Edit Profile (opens in new tab) Cash, David M. Compute Distance To: Compute Author ID: cash.david-m Published as: Cash, David; Cash, David M. Documents Indexed: 27 Publications since 2002 Co-Authors: 51 Co-Authors with 27 Joint Publications 1,148 Co-Co-Authors all top 5 Co-Authors 0 single-authored 9 Kiltz, Eike 3 Bellare, Mihir 3 Peikert, Chris 3 Zhang, Cong 2 Hofheinz, Dennis 2 Jain, Abhishek 2 Küpçü, Alptekin 2 Pietrzak, Krzysztof 2 Shoup, Victor 2 Tessaro, Stefano 2 Venturi, Daniele 2 Wichs, Daniel 1 Acar, Tolga 1 Applebaum, Benny 1 Auerbach, Benedikt 1 Belenkiy, Mira 1 Boldyreva, Alexandra 1 Brakerski, Zvika 1 Chow, Sherman S. M. 1 Ding, Yan Zong 1 Dodis, Yevgeniy 1 Dowsley, Rafael 1 Drucker, Andrew 1 Fersch, Manuel 1 Fischlin, Marc 1 Galloway, Robert L. 1 Hohenberger, Susan 1 Hoover, Alexander P. 1 Jarecki, Stanisław 1 Jutla, Charanjit S. 1 Krawczyk, Hugo 1 Lee, Wenke 1 Lipton, Richard J. 1 Liu, Feng-Hao 1 Miga, Michael I. 1 Miller, Rachel 1 Ng, Ruth 1 O’Neill, Adam 1 Rivkin, Adam 1 Roşu, Marcel-Cătălin 1 Sahai, Amit 1 Sinha, Tuhin K. 1 Steiner, Michael 1 Tsabary, Rotem 1 Walfish, Shabsi 1 Wang, Xiuhua 1 Warinschi, Bogdan 1 Wee, Hoeteck 1 Weil, Robert J. 1 Yu, Xiaoqi 1 Zhandry, Mark Serials 4 Journal of Cryptology Fields 25 Information and communication theory, circuits (94-XX) 10 Computer science (68-XX) 1 Biology and other natural sciences (92-XX) Publications by Year all cited Publications top 5 cited Publications Citations contained in zbMATH Open 23 Publications have been cited 373 times in 302 Documents Cited by ▼ Year ▼ Bonsai trees, or how to delegate a lattice basis. Zbl 1280.94043Cash, David; Hofheinz, Dennis; Kiltz, Eike; Peikert, Chris 85 2010 Fast cryptographic primitives and circular-secure encryption based on hard learning problems. Zbl 1252.94044Applebaum, Benny; Cash, David; Peikert, Chris; Sahai, Amit 78 2009 The twin Diffie-Hellman problem and applications. Zbl 1149.94307Cash, David; Kiltz, Eike; Shoup, Victor 35 2008 Highly-scalable searchable symmetric encryption with support for Boolean queries. Zbl 1311.68057Cash, David; Jarecki, Stanislaw; Jutla, Charanjit; Krawczyk, Hugo; Roşu, Marcel-Cătălin; Steiner, Michael 23 2013 Pseudorandom functions and permutations provably secure against related-key attacks. Zbl 1283.94050Bellare, Mihir; Cash, David 22 2010 Bonsai trees, or how to delegate a lattice basis. Zbl 1277.94017Cash, David; Hofheinz, Dennis; Kiltz, Eike; Peikert, Chris 22 2012 Cryptography secure against related-key attacks and tampering. Zbl 1227.94028Bellare, Mihir; Cash, David; Miller, Rachel 22 2011 Efficient authentication from hard learning problems. Zbl 1281.94083Kiltz, Eike; Pietrzak, Krzysztof; Cash, David; Jain, Abhishek; Venturi, Daniele 12 2011 Foundations of non-malleable hash and one-way functions. Zbl 1267.94042Boldyreva, Alexandra; Cash, David; Fischlin, Marc; Warinschi, Bogdan 10 2009 Cryptographic agility and its relation to circular encryption. Zbl 1280.94034Acar, Tolga; Belenkiy, Mira; Bellare, Mihir; Cash, David 9 2010 New definitions and separations for circular security. Zbl 1300.94044Cash, David; Green, Matthew; Hohenberger, Susan 9 2012 Intrusion-resilient key exchange in the bounded retrieval model. Zbl 1156.94338Cash, David; Ding, Yan Zong; Dodis, Yevgeniy; Lee, Wenke; Lipton, Richard; Walfish, Shabsi 9 2007 Targeted homomorphic attribute-based encryption. Zbl 1394.94928Brakerski, Zvika; Cash, David; Tsabary, Rotem; Wee, Hoeteck 8 2016 The locality of searchable symmetric encryption. Zbl 1332.94061Cash, David; Tessaro, Stefano 7 2014 Dynamic proofs of retrievability via oblivious RAM. Zbl 1306.94037Cash, David; Küpçü, Alptekin; Wichs, Daniel 5 2013 The twin Diffie-Hellman problem and applications. Zbl 1220.94034Cash, David; Kiltz, Eike; Shoup, Victor 5 2009 Two-round man-in-the-middle security from LPN. Zbl 1378.94074Cash, David; Kiltz, Eike; Tessaro, Stefano 4 2016 Memory-tight reductions. Zbl 1407.94076Auerbach, Benedikt; Cash, David; Fersch, Manuel; Kiltz, Eike 3 2017 Dynamic proofs of retrievability via oblivious RAM. Zbl 1372.68085Cash, David; Küpçü, Alptekin; Wichs, Daniel 1 2017 Digital signatures from strong RSA without prime generation. Zbl 1345.94048Cash, David; Dowsley, Rafael; Kiltz, Eike 1 2015 Efficient authentication from hard learning problems. Zbl 1386.94096Kiltz, Eike; Pietrzak, Krzysztof; Venturi, Daniele; Cash, David; Jain, Abhishek 1 2017 A ciphertext-size lower bound for order-preserving encryption with limited leakage. Zbl 1430.94062Cash, David; Zhang, Cong 1 2018 A lower bound for one-round oblivious RAM. Zbl 07437003Cash, David; Drucker, Andrew; Hoover, Alexander 1 2020 A lower bound for one-round oblivious RAM. Zbl 07437003Cash, David; Drucker, Andrew; Hoover, Alexander 1 2020 A ciphertext-size lower bound for order-preserving encryption with limited leakage. Zbl 1430.94062Cash, David; Zhang, Cong 1 2018 Memory-tight reductions. Zbl 1407.94076Auerbach, Benedikt; Cash, David; Fersch, Manuel; Kiltz, Eike 3 2017 Dynamic proofs of retrievability via oblivious RAM. Zbl 1372.68085Cash, David; Küpçü, Alptekin; Wichs, Daniel 1 2017 Efficient authentication from hard learning problems. Zbl 1386.94096Kiltz, Eike; Pietrzak, Krzysztof; Venturi, Daniele; Cash, David; Jain, Abhishek 1 2017 Targeted homomorphic attribute-based encryption. Zbl 1394.94928Brakerski, Zvika; Cash, David; Tsabary, Rotem; Wee, Hoeteck 8 2016 Two-round man-in-the-middle security from LPN. Zbl 1378.94074Cash, David; Kiltz, Eike; Tessaro, Stefano 4 2016 Digital signatures from strong RSA without prime generation. Zbl 1345.94048Cash, David; Dowsley, Rafael; Kiltz, Eike 1 2015 The locality of searchable symmetric encryption. Zbl 1332.94061Cash, David; Tessaro, Stefano 7 2014 Highly-scalable searchable symmetric encryption with support for Boolean queries. Zbl 1311.68057Cash, David; Jarecki, Stanislaw; Jutla, Charanjit; Krawczyk, Hugo; Roşu, Marcel-Cătălin; Steiner, Michael 23 2013 Dynamic proofs of retrievability via oblivious RAM. Zbl 1306.94037Cash, David; Küpçü, Alptekin; Wichs, Daniel 5 2013 Bonsai trees, or how to delegate a lattice basis. Zbl 1277.94017Cash, David; Hofheinz, Dennis; Kiltz, Eike; Peikert, Chris 22 2012 New definitions and separations for circular security. Zbl 1300.94044Cash, David; Green, Matthew; Hohenberger, Susan 9 2012 Cryptography secure against related-key attacks and tampering. Zbl 1227.94028Bellare, Mihir; Cash, David; Miller, Rachel 22 2011 Efficient authentication from hard learning problems. Zbl 1281.94083Kiltz, Eike; Pietrzak, Krzysztof; Cash, David; Jain, Abhishek; Venturi, Daniele 12 2011 Bonsai trees, or how to delegate a lattice basis. Zbl 1280.94043Cash, David; Hofheinz, Dennis; Kiltz, Eike; Peikert, Chris 85 2010 Pseudorandom functions and permutations provably secure against related-key attacks. Zbl 1283.94050Bellare, Mihir; Cash, David 22 2010 Cryptographic agility and its relation to circular encryption. Zbl 1280.94034Acar, Tolga; Belenkiy, Mira; Bellare, Mihir; Cash, David 9 2010 Fast cryptographic primitives and circular-secure encryption based on hard learning problems. Zbl 1252.94044Applebaum, Benny; Cash, David; Peikert, Chris; Sahai, Amit 78 2009 Foundations of non-malleable hash and one-way functions. Zbl 1267.94042Boldyreva, Alexandra; Cash, David; Fischlin, Marc; Warinschi, Bogdan 