


default search action
Matthew Green 0001
Person information
- affiliation: Johns Hopkins University, Baltimore, MD, USA
Other persons with the same name
- Matthew Green 0002 (aka: Matthew J. Green) — University of Aberdeen, UK
- Matthew Green 0003 — Cornell University, NY, USA
- Matthew Green 0004 — Curtin University of Technology, Australian Telecommunication Research Centre, Perth, WA, Australia
- Matthew Green 0005
— EMBL-EBI, Cambridge, UK (and 1 more)
- Matthew Green 0006
— Griffith University, Brisbane, QLD, Australia
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c62]Hannah Davis
, Matthew D. Green, Nadia Heninger
, Keegan Ryan
, Adam Suhl:
On the Possibility of a Backdoor in the Micali-Schnorr Generator. Public Key Cryptography (1) 2024: 352-386 - [c61]Harry Eldridge, Gabrielle Beck, Matthew Green, Nadia Heninger, Abhishek Jain:
Abuse-Resistant Location Tracking: Balancing Privacy and Safety in the Offline Finding Ecosystem. USENIX Security Symposium 2024 - [i49]Brennon Brimhall, Orion Weller, Matthew Green, Ian Miers:
A Waterlog for Detecting and Tracing Synthetic Text from Large Language Models. IACR Cryptol. ePrint Arch. 2024: 1424 (2024) - 2023
- [j17]Matthew Green, Mathias Hall-Andersen, Eric Hennenfent, Gabriel Kaptchuk, Benjamin Perez, Gijs Van Laer:
Efficient Proofs of Software Exploitability for Real-world Processors. Proc. Priv. Enhancing Technol. 2023(1): 627-640 (2023) - [j16]Gabrielle Beck, Arka Rai Choudhuri, Matthew Green, Abhishek Jain, Pratyush Ranjan Tiwari:
Time-Deniable Signatures. Proc. Priv. Enhancing Technol. 2023(3): 79-102 (2023) - [c60]Matthew Green
, Abhishek Jain
, Gijs Van Laer
:
Efficient Set Membership Encryption and Applications. CCS 2023: 1080-1092 - [c59]Jonathan Prokos, Neil Fendley, Matthew Green, Roei Schuster, Eran Tromer, Tushar M. Jois, Yinzhi Cao:
Squint Hard Enough: Attacking Perceptual Hashing with Adversarial Machine Learning. USENIX Security Symposium 2023: 211-228 - [c58]Maximilian Zinkus, Yinzhi Cao, Matthew D. Green:
McFIL: Model Counting Functionality-Inherent Leakage. USENIX Security Symposium 2023: 7001-7018 - [i48]Maximilian Zinkus, Yinzhi Cao, Matthew Green:
McFIL: Model Counting Functionality-Inherent Leakage. CoRR abs/2306.05633 (2023) - [i47]Hannah Davis, Matthew Green, Nadia Heninger, Keegan Ryan, Adam Suhl:
On the Possibility of a Backdoor in the Micali-Schnorr Generator. IACR Cryptol. ePrint Arch. 2023: 440 (2023) - [i46]Alishah Chator, Matthew Green, Pratyush Ranjan Tiwari:
SoK: Privacy-Preserving Signatures. IACR Cryptol. ePrint Arch. 2023: 1039 (2023) - [i45]Gabrielle Beck, Harry Eldridge, Matthew Green, Nadia Heninger, Abhishek Jain:
Abuse-Resistant Location Tracking: Balancing Privacy and Safety in the Offline Finding Ecosystem. IACR Cryptol. ePrint Arch. 2023: 1332 (2023) - 2022
- [j15]Maximilian Zinkus, Tushar M. Jois, Matthew Green:
SoK: Cryptographic Confidentiality of Data on Mobile Devices. Proc. Priv. Enhancing Technol. 2022(1): 586-607 (2022) - [j14]Aarushi Goel, Matthew Green, Mathias Hall-Andersen, Gabriel Kaptchuk:
Efficient Set Membership Proofs using MPC-in-the-Head. Proc. Priv. Enhancing Technol. 2022(2): 304-324 (2022) - [c57]Aarushi Goel, Matthew Green, Mathias Hall-Andersen, Gabriel Kaptchuk:
