Bauer, Balthazar; Farshim, Pooya; Harasser, Patrick; O’Neill, Adam Beyond Uber: instantiating generic groups via PGGs. (English) Zbl 1519.94046 Kiltz, Eike (ed.) et al., Theory of cryptography. 20th international conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 13749, 212-242 (2023). MSC: 94A60 PDFBibTeX XMLCite \textit{B. Bauer} et al., Lect. Notes Comput. Sci. 13749, 212--242 (2023; Zbl 1519.94046) Full Text: DOI
Farshim, Pooya; Khati, Louiza; Seurin, Yannick; Vergnaud, Damien The key-dependent message security of key-alternating Feistel ciphers. (English) Zbl 1479.94168 Paterson, Kenneth G. (ed.), Topics in cryptology – CT-RSA 2021. Cryptographers’ track at the RSA conference 2021, virtual event, May 17–20, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12704, 351-374 (2021). MSC: 94A60 05A05 PDFBibTeX XMLCite \textit{P. Farshim} et al., Lect. Notes Comput. Sci. 12704, 351--374 (2021; Zbl 1479.94168) Full Text: DOI
Farshim, Pooya; Tessaro, Stefano Password hashing and preprocessing. (English) Zbl 1479.94317 Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2021. 40th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, October 17–21, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12697, 64-91 (2021). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{P. Farshim} and \textit{S. Tessaro}, Lect. Notes Comput. Sci. 12697, 64--91 (2021; Zbl 1479.94317) Full Text: DOI
Farshim, Pooya; Fuchsbauer, Georg; Passelègue, Alain Simpler constructions of asymmetric primitives from obfuscation. (English) Zbl 1492.94104 Bhargavan, Karthikeyan (ed.) et al., Progress in cryptology – INDOCRYPT 2020. 21st international conference on cryptology in India, Bangalore, India, December 13–16, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12578, 715-738 (2020). MSC: 94A60 PDFBibTeX XMLCite \textit{P. Farshim} et al., Lect. Notes Comput. Sci. 12578, 715--738 (2020; Zbl 1492.94104) Full Text: DOI
Dodis, Yevgeniy; Farshim, Pooya; Mazaheri, Sogol; Tessaro, Stefano Towards defeating backdoored random oracles: indifferentiability with bounded adaptivity. (English) Zbl 1485.94080 Pass, Rafael (ed.) et al., Theory of cryptography. 18th international conference, TCC 2020, Durham, NC, USA, November 16–19, 2020. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12552, 241-273 (2020). MSC: 94A60 68P25 94A05 PDFBibTeX XMLCite \textit{Y. Dodis} et al., Lect. Notes Comput. Sci. 12552, 241--273 (2020; Zbl 1485.94080) Full Text: DOI
Albrecht, Martin R.; Farshim, Pooya; Han, Shuai; Hofheinz, Dennis; Larraia, Enrique; Paterson, Kenneth G. Multilinear maps from obfuscation. (English) Zbl 1457.94090 J. Cryptology 33, No. 3, 1080-1113 (2020). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{M. R. Albrecht} et al., J. Cryptology 33, No. 3, 1080--1113 (2020; Zbl 1457.94090) Full Text: DOI
Bauer, Balthazar; Farshim, Pooya; Mazaheri, Sogol Combiners for backdoored random oracles. (English) Zbl 1436.94039 Shacham, Hovav (ed.) et al., Advances in cryptology – CRYPTO 2018. 38th annual international cryptology conference, Santa Barbara, CA, USA, August 19–23, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10992, 272-302 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{B. Bauer} et al., Lect. Notes Comput. Sci. 10992, 272--302 (2018; Zbl 1436.94039) Full Text: DOI HAL
Barbosa, Manuel; Farshim, Pooya Indifferentiable authenticated encryption. (English) Zbl 1440.94088 Shacham, Hovav (ed.) et al., Advances in cryptology – CRYPTO 2018. 38th annual international cryptology conference, Santa Barbara, CA, USA, August 19–23, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10991, 187-220 (2018). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{M. Barbosa} and \textit{P. Farshim}, Lect. Notes Comput. Sci. 10991, 187--220 (2018; Zbl 1440.94088) Full Text: DOI Link
Farshim, Pooya; Hesse, Julia; Hofheinz, Dennis; Larraia, Enrique Graded encoding schemes from obfuscation. (English) Zbl 1420.94061 Abdalla, Michel (ed.) et al., Public-key cryptography – PKC 2018. 21st IACR international conference on practice and theory of public-key cryptography, Rio de Janeiro, Brazil, March 25–29, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10770, 371-400 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{P. Farshim} et al., Lect. Notes Comput. Sci. 10770, 371--400 (2018; Zbl 1420.94061) Full Text: DOI HAL
Farshim, Pooya; Mittelbach, Arno Modeling random oracles under unpredictable queries. (English) Zbl 1387.94080 Peyrin, Thomas (ed.), Fast software encryption. 23rd international conference, FSE 2016, Bochum, Germany, March 20–23, 2016. Revised selected papers. Berlin: Springer (ISBN 978-3-662-52992-8/pbk; 978-3-662-52993-5/ebook). Lecture Notes in Computer Science 9783, 453-473 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{P. Farshim} and \textit{A. Mittelbach}, Lect. Notes Comput. Sci. 9783, 453--473 (2016; Zbl 1387.94080) Full Text: DOI Link
Arriaga, Afonso; Barbosa, Manuel; Farshim, Pooya Private functional encryption: indistinguishability-based definitions and constructions from obfuscation. (English) Zbl 1411.94047 Dunkelman, Orr (ed.) et al., Progress in cryptology – INDOCRYPT 2016. 17th international conference on cryptology in India, Kolkata, India, December 11–14, 2016. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10095, 227-247 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Arriaga} et al., Lect. Notes Comput. Sci. 10095, 227--247 (2016; Zbl 1411.94047) Full Text: DOI Link
Albrecht, Martin R.; Faugère, Jean-Charles; Farshim, Pooya; Herold, Gottfried; Perret, Ludovic Polly cracker, revisited. (English) Zbl 1405.94039 Des. Codes Cryptography 79, No. 2, 261-302 (2016). MSC: 94A60 93C35 68Q17 PDFBibTeX XMLCite \textit{M. R. Albrecht} et al., Des. Codes Cryptography 79, No. 2, 261--302 (2016; Zbl 1405.94039) Full Text: DOI
Albrecht, Martin R.; Farshim, Pooya; Hofheinz, Dennis; Larraia, Enrique; Paterson, Kenneth G. Multilinear maps from obfuscation. (English) Zbl 1388.94030 Kushilevitz, Eyal (ed.) et al., Theory of cryptography. 13th international conference, TCC 2016-A, Tel Aviv, Israel, January 10–13, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49095-2/pbk; 978-3-662-49096-9/ebook). Lecture Notes in Computer Science 9562, 446-473 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{M. R. Albrecht} et al., Lect. Notes Comput. Sci. 9562, 446--473 (2016; Zbl 1388.94030) Full Text: DOI Link
Degabriele, Jean Paul; Farshim, Pooya; Poettering, Bertram A more cautious approach to security against mass surveillance. (English) Zbl 1382.94087 Leander, Gregor (ed.), Fast software encryption. 22nd international workshop, FSE 2015, Istanbul, Turkey, March 8–11, 2015. Revised selected papers. Berlin: Springer (ISBN 978-3-662-48115-8/pbk; 978-3-662-48116-5/ebook). Lecture Notes in Computer Science 9054, 579-598 (2015). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{J. P. Degabriele} et al., Lect. Notes Comput. Sci. 9054, 579--598 (2015; Zbl 1382.94087) Full Text: DOI
Farshim, Pooya; Procter, Gordon The related-key security of iterated Even-Mansour ciphers. (English) Zbl 1382.94102 Leander, Gregor (ed.), Fast software encryption. 22nd international workshop, FSE 2015, Istanbul, Turkey, March 8–11, 2015. Revised selected papers. Berlin: Springer (ISBN 978-3-662-48115-8/pbk; 978-3-662-48116-5/ebook). Lecture Notes in Computer Science 9054, 342-363 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{P. Farshim} and \textit{G. Procter}, Lect. Notes Comput. Sci. 9054, 342--363 (2015; Zbl 1382.94102) Full Text: DOI
Barbosa, Manuel; Farshim, Pooya The related-key analysis of Feistel constructions. (English) Zbl 1382.94058 Cid, Carlos (ed.) et al., Fast software encryption. 21st international workshop, FSE 2014, London, UK, March 3–5, 2014. Revised selected papers. Berlin: Springer (ISBN 978-3-662-46705-3/pbk; 978-3-662-46706-0/ebook). Lecture Notes in Computer Science 8540, 265-284 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Barbosa} and \textit{P. Farshim}, Lect. Notes Comput. Sci. 8540, 265--284 (2015; Zbl 1382.94058) Full Text: DOI
Brzuska, Christina; Farshim, Pooya; Mittelbach, Arno Random-oracle uninstantiability from indistinguishability obfuscation. (English) Zbl 1334.94067 Dodis, Yevgeniy (ed.) et al., Theory of cryptography. 12th theory of cryptography conference, TCC 2015, Warsaw, Poland, March 23–25, 2015. Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-46496-0/pbk). Lecture Notes in Computer Science 9015, 428-455 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{C. Brzuska} et al., Lect. Notes Comput. Sci. 9015, 428--455 (2015; Zbl 1334.94067) Full Text: DOI
