Follow
Máté Horváth
Máté Horváth
Postdoc, University of Wuppertal
Verified email at crysys.hu - Homepage
Title
Cited by
Cited by
Year
Attribute-based encryption optimized for cloud computing
M Horváth
SOFSEM 2015: Theory and Practice of Computer Science - 41st International …, 2015
832015
Cryptographic Obfuscation A Survey
M Horváth, L Buttyán
Springer International Publishing, 2020
25*2020
Problem domain analysis of IoT-driven secure data markets
M Horváth, L Buttyán
International ISCIS Security Workshop, 57-67, 2018
72018
The Legendre Pseudorandom Function as a Multivariate Quadratic Cryptosystem: Security and Applications
IA Seres, M Horváth, P Burcsi
Cryptology ePrint Archive, Report 2021/182. https://eprint. iacr. org/2021/182, 2021
62021
Searchable Symmetric Encryption for Restricted Search
M Horvath, I Vajda
Journal of Communications Software and Systems 14 (1), 104-111, 2018
32018
Searchable symmetric encryption: Sequential scan can be practical
M Horváth, I Vajda
2017 25th International Conference on Software, Telecommunications and …, 2017
32017
The Cost of Having Been Pwned: A Security Service Provider’s Perspective
G Biczók, M Horváth, S Szebeni, I Lám, L Buttyán
International Workshop on Emerging Technologies for Authorization and …, 2020
2020
Cryptographic problems in the context of data markets
M Horváth
2020
There Is Always an Exception: Controlling Partial Information Leakage in Secure Computation
M Horváth, L Buttyán, G Székely, D Neubrandt
International Conference on Information Security and Cryptology, 133-149, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–9