What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Adam O'Neill
Google Scholar
37
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/popets
Non-Interactive Verifiable Aggregation.
Ojaswi Acharya
Suvasree Biswas
Weiqi Feng
Adam O'Neill
Arkady Yerukhimovich
2025
conf/crypto
Schnorr Signatures are Tightly Secure in the ROM Under a Non-interactive Assumption.
Gavin Cho
Georg Fuchsbauer
Adam O'Neill
Marek Sefranek
2025
journals/cic
Access-Controlled Inner Product Function-Revealing Encryption.
Ojaswi Acharya
Weiqi Feng
Roman Langrehr
Adam O'Neill
2024
conf/tcc
On the Black-Box Complexity of Private-Key Inner-Product Functional Encryption.
Mohammad Hajiabadi
Roman Langrehr
Adam O'Neill
Mingyuan Wang
2023
conf/cans
Forward Security Under Leakage Resilience, Revisited.
Suvradip Chakraborty
Harish Karthikeyan
Adam O'Neill
C. Pandu Rangan
2022
conf/asiacrypt
Instantiability of Classical Random-Oracle-Model Encryption Transforms.
Alice Murphy
Adam O'Neill
Mohammad Zaheri
2022
conf/tcc
Beyond Uber: Instantiating Generic Groups via PGGs.
Balthazar Bauer
Pooya Farshim
Patrick Harasser
Adam O'Neill
2021
conf/ccs
εpsolute: Efficiently Querying Databases While Providing Differential Privacy.
Dmytro Bogatov
Georgios Kellaris
George Kollios
Kobbi Nissim
Adam O'Neill
2021
conf/pkc
On Selective-Opening Security of Deterministic Primitives.
Adam O'Neill
Mohammad Zaheri
2020
conf/pkc
Toward RSA-OAEP Without Random Oracles.
Nairen Cao
Adam O'Neill
Mohammad Zaheri
2019
journals/joc
Leakage Resilience from Program Obfuscation.
Dana Dachman-Soled
S. Dov Gordon
Feng-Hao Liu
Adam O'Neill
Hong-Sheng Zhou
2018
conf/pkc
A Unified Framework for Trapdoor-Permutation-Based Sequential Aggregate Signatures.
Craig Gentry
Adam O'Neill
Leonid Reyzin
2018
conf/asiacrypt
Parameter-Hiding Order Revealing Encryption.
David Cash
Feng-Hao Liu
Adam O'Neill
Mark Zhandry
Cong Zhang
2017
journals/joc
Instantiability of RSA-OAEP Under Chosen-Plaintext Attack.
Eike Kiltz
Adam O'Neill
Adam D. Smith
2017
conf/cans
Forward-Security Under Continual Leakage.
Mihir Bellare
Adam O'Neill
Igors Stepanovs
2016
conf/ccs
Generic Attacks on Secure Outsourced Databases.
Georgios Kellaris
George Kollios
Kobbi Nissim
Adam O'Neill
2016
conf/pkc
Leakage-Resilient Public-Key Encryption from Obfuscation.
Dana Dachman-Soled
S. Dov Gordon
Feng-Hao Liu
Adam O'Neill
Hong-Sheng Zhou
2016
conf/pkc
Deniable Functional Encryption.
Angelo De Caro
Vincenzo Iovino
Adam O'Neill
2016
conf/asiacrypt
Selective-Opening Security in the Presence of Randomness Failures.
Viet Tung Hoang
Jonathan Katz
Adam O'Neill
Mohammad Zaheri
2016
conf/asiacrypt
Multi-input Functional Encryption with Unbounded-Message Security.
Vipul Goyal
Aayush Jain
Adam O'Neill
2015
journals/joc
A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy.
Benjamin Fuller
Adam O'Neill
Leonid Reyzin
2014
conf/pkc
Enhanced Chosen-Ciphertext Security and Applications.
Dana Dachman-Soled
Georg Fuchsbauer
Payman Mohassel
Adam O'Neill
2013
conf/crypto
On the Achievability of Simulation-Based Security for Functional Encryption.
Angelo De Caro
Vincenzo Iovino
Abhishek Jain
Adam O'Neill
Omer Paneth
Giuseppe Persiano
2013
conf/eurocrypt
Regularity of Lossy RSA on Subdomains and Its Applications.
Mark Lewko
Adam O'Neill
Adam D. Smith
2013
conf/cans
Semantically-Secure Functional Encryption: Possibility Results, Impossibility Results and the Quest for a General Definition.
Mihir Bellare
Adam O'Neill
2012
conf/asiacrypt
Dual Form Signatures: An Approach for Proving Security from Static Assumptions.
Michael Gerbush
Allison B. Lewko
Adam O'Neill
Brent Waters
2012
conf/tcc
A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy.
Benjamin Fuller
Adam O'Neill
Leonid Reyzin
2011
conf/crypto
Bi-Deniable Public-Key Encryption.
Adam O'Neill
Chris Peikert
Brent Waters
2011
conf/crypto
Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions.
Alexandra Boldyreva
Nathan Chenette
Adam O'Neill
2011
conf/tcc
Correlated-Input Secure Hash Functions.
Vipul Goyal
Adam O'Neill
Vanishree Rao
2010
conf/crypto
Instantiability of RSA-OAEP under Chosen-Plaintext Attack.
Eike Kiltz
Adam O'Neill
Adam D. Smith
2010
conf/eurocrypt
Adaptive Trapdoor Functions and Chosen-Ciphertext Security.
Eike Kiltz
Payman Mohassel
Adam O'Neill
2009
conf/eurocrypt
Order-Preserving Symmetric Encryption.
Alexandra Boldyreva
Nathan Chenette
Younho Lee
Adam O'Neill
2008
conf/crypto
On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles.
Alexandra Boldyreva
Serge Fehr
Adam O'Neill
2008
conf/crypto
Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles.
Mihir Bellare
Marc Fischlin
Adam O'Neill
Thomas Ristenpart
2007
conf/ccs
Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing.
Alexandra Boldyreva
Craig Gentry
Adam O'Neill
Dae Hyun Yum
2007
conf/crypto
Deterministic and Efficiently Searchable Encryption.
Mihir Bellare
Alexandra Boldyreva
Adam O'Neill
Coauthors
Aayush Jain
(1)
Abhishek Jain
(1)
Adam D. Smith
(3)
Adam O'Neill
(37)
Alexandra Boldyreva
(5)
Alice Murphy
(1)
Allison B. Lewko
(1)
Angelo De Caro
(2)
Arkady Yerukhimovich
(1)
Balthazar Bauer
(1)
Benjamin Fuller
(2)
Brent Waters
(2)
C. Pandu Rangan
(1)
Chris Peikert
(1)
Cong Zhang
(1)
Craig Gentry
(2)
Dae Hyun Yum
(1)
Dana Dachman-Soled
(3)
David Cash
(1)
Dmytro Bogatov
(1)
Eike Kiltz
(3)
Feng-Hao Liu
(3)
Gavin Cho
(1)
Georg Fuchsbauer
(2)
George Kollios
(2)
Georgios Kellaris
(2)
Giuseppe Persiano
(1)
Harish Karthikeyan
(1)
Hong-Sheng Zhou
(2)
Igors Stepanovs
(1)
Jonathan Katz
(1)
Kobbi Nissim
(2)
Leonid Reyzin
(3)
Marc Fischlin
(1)
Marek Sefranek
(1)
Mark Lewko
(1)
Mark Zhandry
(1)
Michael Gerbush
(1)
Mihir Bellare
(4)
Mingyuan Wang
(1)
Mohammad Hajiabadi
(1)
Mohammad Zaheri
(4)
Nairen Cao
(1)
Nathan Chenette
(2)
Ojaswi Acharya
(2)
Omer Paneth
(1)
Patrick Harasser
(1)
Payman Mohassel
(2)
Pooya Farshim
(1)
Roman Langrehr
(2)
S. Dov Gordon
(2)
Serge Fehr
(1)
Suvasree Biswas
(1)
Suvradip Chakraborty
(1)
Thomas Ristenpart
(1)
Vanishree Rao
(1)
Viet Tung Hoang
(1)
Vincenzo Iovino
(2)
Vipul Goyal
(2)
Weiqi Feng
(2)
Younho Lee
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to