Pooya Farshim
Pooya Farshim
IOG Research & Durham University
Verified email at - Homepage
Cited by
Cited by
Certificateless Signcryption
M Barbosa, P Farshim
Proceedings of the 2008 ACM symposium on Information, computer and …, 2008
Generic constructions of identity-based and certificateless KEMs
K Bentahar, P Farshim, J Malone-Lee, NP Smart
Journal of Cryptology 21, 178-199, 2008
Delegatable Homomorphic Encryption with Applications to Secure Outsourcing of Computation
M Barbosa, P Farshim
CT-RSA 12, 296-312, 2012
Security of symmetric primitives under incorrect usage of keys
P Farshim, C Orlandi, R Roşie
Cryptology ePrint Archive, 2017
A more cautious approach to security against mass surveillance
JP Degabriele, P Farshim, B Poettering
Fast Software Encryption: 22nd International Workshop, FSE 2015, Istanbul …, 2015
Indistinguishability obfuscation and UCEs: The case of computationally unpredictable sources
C Brzuska, P Farshim, A Mittelbach
Advances in Cryptology–CRYPTO 2014: 34th Annual Cryptology Conference, Santa …, 2014
Polly cracker, revisited
MR Albrecht, P Farshim, JC Faugere, L Perret
International Conference on the Theory and Application of Cryptology and …, 2011
Efficient identity-based key encapsulation to multiple parties
M Barbosa, P Farshim
Cryptography and Coding: 10th IMA International Conference, Cirencester, UK …, 2005
Robust encryption, revisited
P Farshim, B Libert, KG Paterson, EA Quaglia
Public-Key Cryptography–PKC 2013: 16th International Conference on Practice …, 2013
On the relationship between functional encryption, obfuscation, and fully homomorphic encryption
J Alwen, M Barbosa, P Farshim, R Gennaro, SD Gordon, S Tessaro, ...
Cryptography and Coding: 14th IMA International Conference, IMACC 2013 …, 2013
Multilinear maps from obfuscation
MR Albrecht, P Farshim, S Han, D Hofheinz, E Larraia, KG Paterson
Journal of Cryptology 33 (3), 1080-1113, 2020
The related-key security of iterated even–mansour ciphers
P Farshim, G Procter
Fast Software Encryption: 22nd International Workshop, FSE 2015, Istanbul …, 2015
On cipher-dependent related-key attacks in the ideal-cipher model
MR Albrecht, P Farshim, KG Paterson, GJ Watson
Fast Software Encryption: 18th International Workshop, FSE 2011, Lyngby …, 2011
On the Semantic Security of Functional Encryption Schemes
M Barbosa, P Farshim
Public Key Cryptography 7778, 143-161, 2013
Random-Oracle Uninstantiability from Indistinguishability Obfuscation
C Brzuska, P Farshim, A Mittelbach
TCC (2), 428-455, 2015
Indifferentiable authenticated encryption
M Barbosa, P Farshim
Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018
The related-key analysis of Feistel constructions
M Barbosa, P Farshim
Fast Software Encryption: 21st International Workshop, FSE 2014, London, UK …, 2015
Randomness reuse: Extensions and improvements
M Barbosa, P Farshim
Cryptography and Coding: 11th IMA International Conference, Cirencester, UK …, 2007
Secure cryptographic workflow in the standard model
M Barbosa, P Farshim
Progress in Cryptology-INDOCRYPT 2006: 7th International Conference on …, 2006
Graded Encoding Schemes from Obfuscation
P Farshim, J Hesse, D Hofheinz, E Larraia
The system can't perform the operation now. Try again later.
Articles 1–20