Christopher J. P. Newton

Orcid: 0000-0003-1262-2192

Affiliations:
  • University of Surrey, UK
  • Hewlett-Packard Laboratories, Bristol, UK (former)


According to our database1, Christopher J. P. Newton authored at least 20 papers between 2012 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
BACON: An Improved Vector Commitment Construction with Applications to Signatures.
IACR Cryptol. ePrint Arch., 2025

AVPEU: Anonymous Verifiable Presentations with Extended Usability.
IACR Cryptol. ePrint Arch., 2025

Who Pays Whom? Anonymous EMV-Compliant Contactless Payments.
Proceedings of the 34th USENIX Security Symposium, 2025

2024
Sphinx-in-the-Head: Group Signatures from Symmetric Primitives.
ACM Trans. Priv. Secur., 2024

How To Bind A TPM's Attestation Keys With Its Endorsement Key.
Comput. J., 2024

VCaDID: Verifiable Credentials with Anonymous Decentralized Identities.
Proceedings of the 23rd IEEE International Conference on Trust, 2024

A New Hash-Based Enhanced Privacy ID Signature Scheme.
Proceedings of the Post-Quantum Cryptography - 15th International Workshop, 2024

2023
Hash-Based Direct Anonymous Attestation.
Proceedings of the Post-Quantum Cryptography - 14th International Workshop, 2023

DRoT: A Decentralised Root of Trust for Trusted Networks.
Proceedings of the Information and Communications Security - 25th International Conference, 2023

2022
Practical EMV Relay Protection.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

The 5G Key-Establishment Stack: In-Depth Formal Verification and Experimentation.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Direct Anonymous Attestation With Optimal TPM Signing Efficiency.
IEEE Trans. Inf. Forensics Secur., 2021

Technical Report on a Virtual CTAP2 WebAuthn Authenticator.
CoRR, 2021

A Survey of Technologies for Building Trusted Networks.
Proceedings of the IEEE Globecom 2021 Workshops, Madrid, Spain, December 7-11, 2021, 2021

2020
An Interoperable Architecture for Usable Password-Less Authentication.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2020

Formal Analysis and Implementation of a TPM 2.0-based Direct Anonymous Attestation Scheme.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
Lattice-based deniable ring signatures.
Int. J. Inf. Sec., 2019

2015
Efficient Moving Mesh Methods for Q-Tensor Models of Nematic Liquid Crystals.
SIAM J. Sci. Comput., 2015

2012
Liquid Crystal Theory and Modelling.
Proceedings of the Handbook of Visual Display Technology, 2012

Robust adaptive computation of a one-dimensional Q-tensor model of nematic liquid crystals.
Comput. Math. Appl., 2012


  Loading...