Adam O'Neill

From MaRDI portal
Person:1633449


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Forward security under leakage resilience, revisited
 
2024-06-05Paper
Instantiability of classical random-oracle-model encryption transforms
Advances in Cryptology – ASIACRYPT 2022
2023-08-21Paper
Beyond Uber: instantiating generic groups via PGGs
Theory of Cryptography
2023-08-14Paper
Forward-security under continual leakage
Cryptology and Network Security
2023-08-02Paper
Approximate distance-comparison-preserving symmetric encryption
Lecture Notes in Computer Science
2023-07-25Paper
Ad Hoc Multi-Input Functional Encryption.
 
2023-02-03Paper
Toward RSA-OAEP without random oracles
Lecture Notes in Computer Science
2022-10-13Paper
On selective-opening security of deterministic primitives
 
2021-12-21Paper
Leakage resilience from program obfuscation
Journal of Cryptology
2019-08-13Paper
Parameter-hiding order revealing encryption
 
2018-12-20Paper
A unified framework for trapdoor-permutation-based sequential aggregate signatures
 
2018-05-29Paper
Selective-Opening Security in the Presence of Randomness Failures
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
Multi-input functional encryption with unbounded-message security
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
Leakage-resilient public-key encryption from obfuscation
Public-Key Cryptography – PKC 2016
2016-04-13Paper
Deniable Functional Encryption
Public-Key Cryptography – PKC 2016
2016-04-13Paper
A unified approach to deterministic encryption: new constructions and a connection to computational entropy
Journal of Cryptology
2015-08-03Paper
Enhanced chosen-ciphertext security and applications
Public-Key Cryptography – PKC 2014
2014-03-25Paper
On the achievability of simulation-based security for functional encryption
Advances in Cryptology – CRYPTO 2013
2013-09-17Paper
Dual form signatures: an approach for proving security from static assumptions
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy
Theory of Cryptography
2012-06-15Paper
Order-preserving encryption revisited: improved security analysis and alternative solutions
Advances in Cryptology – CRYPTO 2011
2011-08-12Paper
Bi-deniable public-key encryption
Advances in Cryptology – CRYPTO 2011
2011-08-12Paper
Correlated-input secure hash functions
Theory of Cryptography
2011-05-19Paper
Adaptive trapdoor functions and chosen-ciphertext security
Advances in Cryptology – EUROCRYPT 2010
2010-06-01Paper
Order-Preserving Symmetric Encryption
Advances in Cryptology - EUROCRYPT 2009
2009-05-12Paper
Deterministic and Efficiently Searchable Encryption
Advances in Cryptology - CRYPTO 2007
2009-03-10Paper
New Multiparty Signature Schemes for Network Routing Applications
ACM Transactions on Information and System Security
2009-02-24Paper
On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles
Lecture Notes in Computer Science
2009-02-10Paper
Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles
Lecture Notes in Computer Science
2009-02-10Paper


Research outcomes over time


This page was built for person: Adam O'Neill