Adam O'Neill

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Breaking RSA generically is equivalent to factoring, with preprocessing2026-02-03Paper
Schnorr signatures are tightly secure in the ROM under a non-interactive assumption2026-01-28Paper
On the black-box complexity of private-key inner-product functional encryption2025-07-25Paper
Forward security under leakage resilience, revisited2024-06-05Paper
Instantiability of classical random-oracle-model encryption transforms
Advances in Cryptology – ASIACRYPT 2022
2023-08-21Paper
Beyond Uber: instantiating generic groups via PGGs
Theory of Cryptography
2023-08-14Paper
Forward-security under continual leakage
Cryptology and Network Security
2023-08-02Paper
Approximate distance-comparison-preserving symmetric encryption
Lecture Notes in Computer Science
2023-07-25Paper
Ad Hoc Multi-Input Functional Encryption.2023-02-03Paper
Toward RSA-OAEP without random oracles
Lecture Notes in Computer Science
2022-10-13Paper
On selective-opening security of deterministic primitives2021-12-21Paper
Leakage resilience from program obfuscation
Journal of Cryptology
2019-08-13Paper
Parameter-hiding order revealing encryption2018-12-20Paper
A unified framework for trapdoor-permutation-based sequential aggregate signatures2018-05-29Paper
Selective-Opening Security in the Presence of Randomness Failures
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
Multi-input functional encryption with unbounded-message security
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
Leakage-resilient public-key encryption from obfuscation
Public-Key Cryptography – PKC 2016
2016-04-13Paper
Deniable Functional Encryption
Public-Key Cryptography – PKC 2016
2016-04-13Paper
A unified approach to deterministic encryption: new constructions and a connection to computational entropy
Journal of Cryptology
2015-08-03Paper
Enhanced chosen-ciphertext security and applications
Public-Key Cryptography – PKC 2014
2014-03-25Paper
On the achievability of simulation-based security for functional encryption
Advances in Cryptology – CRYPTO 2013
2013-09-17Paper
Dual form signatures: an approach for proving security from static assumptions
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy
Theory of Cryptography
2012-06-15Paper
Order-preserving encryption revisited: improved security analysis and alternative solutions
Advances in Cryptology – CRYPTO 2011
2011-08-12Paper
Bi-deniable public-key encryption
Advances in Cryptology – CRYPTO 2011
2011-08-12Paper
Correlated-input secure hash functions
Theory of Cryptography
2011-05-19Paper
Adaptive trapdoor functions and chosen-ciphertext security
Advances in Cryptology – EUROCRYPT 2010
2010-06-01Paper
Order-Preserving Symmetric Encryption
Advances in Cryptology - EUROCRYPT 2009
2009-05-12Paper
Deterministic and Efficiently Searchable Encryption
Advances in Cryptology - CRYPTO 2007
2009-03-10Paper
New Multiparty Signature Schemes for Network Routing Applications
ACM Transactions on Information and System Security
2009-02-24Paper
On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles
Lecture Notes in Computer Science
2009-02-10Paper
Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles
Lecture Notes in Computer Science
2009-02-10Paper


Research outcomes over time


This page was built for person: Adam O'Neill