David Cash

From MaRDI portal
(Redirected from Person:514465)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Encapsulated search index: public-key, sub-linear, distributed, and delegatable
Public-Key Cryptography – PKC 2022
2023-08-10Paper
Time-space tradeoffs and short collisions in Merkle-Damgård hash functions2022-11-09Paper
Improved structured encryption for SQL databases via hybrid indexing2022-03-21Paper
A lower bound for one-round oblivious RAM2021-12-01Paper
Parameter-hiding order revealing encryption2018-12-20Paper
A ciphertext-size lower bound for order-preserving encryption with limited leakage2018-12-06Paper
Efficient authentication from hard learning problems
Journal of Cryptology
2018-02-15Paper
Memory-tight reductions2017-11-03Paper
Dynamic proofs of retrievability via oblivious RAM
Journal of Cryptology
2017-03-02Paper
Targeted homomorphic attribute-based encryption
Theory of Cryptography
2016-12-22Paper
Digital signatures from strong RSA without prime generation
Lecture Notes in Computer Science
2015-08-27Paper
The locality of searchable symmetric encryption
Advances in Cryptology – EUROCRYPT 2014
2014-05-27Paper
Dynamic proofs of retrievability via oblivious RAM
Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings
2013-05-31Paper
Bonsai trees, or how to delegate a lattice basis
Journal of Cryptology
2013-01-04Paper
Cryptography secure against related-key attacks and tampering
Lecture Notes in Computer Science
2011-12-02Paper
Efficient Authentication from Hard Learning Problems
Advances in Cryptology – EUROCRYPT 2011
2011-05-27Paper
Pseudorandom functions and permutations provably secure against related-key attacks
Advances in Cryptology – CRYPTO 2010
2010-08-24Paper
Bonsai trees, or how to delegate a lattice basis
Advances in Cryptology – EUROCRYPT 2010
2010-06-01Paper
Cryptographic agility and its relation to circular encryption
Advances in Cryptology – EUROCRYPT 2010
2010-06-01Paper
Foundations of non-malleable hash and one-way functions
Advances in Cryptology – ASIACRYPT 2009
2009-12-15Paper
The twin Diffie-Hellman problem and applications
Journal of Cryptology
2009-11-13Paper
Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems
Advances in Cryptology - CRYPTO 2009
2009-10-20Paper
The Twin Diffie-Hellman Problem and Applications
Advances in Cryptology – EUROCRYPT 2008
2008-04-15Paper
Intrusion-Resilient Key Exchange in the Bounded Retrieval Model
Theory of Cryptography
2007-08-30Paper
scientific article; zbMATH DE number 2017944 (Why is no real title available?)2003-12-15Paper


Research outcomes over time


This page was built for person: David Cash