of fully dynamic group signatures J Bootle, A Cerulli, P Chaidos, E Ghadafi, J Groth Journal of Cryptology 33, 1822-1870, 2020 | 18 | 2020 |
Efficient two-move blind signatures in the common reference string model E Ghadafi, NP Smart International Conference on Information Security, 274-289, 2012 | 16 | 2012 |
Attribute-based signatures with user-controlled linkability without random oracles A El Kaafarani, E Ghadafi Cryptography and Coding: 16th IMA International Conference, IMACC 2017 …, 2017 | 13 | 2017 |
Defending against adversarial machine learning attacks using hierarchical learning: A case study on network traffic attack classification A McCarthy, E Ghadafi, P Andriotis, P Legg Journal of Information Security and Applications 72, 103398, 2023 | 12 | 2023 |