Adam O'Neill

According to our database1, Adam O'Neill authored at least 45 papers between 2006 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Forward Security Under Leakage Resilience, Revisited.
Proceedings of the Cryptology and Network Security - 22nd International Conference, 2023

2022
Instantiability of Classical Random-Oracle-Model Encryption Transforms.
IACR Cryptol. ePrint Arch., 2022

Breaking RSA Generically is Equivalent to Factoring, with Preprocessing.
IACR Cryptol. ePrint Arch., 2022

Beyond Uber: Instantiating Generic Groups via PGGs.
IACR Cryptol. ePrint Arch., 2022

2021
Approximate Distance-Comparison-Preserving Symmetric Encryption.
IACR Cryptol. ePrint Arch., 2021

εpsolute: Efficiently Querying Databases While Providing Differential Privacy.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
On Selective-Opening Security of Deterministic Primitives.
IACR Cryptol. ePrint Arch., 2020

Forward-Security Under Continual Leakage with Deterministic Key Updates.
IACR Cryptol. ePrint Arch., 2020

Toward RSA-OAEP Without Random Oracles.
Proceedings of the Public-Key Cryptography - PKC 2020, 2020

2019
Leakage Resilience from Program Obfuscation.
J. Cryptol., 2019

Ad Hoc Multi-Input Functional Encryption.
IACR Cryptol. ePrint Arch., 2019

2018
Receiver- and sender-deniable functional encryption.
IET Inf. Secur., 2018

A Unified Framework for Trapdoor-Permutation-Based Sequential Aggregate Signatures.
IACR Cryptol. ePrint Arch., 2018

Parameter-Hiding Order Revealing Encryption.
IACR Cryptol. ePrint Arch., 2018

Towards RSA-OAEP without Random Oracles.
IACR Cryptol. ePrint Arch., 2018

2017
Privacy-preserving Network Provenance.
Proc. VLDB Endow., 2017

Instantiability of RSA-OAEP Under Chosen-Plaintext Attack.
J. Cryptol., 2017

Forward-Security under Continual Leakage.
IACR Cryptol. ePrint Arch., 2017

Accessing Data while Preserving Privacy.
CoRR, 2017

2016
Selective-Opening Security in the Presence of Randomness Failures.
IACR Cryptol. ePrint Arch., 2016

Leakage-Resilient Public-Key Encryption from Obfuscation.
IACR Cryptol. ePrint Arch., 2016

Reducing the Leakage in Practical Order-Revealing Encryption.
IACR Cryptol. ePrint Arch., 2016

Generic Attacks on Secure Outsourced Databases.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy.
J. Cryptol., 2015

Multi-Input Functional Encryption with Unbounded-Message Security.
IACR Cryptol. ePrint Arch., 2015

Deniable Functional Encryption.
IACR Cryptol. ePrint Arch., 2015

Modular Order-Preserving Encryption, Revisited.
Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, Melbourne, Victoria, Australia, May 31, 2015

2013
On the Achievability of Simulation-Based Security for Functional Encryption.
IACR Cryptol. ePrint Arch., 2013

Regularity of Lossy RSA on Subdomains and Its Applications.
Proceedings of the Advances in Cryptology, 2013

2012
Dual Form Signatures: An Approach for Proving Security from Static Assumptions.
IACR Cryptol. ePrint Arch., 2012

Enhanced Chosen-Ciphertext Security and Applications.
IACR Cryptol. ePrint Arch., 2012

Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions.
IACR Cryptol. ePrint Arch., 2012

Order-Preserving Symmetric Encryption.
IACR Cryptol. ePrint Arch., 2012

Semantically-Secure Functional Encryption: Possibility Results, Impossibility Results and the Quest for a General Definition.
IACR Cryptol. ePrint Arch., 2012

2011
Bi-Deniable Public-Key Encryption.
IACR Cryptol. ePrint Arch., 2011

Correlated-Input Secure Hash Functions.
IACR Cryptol. ePrint Arch., 2011

2010
Stronger security notions for trapdoor functions and applications.
PhD thesis, 2010

Definitional Issues in Functional Encryption.
IACR Cryptol. ePrint Arch., 2010

Adaptive Trapdoor Functions and Chosen-Ciphertext Security.
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010

2008
New Multiparty Signature Schemes for Network Routing Applications.
ACM Trans. Inf. Syst. Secur., 2008

On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles.
IACR Cryptol. ePrint Arch., 2008

Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles.
IACR Cryptol. ePrint Arch., 2008

2007
Ordered Multisignatures and Identity-Based Sequential Aggregate Signatures, with Applications to Secure Routing.
IACR Cryptol. ePrint Arch., 2007

Provably-Secure Schemes for Basic Query Support in Outsourced Databases.
Proceedings of the Data and Applications Security XXI, 2007

2006
Deterministic and Efficiently Searchable Encryption.
IACR Cryptol. ePrint Arch., 2006


  Loading...