Adam O'Neill
Orcid: 0009-0006-0233-6466
According to our database1,
Adam O'Neill
authored at least 51 papers
between 2007 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
IACR Commun. Cryptol., 2025
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025
2024
IACR Cryptol. ePrint Arch., 2024
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024
Proceedings of the 5th Conference on Information-Theoretic Cryptography, 2024
2023
Proceedings of the Cryptology and Network Security - 22nd International Conference, 2023
2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the Theory of Cryptography - 20th International Conference, 2022
Proceedings of the Security and Cryptography for Networks - 13th International Conference, 2022
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022
2021
Proceedings of the Public-Key Cryptography - PKC 2021, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the Public-Key Cryptography - PKC 2020, 2020
Proceedings of the 11th Innovations in Theoretical Computer Science Conference, 2020
2019
2018
Proceedings of the Public-Key Cryptography - PKC 2018, 2018
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018
2017
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017
2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Public-Key Cryptography - PKC 2016, 2016
Proceedings of the Public-Key Cryptography - PKC 2016, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016
2015
Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, Melbourne, Victoria, Australia, May 31, 2015
2014
Proceedings of the Public-Key Cryptography - PKC 2014, 2014
2013
Proceedings of the Advances in Cryptology, 2013
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013
Semantically-Secure Functional Encryption: Possibility Results, Impossibility Results and the Quest for a General Definition.
Proceedings of the Cryptology and Network Security - 12th International Conference, 2013
2012
A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy.
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012
2011
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011
Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions.
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011
2010
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010
Proceedings of the Advances in Cryptology, 2010
2009
Proceedings of the Advances in Cryptology, 2009
2008
ACM Trans. Inf. Syst. Secur., 2008
On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles.
Proceedings of the Advances in Cryptology, 2008
Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles.
Proceedings of the Advances in Cryptology, 2008
2007
Proceedings of the Data and Applications Security XXI, 2007
Proceedings of the Advances in Cryptology, 2007
Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007