Follow
Máté Horváth
Máté Horváth
Postdoc, University of Wuppertal
Verified email at crysys.hu - Homepage
Title
Cited by
Cited by
Year
Attribute-based encryption optimized for cloud computing
M Horváth
SOFSEM 2015: Theory and Practice of Computer Science - 41st International …, 2015
922015
Cryptographic Obfuscation A Survey
M Horváth, L Buttyán
Springer International Publishing, 2020
29*2020
The Legendre pseudorandom function as a multivariate quadratic cryptosystem: security and applications
IA Seres, M Horváth, P Burcsi
Applicable Algebra in Engineering, Communication and Computing, 1-31, 2023
222023
Problem domain analysis of iot-driven secure data markets
M Horváth, L Buttyán
Security in Computer and Information Sciences: First International ISCIS …, 2018
72018
Security analysis of the whatsapp end-to-end encrypted backup protocol
GT Davies, S Faller, K Gellert, T Handirk, J Hesse, M Horváth, T Jager
Annual International Cryptology Conference, 330-361, 2023
62023
Searchable symmetric encryption: Sequential scan can be practical
M Horváth, I Vajda
2017 25th International Conference on Software, Telecommunications and …, 2017
42017
Searchable Symmetric Encryption for Restricted Search
M Horvath, I Vajda
Journal of Communications Software and Systems 14 (1), 104-111, 2018
32018
There Is Always an Exception: Controlling Partial Information Leakage in Secure Computation
M Horváth, L Buttyán, G Székely, D Neubrandt
Information Security and Cryptology–ICISC 2019: 22nd International …, 2020
22020
Private key delegation in attribute-based encryption
M Horváth
Mesterproba Conference of the Budapest University of Technology and …, 2015
22015
Cryptographic Problems in the Context of Data Markets
M Horváth
Budapest University of Technology and Economics, Hungary, 2021
2021
The cost of having been pwned: a security service provider’s perspective
G Biczók, M Horváth, S Szebeni, I Lám, L Buttyán
Emerging Technologies for Authorization and Authentication: Third …, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–11