Brzuska, Christina; Farshim, Pooya; Mittelbach, Arno Indistinguishability obfuscation and UCEs: the case of computationally unpredictable sources. (English) Zbl 1317.94091 Garay, Juan A. (ed.) et al., Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-44370-5/pbk). Lecture Notes in Computer Science 8616, 188-205 (2014). MSC: 94A60 68Q17 68P25 PDFBibTeX XMLCite \textit{C. Brzuska} et al., Lect. Notes Comput. Sci. 8616, 188--205 (2014; Zbl 1317.94091) Full Text: DOI Link
Alwen, Joël; Barbosa, Manuel; Farshim, Pooya; Gennaro, Rosario; Gordon, S. Dov; Tessaro, Stefano; Wilson, David A. On the relationship between functional encryption, obfuscation, and fully homomorphic encryption. (English) Zbl 1317.94080 Stam, Martijn (ed.), Cryptography and coding. 14th IMA international conference, IMACC 2013, Oxford, UK, December 17–19, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-45238-3/pbk). Lecture Notes in Computer Science 8308, 65-84 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Alwen} et al., Lect. Notes Comput. Sci. 8308, 65--84 (2013; Zbl 1317.94080) Full Text: DOI Link
Baecher, Paul; Farshim, Pooya; Fischlin, Marc; Stam, Martijn Ideal-cipher (ir)reducibility for blockcipher-based hash functions. (English) Zbl 1306.94024 Johansson, Thomas (ed.) et al., Advances in cryptology – EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26–30, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38347-2/pbk). Lecture Notes in Computer Science 7881, 426-443 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{P. Baecher} et al., Lect. Notes Comput. Sci. 7881, 426--443 (2013; Zbl 1306.94024) Full Text: DOI
Farshim, Pooya; Libert, Benoît; Paterson, Kenneth G.; Quaglia, Elizabeth A. Robust encryption, revisited. (English) Zbl 1314.94068 Kurosawa, Kaoru (ed.) et al., Public-key cryptography – PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36361-0/pbk). Lecture Notes in Computer Science 7778, 352-368 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{P. Farshim} et al., Lect. Notes Comput. Sci. 7778, 352--368 (2013; Zbl 1314.94068) Full Text: DOI
Barbosa, Manuel; Farshim, Pooya On the semantic security of functional encryption schemes. (English) Zbl 1314.94054 Kurosawa, Kaoru (ed.) et al., Public-key cryptography – PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36361-0/pbk). Lecture Notes in Computer Science 7778, 143-161 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Barbosa} and \textit{P. Farshim}, Lect. Notes Comput. Sci. 7778, 143--161 (2013; Zbl 1314.94054) Full Text: DOI
Barbosa, Manuel; Farshim, Pooya Delegatable homomorphic encryption with applications to secure outsourcing of computation. (English) Zbl 1292.94025 Dunkelman, Orr (ed.), Topics in cryptology – CT-RSA 2012. The cryptographers’ track at the RSA conference 2012, San Francisco, CA, USA, February 27–March 2, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-27953-9/pbk). Lecture Notes in Computer Science 7178, 296-312 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Barbosa} and \textit{P. Farshim}, Lect. Notes Comput. Sci. 7178, 296--312 (2012; Zbl 1292.94025) Full Text: DOI Link
Albrecht, Martin R.; Farshim, Pooya; Faugère, Jean-Charles; Perret, Ludovic Polly cracker, revisited. (English) Zbl 1227.94025 Lee, Dong Hoon (ed.) et al., Advances in cryptology – ASIACRYPT 2011. 17th international conference on the theory and application of cryptology and information security, Seoul, South Korea, December 4–8, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25384-3/pbk). Lecture Notes in Computer Science 7073, 179-196 (2011). MSC: 94A60 PDFBibTeX XMLCite \textit{M. R. Albrecht} et al., Lect. Notes Comput. Sci. 7073, 179--196 (2011; Zbl 1227.94025) Full Text: DOI
Albrecht, M. R.; Farshim, P.; Paterson, K. G.; Watson, G. J. On cipher-dependent related-key attacks in the ideal-cipher model. (English) Zbl 1282.94030 Joux, Antoine (ed.), Fast software encryption. 18th international workshop, FSE 2011, Lyngby, Denmark, February 13–16, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-21701-2/pbk). Lecture Notes in Computer Science 6733, 128-145 (2011). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{M. R. Albrecht} et al., Lect. Notes Comput. Sci. 6733, 128--145 (2011; Zbl 1282.94030) Full Text: DOI
