David Cash

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Encapsulated search index: public-key, sub-linear, distributed, and delegatable
Public-Key Cryptography – PKC 2022
2023-08-10Paper
Time-space tradeoffs and short collisions in Merkle-Damgård hash functions2022-11-09Paper
Improved structured encryption for SQL databases via hybrid indexing2022-03-21Paper
A lower bound for one-round oblivious RAM2021-12-01Paper
Parameter-hiding order revealing encryption2018-12-20Paper
A ciphertext-size lower bound for order-preserving encryption with limited leakage2018-12-06Paper
Efficient authentication from hard learning problems
Journal of Cryptology
2018-02-15Paper
Memory-tight reductions2017-11-03Paper
Dynamic proofs of retrievability via oblivious RAM
Journal of Cryptology
2017-03-02Paper
Targeted homomorphic attribute-based encryption
Theory of Cryptography
2016-12-22Paper
Digital signatures from strong RSA without prime generation
Lecture Notes in Computer Science
2015-08-27Paper
The locality of searchable symmetric encryption
Advances in Cryptology – EUROCRYPT 2014
2014-05-27Paper
Dynamic proofs of retrievability via oblivious RAM
Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings
2013-05-31Paper
Bonsai trees, or how to delegate a lattice basis
Journal of Cryptology
2013-01-04Paper
Cryptography secure against related-key attacks and tampering
Lecture Notes in Computer Science
2011-12-02Paper
Efficient Authentication from Hard Learning Problems
Advances in Cryptology – EUROCRYPT 2011
2011-05-27Paper
Pseudorandom functions and permutations provably secure against related-key attacks
Advances in Cryptology – CRYPTO 2010
2010-08-24Paper
Bonsai trees, or how to delegate a lattice basis
Advances in Cryptology – EUROCRYPT 2010
2010-06-01Paper
Cryptographic agility and its relation to circular encryption
Advances in Cryptology – EUROCRYPT 2010
2010-06-01Paper
Foundations of non-malleable hash and one-way functions
Advances in Cryptology – ASIACRYPT 2009
2009-12-15Paper
The twin Diffie-Hellman problem and applications
Journal of Cryptology
2009-11-13Paper
Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems
Advances in Cryptology - CRYPTO 2009
2009-10-20Paper
The Twin Diffie-Hellman Problem and Applications
Advances in Cryptology – EUROCRYPT 2008
2008-04-15Paper
Intrusion-Resilient Key Exchange in the Bounded Retrieval Model
Theory of Cryptography
2007-08-30Paper
scientific article; zbMATH DE number 2017944 (Why is no real title available?)2003-12-15Paper


Research outcomes over time


This page was built for person: David Cash