Follow
David Cash
David Cash
Verified email at cs.uchicago.edu - Homepage
Title
Cited by
Cited by
Year
Bonsai trees, or how to delegate a lattice basis
D Cash, D Hofheinz, E Kiltz, C Peikert
Journal of cryptology 25, 601-639, 2012
10362012
Highly-scalable searchable symmetric encryption with support for boolean queries
D Cash, S Jarecki, C Jutla, H Krawczyk, MC Roşu, M Steiner
Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013
9462013
Dynamic searchable encryption in very-large databases: Data structures and implementation
D Cash, J Jaeger, S Jarecki, C Jutla, H Krawczyk, MC Roşu, M Steiner
NDSS Symposium, 2014
7662014
Fast cryptographic primitives and circular-secure encryption based on hard learning problems
B Applebaum, D Cash, C Peikert, A Sahai
Advances in Cryptology-CRYPTO 2009: 29th Annual International Cryptology …, 2009
6902009
Leakage-abuse attacks against searchable encryption
D Cash, P Grubbs, J Perry, T Ristenpart
Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015
5942015
The twin Diffie–Hellman problem and applications
D Cash, E Kiltz, V Shoup
Journal of cryptology 22, 470-504, 2009
3652009
Dynamic proofs of retrievability via oblivious RAM
D Cash, A Küpçü, D Wichs
Journal of Cryptology 30, 22-57, 2017
2982017
What else is revealed by order-revealing encryption?
FB Durak, TM DuBuisson, D Cash
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
1362016
Efficient authentication from hard learning problems
E Kiltz, K Pietrzak, D Venturi, D Cash, A Jain
Journal of Cryptology 30 (4), 1238-1275, 2017
1332017
The Locality of Searchable Symmetric Encryption.
D Cash, S Tessaro
Eurocrypt 8441, 351-368, 2014
1322014
Cryptography secure against related-key attacks and tampering
M Bellare, D Cash, R Miller
Advances in Cryptology–ASIACRYPT 2011: 17th International Conference on the …, 2011
1282011
Pseudorandom functions and permutations provably secure against related-key attacks
M Bellare, D Cash
Advances in Cryptology–CRYPTO 2010: 30th Annual Cryptology Conference, Santa …, 2010
1252010
The tao of inference in privacy-protected databases
V Bindschaedler, P Grubbs, D Cash, T Ristenpart, V Shmatikov
Cryptology ePrint Archive, 2017
922017
Cryptographic agility and its relation to circular encryption
T Acar, M Belenkiy, M Bellare, D Cash
Advances in Cryptology–EUROCRYPT 2010: 29th Annual International Conference …, 2010
872010
Intrusion-resilient key exchange in the bounded retrieval model
D Cash, YZ Ding, Y Dodis, W Lee, R Lipton, S Walfish
Theory of Cryptography: 4th Theory of Cryptography Conference, TCC 2007 …, 2007
802007
New Definitions and Separations for Circular Security.
D Cash, M Green, S Hohenberger
Public Key Cryptography 7293, 540-557, 2012
602012
Targeted homomorphic attribute-based encryption
Z Brakerski, D Cash, R Tsabary, H Wee
Theory of Cryptography: 14th International Conference, TCC 2016-B, Beijing …, 2016
552016
Foundations of Non-malleable Hash and One-Way Functions.
A Boldyreva, D Cash, M Fischlin, B Warinschi
ASIACRYPT 5912, 524-541, 2009
552009
Minimal information disclosure with efficiently verifiable credentials
D Bauer, DM Blough, D Cash
Proceedings of the 4th ACM workshop on Digital identity management, 15-24, 2008
472008
Reducing the leakage in practical order-revealing encryption
D Cash, FH Liu, A O'Neill, C Zhang
Cryptology ePrint Archive, 2016
362016
The system can't perform the operation now. Try again later.
Articles 1–20