BibTeX records: David Cash

download as .bib file

@article{DBLP:journals/iacr/NgHCE23,
  author       = {Ruth Ng and
                  Alexander Hoover and
                  David Cash and
                  Eileen Ee},
  title        = {Structured Encryption for Indirect Addressing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1146},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1146},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NgHCE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AronestyCDGHKT22,
  author       = {Erik Aronesty and
                  David Cash and
                  Yevgeniy Dodis and
                  Daniel H. Gallancy and
                  Christopher Higley and
                  Harish Karthikeyan and
                  Oren Tysor},
  editor       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yohei Watanabe},
  title        = {Encapsulated Search Index: Public-Key, Sub-linear, Distributed, and
                  Delegatable},
  booktitle    = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Virtual Event,
                  March 8-11, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13178},
  pages        = {256--285},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-97131-1\_9},
  doi          = {10.1007/978-3-030-97131-1\_9},
  timestamp    = {Thu, 10 Mar 2022 11:26:10 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/AronestyCDGHKT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AronestyCDGHKT22,
  author       = {Erik Aronesty and
                  David Cash and
                  Yevgeniy Dodis and
                  Daniel H. Gallancy and
                  Christopher Higley and
                  Harish Karthikeyan and
                  Oren Tysor},
  title        = {Encapsulated Search Index: Public-Key, Sub-linear, Distributed, and
                  Delegatable},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {71},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/071},
  timestamp    = {Fri, 18 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AronestyCDGHKT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/CashNR21,
  author       = {David Cash and
                  Ruth Ng and
                  Adam Rivkin},
  editor       = {Kazue Sako and
                  Nils Ole Tippenhauer},
  title        = {Improved Structured Encryption for {SQL} Databases via Hybrid Indexing},
  booktitle    = {Applied Cryptography and Network Security - 19th International Conference,
                  {ACNS} 2021, Kamakura, Japan, June 21-24, 2021, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12727},
  pages        = {480--510},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-78375-4\_19},
  doi          = {10.1007/978-3-030-78375-4\_19},
  timestamp    = {Thu, 10 Jun 2021 16:38:04 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/CashNR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/XuNCR21,
  author       = {Min Xu and
                  Armin Namavari and
                  David Cash and
                  Thomas Ristenpart},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Searching Encrypted Data with Size-Locked Indexes},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {4025--4042},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/xu-min},
  timestamp    = {Mon, 20 Nov 2023 08:57:49 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/XuNCR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CashNR21,
  author       = {David Cash and
                  Ruth Ng and
                  Adam Rivkin},
  title        = {Improved Structured Encryption for {SQL} Databases via Hybrid Indexing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {852},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/852},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CashNR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FalzonMACRST20,
  author       = {Francesca Falzon and
                  Evangelia Anna Markatou and
                  Akshima and
                  David Cash and
                  Adam Rivkin and
                  Jesse Stern and
                  Roberto Tamassia},
  editor       = {Jay Ligatti and
                  Xinming Ou and
                  Jonathan Katz and
                  Giovanni Vigna},
  title        = {Full Database Reconstruction in Two Dimensions},
  booktitle    = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, USA, November 9-13, 2020},
  pages        = {443--460},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372297.3417275},
  doi          = {10.1145/3372297.3417275},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/FalzonMACRST20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AkshimaCDW20,
  author       = {Akshima and
                  David Cash and
                  Andrew Drucker and
                  Hoeteck Wee},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Time-Space Tradeoffs and Short Collisions in Merkle-Damg{\aa}rd Hash
                  Functions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12170},
  pages        = {157--186},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56784-2\_6},
  doi          = {10.1007/978-3-030-56784-2\_6},
  timestamp    = {Wed, 12 Aug 2020 14:16:56 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AkshimaCDW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/CashDH20,
  author       = {David Cash and
                  Andrew Drucker and
                  Alexander Hoover},
  editor       = {Rafael Pass and
                  Krzysztof Pietrzak},
  title        = {A Lower Bound for One-Round Oblivious {RAM}},
  booktitle    = {Theory of Cryptography - 18th International Conference, {TCC} 2020,
                  Durham, NC, USA, November 16-19, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12550},
  pages        = {457--485},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64375-1\_16},
  doi          = {10.1007/978-3-030-64375-1\_16},
  timestamp    = {Tue, 15 Dec 2020 11:52:09 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/CashDH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AkshimaCFRS20,
  author       = {Akshima and
                  David Cash and
                  Francesca Falzon and
                  Adam Rivkin and
                  Jesse Stern},
  title        = {Multidimensional Database Reconstruction from Range Query Access Patterns},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {296},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/296},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AkshimaCFRS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AkshimaCDW20,
  author       = {Akshima and
                  David Cash and
                  Andrew Drucker and
                  Hoeteck Wee},
  title        = {Time-Space Tradeoffs and Short Collisions in Merkle-Damg{\aa}rd Hash
                  Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {770},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/770},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AkshimaCDW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CashDH20,
  author       = {David Cash and
                  Andrew Drucker and
                  Alexander Hoover},
  title        = {A Lower Bound for One-Round Oblivious {RAM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1195},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1195},
  timestamp    = {Fri, 30 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/CashDH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/LiuNGCU19,
  author       = {Enze Liu and
                  Amanda Nakanishi and
                  Maximilian Golla and
                  David Cash and
                  Blase Ur},
  title        = {Reasoning Analytically about Password-Cracking Software},
  booktitle    = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco,
                  CA, USA, May 19-23, 2019},
  pages        = {380--397},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SP.2019.00070},
  doi          = {10.1109/SP.2019.00070},
  timestamp    = {Mon, 08 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/LiuNGCU19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pvldb/BindschaedlerGC18,
  author       = {Vincent Bindschaedler and
                  Paul Grubbs and
                  David Cash and
                  Thomas Ristenpart and
                  Vitaly Shmatikov},
  title        = {The Tao of Inference in Privacy-Protected Databases},
  journal      = {Proc. {VLDB} Endow.},
  volume       = {11},
  number       = {11},
  pages        = {1715--1728},
  year         = {2018},
  url          = {http://www.vldb.org/pvldb/vol11/p1715-bindschaedler.pdf},
  doi          = {10.14778/3236187.3236217},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pvldb/BindschaedlerGC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/CashLOZZ18,
  author       = {David Cash and
                  Feng{-}Hao Liu and
                  Adam O'Neill and
                  Mark Zhandry and
                  Cong Zhang},
  editor       = {Thomas Peyrin and
                  Steven D. Galbraith},
  title        = {Parameter-Hiding Order Revealing Encryption},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11272},
  pages        = {181--210},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03326-2\_7},
  doi          = {10.1007/978-3-030-03326-2\_7},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/CashLOZZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/CashZ18,
  author       = {David Cash and
                  Cong Zhang},
  editor       = {Amos Beimel and
                  Stefan Dziembowski},
  title        = {A Ciphertext-Size Lower Bound for Order-Preserving Encryption with
                  Limited Leakage},
  booktitle    = {Theory of Cryptography - 16th International Conference, {TCC} 2018,
                  Panaji, India, November 11-14, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11240},
  pages        = {159--176},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03810-6\_6},
  doi          = {10.1007/978-3-030-03810-6\_6},
  timestamp    = {Sat, 09 Apr 2022 12:44:08 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/CashZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CashLOZZ18,
  author       = {David Cash and
                  Feng{-}Hao Liu and
                  Adam O'Neill and
                  Mark Zhandry and
                  Cong Zhang},
  title        = {Parameter-Hiding Order Revealing Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {698},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/698},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CashLOZZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/CashKW17,
  author       = {David Cash and
                  Alptekin K{\"{u}}p{\c{c}}{\"{u}} and
                  Daniel Wichs},
  title        = {Dynamic Proofs of Retrievability Via Oblivious {RAM}},
  journal      = {J. Cryptol.},
  volume       = {30},
  number       = {1},
  pages        = {22--57},
  year         = {2017},
  url          = {https://doi.org/10.1007/s00145-015-9216-2},
  doi          = {10.1007/S00145-015-9216-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/CashKW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/KiltzPVCJ17,
  author       = {Eike Kiltz and
                  Krzysztof Pietrzak and
                  Daniele Venturi and
                  David Cash and
                  Abhishek Jain},
  title        = {Efficient Authentication from Hard Learning Problems},
  journal      = {J. Cryptol.},
  volume       = {30},
  number       = {4},
  pages        = {1238--1275},
  year         = {2017},
  url          = {https://doi.org/10.1007/s00145-016-9247-3},
  doi          = {10.1007/S00145-016-9247-3},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/KiltzPVCJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AuerbachCFK17,
  author       = {Benedikt Auerbach and
                  David Cash and
                  Manuel Fersch and
                  Eike Kiltz},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Memory-Tight Reductions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10401},
  pages        = {101--132},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63688-7\_4},
  doi          = {10.1007/978-3-319-63688-7\_4},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AuerbachCFK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/WangGLBCR17,
  author       = {Liang Wang and
                  Paul Grubbs and
                  Jiahui Lu and
                  Vincent Bindschaedler and
                  David Cash and
                  Thomas Ristenpart},
  title        = {Side-Channel Attacks on Shared Search Indexes},
  booktitle    = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose,
                  CA, USA, May 22-26, 2017},
  pages        = {673--692},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SP.2017.50},
  doi          = {10.1109/SP.2017.50},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/WangGLBCR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AuerbachCFK17,
  author       = {Benedikt Auerbach and
                  David Cash and
                  Manuel Fersch and
                  Eike Kiltz},
  title        = {Memory-Tight Reductions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {675},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/675},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AuerbachCFK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BindschaedlerGC17,
  author       = {Vincent Bindschaedler and
                  Paul Grubbs and
                  David Cash and
                  Thomas Ristenpart and
                  Vitaly Shmatikov},
  title        = {The Tao of Inference in Privacy-Protected Databases},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1078},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1078},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BindschaedlerGC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CashZ17,
  author       = {David Cash and
                  Cong Zhang},
  title        = {A Ciphertext-Size Lower Bound for Order-Preserving Encryption with
                  Limited Leakage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1120},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1120},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CashZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DurakDC16,
  author       = {F. Bet{\"{u}}l Durak and
                  Thomas M. DuBuisson and
                  David Cash},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {What Else is Revealed by Order-Revealing Encryption?},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {1155--1166},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2978379},
  doi          = {10.1145/2976749.2978379},
  timestamp    = {Tue, 10 Nov 2020 20:00:49 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DurakDC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cocoon/ZhangCWYC16,
  author       = {Cong Zhang and
                  David Cash and
                  Xiuhua Wang and
                  Xiaoqi Yu and
                  Sherman S. M. Chow},
  editor       = {Thang N. Dinh and
                  My T. Thai},
  title        = {Combiners for Chosen-Ciphertext Security},
  booktitle    = {Computing and Combinatorics - 22nd International Conference, {COCOON}
                  2016, Ho Chi Minh City, Vietnam, August 2-4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9797},
  pages        = {257--268},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-42634-1\_21},
  doi          = {10.1007/978-3-319-42634-1\_21},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cocoon/ZhangCWYC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/CashKT16,
  author       = {David Cash and
                  Eike Kiltz and
                  Stefano Tessaro},
  editor       = {Eyal Kushilevitz and
                  Tal Malkin},
  title        = {Two-Round Man-in-the-Middle Security from {LPN}},
  booktitle    = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A,
                  Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9562},
  pages        = {225--248},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49096-9\_10},
  doi          = {10.1007/978-3-662-49096-9\_10},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/CashKT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BrakerskiCTW16,
  author       = {Zvika Brakerski and
                  David Cash and
                  Rotem Tsabary and
                  Hoeteck Wee},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {Targeted Homomorphic Attribute-Based Encryption},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9986},
  pages        = {330--360},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53644-5\_13},
  doi          = {10.1007/978-3-662-53644-5\_13},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/BrakerskiCTW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CashLOZ16,
  author       = {David Cash and
                  Feng{-}Hao Liu and
                  Adam O'Neill and
                  Cong Zhang},
  title        = {Reducing the Leakage in Practical Order-Revealing Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {661},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/661},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CashLOZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrakerskiCTW16,
  author       = {Zvika Brakerski and
                  David Cash and
                  Rotem Tsabary and
                  Hoeteck Wee},
  title        = {Targeted Homomorphic Attribute Based Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {691},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/691},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrakerskiCTW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CashGPR16,
  author       = {David Cash and
                  Paul Grubbs and
                  Jason Perry and
                  Thomas Ristenpart},
  title        = {Leakage-Abuse Attacks Against Searchable Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {718},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/718},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CashGPR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DurakDC16,
  author       = {F. Bet{\"{u}}l Durak and
                  Thomas DuBuisson and
                  David Cash},
  title        = {What Else is Revealed by Order-Revealing Encryption?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {786},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/786},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DurakDC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CashGPR15,
  author       = {David Cash and
                  Paul Grubbs and
                  Jason Perry and
                  Thomas Ristenpart},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {Leakage-Abuse Attacks Against Searchable Encryption},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {668--679},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2813700},
  doi          = {10.1145/2810103.2813700},
  timestamp    = {Tue, 10 Nov 2020 19:58:09 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CashGPR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CashDK15,
  author       = {David Cash and
                  Rafael Dowsley and
                  Eike Kiltz},
  editor       = {Jonathan Katz},
  title        = {Digital Signatures from Strong {RSA} without Prime Generation},
  booktitle    = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
                  USA, March 30 - April 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9020},
  pages        = {217--235},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46447-2\_10},
  doi          = {10.1007/978-3-662-46447-2\_10},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CashDK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CashKT15,
  author       = {David Cash and
                  Eike Kiltz and
                  Stefano Tessaro},
  title        = {Two-Round Man-in-the-Middle Security from {LPN}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1220},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1220},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CashKT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CashT14,
  author       = {David Cash and
                  Stefano Tessaro},
  editor       = {Phong Q. Nguyen and
                  Elisabeth Oswald},
  title        = {The Locality of Searchable Symmetric Encryption},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Copenhagen, Denmark, May 11-15, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8441},
  pages        = {351--368},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55220-5\_20},
  doi          = {10.1007/978-3-642-55220-5\_20},
  timestamp    = {Thu, 14 Oct 2021 09:58:16 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CashT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/CashJJJKRS14,
  author       = {David Cash and
                  Joseph Jaeger and
                  Stanislaw Jarecki and
                  Charanjit S. Jutla and
                  Hugo Krawczyk and
                  Marcel{-}Catalin Rosu and
                  Michael Steiner},
  title        = {Dynamic Searchable Encryption in Very-Large Databases: Data Structures
                  and Implementation},
  booktitle    = {21st Annual Network and Distributed System Security Symposium, {NDSS}
                  2014, San Diego, California, USA, February 23-26, 2014},
  publisher    = {The Internet Society},
  year         = {2014},
  url          = {https://www.ndss-symposium.org/ndss2014/dynamic-searchable-encryption-very-large-databases-data-structures-and-implementation},
  timestamp    = {Mon, 01 Feb 2021 08:42:18 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/CashJJJKRS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CashT14,
  author       = {David Cash and
                  Stefano Tessaro},
  title        = {The Locality of Searchable Symmetric Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {308},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/308},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CashT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CashJJJKRS14,
  author       = {David Cash and
                  Joseph Jaeger and
                  Stanislaw Jarecki and
                  Charanjit S. Jutla and
                  Hugo Krawczyk and
                  Marcel{-}Catalin Rosu and
                  Michael Steiner},
  title        = {Dynamic Searchable Encryption in Very-Large Databases: Data Structures
                  and Implementation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {853},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/853},
  timestamp    = {Sat, 23 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CashJJJKRS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CashJJKRS13,
  author       = {David Cash and
                  Stanislaw Jarecki and
                  Charanjit S. Jutla and
                  Hugo Krawczyk and
                  Marcel{-}Catalin Rosu and
                  Michael Steiner},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Highly-Scalable Searchable Symmetric Encryption with Support for Boolean
                  Queries},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8042},
  pages        = {353--373},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40041-4\_20},
  doi          = {10.1007/978-3-642-40041-4\_20},
  timestamp    = {Sat, 23 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CashJJKRS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CashKW13,
  author       = {David Cash and
                  Alptekin K{\"{u}}p{\c{c}}{\"{u}} and
                  Daniel Wichs},
  editor       = {Thomas Johansson and
                  Phong Q. Nguyen},
  title        = {Dynamic Proofs of Retrievability via Oblivious {RAM}},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Athens, Greece, May 26-30, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7881},
  pages        = {279--295},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38348-9\_17},
  doi          = {10.1007/978-3-642-38348-9\_17},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CashKW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CashJJKRS13,
  author       = {David Cash and
                  Stanislaw Jarecki and
                  Charanjit S. Jutla and
                  Hugo Krawczyk and
                  Marcel{-}Catalin Rosu and
                  Michael Steiner},
  title        = {Highly-Scalable Searchable Symmetric Encryption with Support for Boolean
                  Queries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {169},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/169},
  timestamp    = {Sat, 23 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CashJJKRS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/CashHKP12,
  author       = {David Cash and
                  Dennis Hofheinz and
                  Eike Kiltz and
                  Chris Peikert},
  title        = {Bonsai Trees, or How to Delegate a Lattice Basis},
  journal      = {J. Cryptol.},
  volume       = {25},
  number       = {4},
  pages        = {601--639},
  year         = {2012},
  url          = {https://doi.org/10.1007/s00145-011-9105-2},
  doi          = {10.1007/S00145-011-9105-2},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/CashHKP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CashGH12,
  author       = {David Cash and
                  Matthew Green and
                  Susan Hohenberger},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {New Definitions and Separations for Circular Security},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {540--557},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_32},
  doi          = {10.1007/978-3-642-30057-8\_32},
  timestamp    = {Mon, 16 Nov 2020 15:55:52 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/CashGH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CashKW12,
  author       = {David Cash and
                  Alptekin K{\"{u}}p{\c{c}}{\"{u}} and
                  Daniel Wichs},
  title        = {Dynamic Proofs of Retrievability via Oblivious {RAM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {550},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/550},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CashKW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BellareCM11,
  author       = {Mihir Bellare and
                  David Cash and
                  Rachel Miller},
  editor       = {Dong Hoon Lee and
                  Xiaoyun Wang},
  title        = {Cryptography Secure against Related-Key Attacks and Tampering},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Seoul, South Korea, December 4-8, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7073},
  pages        = {486--503},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25385-0\_26},
  doi          = {10.1007/978-3-642-25385-0\_26},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BellareCM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BellareCK11,
  author       = {Mihir Bellare and
                  David Cash and
                  Sriram Keelveedhi},
  editor       = {Yan Chen and
                  George Danezis and
                  Vitaly Shmatikov},
  title        = {Ciphers that securely encipher their own keys},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages        = {423--432},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046707.2046757},
  doi          = {10.1145/2046707.2046757},
  timestamp    = {Tue, 10 Nov 2020 19:56:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BellareCK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KiltzPCJV11,
  author       = {Eike Kiltz and
                  Krzysztof Pietrzak and
                  David Cash and
                  Abhishek Jain and
                  Daniele Venturi},
  editor       = {Kenneth G. Paterson},
  title        = {Efficient Authentication from Hard Learning Problems},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tallinn, Estonia, May 15-19, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6632},
  pages        = {7--26},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20465-4\_3},
  doi          = {10.1007/978-3-642-20465-4\_3},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KiltzPCJV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareCM11,
  author       = {Mihir Bellare and
                  David Cash and
                  Rachel Miller},
  title        = {Cryptography Secure Against Related-Key Attacks and Tampering},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {252},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/252},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareCM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareCK11,
  author       = {Mihir Bellare and
                  David Cash and
                  Sriram Keelveedhi},
  title        = {Ciphers that Securely Encipher their own Keys},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {432},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/432},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareCK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BellareC10,
  author       = {Mihir Bellare and
                  David Cash},
  editor       = {Tal Rabin},
  title        = {Pseudorandom Functions and Permutations Provably Secure against Related-Key
                  Attacks},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {666--684},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7\_36},
  doi          = {10.1007/978-3-642-14623-7\_36},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BellareC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AcarBBC10,
  author       = {Tolga Acar and
                  Mira Belenkiy and
                  Mihir Bellare and
                  David Cash},
  editor       = {Henri Gilbert},
  title        = {Cryptographic Agility and Its Relation to Circular Encryption},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Monaco / French Riviera, May 30 - June 3, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6110},
  pages        = {403--422},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13190-5\_21},
  doi          = {10.1007/978-3-642-13190-5\_21},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/AcarBBC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CashHKP10,
  author       = {David Cash and
                  Dennis Hofheinz and
                  Eike Kiltz and
                  Chris Peikert},
  editor       = {Henri Gilbert},
  title        = {Bonsai Trees, or How to Delegate a Lattice Basis},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Monaco / French Riviera, May 30 - June 3, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6110},
  pages        = {523--552},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13190-5\_27},
  doi          = {10.1007/978-3-642-13190-5\_27},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CashHKP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AcarBBC10,
  author       = {Tolga Acar and
                  Mira Belenkiy and
                  Mihir Bellare and
                  David Cash},
  title        = {Cryptographic Agility and its Relation to Circular Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {117},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/117},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AcarBBC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareC10,
  author       = {Mihir Bellare and
                  David Cash},
  title        = {Pseudorandom Functions and Permutations Provably Secure Against Related-Key
                  Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {397},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/397},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CashHKP10,
  author       = {David Cash and
                  Dennis Hofheinz and
                  Eike Kiltz and
                  Chris Peikert},
  title        = {Bonsai Trees, or How to Delegate a Lattice Basis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {591},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/591},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CashHKP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/CashKS09,
  author       = {David Cash and
                  Eike Kiltz and
                  Victor Shoup},
  title        = {The Twin Diffie-Hellman Problem and Applications},
  journal      = {J. Cryptol.},
  volume       = {22},
  number       = {4},
  pages        = {470--504},
  year         = {2009},
  url          = {https://doi.org/10.1007/s00145-009-9041-6},
  doi          = {10.1007/S00145-009-9041-6},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/CashKS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BoldyrevaCFW09,
  author       = {Alexandra Boldyreva and
                  David Cash and
                  Marc Fischlin and
                  Bogdan Warinschi},
  editor       = {Mitsuru Matsui},
  title        = {Foundations of Non-malleable Hash and One-Way Functions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {524--541},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_31},
  doi          = {10.1007/978-3-642-10366-7\_31},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BoldyrevaCFW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ApplebaumCPS09,
  author       = {Benny Applebaum and
                  David Cash and
                  Chris Peikert and
                  Amit Sahai},
  editor       = {Shai Halevi},
  title        = {Fast Cryptographic Primitives and Circular-Secure Encryption Based
                  on Hard Learning Problems},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {595--618},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_35},
  doi          = {10.1007/978-3-642-03356-8\_35},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ApplebaumCPS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoldyrevaCFW09,
  author       = {Alexandra Boldyreva and
                  David Cash and
                  Marc Fischlin and
                  Bogdan Warinschi},
  title        = {Foundations of Non-Malleable Hash and One-Way Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {65},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/065},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoldyrevaCFW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CashHK09,
  author       = {David Cash and
                  Dennis Hofheinz and
                  Eike Kiltz},
  title        = {How to Delegate a Lattice Basis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {351},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/351},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CashHK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dim/BauerBC08,
  author       = {David Bauer and
                  Douglas M. Blough and
                  David Cash},
  editor       = {Elisa Bertino and
                  Kenji Takahashi},
  title        = {Minimal information disclosure with efficiently verifiable credentials},
  booktitle    = {Proceedings of the 4th Workshop on Digital Identity Management, Alexandria,
                  VA, USA, October 31, 2008},
  pages        = {15--24},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456424.1456428},
  doi          = {10.1145/1456424.1456428},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dim/BauerBC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CashKS08,
  author       = {David Cash and
                  Eike Kiltz and
                  Victor Shoup},
  editor       = {Nigel P. Smart},
  title        = {The Twin Diffie-Hellman Problem and Applications},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2008, 27th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Istanbul, Turkey, April 13-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4965},
  pages        = {127--145},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78967-3\_8},
  doi          = {10.1007/978-3-540-78967-3\_8},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CashKS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CashKS08,
  author       = {David Cash and
                  Eike Kiltz and
                  Victor Shoup},
  title        = {The Twin Diffie-Hellman Problem and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {67},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/067},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CashKS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/CashDDLLW07,
  author       = {David Cash and
                  Yan Zong Ding and
                  Yevgeniy Dodis and
                  Wenke Lee and
                  Richard J. Lipton and
                  Shabsi Walfish},
  editor       = {Salil P. Vadhan},
  title        = {Intrusion-Resilient Key Exchange in the Bounded Retrieval Model},
  booktitle    = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC}
                  2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4392},
  pages        = {479--498},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-70936-7\_26},
  doi          = {10.1007/978-3-540-70936-7\_26},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/CashDDLLW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics