Adam O'Neill
Adam O'Neill
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα cs.umass.edu - Αρχική σελίδα
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
Order-preserving symmetric encryption
A Boldyreva, N Chenette, Y Lee, A O’neill
Annual International Conference on the Theory and Applications of …, 2009
11002009
Deterministic and efficiently searchable encryption
M Bellare, A Boldyreva, A O’Neill
Annual International Cryptology Conference, 535-552, 2007
9722007
Order-preserving encryption revisited: Improved security analysis and alternative solutions
A Boldyreva, N Chenette, A O’Neill
Annual Cryptology Conference, 578-595, 2011
5972011
Definitional Issues in Functional Encryption.
A O'Neill
IACR Cryptol. ePrint Arch. 2010, 556, 2010
2672010
On notions of security for deterministic encryption, and efficient constructions without random oracles
A Boldyreva, S Fehr, A O’Neill
Annual International Cryptology Conference, 335-359, 2008
2502008
Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing
A Boldyreva, C Gentry, A O'Neill, DH Yum
Proceedings of the 14th ACM conference on Computer and communications …, 2007
2102007
Generic attacks on secure outsourced databases
G Kellaris, G Kollios, K Nissim, A O'neill
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
1892016
Deterministic encryption: Definitional equivalences and constructions without random oracles
M Bellare, M Fischlin, A O’Neill, T Ristenpart
Annual International Cryptology Conference, 360-378, 2008
1872008
Bi-deniable public-key encryption
A O’Neill, C Peikert, B Waters
Annual Cryptology Conference, 525-542, 2011
1122011
Correlated-input secure hash functions
V Goyal, A O’Neill, V Rao
Theory of Cryptography Conference, 182-200, 2011
1092011
Instantiability of RSA-OAEP under chosen-plaintext attack
E Kiltz, A O’Neill, A Smith
Annual Cryptology Conference, 295-313, 2010
992010
A unified approach to deterministic encryption: New constructions and a connection to computational entropy
B Fuller, A O’neill, L Reyzin
Journal of Cryptology 28 (3), 671-717, 2015
972015
On the achievability of simulation-based security for functional encryption
A De Caro, V Iovino, A Jain, A O’Neill, O Paneth, G Persiano
Annual Cryptology Conference, 519-535, 2013
952013
Provably-secure schemes for basic query support in outsourced databases
G Amanatidis, A Boldyreva, A O’Neill
IFIP Annual Conference on Data and Applications Security and Privacy, 14-30, 2007
872007
Adaptive trapdoor functions and chosen-ciphertext security
E Kiltz, P Mohassel, A O’Neill
Annual International Conference on the Theory and Applications of …, 2010
852010
Modular order-preserving encryption, revisited
C Mavroforakis, N Chenette, A O'Neill, G Kollios, R Canetti
Proceedings of the 2015 ACM SIGMOD International Conference on Management of …, 2015
732015
Semantically-secure functional encryption: Possibility results, impossibility results and the quest for a general definition
M Bellare, A O’Neill
International Conference on Cryptology and Network Security, 218-234, 2013
662013
Dual form signatures: An approach for proving security from static assumptions
M Gerbush, A Lewko, A O’Neill, B Waters
International Conference on the Theory and Application of Cryptology and …, 2012
492012
Reducing the Leakage in Practical Order-Revealing Encryption.
D Cash, FH Liu, A O'Neill, C Zhang
IACR Cryptol. ePrint Arch. 2016 (661), 661, 2016
302016
Accessing data while preserving privacy
G Kellaris, G Kollios, K Nissim, A O'Neill
arXiv e-prints, arXiv: 1706.01552, 2017
242017
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20