Pooya Farshim

Orcid: 0000-0003-2746-3585

According to our database1, Pooya Farshim authored at least 44 papers between 2005 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Multi-Source Randomness Extraction and Generation in the Random-Oracle Model.
Proceedings of the 6th Conference on Information-Theoretic Cryptography, 2025

2024
The Uber-Knowledge Assumption: A Bridge to the AGM.
IACR Commun. Cryptol., 2024

The Brave New World of Global Generic Groups and UC-Secure Zero-Overhead SNARKs.
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024

Block Ciphers in Idealized Models: Automated Proofs and New Security Results.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2022
Beyond Uber: Instantiating Generic Groups via PGGs.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

2021
Black-Box Uselessness: Composing Separations in Cryptography.
Proceedings of the 12th Innovations in Theoretical Computer Science Conference, 2021

Password Hashing and Preprocessing.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

The Key-Dependent Message Security of Key-Alternating Feistel Ciphers.
Proceedings of the Topics in Cryptology - CT-RSA 2021, 2021

2020
Multilinear Maps from Obfuscation.
J. Cryptol., 2020

Towards Defeating Backdoored Random Oracles: Indifferentiability with Bounded Adaptivity.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

Simpler Constructions of Asymmetric Primitives from Obfuscation.
Proceedings of the Progress in Cryptology - INDOCRYPT 2020, 2020

2019
Security of Symmetric Primitives against Key-Correlated Attacks.
IACR Cryptol. ePrint Arch., 2019

2018
Graded Encoding Schemes from Obfuscation.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

Combiners for Backdoored Random Oracles.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

Indifferentiable Authenticated Encryption.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

2017
Security of Symmetric Primitives under Incorrect Usage of Keys.
IACR Cryptol. ePrint Arch., 2017

Security of Even-Mansour Ciphers under Key-Dependent Messages.
IACR Cryptol. ePrint Arch., 2017

2016
Multilinear Maps from Obfuscation.
Proceedings of the Theory of Cryptography - 13th International Conference, 2016

Private Functional Encryption: Indistinguishability-Based Definitions and Constructions from Obfuscation.
Proceedings of the Progress in Cryptology - INDOCRYPT 2016, 2016

Modeling Random Oracles Under Unpredictable Queries.
Proceedings of the Fast Software Encryption - 23rd International Conference, 2016

2015
Random-Oracle Uninstantiability from Indistinguishability Obfuscation.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

The Related-Key Security of Iterated Even-Mansour Ciphers.
Proceedings of the Fast Software Encryption - 22nd International Workshop, 2015

A More Cautious Approach to Security Against Mass Surveillance.
Proceedings of the Fast Software Encryption - 22nd International Workshop, 2015

2014
The Related-Key Analysis of Feistel Constructions.
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014

Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

2013
Robust Encryption, Revisited.
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013

On the Semantic Security of Functional Encryption Schemes.
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013

On the Relationship between Functional Encryption, Obfuscation, and Fully Homomorphic Encryption.
Proceedings of the Cryptography and Coding - 14th IMA International Conference, 2013

Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions.
Proceedings of the Advances in Cryptology, 2013

2012
Semantically Secure Functional Encryption, Revisited.
IACR Cryptol. ePrint Arch., 2012

Polly Cracker, Revisited.
Electron. Colloquium Comput. Complex., 2012

Delegatable Homomorphic Encryption with Applications to Secure Outsourcing of Computation.
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012

On the Joint Security of Signature and Encryption Schemes under Randomness Reuse: Efficiency and Security Amplification.
Proceedings of the Applied Cryptography and Network Security, 2012

2011
On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model.
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011

Polly Cracker, Revisited.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

2010
Strong Knowledge Extractors for Public-Key Encryption Schemes.
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010

Relations among Notions of Complete Non-malleability: Indistinguishability Characterisation and Efficient Construction without Random Oracles.
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010

2009
Certified Encryption Revisited.
Proceedings of the Progress in Cryptology, 2009

Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps.
Proceedings of the Progress in Cryptology, 2009

2008
Certificateless signcryption.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

2007
Randomness Reuse: Extensions and Improvements.
Proceedings of the Cryptography and Coding, 2007

2006
Secure Cryptographic Workflow in the Standard Model.
Proceedings of the Progress in Cryptology, 2006

2005
Generic Constructions of Identity-Based and Certificateless KEMs.
IACR Cryptol. ePrint Arch., 2005

Efficient Identity-Based Key Encapsulation to Multiple Parties.
Proceedings of the Cryptography and Coding, 2005


  Loading...