Stacking Sigmas: A Framework to Compose $\varSigma $-Protocols for Disjunctions. EUROCRYPT (2) 2022: 458-487 - [c56]Harry Eldridge
, Aarushi Goel, Matthew Green, Abhishek Jain, Maximilian Zinkus:
One-Time Programs from Commodity Hardware. TCC (3) 2022: 121-150 - [i44]Pratyush Ranjan Tiwari, Matthew Green:
Algorithm-Substitution Attacks on Cryptographic Puzzles. IACR Cryptol. ePrint Arch. 2022: 477 (2022) - [i43]Gabrielle Beck, Arka Rai Choudhuri, Matthew Green, Abhishek Jain, Pratyush Ranjan Tiwari:
Time-Deniable Signatures. IACR Cryptol. ePrint Arch. 2022: 1018 (2022) - [i42]Matthew Green, Mathias Hall-Andersen, Eric Hennenfent, Gabriel Kaptchuk, Benjamin Perez, Gijs Van Laer:
Efficient Proofs of Software Exploitability for Real-world Processors. IACR Cryptol. ePrint Arch. 2022: 1223 (2022) - [i41]Harry Eldridge, Aarushi Goel, Matthew Green, Abhishek Jain, Maximilian Zinkus:
One-Time Programs from Commodity Hardware. IACR Cryptol. ePrint Arch. 2022: 1257 (2022) - 2021
- [c55]Gabrielle Beck, Julia Len, Ian Miers, Matthew Green:
Fuzzy Message Detection. CCS 2021: 1507-1528 - [c54]Gabriel Kaptchuk, Tushar M. Jois, Matthew Green, Aviel D. Rubin:
Meteor: Cryptographically Secure Steganography for Realistic Distributions. CCS 2021: 1529-1548 - [c53]Arka Rai Choudhuri
, Aarushi Goel, Matthew Green, Abhishek Jain, Gabriel Kaptchuk:
Fluid MPC: Secure Multiparty Computation with Dynamic Participants. CRYPTO (2) 2021: 94-123 - [c52]Matthew Green, Gabriel Kaptchuk, Gijs Van Laer:
Abuse Resistant Law Enforcement Access Systems. EUROCRYPT (3) 2021: 553-583 - [c51]Karl Siil, Aviel Rubin, Matthew Elder, Anton Dahbura
, Matthew Green, Lanier A. Watkins:
Cost-Effective Mission Assurance Engineering Through Simulation. IoTaIS 2021: 67-72 - [c50]Michael A. Specter, Sunoo Park, Matthew Green:
KeyForge: Non-Attributable Email from Forward-Forgeable Signatures. USENIX Security Symposium 2021: 1755-1773 - [i40]Maximilian Zinkus, Tushar M. Jois, Matthew Green:
Data Security on Mobile Devices: Current State of the Art, Open Problems, and Proposed Solutions. CoRR abs/2105.12613 (2021) - [i39]Maximilian Zinkus, Tushar M. Jois, Matthew Green:
SoK: Cryptographic Confidentiality of Data on Mobile Devices. CoRR abs/2109.11007 (2021) - [i38]Gabrielle Beck, Julia Len, Ian Miers, Matthew Green:
Fuzzy Message Detection. IACR Cryptol. ePrint Arch. 2021: 89 (2021) - [i37]Matthew Green, Gabriel Kaptchuk, Gijs Van Laer:
Abuse Resistant Law Enforcement Access Systems. IACR Cryptol. ePrint Arch. 2021: 321 (2021) - [i36]Aarushi Goel, Matthew Green, Mathias Hall-Andersen, Gabriel Kaptchuk:
Stacking Sigmas: A Framework to Compose Σ-Protocols for Disjunctions. IACR Cryptol. ePrint Arch. 2021: 422 (2021) - [i35]Gabriel Kaptchuk, Tushar M. Jois, Matthew Green, Aviel D. Rubin:
Meteor: Cryptographically Secure Steganography for Realistic Distributions. IACR Cryptol. ePrint Arch. 2021: 686 (2021) - [i34]Jonathan Prokos, Tushar M. Jois, Neil Fendley, Roei Schuster, Matthew Green, Eran Tromer, Yinzhi Cao:
Squint Hard Enough: Evaluating Perceptual Hashing with Machine Learning. IACR Cryptol. ePrint Arch. 2021: 1531 (2021) - [i33]Aarushi Goel, Matthew Green, Mathias Hall-Andersen, Gabriel Kaptchuk:
Efficient Set Membership Proofs using MPC-in-the-Head. IACR Cryptol. ePrint Arch. 2021: 1656 (2021) - 2020
