Allison Bishop
Affiliations:- Columbia University, New York City, USA
According to our database1,
Allison Bishop
authored at least 43 papers
between 2009 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
On csauthors.net:
Bibliography
2025
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025
2024
2023
IACR Cryptol. ePrint Arch., 2023
2020
From discrete-log to lattices: maybe the real lessons were our broken schemes along the way?
IACR Cryptol. ePrint Arch., 2020
Proceedings of the Financial Cryptography and Data Security, 2020
2019
Proceedings of the IEEE INFOCOM 2019, 2019
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019
2018
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018
2016
Proceedings of the Theory of Cryptography - 13th International Conference, 2016
Proceedings of the Public-Key Cryptography - PKC 2016, 2016
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016
2015
Proceedings of the Forty-Seventh Annual ACM on Symposium on Theory of Computing, 2015
A Profitable Sub-prime Loan: Obtaining the Advantages of Composite Order in Prime-Order Bilinear Groups.
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015
Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science, 2015
Indistinguishability Obfuscation from the Multilinear Subgroup Elimination Assumption.
Proceedings of the IEEE 56th Annual Symposium on Foundations of Computer Science, 2015
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015
2014
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014
2013
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2013
2012
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012
Proceedings of the 53rd Annual IEEE Symposium on Foundations of Computer Science, 2012
Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting.
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012
New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques.
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012
2011
Proceedings of the Distributed Computing - 25th International Symposium, 2011
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011
Proceedings of the 43rd ACM Symposium on Theory of Computing, 2011
Proceedings of the IEEE 52nd Annual Symposium on Foundations of Computer Science, 2011
Proceedings of the Advances in Cryptology - EUROCRYPT 2011, 2011
Proceedings of the Advances in Cryptology - EUROCRYPT 2011, 2011
2010
New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts.
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010
Proceedings of the 51th Annual IEEE Symposium on Foundations of Computer Science, 2010
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption.
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010
2009
Efficient pseudorandom functions from the decisional linear assumption and weaker variants.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009