Juan A. Garay focuses on Computer security, Cryptography, Computer network, Authentication and Discrete mathematics. Juan A. Garay combines topics linked to The Internet with his work on Computer security. His Cryptography study combines topics in areas such as Payment system and Public-key cryptography.
His work on Multicast and Key distribution as part of his general Computer network study is frequently connected to Wireless WAN, Municipal wireless network and Multi-frequency network, thereby bridging the divide between different branches of science. The concepts of his Authentication study are interwoven with issues in Signature, Security parameter, Factor, Speaker recognition and User profile. In his research on the topic of Adversary, Theoretical computer science is strongly related with Access control.
His main research concerns Computer security, Theoretical computer science, Cryptography, Protocol and Computer network. His research on Computer security frequently links to adjacent areas such as The Internet. His biological study spans a wide range of topics, including Adversary, State, Constant and Secure multi-party computation, Computation.
His Cryptography research is multidisciplinary, incorporating elements of Correctness and Public-key cryptography. His Protocol research integrates issues from Communication channel, Ideal and Digital signature. His studies examine the connections between Computer network and genetics, as well as such issues in Key, with regards to Encryption.
Juan A. Garay mostly deals with Computer security, Secure multi-party computation, Theoretical computer science, Cryptography and Protocol. Juan A. Garay combines subjects such as Adversarial system, Block and Correctness with his study of Computer security. The various areas that Juan A. Garay examines in his Theoretical computer science study include Cryptographic protocol, Probabilistic logic, Compiler and String.
His study in Cryptography is interdisciplinary in nature, drawing from both Protocol design, Data security, Internet privacy, Theory of computation and Robustness. His Protocol research includes elements of Adversary and Hash function. Juan A. Garay interconnects Cryptocurrency and Broadcast channels in the investigation of issues within Computer network.
His primary areas of investigation include Computer security, Protocol, Blockchain, Cryptographic protocol and Theoretical computer science. Oblivious transfer, Adversary and Cryptography are among the areas of Computer security where the researcher is concentrating his efforts. His Protocol course of study focuses on Hash function and Cryptocurrency, Synchronization and Computer network.
His Cryptographic protocol research is multidisciplinary, incorporating perspectives in Probabilistic logic and Compiler. As part of one scientific family, Juan A. Garay deals mainly with the area of Compiler, narrowing it down to issues related to the Distributed computing, and often Constant. Juan A. Garay interconnects Secure multi-party computation, String and Public key infrastructure in the investigation of issues within Theoretical computer science.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
The Bitcoin Backbone Protocol: Analysis and Applications
Juan A. Garay;Aggelos Kiayias;Nikos Leonardos.
theory and application of cryptographic techniques (2015)
Method and apparatus for the secure distributed storage and retrieval of information
Juan Alberto Garay;Rosario Gennaro;Charanjit Singh Jutla;Tal D. Rabin.
Multicast security: a taxonomy and some efficient constructions
R. Canetti;J. Garay;G. Itkis;D. Micciancio.
international conference on computer communications (1999)
Searchable symmetric encryption: Improved definitions and efficient constructions
Reza Curtmola;Juan Garay;Seny Kamara;Rafail Ostrovsky.
Journal of Computer Security (2011)
Abuse-free optimistic contract signing
J. A. Garay;M. Jakobsson;P. Mackenzie.
Lecture Notes in Computer Science (1999)
Fast batch verification for modular exponentiation and digital signatures
Mihir Bellare;Juan A. Garay;Tal Rabin.
theory and application of cryptographic techniques (1998)
Authentication Techniques Utilizing a Computing Device
Ilija Zeljkovic;Robert J. Andres;Jerry Birkes;W. Drake Ii Alton.
iKP: a family of secure electronic payment protocols
Mihir Bellare;Juan A. Garay;Ralf Hauser;Amir Herzberg.
WOEC'95 Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1 (1995)
A SubLinear Time Distributed Algorithm for Minimum-Weight Spanning Trees
Juan A. Garay;Shay Kutten;David Peleg.
SIAM Journal on Computing (1998)
Design, implementation, and deployment of the iKP secure electronic payment system
M. Bellare;J.A. Garay;R. Hauser;A. Herzberg.
IEEE Journal on Selected Areas in Communications (2000)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: