Pooya Farshim
Pooya Farshim
IOHK Research & Durham University
Zweryfikowany adres z durham.ac.uk - Strona główna
Cytowane przez
Cytowane przez
Certificateless Signcryption
M Barbosa, P Farshim
Proceedings of the 2008 ACM symposium on Information, computer and …, 2008
Generic constructions of identity-based and certificateless KEMs
K Bentahar, P Farshim, J Malone-Lee, NP Smart
Journal of Cryptology 21, 178-199, 2008
Delegatable Homomorphic Encryption with Applications to Secure Outsourcing of Computation
M Barbosa, P Farshim
CT-RSA 12, 296-312, 2012
Polly cracker, revisited
MR Albrecht, P Farshim, JC Faugere, L Perret
International Conference on the Theory and Application of Cryptology and …, 2011
Efficient identity-based key encapsulation to multiple parties
M Barbosa, P Farshim
Cryptography and Coding: 10th IMA International Conference, Cirencester, UK …, 2005
Indistinguishability obfuscation and UCEs: The case of computationally unpredictable sources
C Brzuska, P Farshim, A Mittelbach
Advances in Cryptology–CRYPTO 2014: 34th Annual Cryptology Conference, Santa …, 2014
A more cautious approach to security against mass surveillance
JP Degabriele, P Farshim, B Poettering
Fast Software Encryption: 22nd International Workshop, FSE 2015, Istanbul …, 2015
Robust Encryption, Revisited.
P Farshim, B Libert, KG Paterson, EA Quaglia
Public Key Cryptography 7778, 352-368, 2013
Security of symmetric primitives under incorrect usage of keys
P Farshim, C Orlandi, R Roşie
Cryptology ePrint Archive, 2017
The related-key security of iterated Even–Mansour ciphers
P Farshim, G Procter
Fast Software Encryption: 22nd International Workshop, FSE 2015, Istanbul …, 2015
On the relationship between functional encryption, obfuscation, and fully homomorphic encryption
J Alwen, M Barbosa, P Farshim, R Gennaro, SD Gordon, S Tessaro, ...
Cryptography and Coding: 14th IMA International Conference, IMACC 2013 …, 2013
Multilinear maps from obfuscation
MR Albrecht, P Farshim, S Han, D Hofheinz, E Larraia, KG Paterson
Journal of Cryptology 33 (3), 1080-1113, 2020
On the Semantic Security of Functional Encryption Schemes
M Barbosa, P Farshim
Public Key Cryptography 7778, 143-161, 2013
On cipher-dependent related-key attacks in the ideal-cipher model
MR Albrecht, P Farshim, KG Paterson, GJ Watson
Fast Software Encryption: 18th International Workshop, FSE 2011, Lyngby …, 2011
Random-Oracle Uninstantiability from Indistinguishability Obfuscation
C Brzuska, P Farshim, A Mittelbach
TCC (2), 428-455, 2015
Secure cryptographic workflow in the standard model
M Barbosa, P Farshim
Progress in Cryptology-INDOCRYPT 2006: 7th International Conference on …, 2006
Randomness reuse: Extensions and improvements
M Barbosa, P Farshim
Cryptography and Coding: 11th IMA International Conference, Cirencester, UK …, 2007
Indifferentiable authenticated encryption
M Barbosa, P Farshim
Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018
The related-key analysis of Feistel constructions
M Barbosa, P Farshim
Fast Software Encryption: 21st International Workshop, FSE 2014, London, UK …, 2015
Graded Encoding Schemes from Obfuscation
P Farshim, J Hesse, D Hofheinz, E Larraia
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20