Allison Bishop
Affiliations:- Columbia University, New York City, USA
According to our database1,
Allison Bishop
authored at least 42 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
On csauthors.net:
Bibliography
2024
Proc. Priv. Enhancing Technol., 2024
2023
2020
From discrete-log to lattices: maybe the real lessons were our broken schemes along the way?
IACR Cryptol. ePrint Arch., 2020
Proceedings of the Financial Cryptography and Data Security, 2020
2019
Proceedings of the IEEE INFOCOM 2019, 2019
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019
2018
IACR Cryptol. ePrint Arch., 2018
2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Distributed Comput., 2015
Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science, 2015
2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Indistinguishability Obfuscation from the Multilinear Subgroup Elimination Assumption.
IACR Cryptol. ePrint Arch., 2014
2013
A Profitable Sub-Prime Loan: Obtaining the Advantages of Composite-Order in Prime-Order Bilinear Groups.
IACR Cryptol. ePrint Arch., 2013
2012
New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques.
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012
Proceedings of the 53rd Annual IEEE Symposium on Foundations of Computer Science, 2012
2011
Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting.
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Distributed Computing - 25th International Symposium, 2011
2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption.
IACR Cryptol. ePrint Arch., 2010
2009
Efficient Pseudorandom Functions From the Decisional Linear Assumption and Weaker Variants.
IACR Cryptol. ePrint Arch., 2009
New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts.
IACR Cryptol. ePrint Arch., 2009
2008