10 2009 The twin Diffie-Hellman problem and applications. Zbl 1220.94034Cash, David; Kiltz, Eike; Shoup, Victor 5 2009 The twin Diffie-Hellman problem and applications. Zbl 1149.94307Cash, David; Kiltz, Eike; Shoup, Victor 35 2008 Intrusion-resilient key exchange in the bounded retrieval model. Zbl 1156.94338Cash, David; Ding, Yan Zong; Dodis, Yevgeniy; Lee, Wenke; Lipton, Richard; Walfish, Shabsi 9 2007 all cited Publications top 5 cited Publications all top 5 Cited by 547 Authors 10 Segev, Gil 10 Wang, Huaxiong 8 Hanaoka, Goichiro 8 Hofheinz, Dennis 8 Kiltz, Eike 8 Ling, San 8 Matsuda, Takahiro 8 Nguyen, Khoa 7 Katsumata, Shuichi 7 Venturi, Daniele 7 Zhang, Jiang 6 Brakerski, Zvika 6 Hu, Yupu 6 Libert, Benoît 6 Tanaka, Keisuke 6 Waters, Brent 6 Wee, Hoeteck 6 Wichs, Daniel 6 Yamada, Shota 5 Abdalla, Michel 5 Canetti, Ran 5 Cash, David M. 5 Chen, Yu 5 Mouhartem, Fabrice 5 Mu, Yi 5 Park, Jonghwan 5 Peikert, Chris 5 Susilo, Willy 5 Takayasu, Atsushi 5 Vaikuntanathan, Vinod 5 Wang, Baocang 5 Yu, Yu 4 Albrecht, Martin R. 4 Applebaum, Benny 4 Boyen, Xavier 4 Chen, Yilei 4 Emura, Keita 4 Hajiabadi, Mohammad 4 Komargodski, Ilan 4 Koppula, Venkata 4 Lai, Qiqi 4 Pietrzak, Krzysztof 4 Prest, Thomas 4 Qin, Baodong 4 Stehlé, Damien 4 Steinfeld, Ron 4 Vaudenay, Serge 4 Watanabe, Yodai 4 Wu, David J. 4 Xue, Rui 3 Al-Kuwari, Saif 3 Asharov, Gilad 3 Benhamouda, Fabrice 3 Bogos, Sonia 3 Boneh, Dan 3 Chen, Jie 3 Damgård, Ivan Bjerre 3 Farshim, Pooya 3 Fouque, Pierre-Alain 3 Fujioka, Atsushi 3 Fujisaki, Eiichiro 3 Goyal, Rishab 3 Gu, Dawu 3 Guo, Fuchun 3 Han, Shuai 3 Jager, Tibor 3 Jain, Aayush 3 Kapron, Bruce M. 3 Kitagawa, Fuyuki 3 Kurosawa, Kaoru 3 Li, Qinyi 3 Liu, Feng-Hao 3 Liu, Shengli 3 Lu, Xianhui 3 Luo, Fucai 3 Ma, Jianfeng 3 Masny, Daniel 3 Pan, Jiaxin 3 Paterson, Kenneth G. 3 Roux-Langlois, Adeline 3 Shahaf, Ido 3 Tessaro, Stefano 3 Tibouchi, Mehdi 3 Wang, Zhedong 3 Wen, Qiaoyan 3 Yang, Bo 3 Zhang, Zhenfeng 2 Biagioni, Silvio 2 Cao, Zhenfu 2 Catalano, Dario 2 Chang, Jinyong 2 Chen, Rongmao 2 Chen, Wenbin 2 Cui, Hui 2 Deng, Yi 2 Döttling, Nico 2 Duong, Dung Hoang 2 Fan, Xiong 2 Faonio, Antonio 2 Faust, Sebastian ...and 447 more Authors all top 5 Cited in 29 Serials 35 Journal of Cryptology 23 Designs, Codes and Cryptography 21 Theoretical Computer Science 15 Information Sciences 4 Information Processing Letters 4 SIAM Journal on Computing 4 Mathematical Problems in Engineering 3 Soft Computing 3 Science China. Information Sciences 3 Frontiers of Computer Science 2 Journal of Computer and System Sciences 2 International Journal of Foundations of Computer Science 2 Science in China. Series F 2 Journal of Mathematical Cryptology 2 Cryptography and Communications 2 Computer Science Review 1 Electronics Letters 1 Algorithmica 1 International Journal of Computer Mathematics 1 Applicable Algebra in Engineering, Communication and Computing 1 Tatra Mountains Mathematical Publications 1 Journal of Mathematical Sciences (New York) 1 Theory of Computing Systems 1 Wuhan University Journal of Natural Sciences (WUJNS) 1 Fundamenta Informaticae 1 Journal of Applied Mathematics 1 Advances in Mathematics of Communications 1 Symmetry 1 ACM Transactions on Computation Theory all top 5 Cited in 10 Fields 280 Information and communication theory, circuits (94-XX) 100 Computer science (68-XX) 9 Quantum theory (81-XX) 5 Number theory (11-XX) 3 Algebraic geometry (14-XX) 2 Probability theory and stochastic processes (60-XX) 1 Associative rings and algebras (16-XX) 1 Group theory and generalizations (20-XX) 1 Statistics (62-XX) 1 Systems theory; control (93-XX) Citations by Year