Edit Profile Cash, David M. Compute Distance To: Compute Author ID: cash.david-m Published as: Cash, David; Cash, David M. Documents Indexed: 25 Publications since 2002 all top 5 Co-Authors 0 single-authored 9 Kiltz, Eike 3 Bellare, Mihir 3 Peikert, Chris 3 Zhang, Cong 2 Hofheinz, Dennis 2 Jain, Abhishek 2 Küpçü, Alptekin 2 Pietrzak, Krzysztof 2 Shoup, Victor 2 Tessaro, Stefano 2 Venturi, Daniele 2 Wichs, Daniel 1 Acar, Tolga 1 Applebaum, Benny 1 Auerbach, Benedikt 1 Belenkiy, Mira 1 Boldyreva, Alexandra 1 Brakerski, Zvika 1 Chow, Sherman S. M. 1 Ding, Yan Zong 1 Dodis, Yevgeniy 1 Dowsley, Rafael 1 Fersch, Manuel 1 Fischlin, Marc 1 Galloway, Robert L. 1 Green, Matthew J. 1 Hohenberger, Susan 1 Jarecki, Stanisław 1 Jutla, Charanjit S. 1 Krawczyk, Hugo 1 Lee, Wenke 1 Lipton, Richard J. 1 Liu, Feng-Hao 1 Miga, Michael I. 1 Miller, Rachel 1 O’Neill, Adam 1 Roşu, Marcel-Cătălin 1 Sahai, Amit 1 Sinha, Tuhin K. 1 Steiner, Michael 1 Tsabary, Rotem 1 Walfish, Shabsi 1 Wang, Xiuhua 1 Warinschi, Bogdan 1 Wee, Hoeteck 1 Weil, Robert J. 1 Yu, Xiaoqi 1 Zhandry, Mark Serials 4 Journal of Cryptology Fields 23 Information and communication theory, circuits (94-XX) 8 Computer science (68-XX) 1 Biology and other natural sciences (92-XX) Publications by Year all cited Publications top 5 cited Publications Citations contained in zbMATH 18 Publications have been cited 268 times in 216 Documents Cited by ▼ Year ▼ Bonsai trees, or how to delegate a lattice basis. Zbl 1280.94043Cash, David; Hofheinz, Dennis; Kiltz, Eike; Peikert, Chris 62 2010 Fast cryptographic primitives and circular-secure encryption based on hard learning problems. Zbl 1252.94044Applebaum, Benny; Cash, David; Peikert, Chris; Sahai, Amit 58 2009 The twin Diffie-Hellman problem and applications. Zbl 1149.94307Cash, David; Kiltz, Eike; Shoup, Victor 29 2008 Cryptography secure against related-key attacks and tampering. Zbl 1227.94028Bellare, Mihir; Cash, David; Miller, Rachel 20 2011 Highly-scalable searchable symmetric encryption with support for Boolean queries. Zbl 1311.68057Cash, David; Jarecki, Stanislaw; Jutla, Charanjit; Krawczyk, Hugo; Roşu, Marcel-Cătălin; Steiner, Michael 17 2013 Pseudorandom functions and permutations provably secure against related-key attacks. Zbl 1283.94050Bellare, Mihir; Cash, David 16 2010 Bonsai trees, or how to delegate a lattice basis. Zbl 1277.94017Cash, David; Hofheinz, Dennis; Kiltz, Eike; Peikert, Chris 12 2012 Efficient authentication from hard learning problems. Zbl 1281.94083Kiltz, Eike; Pietrzak, Krzysztof; Cash, David; Jain, Abhishek; Venturi, Daniele 10 2011 Intrusion-resilient key exchange in the bounded retrieval model. Zbl 1156.94338Cash, David; Ding, Yan Zong; Dodis, Yevgeniy; Lee, Wenke; Lipton, Richard; Walfish, Shabsi 8 2007 Cryptographic agility and its relation to circular encryption. Zbl 1280.94034Acar, Tolga; Belenkiy, Mira; Bellare, Mihir; Cash, David 7 2010 New definitions and separations for circular security. Zbl 1300.94044Cash, David; Green, Matthew; Hohenberger, Susan 6 2012 Foundations of non-malleable hash and one-way functions. Zbl 1267.94042Boldyreva, Alexandra; Cash, David; Fischlin, Marc; Warinschi, Bogdan 