Name
Papers
Collaborators
MATTHEW GREEN
72
129
Citations 
PageRank 
Referers 
2007
114.98
3724
Referees 
References 
1101
1083
Search Limit
1001000
Title
Citations
PageRank
Year
Stacking Sigmas: A Framework to Compose Sigma-Protocols for Disjunctions00.342022
Algorithm-Substitution Attacks on Cryptographic Puzzles.00.342022
One-Time Programs from Commodity Hardware.00.342022
Efficient Proofs of Software Exploitability for Real-world Processors.00.342022
Efficient Set Membership Proofs using MPC-in-the-Head.00.342022
SoK: Cryptographic Confidentiality of Data on Mobile Devices.00.342022
Fluid Mpc: Secure Multiparty Computation With Dynamic Participants10.352021
Efficient Set Membership Proofs using MPC-in-the-Head.00.342021
Cost-Effective Mission Assurance Engineering Through Simulation00.342021
KeyForge: Non-Attributable Email from Forward-Forgeable Signatures00.342021
Mission Assurance for Autonomous Undersea Vehicles00.342020
ZEXE: Enabling Decentralized Private Computation20.352020
KeyForge: Mitigating Email Breaches with Forward-Forgeable Signatures.00.342019
Giving State to the Stateless - Augmenting Trustworthy Computation with Ledgers.20.362019
Using SMT Solvers to Automate Chosen Ciphertext Attacks.00.342019
A multi-party protocol for constructing the public parameters of the Pinocchio zk-SNARK.50.402018
Don't Talk to Strangers - On the Challenges of Intelligent Vehicle Authentication.00.342018
How to Squeeze a Crowd: Reducing Bandwidth in Mixing Cryptocurrencies00.342018
Practical State Recovery Attacks against Legacy RNG Implementations.20.392018
Where did I leave my keys?: lessons from the Juniper Dual EC incident.10.372018
Managing Secrets with Consensus Networks: Fairness, Ransomware and Access Control.00.342017
Fairness in an Unfair World: Fair Multiparty Computation from Public Bulletin Boards.90.442017
Decentralized Anonymous Micropayments.10.362017
Verified Correctness and Security of mbedTLS HMAC-DRBG.70.512017
Outsourcing Medical Dataset Analysis: A Possible Solution.00.342017
Bolt: Anonymous Payment Channels for Decentralized Currencies.241.152017
Developers are Not the Enemy!: The Need for Usable Security APIs.210.842016
A Systematic Analysis of the Juniper Dual EC Incident.220.892016
A Unified Approach to Idealized Model Separations via Indistinguishability Obfuscation.10.352016
A Protocol for Privately Reporting Ad Impressions at Scale.50.422016
Keynote: On Subverting Trust.00.342016
Downgrade Resilience in Key-Exchange Protocols110.672016
Accountable Privacy for Decentralized Anonymous Payments.10.382016
Dancing On The Lip Of The Volcano: Chosen Ciphertext Attacks On Apple Imessage70.482016
Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice802.822015
Forward Secure Asynchronous Messaging from Puncturable Encryption170.612015
Secure Sampling of Public Parameters for Succinct Zero Knowledge Proofs220.962015
Keys under doormats: mandating insecurity by requiring government access to all data and communications.90.702015
Keys under doormats100.852015
Automated Analysis and Synthesis of Block-Cipher Modes of Operation421.372014
On the practical exploitability of dual EC in TLS implementations50.822014
The Brown Cloud Project: A New Blue?00.342014
Rational Zero: Economic Security for Zerocoin with Everlasting Anonymity.30.442014
Zerocash: Decentralized Anonymous Payments from Bitcoin2058.932014
Silver Bullet Talks with Matthew Green.00.342014
Decentralized Anonymous Credentials.10.362013
Using SMT solvers to automate design tasks for encryption and signature schemes150.582013
Dialogue with the Brown Cloud: A Virtual Conversation00.342013
Zerocoin: Anonymous Distributed E-Cash from Bitcoin17514.202013
Machine-generated algorithms, proofs and software for the batch verification of digital signature schemes140.562013
  • 1
  • 2