Pooya Farshim
Pooya Farshim
Durham University
Geverifieerd e-mailadres voor york.ac.uk - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Certificateless Signcryption
M Barbosa, P Farshim
Proceedings of the 2008 ACM symposium on Information, computer and …, 2008
3072008
Generic constructions of identity-based and certificateless KEMs
K Bentahar, P Farshim, J Malone-Lee, NP Smart
Journal of Cryptology 21 (2), 178-199, 2008
1692008
Delegatable Homomorphic Encryption with Applications to Secure Outsourcing of Computation
M Barbosa, P Farshim
CT-RSA 12, 296-312, 2012
802012
Efficient identity-based key encapsulation to multiple parties
M Barbosa, P Farshim
IMA International Conference on Cryptography and Coding, 428-441, 2005
612005
Polly cracker, revisited
MR Albrecht, P Farshim, JC Faugere, L Perret
International Conference on the Theory and Application of Cryptology and …, 2011
572011
Indistinguishability obfuscation and UCEs: The case of computationally unpredictable sources
C Brzuska, P Farshim, A Mittelbach
Annual Cryptology Conference, 188-205, 2014
512014
A more cautious approach to security against mass surveillance
JP Degabriele, P Farshim, B Poettering
International Workshop on Fast Software Encryption, 579-598, 2015
482015
On the relationship between functional encryption, obfuscation, and fully homomorphic encryption
J Alwen, M Barbosa, P Farshim, R Gennaro, SD Gordon, S Tessaro, ...
IMA International Conference on Cryptography and Coding, 65-84, 2013
422013
Robust encryption, revisited
P Farshim, B Libert, KG Paterson, EA Quaglia
International Workshop on Public Key Cryptography, 352-368, 2013
422013
The related-key security of iterated Even–Mansour ciphers
P Farshim, G Procter
International Workshop on Fast Software Encryption, 342-363, 2015
392015
Multilinear maps from obfuscation
MR Albrecht, P Farshim, S Han, D Hofheinz, E Larraia, KG Paterson
Journal of Cryptology, 1-34, 2020
362020
On the Semantic Security of Functional Encryption Schemes
M Barbosa, P Farshim
Public Key Cryptography 7778, 143-161, 2013
362013
Security of symmetric primitives under incorrect usage of keys
P Farshim, C Orlandi
Cryptology ePrint Archive, 2017
352017
On cipher-dependent related-key attacks in the ideal-cipher model
MR Albrecht, P Farshim, KG Paterson, GJ Watson
International Workshop on Fast Software Encryption, 128-145, 2011
342011
Random-Oracle Uninstantiability from Indistinguishability Obfuscation
C Brzuska, P Farshim, A Mittelbach
TCC (2), 428-455, 2015
262015
Secure cryptographic workflow in the standard model
M Barbosa, P Farshim
International Conference on Cryptology in India, 379-393, 2006
212006
The related-key analysis of Feistel constructions
M Barbosa, P Farshim
International Workshop on Fast Software Encryption, 265-284, 2014
182014
Graded Encoding Schemes from Obfuscation
P Farshim, J Hesse, D Hofheinz, E Larraia
18*
Randomness reuse: Extensions and improvements
M Barbosa, P Farshim
IMA International Conference on Cryptography and Coding, 257-276, 2007
162007
SK− KEM: An Identity− based Kem
M Barbosa, L Chen, Z Cheng, M Chimley, A Dent, P Farshim, K Harrison, ...
Sumission to IEEE P 1363, 3, 2006
142006
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20