D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 38 Citations 12,181 111 World Ranking 6248 National Ranking 3008

Overview

What is he best known for?

The fields of study he is best known for:

  • Cryptography
  • Operating system
  • Law

His primary areas of study are Computer security, Cryptography, Ciphertext, Encryption and Random oracle. He interconnects Electronic money and Server in the investigation of issues within Computer security. In the field of Ciphertext, his study on Proxy re-encryption overlaps with subjects such as Proxy.

His Proxy re-encryption study incorporates themes from File system, Distributed data store and Access control. His research on Encryption often connects related areas such as Key. The Random oracle study combines topics in areas such as Theoretical computer science, Identity and Ring signature.

His most cited work include:

  • Improved proxy re-encryption schemes with applications to secure distributed storage (1087 citations)
  • Zerocash: Decentralized Anonymous Payments from Bitcoin (753 citations)
  • Identity-Based Proxy Re-encryption (578 citations)

What are the main themes of his work throughout his whole career to date?

Matthew Green mostly deals with Computer security, Encryption, Cryptography, Theoretical computer science and Ciphertext. Matthew Green has researched Computer security in several fields, including Protocol and Internet privacy. His Attribute-based encryption study in the realm of Encryption connects with subjects such as Elliptic curve.

His Cryptography study combines topics from a wide range of disciplines, such as Python and Software. Matthew Green combines subjects such as Mathematical proof, Oblivious transfer, Digital signature, Random oracle and Hash function with his study of Theoretical computer science. His research in Ciphertext intersects with topics in Plaintext, Discrete mathematics and Standard model.

He most often published in these fields:

  • Computer security (46.85%)
  • Encryption (27.03%)
  • Cryptography (23.42%)

What were the highlights of his more recent work (between 2016-2021)?

  • Computer security (46.85%)
  • Mathematical proof (10.81%)
  • Theoretical computer science (23.42%)

In recent papers he was focusing on the following fields of study:

Matthew Green mainly focuses on Computer security, Mathematical proof, Theoretical computer science, Computation and Cryptography. His work on Encryption and Spoofing attack as part of his general Computer security study is frequently connected to Ledger, thereby bridging the divide between different branches of science. His work on Certificate transparency as part of general Encryption study is frequently linked to Function, bridging the gap between disciplines.

His Mathematical proof study combines topics in areas such as Correctness and Protocol. The study incorporates disciplines such as String and SNARK in addition to Theoretical computer science. His Cryptography research is multidisciplinary, incorporating elements of Test, Homomorphic encryption, Database transaction and Field.

Between 2016 and 2021, his most popular works were:

  • Bolt: Anonymous Payment Channels for Decentralized Currencies (120 citations)
  • A Multi-party Protocol for Constructing the Public Parameters of the Pinocchio zk-SNARK (43 citations)
  • Fairness in an Unfair World: Fair Multiparty Computation from Public Bulletin Boards (35 citations)

In his most recent research, the most cited papers focused on:

  • Cryptography
  • Operating system
  • Programming language

Matthew Green focuses on Mathematical proof, Computer security, Computation, Theoretical computer science and Database transaction. His biological study deals with issues like Correctness, which deal with fields such as Proof assistant and Compiler. In his research, Matthew Green undertakes multidisciplinary study on Computer security and Ledger.

His Theoretical computer science research includes elements of String, Protocol and SNARK. His Database transaction research is multidisciplinary, incorporating perspectives in Distributed computing, Cryptography, Zero-knowledge proof, Cryptographic primitive and Byte. The Byte study combines topics in areas such as Scalability and State.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Zerocash: Decentralized Anonymous Payments from Bitcoin

Eli Ben Sasson;Alessandro Chiesa;Christina Garman;Matthew Green.
ieee symposium on security and privacy (2014)

1708 Citations

Improved proxy re-encryption schemes with applications to secure distributed storage

Giuseppe Ateniese;Kevin Fu;Matthew Green;Susan Hohenberger.
ACM Transactions on Information and System Security (2006)