Barbosa, Manuel; Farshim, Pooya Strong knowledge extractors for public-key encryption schemes. (English) Zbl 1323.94101 Steinfeld, Ron (ed.) et al., Information security and privacy. 15th Australasian conference, ACISP 2010, Sydney, Australia, July 5–7, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14080-8/pbk). Lecture Notes in Computer Science 6168, 164-181 (2010). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Barbosa} and \textit{P. Farshim}, Lect. Notes Comput. Sci. 6168, 164--181 (2010; Zbl 1323.94101) Full Text: DOI Link
Barbosa, Manuel; Farshim, Pooya Relations among notions of complete non-malleability: indistinguishability characterisation and efficient construction without random oracles. (English) Zbl 1323.94100 Steinfeld, Ron (ed.) et al., Information security and privacy. 15th Australasian conference, ACISP 2010, Sydney, Australia, July 5–7, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14080-8/pbk). Lecture Notes in Computer Science 6168, 145-163 (2010). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Barbosa} and \textit{P. Farshim}, Lect. Notes Comput. Sci. 6168, 145--163 (2010; Zbl 1323.94100) Full Text: DOI Link
Barbosa, Manuel; Farshim, Pooya Security analysis of standard authentication and key agreement protocols utilising timestamps. (English) Zbl 1246.94021 Preneel, Bart (ed.), Progress in cryptology – AFRICACRYPT 2009. Second international conference on cryptology in Africa, Gammarth, Tunisia, June 21–25, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02383-5/pbk). Lecture Notes in Computer Science 5580, 235-253 (2009). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{M. Barbosa} and \textit{P. Farshim}, Lect. Notes Comput. Sci. 5580, 235--253 (2009; Zbl 1246.94021) Full Text: DOI Link
Farshim, Pooya; Warinschi, Bogdan Certified encryption revisited. (English) Zbl 1246.94029 Preneel, Bart (ed.), Progress in cryptology – AFRICACRYPT 2009. Second international conference on cryptology in Africa, Gammarth, Tunisia, June 21–25, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02383-5/pbk). Lecture Notes in Computer Science 5580, 179-197 (2009). MSC: 94A60 PDFBibTeX XMLCite \textit{P. Farshim} and \textit{B. Warinschi}, Lect. Notes Comput. Sci. 5580, 179--197 (2009; Zbl 1246.94029) Full Text: DOI
Bentahar, K.; Farshim, P.; Malone-Lee, J.; Smart, N. P. Generic constructions of identity-based and certificateless kEMs. (English) Zbl 1143.94340 J. Cryptology 21, No. 2, 178-199 (2008). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{K. Bentahar} et al., J. Cryptology 21, No. 2, 178--199 (2008; Zbl 1143.94340) Full Text: DOI Link
Barbosa, Manuel; Farshim, Pooya Randomness reuse: Extensions and improvements. (English) Zbl 1154.94372 Galbraith, Steven D. (ed.), Cryptography and coding. 11th IMA international conference, Cirencester, UK, December 18–20, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-77271-2/pbk). Lecture Notes in Computer Science 4887, 257-276 (2007). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Barbosa} and \textit{P. Farshim}, Lect. Notes Comput. Sci. 4887, 257--276 (2007; Zbl 1154.94372) Full Text: DOI
Barbosa, M.; Farshim, P. Secure cryptographic workflow in the standard model. (English) Zbl 1175.94066 Barua, Rana (ed.) et al., Progress in cryptology – INDOCRYPT 2006. 7th international conference on cryptology in India, Kolkata, India, December 11-13, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49767-7/pbk). Lecture Notes in Computer Science 4329, 379-393 (2006). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{M. Barbosa} and \textit{P. Farshim}, Lect. Notes Comput. Sci. 4329, 379--393 (2006; Zbl 1175.94066) Full Text: DOI Link
Barbosa, M.; Farshim, P. Efficient identity-based key encapsulation to multiple parties. (English) Zbl 1122.94348 Smart, Nigel P. (ed.), Cryptography and coding. 10th IMA international conference, Cirencester, UK, December 19–21, 2005. Proceedings. Berlin: Springer (ISBN 3-540-30276-X/pbk). Lecture Notes in Computer Science 3796, 428-441 (2005). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Barbosa} and \textit{P. Farshim}, Lect. Notes Comput. Sci. 3796, 428--441 (2005; Zbl 1122.94348) Full Text: DOI