Pooya Farshim
Pooya Farshim
Bestätigte E-Mail-Adresse bei york.ac.uk - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Certificateless Signcryption
M Barbosa, P Farshim
Proceedings of the 2008 ACM symposium on Information, computer and …, 2008
2952008
Generic constructions of identity-based and certificateless KEMs
K Bentahar, P Farshim, J Malone-Lee, NP Smart
Journal of Cryptology 21 (2), 178-199, 2008
1692008
Delegatable Homomorphic Encryption with Applications to Secure Outsourcing of Computation
M Barbosa, P Farshim
CT-RSA 12, 296-312, 2012
792012
Efficient identity-based key encapsulation to multiple parties
M Barbosa, P Farshim
IMA International Conference on Cryptography and Coding, 428-441, 2005
592005
Polly cracker, revisited
MR Albrecht, P Farshim, JC Faugere, L Perret
International Conference on the Theory and Application of Cryptology and …, 2011
572011
Indistinguishability obfuscation and UCEs: The case of computationally unpredictable sources
C Brzuska, P Farshim, A Mittelbach
Annual Cryptology Conference, 188-205, 2014
512014
A more cautious approach to security against mass surveillance
JP Degabriele, P Farshim, B Poettering
International Workshop on Fast Software Encryption, 579-598, 2015
472015
On the relationship between functional encryption, obfuscation, and fully homomorphic encryption
J Alwen, M Barbosa, P Farshim, R Gennaro, SD Gordon, S Tessaro, ...
IMA International Conference on Cryptography and Coding, 65-84, 2013
412013
Robust encryption, revisited
P Farshim, B Libert, KG Paterson, EA Quaglia
International Workshop on Public Key Cryptography, 352-368, 2013
392013
The related-key security of iterated Even–Mansour ciphers
P Farshim, G Procter
International Workshop on Fast Software Encryption, 342-363, 2015
382015
On the Semantic Security of Functional Encryption Schemes
M Barbosa, P Farshim
Public Key Cryptography 7778, 143-161, 2013
352013
Multilinear maps from obfuscation
MR Albrecht, P Farshim, S Han, D Hofheinz, E Larraia, KG Paterson
Journal of Cryptology, 1-34, 2020
342020
On cipher-dependent related-key attacks in the ideal-cipher model
MR Albrecht, P Farshim, KG Paterson, GJ Watson
International Workshop on Fast Software Encryption, 128-145, 2011
342011
Security of symmetric primitives under incorrect usage of keys
P Farshim, C Orlandi
Cryptology ePrint Archive, 2017
322017
Random-Oracle Uninstantiability from Indistinguishability Obfuscation
C Brzuska, P Farshim, A Mittelbach
TCC (2), 428-455, 2015
262015
Secure cryptographic workflow in the standard model
M Barbosa, P Farshim
International Conference on Cryptology in India, 379-393, 2006
212006
Graded Encoding Schemes from Obfuscation
P Farshim, J Hesse, D Hofheinz, E Larraia
17*
The related-key analysis of Feistel constructions
M Barbosa, P Farshim
International Workshop on Fast Software Encryption, 265-284, 2014
162014
Randomness reuse: Extensions and improvements
M Barbosa, P Farshim
IMA International Conference on Cryptography and Coding, 257-276, 2007
152007
SK− KEM: An Identity− based Kem
M Barbosa, L Chen, Z Cheng, M Chimley, A Dent, P Farshim, K Harrison, ...
Sumission to IEEE P 1363, 3, 2006
142006
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20