default search action
Gareth T. Davies
Person information
- affiliation: University of Paderborn, Department of Computer Science, Germany
- affiliation: Norwegian University of Science and Technology, Trondheim, Norway
- affiliation: University of Bristol, Department of Computer Science, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c13]Francesco Regazzoni, Gergely Ács, Albert Zoltan Aszalos, Christos Avgerinos, Nikolaos Bakalos, Josep Lluis Berral, Joppe W. Bos, Marco Brohet, Andrés G. Castillo Sanz, Gareth T. Davies, Stefanos Florescu, Pierre-Elisée Flory, Alberto Gutierrez-Torre, Evangelos Haleplidis, Alice Héliou, Sotirios Ioannidis, Alexander Islam El-Kady, Katarzyna Kapusta, Konstantina Karagianni, Pieter Kruizinga, Kyrian Maat, Zoltán Ádám Mann, Kalliopi Mastoraki, SeoJeong Moon, Maja Nisevic, Balázs Pejó, Kostas Papagiannopoulos, Vassilis Paliouras, Paolo Palmieri, Francesca Palumbo, Juan Carlos Pérez Baun, Péter Pollner, Eduard Porta-Pardo, Luca Pulina, Muhammad Ali Siddiqi, Daniela Spajic, Christos Strydis, Georgios Tasopoulos, Vincent Thouvenot, Christos Tselios, Apostolos P. Fournaris:
SECURED for Health: Scaling Up Privacy to Enable the Integration of the European Health Data Space. DATE 2024: 1-4 - 2023
- [c12]Gareth T. Davies, Sebastian H. Faller, Kai Gellert, Tobias Handirk, Julia Hesse, Máté Horváth, Tibor Jager:
Security Analysis of the WhatsApp End-to-End Encrypted Backup Protocol. CRYPTO (4) 2023: 330-361 - [i15]Gareth T. Davies, Sebastian H. Faller, Kai Gellert, Tobias Handirk, Julia Hesse, Máté Horváth, Tibor Jager:
Security Analysis of the WhatsApp End-to-End Encrypted Backup Protocol. IACR Cryptol. ePrint Arch. 2023: 843 (2023) - [i14]Chen Qian, Yao Jiang Galteland, Gareth T. Davies:
Extending Updatable Encryption: Public Key, Tighter Security and Signed Ciphertexts. IACR Cryptol. ePrint Arch. 2023: 848 (2023) - 2022
- [c11]Gareth T. Davies, Jeroen Pijnenburg:
sfPERKS: Persistent and Distributed Key Acquisition for Secure Storage from Passwords. SAC 2022: 159-189 - [i13]Gareth T. Davies, Jeroen Pijnenburg:
PERKS: Persistent and Distributed Key Acquisition for Secure Storage from Passwords. IACR Cryptol. ePrint Arch. 2022: 1017 (2022) - 2021
- [c10]Colin Boyd, Gareth T. Davies, Bor de Kock, Kai Gellert, Tibor Jager, Lise Millerjord:
Symmetric Key Exchange with Full Forward Security and Robust Synchronization. ASIACRYPT (4) 2021: 681-710 - [i12]Colin Boyd, Gareth T. Davies, Bor de Kock, Kai Gellert, Tibor Jager, Lise Millerjord:
Symmetric Key Exchange with Full Forward Security and Robust Synchronization. IACR Cryptol. ePrint Arch. 2021: 702 (2021) - 2020
- [c9]Gareth T. Davies, Herman Galteland, Kristian Gjøsteen, Yao Jiang:
Cloud-Assisted Asynchronous Key Transport with Post-Quantum Security. ACISP 2020: 82-101 - [c8]Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Yao Jiang:
Fast and Secure Updatable Encryption. CRYPTO (1) 2020: 464-493 - [c7]Gareth T. Davies, Christian Janson, Daniel P. Martin:
Client-Oblivious OPRAM. ICICS 2020: 312-330 - [i11]Gareth T. Davies, Christian Janson, Daniel P. Martin:
Client-oblivious OPRAM. IACR Cryptol. ePrint Arch. 2020: 858 (2020)
2010 – 2019
- 2019
- [i10]Gareth T. Davies, Herman Galteland, Kristian Gjøsteen, Yao Jiang:
Cloud-assisted Asynchronous Key Transport with Post-Quantum Security. IACR Cryptol. ePrint Arch. 2019: 1409 (2019) - [i9]Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Yao Jiang:
RISE and SHINE: Fast and Secure Updatable Encryption. IACR Cryptol. ePrint Arch. 2019: 1457 (2019) - 2018
- [c6]Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Håvard Raddum, Mohsen Toorani:
Definitions for Plaintext-Existence Hiding in Cloud Storage. ARES 2018: 41:1-41:7 - [c5]Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Yao Jiang:
Offline Assisted Group Key Exchange. ISC 2018: 268-285 - [c4]Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Håvard Raddum, Mohsen Toorani:
Security Notions for Cloud Storage and Deduplication. ProvSec 2018: 347-365 - [i8]Christopher Carr, Anamaria Costache, Gareth T. Davies, Kristian Gjøsteen, Martin Strand:
Zero-Knowledge Proof of Decryption for FHE Ciphertexts. IACR Cryptol. ePrint Arch. 2018: 26 (2018) - [i7]Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Yao Jiang:
Offline Assisted Group Key Exchange. IACR Cryptol. ePrint Arch. 2018: 114 (2018) - [i6]Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Håvard Raddum, Mohsen Toorani:
Definitions for Plaintext-Existence Hiding in Cloud Storage. IACR Cryptol. ePrint Arch. 2018: 748 (2018) - 2017
- [c3]Frederik Armknecht, Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Mohsen Toorani:
Side Channels in Deduplication: Trade-offs between Leakage and Efficiency. AsiaCCS 2017: 266-274 - [i5]Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Mohsen Toorani, Håvard Raddum:
Security notions for cloud storage and deduplication. IACR Cryptol. ePrint Arch. 2017: 1208 (2017) - 2016
- [i4]Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Håvard Raddum, Mohsen Toorani:
Using Cryptography to Control Your Data at a Distance. ERCIM News 2016(106) (2016) - [i3]Frederik Armknecht, Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Mohsen Toorani:
Side channels in deduplication: trade-offs between leakage and efficiency. IACR Cryptol. ePrint Arch. 2016: 977 (2016) - 2015
- [b1]Gareth T. Davies:
Encryption in the presence of key-dependent messages and related-key attacks. University of Bristol, UK, 2015 - 2014
- [c2]Gareth T. Davies, Martijn Stam:
KDM Security in the Hybrid Framework. CT-RSA 2014: 461-480 - [c1]Florian Böhl, Gareth T. Davies, Dennis Hofheinz:
Encryption Schemes Secure under Related-Key and Key-Dependent Message Attacks. Public Key Cryptography 2014: 483-500 - 2013
- [i2]Gareth T. Davies, Martijn Stam:
KDM Security in the Hybrid Framework. IACR Cryptol. ePrint Arch. 2013: 567 (2013) - [i1]Florian Böhl, Gareth T. Davies, Dennis Hofheinz:
RKA-KDM secure encryption from public-key encryption. IACR Cryptol. ePrint Arch. 2013: 653 (2013)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint