David Cash
David Cash
Bestätigte E-Mail-Adresse bei cs.uchicago.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Bonsai trees, or how to delegate a lattice basis
D Cash, D Hofheinz, E Kiltz, C Peikert
Annual International Conference on the Theory and Applications of …, 2010
7772010
Highly-scalable searchable symmetric encryption with support for boolean queries
D Cash, S Jarecki, C Jutla, H Krawczyk, MC Roşu, M Steiner
Annual cryptology conference, 353-373, 2013
6962013
Fast cryptographic primitives and circular-secure encryption based on hard learning problems
B Applebaum, D Cash, C Peikert, A Sahai
Annual International Cryptology Conference, 595-618, 2009
5472009
Dynamic searchable encryption in very-large databases: data structures and implementation.
D Cash, J Jaeger, S Jarecki, CS Jutla, H Krawczyk, MC Rosu, M Steiner
NDSS 14, 23-26, 2014
5442014
Leakage-abuse attacks against searchable encryption
D Cash, P Grubbs, J Perry, T Ristenpart
Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015
3302015
The twin Diffie-Hellman problem and applications
D Cash, E Kiltz, V Shoup
Annual International Conference on the Theory and Applications of …, 2008
2482008
Dynamic proofs of retrievability via oblivious RAM
D Cash, A Küpçü, D Wichs
Journal of Cryptology 30 (1), 22-57, 2017
2222017
Pseudorandom functions and permutations provably secure against related-key attacks
M Bellare, D Cash
Annual Cryptology Conference, 666-684, 2010
1162010
Efficient authentication from hard learning problems
E Kiltz, K Pietrzak, D Venturi, D Cash, A Jain
Journal of Cryptology 30 (4), 1238-1275, 2017
1142017
Cryptography secure against related-key attacks and tampering
M Bellare, D Cash, R Miller
International Conference on the Theory and Application of Cryptology and …, 2011
1102011
The locality of searchable symmetric encryption
D Cash, S Tessaro
Annual International Conference on the Theory and Applications of …, 2014
1012014
What else is revealed by order-revealing encryption?
FB Durak, TM DuBuisson, D Cash
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
902016
The twin Diffie–Hellman problem and applications
D Cash, E Kiltz, V Shoup
Journal of Cryptology 22 (4), 470-504, 2009
802009
Intrusion-resilient key exchange in the bounded retrieval model
D Cash, YZ Ding, Y Dodis, W Lee, R Lipton, S Walfish
Theory of Cryptography Conference, 479-498, 2007
762007
Cryptographic agility and its relation to circular encryption
T Acar, M Belenkiy, M Bellare, D Cash
Annual International Conference on the Theory and Applications of …, 2010
742010
How to Delegate a Lattice Basis.
D Cash, D Hofheinz, E Kiltz
IACR Cryptol. ePrint Arch. 2009, 351, 2009
722009
New definitions and separations for circular security
D Cash, M Green, S Hohenberger
International Workshop on Public Key Cryptography, 540-557, 2012
482012
Foundations of non-malleable hash and one-way functions
A Boldyreva, D Cash, M Fischlin, B Warinschi
International Conference on the Theory and Application of Cryptology and …, 2009
472009
The tao of inference in privacy-protected databases
V Bindschaedler, P Grubbs, D Cash, T Ristenpart, V Shmatikov
Proceedings of the VLDB Endowment 11 (11), 1715-1728, 2018
412018
Targeted homomorphic attribute-based encryption
Z Brakerski, D Cash, R Tsabary, H Wee
Theory of Cryptography Conference, 330-360, 2016
392016
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20