- [c49]Karl Siil, Aviel D. Rubin, Matthew Elder, Anton Dahbura, Matthew Green, Lanier A. Watkins:
Mission Assurance for Autonomous Undersea Vehicles. SP (Workshops) 2020: 244-249 - [c48]Sean Bowe, Alessandro Chiesa, Matthew Green, Ian Miers, Pratyush Mishra, Howard Wu:
ZEXE: Enabling Decentralized Private Computation. SP 2020: 947-964 - [c47]Gabrielle Beck, Maximilian Zinkus, Matthew Green:
Automating the Development of Chosen Ciphertext Attacks. USENIX Security Symposium 2020: 1821-1837 - [i32]Arka Rai Choudhuri, Aarushi Goel, Matthew Green, Abhishek Jain
, Gabriel Kaptchuk:
Fluid MPC: Secure Multiparty Computation with Dynamic Participants. IACR Cryptol. ePrint Arch. 2020: 754 (2020)
2010 – 2019
- 2019
- [j13]David Adrian, Karthikeyan Bhargavan, Zakir Durumeric, Pierrick Gaudry, Matthew Green, J. Alex Halderman, Nadia Heninger, Drew Springall, Emmanuel Thomé
, Luke Valenta, Benjamin VanderSloot, Eric Wustrow, Santiago Zanella Béguelin
, Paul Zimmermann:
Imperfect forward secrecy: how Diffie-Hellman fails in practice. Commun. ACM 62(1): 106-114 (2019) - [c46]Gabriel Kaptchuk, Matthew Green, Ian Miers:
Giving State to the Stateless: Augmenting Trustworthy Computation with Ledgers. NDSS 2019 - [i31]Michael A. Specter, Sunoo Park, Matthew Green:
KeyForge: Mitigating Email Breaches with Forward-Forgeable Signatures. CoRR abs/1904.06425 (2019) - [i30]Michael A. Specter, Sunoo Park, Matthew Green:
KeyForge: Mitigating Email Breaches with Forward-Forgeable Signatures. IACR Cryptol. ePrint Arch. 2019: 390 (2019) - [i29]Gabrielle Beck, Maximilian Zinkus, Matthew Green:
Using SMT Solvers to Automate Chosen Ciphertext Attacks. IACR Cryptol. ePrint Arch. 2019: 958 (2019) - 2018
- [j12]Stephen Checkoway, Jacob Maskiewicz, Christina Garman, Joshua Fried, Shaanan Cohney
, Matthew Green, Nadia Heninger, Ralf-Philipp Weinmann, Eric Rescorla, Hovav Shacham:
Where did I leave my keys?: lessons from the Juniper Dual EC incident. Commun. ACM 61(11): 148-155 (2018) - [c45]Shaanan N. Cohney
, Matthew D. Green, Nadia Heninger:
Practical State Recovery Attacks against Legacy RNG Implementations. CCS 2018: 265-280 - [c44]Alishah Chator, Matthew Green:
How to Squeeze a Crowd: Reducing Bandwidth in Mixing Cryptocurrencies. EuroS&P Workshops 2018: 40-49 - [c43]Sean Bowe, Ariel Gabizon, Matthew D. Green:
A Multi-party Protocol for Constructing the Public Parameters of the Pinocchio zk-SNARK. Financial Cryptography Workshops 2018: 64-77 - [c42]Alishah Chator, Matthew Green:
Don't Talk to Strangers - On the Challenges of Intelligent Vehicle Authentication. VEHITS 2018: 522-528 - [i28]Sean Bowe, Alessandro Chiesa, Matthew Green, Ian Miers, Pratyush Mishra
, Howard Wu:
Zexe: Enabling Decentralized Private Computation. IACR Cryptol. ePrint Arch. 2018: 962 (2018) - 2017
- [c41]Matthew Green, Ian Miers:
Bolt: Anonymous Payment Channels for Decentralized Currencies. CCS 2017: 473-489 - [c40]Arka Rai Choudhuri
, Matthew Green, Abhishek Jain
, Gabriel Kaptchuk, Ian Miers:
Fairness in an Unfair World: Fair Multiparty Computation from Public Bulletin Boards. CCS 2017: 719-728 - [c39]Katherine Q. Ye, Matthew Green, Naphat Sanguansin, Lennart Beringer, Adam Petcher, Andrew W. Appel
:
Verified Correctness and Security of mbedTLS HMAC-DRBG. CCS 2017: 2007-2020 - [c38]Alessandro Chiesa, Matthew Green, Jingcheng Liu, Peihan Miao, Ian Miers, Pratyush Mishra:
Decentralized Anonymous Micropayments. EUROCRYPT (2) 2017: 609-642 - [c37]Gabriel Kaptchuk, Matthew Green, Aviel D. Rubin:
Outsourcing Medical Dataset Analysis: A Possible Solution. Financial Cryptography 2017: 98-123 - [i27]Katherine Q. Ye, Matthew Green, Naphat Sanguansin, Lennart Beringer, Adam Petcher, Andrew W. Appel:
Verified Correctness and Security of mbedTLS HMAC-DRBG. CoRR abs/1708.08542 (2017) - [i26]Gabriel Kaptchuk, Ian Miers, Matthew Green:
Managing Secrets with Consensus Networks: Fairness, Ransomware and Access Control. IACR Cryptol. ePrint Arch. 2017: 201 (2017) - [i25]Sean Bowe, Ariel Gabizon, Matthew D. Green:
A multi-party protocol for constructing the public parameters of the Pinocchio zk-SNARK. IACR Cryptol. ePrint Arch. 2017: 602 (2017) - [i24]Arka Rai Choudhuri, Matthew Green, Abhishek Jain
, Gabriel Kaptchuk, Ian Miers:
Fairness in an Unfair World: Fair Multiparty Computation from public Bulletin Boards. IACR Cryptol. ePrint Arch. 2017: 1091 (2017) - 2016
- [j11]Matthew Green, Matthew Smith
:
Developers are Not the Enemy!: The Need for Usable Security APIs. IEEE Secur. Priv. 14(5): 40-46 (2016) - [c36]Stephen Checkoway, Jacob Maskiewicz, Christina Garman, Joshua Fried, Shaanan Cohney
, Matthew Green, Nadia Heninger, Ralf-Philipp Weinmann, Eric Rescorla, Hovav Shacham:
A Systematic Analysis of the Juniper Dual EC Incident. CCS 2016: 468-479 - [c35]Matthew Green, Watson Ladd, Ian Miers:
A Protocol for Privately Reporting Ad Impressions at Scale. CCS 2016: 1591-1601 - [c34]Christina Garman, Matthew Green, Ian Miers:
Accountable Privacy for Decentralized Anonymous Payments. Financial Cryptography 2016: 81-98 - [c33]Matthew D. Green:
Keynote: On Subverting Trust. NDSS 2016 - [c32]Matthew D. Green, Jonathan Katz, Alex J. Malozemoff, Hong-Sheng Zhou
:
A Unified Approach to Idealized Model Separations via Indistinguishability Obfuscation. SCN 2016: 587-603 - [c31]Karthikeyan Bhargavan, Christina Brzuska, Cédric Fournet, Matthew Green, Markulf Kohlweiss
, Santiago Zanella Béguelin
:
Downgrade Resilience in Key-Exchange Protocols. IEEE Symposium on Security and Privacy 2016: 506-525 - [c30]Christina Garman, Matthew Green, Gabriel Kaptchuk, Ian Miers, Michael Rushanan:
Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage. USENIX Security Symposium 2016: 655-672 - [i23]Christina Garman, Matthew Green, Ian Miers:
Accountable Privacy for Decentralized Anonymous Payments. IACR Cryptol. ePrint Arch. 2016: 61 (2016) - [i22]Karthikeyan Bhargavan, Christina Brzuska, Cédric Fournet, Matthew Green, Markulf Kohlweiss, Santiago Zanella Béguelin:
Downgrade Resilience in Key-Exchange Protocols. IACR Cryptol. ePrint Arch. 2016: 72 (2016) - [i21]Stephen Checkoway, Shaanan Cohney, Christina Garman, Matthew Green, Nadia Heninger, Jacob Maskiewicz, Eric Rescorla, Hovav Shacham, Ralf-Philipp Weinmann:
A Systematic Analysis of the Juniper Dual EC Incident. IACR Cryptol. ePrint Arch. 2016: 376 (2016) - [i20]Matthew D. Green, Ian Miers:
Bolt: Anonymous Payment Channels for Decentralized Currencies. IACR Cryptol. ePrint Arch. 2016: 701 (2016) - [i19]Alessandro Chiesa, Matthew Green, Jingcheng Liu, Peihan Miao, Ian Miers, Pratyush Mishra:
Decentralized Anonymous Micropayments. IACR Cryptol. ePrint Arch. 2016: 1033 (2016) - 2015
