×

zbMATH — the first resource for mathematics

Cash, David M.

Compute Distance To:
Author ID: cash.david-m Recent zbMATH articles by "Cash, David M."
Published as: Cash, David; Cash, David M.
Documents Indexed: 25 Publications since 2002

Publications by Year

Citations contained in zbMATH

18 Publications have been cited 268 times in 216 Documents Cited by Year
Bonsai trees, or how to delegate a lattice basis. Zbl 1280.94043
Cash, David; Hofheinz, Dennis; Kiltz, Eike; Peikert, Chris
62
2010
Fast cryptographic primitives and circular-secure encryption based on hard learning problems. Zbl 1252.94044
Applebaum, Benny; Cash, David; Peikert, Chris; Sahai, Amit
58
2009
The twin Diffie-Hellman problem and applications. Zbl 1149.94307
Cash, David; Kiltz, Eike; Shoup, Victor
29
2008
Cryptography secure against related-key attacks and tampering. Zbl 1227.94028
Bellare, Mihir; Cash, David; Miller, Rachel
20
2011
Highly-scalable searchable symmetric encryption with support for Boolean queries. Zbl 1311.68057
Cash, David; Jarecki, Stanislaw; Jutla, Charanjit; Krawczyk, Hugo; Roşu, Marcel-Cătălin; Steiner, Michael
17
2013
Pseudorandom functions and permutations provably secure against related-key attacks. Zbl 1283.94050
Bellare, Mihir; Cash, David
16
2010
Bonsai trees, or how to delegate a lattice basis. Zbl 1277.94017
Cash, David; Hofheinz, Dennis; Kiltz, Eike; Peikert, Chris
12
2012
Efficient authentication from hard learning problems. Zbl 1281.94083
Kiltz, Eike; Pietrzak, Krzysztof; Cash, David; Jain, Abhishek; Venturi, Daniele
10
2011
Intrusion-resilient key exchange in the bounded retrieval model. Zbl 1156.94338
Cash, David; Ding, Yan Zong; Dodis, Yevgeniy; Lee, Wenke; Lipton, Richard; Walfish, Shabsi
8
2007
Cryptographic agility and its relation to circular encryption. Zbl 1280.94034
Acar, Tolga; Belenkiy, Mira; Bellare, Mihir; Cash, David
7
2010
New definitions and separations for circular security. Zbl 1300.94044
Cash, David; Green, Matthew; Hohenberger, Susan
6
2012
Foundations of non-malleable hash and one-way functions. Zbl 1267.94042
Boldyreva, Alexandra; Cash, David; Fischlin, Marc; Warinschi, Bogdan
6
2009
Targeted homomorphic attribute-based encryption. Zbl 1394.94928
Brakerski, Zvika; Cash, David; Tsabary, Rotem; Wee, Hoeteck
5
2016
The locality of searchable symmetric encryption. Zbl 1332.94061
Cash, David; Tessaro, Stefano
3
2014
Dynamic proofs of retrievability via oblivious RAM. Zbl 1306.94037
Cash, David; Küpçü, Alptekin; Wichs, Daniel
3
2013
The twin Diffie-Hellman problem and applications. Zbl 1220.94034
Cash, David; Kiltz, Eike; Shoup, Victor
3
2009
Two-round man-in-the-middle security from LPN. Zbl 1378.94074
Cash, David; Kiltz, Eike; Tessaro, Stefano
2
2016
Digital signatures from strong RSA without prime generation. Zbl 1345.94048
Cash, David; Dowsley, Rafael; Kiltz, Eike
1
2015
Targeted homomorphic attribute-based encryption. Zbl 1394.94928
Brakerski, Zvika; Cash, David; Tsabary, Rotem; Wee, Hoeteck
5
2016
Two-round man-in-the-middle security from LPN. Zbl 1378.94074
Cash, David; Kiltz, Eike; Tessaro, Stefano
2
2016
Digital signatures from strong RSA without prime generation. Zbl 1345.94048
Cash, David; Dowsley, Rafael; Kiltz, Eike
1
2015
The locality of searchable symmetric encryption. Zbl 1332.94061
Cash, David; Tessaro, Stefano
3
2014
Highly-scalable searchable symmetric encryption with support for Boolean queries. Zbl 1311.68057
Cash, David; Jarecki, Stanislaw; Jutla, Charanjit; Krawczyk, Hugo; Roşu, Marcel-Cătălin; Steiner, Michael
17
2013
Dynamic proofs of retrievability via oblivious RAM. Zbl 1306.94037
Cash, David; Küpçü, Alptekin; Wichs, Daniel
3
2013
Bonsai trees, or how to delegate a lattice basis. Zbl 1277.94017
Cash, David; Hofheinz, Dennis; Kiltz, Eike; Peikert, Chris
12
2012
New definitions and separations for circular security. Zbl 1300.94044
Cash, David; Green, Matthew; Hohenberger, Susan
6
2012
Cryptography secure against related-key attacks and tampering. Zbl 1227.94028
Bellare, Mihir; Cash, David; Miller, Rachel
20
2011
Efficient authentication from hard learning problems. Zbl 1281.94083
Kiltz, Eike; Pietrzak, Krzysztof; Cash, David; Jain, Abhishek; Venturi, Daniele
10
2011
Bonsai trees, or how to delegate a lattice basis. Zbl 1280.94043
Cash, David; Hofheinz, Dennis; Kiltz, Eike; Peikert, Chris
62
2010
Pseudorandom functions and permutations provably secure against related-key attacks. Zbl 1283.94050
Bellare, Mihir; Cash, David
16
2010
Cryptographic agility and its relation to circular encryption. Zbl 1280.94034
Acar, Tolga; Belenkiy, Mira; Bellare, Mihir; Cash, David
7
2010
Fast cryptographic primitives and circular-secure encryption based on hard learning problems. Zbl 1252.94044
Applebaum, Benny; Cash, David; Peikert, Chris; Sahai, Amit
58
2009
Foundations of non-malleable hash and one-way functions. Zbl 1267.94042
Boldyreva, Alexandra; Cash, David; Fischlin, Marc; Warinschi, Bogdan
6
2009
The twin Diffie-Hellman problem and applications. Zbl 1220.94034
Cash, David; Kiltz, Eike; Shoup, Victor
3
2009
The twin Diffie-Hellman problem and applications. Zbl 1149.94307
Cash, David; Kiltz, Eike; Shoup, Victor
29
2008
Intrusion-resilient key exchange in the bounded retrieval model. Zbl 1156.94338
Cash, David; Ding, Yan Zong; Dodis, Yevgeniy; Lee, Wenke; Lipton, Richard; Walfish, Shabsi
8
2007
all top 5

