Pooya Farshim

From MaRDI portal
Person:285243

Available identifiers

zbMath Open farshim.pooyaMaRDI QIDQ285243

List of research outcomes





PublicationDate of PublicationType
Beyond Uber: instantiating generic groups via PGGs2023-08-14Paper
Simpler constructions of asymmetric primitives from obfuscation2022-07-06Paper
Towards defeating backdoored random oracles: indifferentiability with bounded adaptivity2022-03-23Paper
The key-dependent message security of key-alternating Feistel ciphers2021-12-20Paper
Password hashing and preprocessing2021-12-08Paper
Multilinear maps from obfuscation2020-06-15Paper
Combiners for backdoored random oracles2018-09-26Paper
Indifferentiable authenticated encryption2018-09-12Paper
Graded encoding schemes from obfuscation2018-05-29Paper
Modeling random oracles under unpredictable queries2018-05-09Paper
Private functional encryption: indistinguishability-based definitions and constructions from obfuscation2016-12-21Paper
Polly cracker, revisited2016-05-19Paper
Multilinear maps from obfuscation2016-03-23Paper
The Related-Key Security of Iterated Even–Mansour Ciphers2015-09-18Paper
The related-key analysis of Feistel constructions2015-09-18Paper
A more cautious approach to security against mass surveillance2015-09-18Paper
Random-oracle uninstantiability from indistinguishability obfuscation2015-07-06Paper
Indistinguishability obfuscation and UCEs: the case of computationally unpredictable sources2014-08-07Paper
On the relationship between functional encryption, obfuscation, and fully homomorphic encryption2014-01-17Paper
Ideal-cipher (ir)reducibility for blockcipher-based hash functions2013-05-31Paper
Robust encryption, revisited2013-04-19Paper
On the semantic security of functional encryption schemes2013-04-19Paper
Delegatable homomorphic encryption with applications to secure outsourcing of computation2012-06-08Paper
Polly cracker, revisited2011-12-02Paper
On cipher-dependent related-key attacks in the ideal-cipher model2011-07-07Paper
Strong Knowledge Extractors for Public-Key Encryption Schemes2010-10-25Paper
Relations among notions of complete non-malleability: indistinguishability characterisation and efficient construction without random oracles2010-10-25Paper
Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps2009-07-07Paper
Certified Encryption Revisited2009-07-07Paper
Generic constructions of identity-based and certificateless kEMs2008-05-06Paper
Secure Cryptographic Workflow in the Standard Model2008-04-11Paper
Randomness Reuse: Extensions and Improvements2008-03-07Paper
Cryptography and Coding2006-11-01Paper

Research outcomes over time

This page was built for person: Pooya Farshim