1545 Citations

Zerocoin: Anonymous Distributed E-Cash from Bitcoin

I. Miers;C. Garman;M. Green;A. D. Rubin.
ieee symposium on security and privacy (2013)

1068 Citations

Identity-Based Proxy Re-encryption

Matthew Green;Giuseppe Ateniese.
applied cryptography and network security (2007)

915 Citations

Outsourcing the decryption of ABE ciphertexts

Matthew Green;Susan Hohenberger;Brent Waters.
usenix security symposium (2011)

831 Citations

Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice

David Adrian;Karthikeyan Bhargavan;Zakir Durumeric;Pierrick Gaudry.
computer and communications security (2015)

583 Citations

Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice

David Adrian;Karthikeyan Bhargavan;Zakir Durumeric;Pierrick Gaudry.
computer and communications security (2015)

513 Citations

Charm: a framework for rapidly prototyping cryptosystems

Joseph A. Akinyele;Christina Garman;Ian Miers;Matthew W. Pagano.
Journal of Cryptographic Engineering (2013)

493 Citations

Security analysis of a cryptographically-enabled RFID device

Stephen C. Bono;Matthew Green;Adam Stubblefield;Ari Juels.
usenix security symposium (2005)

397 Citations

Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage.

Giuseppe Ateniese;Kevin Fu;Matthew Green;Susan Hohenberger.
network and distributed system security symposium (2005)

280 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Matthew Green

Willy Susilo

Willy Susilo

University of Wollongong

Publications: 70

Robert H. Deng

Robert H. Deng

Singapore Management University

Publications: 40

Jin Li

Jin Li

Chinese Academy of Sciences

Publications: 40

Xiaodong Lin

Xiaodong Lin

University of Guelph

Publications: 37

Yi Mu

Yi Mu

Fujian Normal University

Publications: 33

Joseph K. Liu

Joseph K. Liu

Monash University

Publications: 33

Xiaofeng Chen

Xiaofeng Chen

Xidian University

Publications: 32

Man Ho Au

Man Ho Au

University of Hong Kong

Publications: 32

Markulf Kohlweiss

Markulf Kohlweiss

University of Edinburgh

Publications: 32

Zhenfu Cao

Zhenfu Cao

East China Normal University

Publications: 30

Qianhong Wu

Qianhong Wu

Beihang University

Publications: 30

Andrew Miller

Andrew Miller

University of Illinois at Urbana-Champaign

Publications: 26

Xinyi Huang

Xinyi Huang

Fujian Normal University

Publications: 26

Susan Hohenberger

Susan Hohenberger

Johns Hopkins University

Publications: 26

Bradley E. Marshall

Bradley E. Marshall

Amazon (United States)

Publications: 23

Jian Weng

Jian Weng

Jinan University

Publications: 23

Trending Scientists

Srikanth Kandula

Srikanth Kandula

Microsoft (United States)

Shangguang Wang

Shangguang Wang

Beijing University of Posts and Telecommunications

Yongmin Jung

Yongmin Jung

University of Southampton

Arkady A. Karyakin

Arkady A. Karyakin

Lomonosov Moscow State University

Francesco Fringuelli

Francesco Fringuelli

University of Perugia

Robbert Duchateau

Robbert Duchateau

Eindhoven University of Technology

Kilian Muñiz

Kilian Muñiz

Institució Catalana de Recerca i Estudis Avançats

Qi-Dai Chen

Qi-Dai Chen

Jilin University

Susmita Bose

Susmita Bose

Washington State University

Ghatu Subhash

Ghatu Subhash

University of Florida

Toshio Kimura

Toshio Kimura

Keio University

John L. Harper

John L. Harper

University of Oxford

Paul Krack

Paul Krack

University of Bern

Margaret M. Harnett

Margaret M. Harnett

University of Glasgow

James C. Kaufman

James C. Kaufman

University of Edinburgh

Amit X. Garg

Amit X. Garg

University of Western Ontario

Something went wrong. Please try again later.