Cited by 442 Authors

9 Wang, Huaxiong
8 Hofheinz, Dennis
8 Kiltz, Eike
7 Hu, Yupu
7 Ling, San
7 Nguyen, Khoa
7 Venturi, Daniele
6 Hanaoka, Goichiro
6 Wee, Hoeteck
5 Abdalla, Michel
5 Libert, Benoît
5 Matsuda, Takahiro
5 Mu, Yi
5 Park, Jonghwan
5 Peikert, Chris
5 Segev, Gil
5 Wang, Baocang
5 Waters, Brent
4 Brakerski, Zvika
4 Canetti, Ran
4 Cash, David M.
4 Chen, Yu
4 Koppula, Venkata
4 Mouhartem, Fabrice
4 Pietrzak, Krzysztof
4 Vaikuntanathan, Vinod
4 Yamada, Shota
4 Zhang, Jiang
3 Albrecht, Martin R.
3 Applebaum, Benny
3 Boneh, Dan
3 Boyen, Xavier
3 Farshim, Pooya
3 Fujioka, Atsushi
3 Fujisaki, Eiichiro
3 Goyal, Rishab
3 Gu, Dawu
3 Guo, Fuchun
3 Hajiabadi, Mohammad
3 Han, Shuai
3 Kapron, Bruce M.
3 Katsumata, Shuichi
3 Kurosawa, Kaoru
3 Lee, Dong Hoon
3 Lei, Hao
3 Liu, Shengli
3 Lu, Xianhui
3 Paterson, Kenneth G.
3 Qin, Baodong
3 Vaudenay, Serge
3 Wen, Qiaoyan
3 Wichs, Daniel
3 Wu, David J.
3 Xue, Rui
3 Yang, Bo
3 Yu, Yu
2 Benhamouda, Fabrice
2 Biagioni, Silvio
2 Bogos, Sonia
2 Catalano, Dario
2 Chang, Jinyong
2 Chen, Jie
2 Chen, Rongmao
2 Chen, Yilei
2 Chin, Ji-Jian
2 Cui, Hui
2 Fan, Xiong
2 Faonio, Antonio
2 Faust, Sebastian
2 Fiore, Dario
2 Fouque, Pierre-Alain
2 Guo, Qian
2 Herold, Gottfried
2 Ishai, Yuval
2 Jager, Tibor
2 Jia, Huiwen
2 Jiang, Mingming
2 Jiang, Peng
2 Jin, Zhengping
2 Johansson, Thomas
2 Lai, Jianchang
2 Lai, Qiqi
2 Lee, Donghoon
2 Lee, Kwangsu
2 Li, Bao
2 Li, Hui
2 Li, Jiamei
2 Li, Qinyi
2 Lindner, Richard
2 Liu, Ximeng
2 López-Alt, Adriana
2 Lu, Xiuhua
2 Lyu, Lin
2 Lyubashevsky, Vadim
2 Ma, Chunguang
2 Ma, Jianfeng
2 Masny, Daniel
2 Mohamad, Moesfa Soeheila
2 Mohassel, Payman
2 Mukherjee, Pratyay
...and 342 more Authors

Citations by Year