Gareth T. Davies
Gareth T. Davies
Verified email at - Homepage
Cited by
Cited by
Fast and secure updatable encryption
C Boyd, GT Davies, K Gjøsteen, Y Jiang
Annual International Cryptology Conference, 464-493, 2020
Side channels in deduplication: Trade-offs between leakage and efficiency
F Armknecht, C Boyd, GT Davies, K Gjøsteen, M Toorani
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
Symmetric Key Exchange with Full Forward Security and Robust Synchronization
C Boyd, GT Davies, B Kock, K Gellert, T Jager, L Millerjord
International Conference on the Theory and Application of Cryptology and …, 2021
Encryption schemes secure under related-key and key-dependent message attacks
F Böhl, GT Davies, D Hofheinz
Public-Key Cryptography–PKC 2014: 17th International Conference on Practice …, 2014
Security analysis of the whatsapp end-to-end encrypted backup protocol
GT Davies, S Faller, K Gellert, T Handirk, J Hesse, M Horváth, T Jager
Annual International Cryptology Conference, 330-361, 2023
KDM security in the hybrid framework
GT Davies, M Stam
Topics in Cryptology–CT-RSA 2014: The Cryptographer’s Track at the RSA …, 2014
Zero-knowledge proof of decryption for FHE ciphertexts
C Carr, A Costache, GT Davies, K Gjøsteen, M Strand
Cryptology ePrint Archive, 2018
Offline Assisted Group Key Exchange
C Boyd, GT Davies, K Gjøsteen, Y Jiang
International Conference on Information Security, 2018
Security notions for cloud storage and deduplication
C Boyd, GT Davies, K Gjøsteen, H Raddum, M Toorani
Provable Security: 12th International Conference, ProvSec 2018, Jeju, South …, 2018
Cloud-assisted asynchronous key transport with post-quantum security
GT Davies, H Galteland, K Gjøsteen, Y Jiang
Information Security and Privacy: 25th Australasian Conference, ACISP 2020 …, 2020
Extending updatable encryption: public key, tighter security and signed ciphertexts
C Qian, YJ Galteland, GT Davies
Cryptology ePrint Archive, 2023
Client-oblivious OPRAM
GT Davies, C Janson, DP Martin
International Conference on Information and Communications Security, 312-330, 2020
RKA-KDM secure encryption from public-key encryption
F Böhl, GT Davies, D Hofheinz
Cryptology ePrint Archive, 2013
: Persistent and Distributed Key Acquisition for Secure Storage from Passwords
GT Davies, J Pijnenburg
International Conference on Selected Areas in Cryptography, 159-189, 2022
Definitions for plaintext-existence hiding in cloud storage
C Boyd, GT Davies, K Gjøsteen, H Raddum, M Toorani
Proceedings of the 13th International Conference on Availability …, 2018
SECURED for Health: Scaling Up Privacy to Enable the Integration of the European Health Data Space
F Regazzoni, G Acs, AZ Aszalos, C Avgerinos, N Bakalos, JL Berral, ...
2024 Design, Automation & Test in Europe Conference & Exhibition (DATE), 1-4, 2024
Using Cryptography to Control your Data at a Distance
C Boyd, GT Davies, K Gjøsteen, H Raddum, M Toorani
ERCIM NEWS, 17-18, 2016
Encryption in the presence of key-dependent messages and related-key attacks
GT Davies
University of Bristol, 2015
The system can't perform the operation now. Try again later.
Articles 1–18