Pooya Farshim
Orcid: 0000-0003-2746-3585
According to our database1,
Pooya Farshim
authored at least 43 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
2022
2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021
2020
Towards Defeating Backdoored Random Oracles: Indifferentiability with Bounded Adaptivity.
IACR Cryptol. ePrint Arch., 2020
2019
IACR Trans. Symmetric Cryptol., 2019
2018
IACR Cryptol. ePrint Arch., 2018
2017
IACR Trans. Symmetric Cryptol., 2017
IACR Trans. Symmetric Cryptol., 2017
2016
IACR Cryptol. ePrint Arch., 2016
Private Functional Encryption: Indistinguishability-Based Definitions and Constructions from Obfuscation.
IACR Cryptol. ePrint Arch., 2016
2015
IACR Cryptol. ePrint Arch., 2015
2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources.
IACR Cryptol. ePrint Arch., 2014
2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013
On the Relationship between Functional Encryption, Obfuscation, and Fully Homomorphic Encryption.
Proceedings of the Cryptography and Coding - 14th IMA International Conference, 2013
2012
IACR Cryptol. ePrint Arch., 2012
On the Joint Security of Signature and Encryption Schemes under Randomness Reuse: Efficiency and Security Amplification.
IACR Cryptol. ePrint Arch., 2012
2011
Delegatable Homomorphic Encryption with Applications to Secure Outsourcing of Computation.
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
2010
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010
Relations among Notions of Complete Non-malleability: Indistinguishability Characterisation and Efficient Construction without Random Oracles.
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010
2009
Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps.
Proceedings of the Progress in Cryptology, 2009
2008
2007
Proceedings of the Cryptography and Coding, 2007
2006
IACR Cryptol. ePrint Arch., 2006
2005
IACR Cryptol. ePrint Arch., 2005