- [j10]Harold Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew Green, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Michael A. Specter, Daniel J. Weitzner:
Keys under doormats. Commun. ACM 58(10): 24-26 (2015) - [j9]Harold Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew Green, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Michael A. Specter, Daniel J. Weitzner:
Keys under doormats: mandating insecurity by requiring government access to all data and communications. J. Cybersecur. 1(1): 69-79 (2015) - [c29]David Adrian, Karthikeyan Bhargavan, Zakir Durumeric, Pierrick Gaudry, Matthew Green, J. Alex Halderman, Nadia Heninger, Drew Springall, Emmanuel Thomé
, Luke Valenta, Benjamin VanderSloot, Eric Wustrow, Santiago Zanella Béguelin
, Paul Zimmermann
:
Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice. CCS 2015: 5-17 - [c28]Eli Ben-Sasson, Alessandro Chiesa, Matthew Green, Eran Tromer, Madars Virza:
Secure Sampling of Public Parameters for Succinct Zero Knowledge Proofs. IEEE Symposium on Security and Privacy 2015: 287-304 - [c27]Matthew D. Green, Ian Miers:
Forward Secure Asynchronous Messaging from Puncturable Encryption. IEEE Symposium on Security and Privacy 2015: 305-320 - 2014
- [j8]Joseph A. Akinyele, Matthew Green, Susan Hohenberger, Matthew W. Pagano:
Machine-generated algorithms, proofs and software for the batch verification of digital signature schemes. J. Comput. Secur. 22(6): 867-912 (2014) - [c26]Alex J. Malozemoff, Jonathan Katz, Matthew D. Green:
Automated Analysis and Synthesis of Block-Cipher Modes of Operation. CSF 2014: 140-152 - [c25]Christina Garman, Matthew Green, Ian Miers, Aviel D. Rubin:
Rational Zero: Economic Security for Zerocoin with Everlasting Anonymity. Financial Cryptography Workshops 2014: 140-155 - [c24]Christina Garman, Matthew Green, Ian Miers:
Decentralized Anonymous Credentials. NDSS 2014 - [c23]Eli Ben-Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, Madars Virza:
Zerocash: Decentralized Anonymous Payments from Bitcoin. IEEE Symposium on Security and Privacy 2014: 459-474 - [c22]Stephen Checkoway, Ruben Niederhagen, Adam Everspaugh, Matthew Green, Tanja Lange, Thomas Ristenpart, Daniel J. Bernstein, Jake Maskiewicz, Hovav Shacham, Matthew Fredrikson:
On the Practical Exploitability of Dual EC in TLS Implementations. USENIX Security Symposium 2014: 319-335 - [i18]Eli Ben-Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, Madars Virza:
Zerocash: Decentralized Anonymous Payments from Bitcoin. IACR Cryptol. ePrint Arch. 2014: 349 (2014) - [i17]Alex J. Malozemoff, Jonathan Katz, Matthew D. Green:
Automated Analysis and Synthesis of Block-Cipher Modes of Operation. IACR Cryptol. ePrint Arch. 2014: 774 (2014) - [i16]Matthew D. Green, Jonathan Katz, Alex J. Malozemoff, Hong-Sheng Zhou:
A Unified Approach to Idealized Model Separations via Indistinguishability Obfuscation. IACR Cryptol. ePrint Arch. 2014: 863 (2014) - 2013
- [j7]Matthew Green:
The Threat in the Cloud. IEEE Secur. Priv. 11(1): 86-89 (2013) - [j6]Joseph A. Akinyele, Christina Garman, Ian Miers, Matthew W. Pagano, Michael Rushanan, Matthew Green, Aviel D. Rubin:
Charm: a framework for rapidly prototyping cryptosystems. J. Cryptogr. Eng. 3(2): 111-128 (2013) - [c21]Joseph A. Akinyele, Matthew Green, Susan Hohenberger:
Using SMT solvers to automate design tasks for encryption and signature schemes. CCS 2013: 399-410 - [c20]Ian Miers, Christina Garman, Matthew Green, Aviel D. Rubin:
Zerocoin: Anonymous Distributed E-Cash from Bitcoin. IEEE Symposium on Security and Privacy 2013: 397-411 - [i15]Joseph A. Akinyele, Matthew Green, Susan Hohenberger, Matthew W. Pagano:
Machine-Generated Algorithms, Proofs and Software for the Batch Verification of Digital Signature Schemes. IACR Cryptol. ePrint Arch. 2013: 175 (2013) - [i14]Christina Garman, Matthew Green, Ian Miers:
Decentralized Anonymous Credentials. IACR Cryptol. ePrint Arch. 2013: 622 (2013) - 2012
- [c19]Joseph A. Akinyele, Matthew Green, Susan Hohenberger, Matthew W. Pagano:
Machine-generated algorithms, proofs and software for the batch verification of digital signature schemes. CCS 2012: 474-487 - [c18]Joseph A. Akinyele, Matthew Green, Aviel D. Rubin:
Charm: A Framework for Rapidly Prototyping Cryptosystems. NDSS 2012 - [c17]David Cash, Matthew Green, Susan Hohenberger:
New Definitions and Separations for Circular Security. Public Key Cryptography 2012: 540-557 - [c16]Ian Miers, Matthew Green, Christoph U. Lehmann, Aviel D. Rubin:
Vis-à-vis Cryptography: Private and Trustworthy In-Person Certifications. HealthSec 2012 - 2011
- [j5]Scott E. Coull, Matthew Green, Susan Hohenberger:
Access controls for oblivious and anonymous systems. ACM Trans. Inf. Syst. Secur. 14(1): 10:1-10:28 (2011) - [c15]Joseph A. Akinyele, Matthew W. Pagano, Matthew D. Green, Christoph U. Lehmann
, Zachary N. J. Peterson, Aviel D. Rubin:
Securing electronic medical records using attribute-based encryption on mobile devices. SPSM@CCS 2011: 75-86 - [c14]Matthew Green:
Secure Blind Decryption. Public Key Cryptography 2011: 265-282 - [c13]Matthew Green, Susan Hohenberger:
Practical Adaptive Oblivious Transfer from Simple Assumptions. TCC 2011: 347-363 - [c12]Matthew Green, Susan Hohenberger, Brent Waters:
Outsourcing the Decryption of ABE Ciphertexts. USENIX Security Symposium 2011 - [c11]Matthew D. Green, Aviel D. Rubin:
A Research Roadmap for Healthcare IT Security Inspired by the PCAST Health Information Technology Report. HealthSec 2011 - [i13]Matthew Green:
Secure Blind Decryption. IACR Cryptol. ePrint Arch. 2011: 109 (2011) - [i12]Joseph A. Akinyele, Matthew Green, Aviel D. Rubin:
Charm: A framework for Rapidly Prototyping Cryptosystems. IACR Cryptol. ePrint Arch. 2011: 617 (2011) - 2010
- [c10]Jae Hyun Ahn, Matthew Green, Susan Hohenberger:
Synchronized aggregate signatures: new definitions, constructions and applications. CCS 2010: 473-484 - [i11]Matthew Green, Susan Hohenberger:
Practical Adaptive Oblivious Transfer from Simple Assumptions. IACR Cryptol. ePrint Arch. 2010: 109 (2010) - [i10]Matthew Green, Susan Hohenberger:
CPA and CCA-Secure Encryption Systems that are not 2-Circular Secure. IACR Cryptol. ePrint Arch. 2010: 144 (2010) - [i9]Jae Hyun Ahn, Matthew Green, Susan Hohenberger:
Synchronized Aggregate Signatures: New Definitions, Constructions and Applications. IACR Cryptol. ePrint Arch. 2010: 422 (2010) - [i8]Joseph A. Akinyele, Christoph U. Lehmann, Matthew Green, Matthew W. Pagano, Zachary N. J. Peterson, Aviel D. Rubin:
Self-Protecting Electronic Medical Records Using Attribute-Based Encryption. IACR Cryptol. ePrint Arch. 2010: 565 (2010)
2000 – 2009
- 2009
- [c9]Anna Lisa Ferrara, Matthew Green, Susan Hohenberger, Michael Østergaard Pedersen:
Practical Short Signature Batch Verification. CT-RSA 2009: 309-324 - [c8]Scott E. Coull, Matthew Green, Susan Hohenberger:
Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials. Public Key Cryptography 2009: 501-520 - 2008
- [c7]Matthew Green, Susan Hohenberger:
Universally Composable Adaptive Oblivious Transfer. ASIACRYPT 2008: 179-197 - [i7]Anna Lisa Ferrara, Matthew Green, Susan Hohenberger, Michael Østergaard Pedersen:
Practical Short Signature Batch Verification. IACR Cryptol. ePrint Arch. 2008: 15 (2008) - [i6]Matthew Green, Susan Hohenberger:
Universally Composable Adaptive Oblivious Transfer. IACR Cryptol. ePrint Arch. 2008: 163 (2008) - [i5]Scott E. Coull, Matthew Green, Susan Hohenberger:
Access Controls for Oblivious and Anonymous Systems. IACR Cryptol. ePrint Arch. 2008: 474 (2008) - 2007
- [c6]Matthew Green, Giuseppe Ateniese:
Identity-Based Proxy Re-encryption. ACNS 2007: 288-306 - [c5]Matthew Green, Susan Hohenberger:
Blind Identity-Based Encryption and Simulatable Oblivious Transfer. ASIACRYPT 2007: 265-282 - [i4]Matthew Green, Susan Hohenberger:
Blind Identity-Based Encryption and Simulatable Oblivious Transfer. IACR Cryptol. ePrint Arch. 2007: 235 (2007) - 2006
- [j4]Stephen Bono, Aviel D. Rubin, Adam Stubblefield, Matthew Green:
Security through legality. Commun. ACM 49(6): 41-43 (2006) - [j3]Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan Hohenberger:
Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1): 1-30 (2006) - [i3]Matthew Green, Giuseppe Ateniese:
Identity-Based Proxy Re-encryption. IACR Cryptol. ePrint Arch. 2006: 473 (2006) - 2005
- [c4]Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan Hohenberger:
Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage. NDSS 2005 - [c3]Steve Bono, Matthew Green, Adam Stubblefield, Ari Juels, Aviel D. Rubin, Michael Szydlo:
Security Analysis of a Cryptographically-Enabled RFID Device. USENIX Security Symposium 2005 - [i2]Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan Hohenberger:
Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage. IACR Cryptol. ePrint Arch. 2005: 28 (2005) - [i1]Lucas Ballard, Matthew Green, Breno de Medeiros, Fabian Monrose:
Correlation-Resistant Storage via Keyword-Searchable Encryption. IACR Cryptol. ePrint Arch. 2005: 417 (2005) - 2004
- [j2]Matthew Green, Abdelhak M. Zoubir:
Selection of a time-varying quadratic Volterra model using a wavelet packet basis expansion. IEEE Trans. Signal Process. 52(10): 2721-2728 (2004) - 2003
- [c2]Luke Mewburn, Matthew Green:
build.sh: Cross-building NetBSD. BSDCon 2003: 47-56 - 2001
- [j1]Charles D. Cranor
, Matthew Green, Charles R. Kalmanek, David H. Shur, Sandeep Sibal, Jacobus E. van der Merwe, Cormac J. Sreenan:
Enhanced Streaming Services in a Content Distribution Network. IEEE Internet Comput. 5(4): 66-75 (2001) - 2000
- [c1]Matthew Green, Abdelhak M. Zoubir:
Multiple hypothesis testing for time-varying nonlinear system identification. ICASSP 2000: 560-563
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:13 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint