Pooya Farshim

From MaRDI portal
Person:285243

Available identifiers

zbMath Open farshim.pooyaMaRDI QIDQ285243

List of research outcomes





PublicationDate of PublicationType
Beyond Uber: instantiating generic groups via PGGs2023-08-14Paper
Simpler constructions of asymmetric primitives from obfuscation2022-07-06Paper
Towards defeating backdoored random oracles: indifferentiability with bounded adaptivity2022-03-23Paper
The key-dependent message security of key-alternating Feistel ciphers2021-12-20Paper
Password hashing and preprocessing2021-12-08Paper
Multilinear maps from obfuscation2020-06-15Paper
Combiners for backdoored random oracles2018-09-26Paper
Indifferentiable authenticated encryption2018-09-12Paper
Graded encoding schemes from obfuscation2018-05-29Paper
Modeling Random Oracles Under Unpredictable Queries2018-05-09Paper
Private Functional Encryption: Indistinguishability-Based Definitions and Constructions from Obfuscation2016-12-21Paper
Polly cracker, revisited2016-05-19Paper
Multilinear Maps from Obfuscation2016-03-23Paper
The Related-Key Security of Iterated Even–Mansour Ciphers2015-09-18Paper
The Related-Key Analysis of Feistel Constructions2015-09-18Paper
A More Cautious Approach to Security Against Mass Surveillance2015-09-18Paper
Random-Oracle Uninstantiability from Indistinguishability Obfuscation2015-07-06Paper
Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources2014-08-07Paper
On the Relationship between Functional Encryption, Obfuscation, and Fully Homomorphic Encryption2014-01-17Paper
Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions2013-05-31Paper
Robust Encryption, Revisited2013-04-19Paper
On the Semantic Security of Functional Encryption Schemes2013-04-19Paper
Delegatable Homomorphic Encryption with Applications to Secure Outsourcing of Computation2012-06-08Paper
Polly Cracker, Revisited2011-12-02Paper
On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model2011-07-07Paper
Strong Knowledge Extractors for Public-Key Encryption Schemes2010-10-25Paper
Relations among Notions of Complete Non-malleability: Indistinguishability Characterisation and Efficient Construction without Random Oracles2010-10-25Paper
Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps2009-07-07Paper
Certified Encryption Revisited2009-07-07Paper
Generic constructions of identity-based and certificateless kEMs2008-05-06Paper
Secure Cryptographic Workflow in the Standard Model2008-04-11Paper
Randomness Reuse: Extensions and Improvements2008-03-07Paper
Cryptography and Coding2006-11-01Paper

Research outcomes over time

This page was built for person: Pooya Farshim