6 2009 Targeted homomorphic attribute-based encryption. Zbl 1394.94928Brakerski, Zvika; Cash, David; Tsabary, Rotem; Wee, Hoeteck 5 2016 The locality of searchable symmetric encryption. Zbl 1332.94061Cash, David; Tessaro, Stefano 3 2014 Dynamic proofs of retrievability via oblivious RAM. Zbl 1306.94037Cash, David; Küpçü, Alptekin; Wichs, Daniel 3 2013 The twin Diffie-Hellman problem and applications. Zbl 1220.94034Cash, David; Kiltz, Eike; Shoup, Victor 3 2009 Two-round man-in-the-middle security from LPN. Zbl 1378.94074Cash, David; Kiltz, Eike; Tessaro, Stefano 2 2016 Digital signatures from strong RSA without prime generation. Zbl 1345.94048Cash, David; Dowsley, Rafael; Kiltz, Eike 1 2015 Targeted homomorphic attribute-based encryption. Zbl 1394.94928Brakerski, Zvika; Cash, David; Tsabary, Rotem; Wee, Hoeteck 5 2016 Two-round man-in-the-middle security from LPN. Zbl 1378.94074Cash, David; Kiltz, Eike; Tessaro, Stefano 2 2016 Digital signatures from strong RSA without prime generation. Zbl 1345.94048Cash, David; Dowsley, Rafael; Kiltz, Eike 1 2015 The locality of searchable symmetric encryption. Zbl 1332.94061Cash, David; Tessaro, Stefano 3 2014 Highly-scalable searchable symmetric encryption with support for Boolean queries. Zbl 1311.68057Cash, David; Jarecki, Stanislaw; Jutla, Charanjit; Krawczyk, Hugo; Roşu, Marcel-Cătălin; Steiner, Michael 17 2013 Dynamic proofs of retrievability via oblivious RAM. Zbl 1306.94037Cash, David; Küpçü, Alptekin; Wichs, Daniel 3 2013 Bonsai trees, or how to delegate a lattice basis. Zbl 1277.94017Cash, David; Hofheinz, Dennis; Kiltz, Eike; Peikert, Chris 12 2012 New definitions and separations for circular security. Zbl 1300.94044Cash, David; Green, Matthew; Hohenberger, Susan 6 2012 Cryptography secure against related-key attacks and tampering. Zbl 1227.94028Bellare, Mihir; Cash, David; Miller, Rachel 20 2011 Efficient authentication from hard learning problems. Zbl 1281.94083Kiltz, Eike; Pietrzak, Krzysztof; Cash, David; Jain, Abhishek; Venturi, Daniele 10 2011 Bonsai trees, or how to delegate a lattice basis. Zbl 1280.94043Cash, David; Hofheinz, Dennis; Kiltz, Eike; Peikert, Chris 62 2010 Pseudorandom functions and permutations provably secure against related-key attacks. Zbl 1283.94050Bellare, Mihir; Cash, David 16 2010 Cryptographic agility and its relation to circular encryption. Zbl 1280.94034Acar, Tolga; Belenkiy, Mira; Bellare, Mihir; Cash, David 7 2010 Fast cryptographic primitives and circular-secure encryption based on hard learning problems. Zbl 1252.94044Applebaum, Benny; Cash, David; Peikert, Chris; Sahai, Amit 58 2009 Foundations of non-malleable hash and one-way functions. Zbl 1267.94042Boldyreva, Alexandra; Cash, David; Fischlin, Marc; Warinschi, Bogdan 6 2009 The twin Diffie-Hellman problem and applications. Zbl 1220.94034Cash, David; Kiltz, Eike; Shoup, Victor 3 2009 The twin Diffie-Hellman problem and applications. Zbl 1149.94307Cash, David; Kiltz, Eike; Shoup, Victor 29 2008 Intrusion-resilient key exchange in the bounded retrieval model. Zbl 1156.94338Cash, David; Ding, Yan Zong; Dodis, Yevgeniy; Lee, Wenke; Lipton, Richard; Walfish, Shabsi 8 2007 all cited Publications top 5 cited Publications all top 5 Cited by 442 Authors 9 Wang, Huaxiong 8 Hofheinz, Dennis 8 Kiltz, Eike 7 Hu, Yupu 7 Ling, San 7 Nguyen, Khoa 7 Venturi, Daniele 6 Hanaoka, Goichiro 6 Wee, Hoeteck 5 Abdalla, Michel 5 Libert, Benoît 5 Matsuda, Takahiro 5 Mu, Yi 5 Park, Jonghwan 5 Peikert, Chris 5 Segev, Gil 5 Wang, Baocang 5 Waters, Brent 4 Brakerski, Zvika 4 Canetti, Ran 4 Cash, David M. 4 Chen, Yu 4 Koppula, Venkata 4 Mouhartem, Fabrice 4 Pietrzak, Krzysztof 4 Vaikuntanathan, Vinod 4 Yamada, Shota 4 Zhang, Jiang 3 Albrecht, Martin R. 3 Applebaum, Benny 3 Boneh, Dan 3 Boyen, Xavier 3 Farshim, Pooya 3 Fujioka, Atsushi 3 Fujisaki, Eiichiro 3 Goyal, Rishab 3 Gu, Dawu 3 Guo, Fuchun 3 Hajiabadi, Mohammad 3 Han, Shuai 3 Kapron, Bruce M. 3 Katsumata, Shuichi 3 Kurosawa, Kaoru 3 Lee, Dong Hoon 3 Lei, Hao 3 Liu, Shengli 3 Lu, Xianhui 3 Paterson, Kenneth G. 3 Qin, Baodong 3 Vaudenay, Serge 3 Wen, Qiaoyan 3 Wichs, Daniel 3 Wu, David J. 3 Xue, Rui 3 Yang, Bo 3 Yu, Yu 2 Benhamouda, Fabrice 2 Biagioni, Silvio 2 Bogos, Sonia 2 Catalano, Dario 2 Chang, Jinyong 2 Chen, Jie 2 Chen, Rongmao 2 Chen, Yilei 2 Chin, Ji-Jian 2 Cui, Hui 2 Fan, Xiong 2 Faonio, Antonio 2 Faust, Sebastian 2 Fiore, Dario 2 Fouque, Pierre-Alain 2 Guo, Qian 2 Herold, Gottfried 2 Ishai, Yuval 2 Jager, Tibor 2 Jia, Huiwen 2 Jiang, Mingming 2 Jiang, Peng 2 Jin, Zhengping 2 Johansson, Thomas 2 Lai, Jianchang 2 Lai, Qiqi 2 Lee, Donghoon 2 Lee, Kwangsu 2 Li, Bao 2 Li, Hui 2 Li, Jiamei 2 Li, Qinyi 2 Lindner, Richard 2 Liu, Ximeng 2 López-Alt, Adriana 2 Lu, Xiuhua 2 Lyu, Lin 2 Lyubashevsky, Vadim 2 Ma, Chunguang 2 Ma, Jianfeng 2 Masny, Daniel 2 Mohamad, Moesfa Soeheila 2 Mohassel, Payman 2 Mukherjee, Pratyay ...and 342 more Authors all top 5 Cited in 28 Serials 25 Journal of Cryptology 18 Designs, Codes and Cryptography 15 Theoretical Computer Science 13 Information Sciences 4 Information Processing Letters 4 Mathematical Problems in Engineering 4 Science China. Information Sciences 3 SIAM Journal on Computing 3 Soft Computing 3 Frontiers of Computer Science 2 International Journal of Foundations of Computer Science 2 Abstract and Applied Analysis 2 Cryptography and Communications 1 Journal of Computer and System Sciences 1 Algorithmica 1 International Journal of Computer Mathematics 1 Applicable Algebra in Engineering, Communication and Computing 1 Tatra Mountains Mathematical Publications 1 Journal of Mathematical Sciences (New York) 1 Theory of Computing Systems 1 Wuhan University Journal of Natural Sciences (WUJNS) 1 Journal of Applied Mathematics 1 Journal of Mathematical Cryptology 1 Advances in Mathematics of Communications 1 Algorithms 1 Symmetry 1 Computer Science Review 1 ACM Transactions on Computation Theory all top 5 Cited in 10 Fields 199 Information and communication theory, circuits (94-XX) 64 Computer science (68-XX) 3 Number theory (11-XX) 3 Probability theory and stochastic processes (60-XX) 2 Algebraic geometry (14-XX) 2 Quantum theory (81-XX) 1 General and overarching topics; collections (00-XX) 1 Group theory and generalizations (20-XX) 1 Partial differential equations (35-XX) 1 Systems theory; control (93-XX) Citations by Year