Pooya Farshim
Orcid: 0000-0003-2746-3585
According to our database1,
Pooya Farshim
authored at least 44 papers
between 2005 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Proceedings of the 6th Conference on Information-Theoretic Cryptography, 2025
2024
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2022
Proceedings of the Theory of Cryptography - 20th International Conference, 2022
2021
Proceedings of the 12th Innovations in Theoretical Computer Science Conference, 2021
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021
Proceedings of the Topics in Cryptology - CT-RSA 2021, 2021
2020
Towards Defeating Backdoored Random Oracles: Indifferentiability with Bounded Adaptivity.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020
Proceedings of the Progress in Cryptology - INDOCRYPT 2020, 2020
2019
IACR Cryptol. ePrint Arch., 2019
2018
Proceedings of the Public-Key Cryptography - PKC 2018, 2018
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018
2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
2016
Proceedings of the Theory of Cryptography - 13th International Conference, 2016
Private Functional Encryption: Indistinguishability-Based Definitions and Constructions from Obfuscation.
Proceedings of the Progress in Cryptology - INDOCRYPT 2016, 2016
Proceedings of the Fast Software Encryption - 23rd International Conference, 2016
2015
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015
Proceedings of the Fast Software Encryption - 22nd International Workshop, 2015
Proceedings of the Fast Software Encryption - 22nd International Workshop, 2015
2014
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014
Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014
2013
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013
On the Relationship between Functional Encryption, Obfuscation, and Fully Homomorphic Encryption.
Proceedings of the Cryptography and Coding - 14th IMA International Conference, 2013
Proceedings of the Advances in Cryptology, 2013
2012
IACR Cryptol. ePrint Arch., 2012
Delegatable Homomorphic Encryption with Applications to Secure Outsourcing of Computation.
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012
On the Joint Security of Signature and Encryption Schemes under Randomness Reuse: Efficiency and Security Amplification.
Proceedings of the Applied Cryptography and Network Security, 2012
2011
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011
2010
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010
Relations among Notions of Complete Non-malleability: Indistinguishability Characterisation and Efficient Construction without Random Oracles.
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010
2009
Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps.
Proceedings of the Progress in Cryptology, 2009
2008
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008
2007
Proceedings of the Cryptography and Coding, 2007
2006
Proceedings of the Progress in Cryptology, 2006
2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the Cryptography and Coding, 2005