Pooya Farshim

From MaRDI portal
Person:285243


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Beyond Uber: instantiating generic groups via PGGs
Theory of Cryptography
2023-08-14Paper
Simpler constructions of asymmetric primitives from obfuscation
 
2022-07-06Paper
Towards defeating backdoored random oracles: indifferentiability with bounded adaptivity
 
2022-03-23Paper
The key-dependent message security of key-alternating Feistel ciphers
 
2021-12-20Paper
Password hashing and preprocessing
 
2021-12-08Paper
Multilinear maps from obfuscation
Journal of Cryptology
2020-06-15Paper
Combiners for backdoored random oracles
 
2018-09-26Paper
Indifferentiable authenticated encryption
 
2018-09-12Paper
Graded encoding schemes from obfuscation
 
2018-05-29Paper
Modeling random oracles under unpredictable queries
Fast Software Encryption
2018-05-09Paper
Private functional encryption: indistinguishability-based definitions and constructions from obfuscation
Progress in Cryptology – INDOCRYPT 2016
2016-12-21Paper
Polly cracker, revisited
Designs, Codes and Cryptography
2016-05-19Paper
Multilinear maps from obfuscation
Theory of Cryptography
2016-03-23Paper
The Related-Key Security of Iterated Even–Mansour Ciphers
Fast Software Encryption
2015-09-18Paper
The related-key analysis of Feistel constructions
Fast Software Encryption
2015-09-18Paper
A more cautious approach to security against mass surveillance
Fast Software Encryption
2015-09-18Paper
Random-oracle uninstantiability from indistinguishability obfuscation
Theory of Cryptography
2015-07-06Paper
Indistinguishability obfuscation and UCEs: the case of computationally unpredictable sources
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
On the relationship between functional encryption, obfuscation, and fully homomorphic encryption
Cryptography and Coding
2014-01-17Paper
Ideal-cipher (ir)reducibility for blockcipher-based hash functions
Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings
2013-05-31Paper
Robust encryption, revisited
Public-Key Cryptography – PKC 2013
2013-04-19Paper
On the semantic security of functional encryption schemes
Public-Key Cryptography – PKC 2013
2013-04-19Paper
Delegatable homomorphic encryption with applications to secure outsourcing of computation
Lecture Notes in Computer Science
2012-06-08Paper
Polly cracker, revisited
Lecture Notes in Computer Science
2011-12-02Paper
On cipher-dependent related-key attacks in the ideal-cipher model
Fast Software Encryption
2011-07-07Paper
Strong Knowledge Extractors for Public-Key Encryption Schemes
Information Security and Privacy
2010-10-25Paper
Relations among notions of complete non-malleability: indistinguishability characterisation and efficient construction without random oracles
Information Security and Privacy
2010-10-25Paper
Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps
Progress in Cryptology – AFRICACRYPT 2009
2009-07-07Paper
Certified Encryption Revisited
Progress in Cryptology – AFRICACRYPT 2009
2009-07-07Paper
Generic constructions of identity-based and certificateless kEMs
Journal of Cryptology
2008-05-06Paper
Secure Cryptographic Workflow in the Standard Model
Progress in Cryptology - INDOCRYPT 2006
2008-04-11Paper
Randomness Reuse: Extensions and Improvements
Cryptography and Coding
2008-03-07Paper
Cryptography and Coding
Lecture Notes in Computer Science
2006-11-01Paper


Research outcomes over time


This page was built for person: Pooya Farshim