Pooya Farshim

Orcid: 0000-0003-2746-3585

According to our database1, Pooya Farshim authored at least 41 papers between 2005 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
The Uber-Knowledge Assumption: A Bridge to the AGM.
IACR Cryptol. ePrint Arch., 2023

2022
Beyond Uber: Instantiating Generic Groups via PGGs.
IACR Cryptol. ePrint Arch., 2022

2021
The Key-Dependent Message Security of Key-Alternating Feistel Ciphers.
IACR Cryptol. ePrint Arch., 2021

Black-Box Uselessness: Composing Separations in Cryptography.
IACR Cryptol. ePrint Arch., 2021

Password Hashing and Preprocessing.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

2020
Multilinear Maps from Obfuscation.
J. Cryptol., 2020

Towards Defeating Backdoored Random Oracles: Indifferentiability with Bounded Adaptivity.
IACR Cryptol. ePrint Arch., 2020

2019
Security of Symmetric Primitives against Key-Correlated Attacks.
IACR Cryptol. ePrint Arch., 2019

2018
Graded Encoding Schemes from Obfuscation.
IACR Cryptol. ePrint Arch., 2018

Simpler Constructions of Asymmetric Primitives from Obfuscation.
IACR Cryptol. ePrint Arch., 2018

Combiners for Backdoored Random Oracles.
IACR Cryptol. ePrint Arch., 2018

Indifferentiable Authenticated Encryption.
IACR Cryptol. ePrint Arch., 2018

2017
Security of Symmetric Primitives under Incorrect Usage of Keys.
IACR Cryptol. ePrint Arch., 2017

Security of Even-Mansour Ciphers under Key-Dependent Messages.
IACR Cryptol. ePrint Arch., 2017

2016
Modeling Random Oracles under Unpredictable Queries.
IACR Cryptol. ePrint Arch., 2016

Private Functional Encryption: Indistinguishability-Based Definitions and Constructions from Obfuscation.
IACR Cryptol. ePrint Arch., 2016

Polly Cracker, revisited.
Des. Codes Cryptogr., 2016

2015
A More Cautious Approach to Security Against Mass Surveillance.
IACR Cryptol. ePrint Arch., 2015

Multilinear Maps from Obfuscation.
IACR Cryptol. ePrint Arch., 2015

2014
The Related-Key Security of Iterated Even-Mansour Ciphers.
IACR Cryptol. ePrint Arch., 2014

Random Oracle Uninstantiability from Indistinguishability Obfuscation.
IACR Cryptol. ePrint Arch., 2014

Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources.
IACR Cryptol. ePrint Arch., 2014

The Related-Key Analysis of Feistel Constructions.
IACR Cryptol. ePrint Arch., 2014

2013
Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions.
IACR Cryptol. ePrint Arch., 2013

On the Semantic Security of Functional Encryption Schemes.
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013

On the Relationship between Functional Encryption, Obfuscation, and Fully Homomorphic Encryption.
Proceedings of the Cryptography and Coding - 14th IMA International Conference, 2013

2012
Robust Encryption, Revisited.
IACR Cryptol. ePrint Arch., 2012

Semantically Secure Functional Encryption, Revisited.
IACR Cryptol. ePrint Arch., 2012

On the Joint Security of Signature and Encryption Schemes under Randomness Reuse: Efficiency and Security Amplification.
IACR Cryptol. ePrint Arch., 2012

2011
Delegatable Homomorphic Encryption with Applications to Secure Outsourcing of Computation.
IACR Cryptol. ePrint Arch., 2011

On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model.
IACR Cryptol. ePrint Arch., 2011

Polly Cracker, Revisited.
IACR Cryptol. ePrint Arch., 2011

2010
Strong Knowledge Extractors for Public-Key Encryption Schemes.
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010

Relations among Notions of Complete Non-malleability: Indistinguishability Characterisation and Efficient Construction without Random Oracles.
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010

2009
Certified Encryption Revisited.
Proceedings of the Progress in Cryptology, 2009

Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps.
Proceedings of the Progress in Cryptology, 2009

2008
Generic Constructions of Identity-Based and Certificateless KEMs.
J. Cryptol., 2008

Certificateless Signcryption.
IACR Cryptol. ePrint Arch., 2008

2007
Randomness Reuse: Extensions and Improvements.
Proceedings of the Cryptography and Coding, 2007

2006
Secure Cryptographic Workflow in the Standard Model.
IACR Cryptol. ePrint Arch., 2006

2005
Efficient Identity-Based Key Encapsulation to Multiple Parties.
IACR Cryptol. ePrint Arch., 2005


  Loading...