×
Compute Distance To:
Author ID: cash.david-m Recent zbMATH articles by "Cash, David M."
Published as: Cash, David; Cash, David M.
Documents Indexed: 28 Publications since 2002
Co-Authors: 52 Co-Authors with 28 Joint Publications
1,202 Co-Co-Authors

Publications by Year

Citations contained in zbMATH Open

25 Publications have been cited 427 times in 349 Documents Cited by Year
Bonsai trees, or how to delegate a lattice basis. Zbl 1280.94043
Cash, David; Hofheinz, Dennis; Kiltz, Eike; Peikert, Chris
100
2010
Fast cryptographic primitives and circular-secure encryption based on hard learning problems. Zbl 1252.94044
Applebaum, Benny; Cash, David; Peikert, Chris; Sahai, Amit
90
2009
The twin Diffie-Hellman problem and applications. Zbl 1149.94307
Cash, David; Kiltz, Eike; Shoup, Victor
39
2008
Bonsai trees, or how to delegate a lattice basis. Zbl 1277.94017
Cash, David; Hofheinz, Dennis; Kiltz, Eike; Peikert, Chris
29
2012
Highly-scalable searchable symmetric encryption with support for Boolean queries. Zbl 1311.68057
Cash, David; Jarecki, Stanislaw; Jutla, Charanjit; Krawczyk, Hugo; Roşu, Marcel-Cătălin; Steiner, Michael
26
2013
Pseudorandom functions and permutations provably secure against related-key attacks. Zbl 1283.94050
Bellare, Mihir; Cash, David
24
2010
Cryptography secure against related-key attacks and tampering. Zbl 1227.94028
Bellare, Mihir; Cash, David; Miller, Rachel
24
2011
Efficient authentication from hard learning problems. Zbl 1281.94083
Kiltz, Eike; Pietrzak, Krzysztof; Cash, David; Jain, Abhishek; Venturi, Daniele
13
2011
Foundations of non-malleable hash and one-way functions. Zbl 1267.94042
Boldyreva, Alexandra; Cash, David; Fischlin, Marc; Warinschi, Bogdan
11
2009
Intrusion-resilient key exchange in the bounded retrieval model. Zbl 1156.94338
Cash, David; Ding, Yan Zong; Dodis, Yevgeniy; Lee, Wenke; Lipton, Richard; Walfish, Shabsi
11
2007
Targeted homomorphic attribute-based encryption. Zbl 1394.94928
Brakerski, Zvika; Cash, David; Tsabary, Rotem; Wee, Hoeteck
9
2016
Cryptographic agility and its relation to circular encryption. Zbl 1280.94034
Acar, Tolga; Belenkiy, Mira; Bellare, Mihir; Cash, David
9
2010
New definitions and separations for circular security. Zbl 1300.94044
Cash, David; Green, Matthew; Hohenberger, Susan
9
2012
The locality of searchable symmetric encryption. Zbl 1332.94061
Cash, David; Tessaro, Stefano
8
2014
Memory-tight reductions. Zbl 1407.94076
Auerbach, Benedikt; Cash, David; Fersch, Manuel; Kiltz, Eike
5
2017
Dynamic proofs of retrievability via oblivious RAM. Zbl 1306.94037
Cash, David; Küpçü, Alptekin; Wichs, Daniel
5
2013
The twin Diffie-Hellman problem and applications. Zbl 1220.94034
Cash, David; Kiltz, Eike; Shoup, Victor
4
2009
Two-round man-in-the-middle security from LPN. Zbl 1378.94074
Cash, David; Kiltz, Eike; Tessaro, Stefano
4
2016
A ciphertext-size lower bound for order-preserving encryption with limited leakage. Zbl 1430.94062
Cash, David; Zhang, Cong
1
2018
Combiners for chosen-ciphertext security. Zbl 1394.94944
Zhang, Cong; Cash, David; Wang, Xiuhua; Yu, Xiaoqi; Chow, Sherman S. M.
1
2016
Efficient authentication from hard learning problems. Zbl 1386.94096
Kiltz, Eike; Pietrzak, Krzysztof; Venturi, Daniele; Cash, David; Jain, Abhishek
1
2017
Dynamic proofs of retrievability via oblivious RAM. Zbl 1372.68085
Cash, David; Küpçü, Alptekin; Wichs, Daniel
1
2017
A lower bound for one-round oblivious RAM. Zbl 07437003
Cash, David; Drucker, Andrew; Hoover, Alexander
1
2020
Digital signatures from strong RSA without prime generation. Zbl 1345.94048
Cash, David; Dowsley, Rafael; Kiltz, Eike
1
2015
Parameter-hiding order revealing encryption. Zbl 1440.68055
Cash, David; Liu, Feng-Hao; O’Neill, Adam; Zhandry, Mark; Zhang, Cong
1
2018
A lower bound for one-round oblivious RAM. Zbl 07437003
Cash, David; Drucker, Andrew; Hoover, Alexander
1
2020
A ciphertext-size lower bound for order-preserving encryption with limited leakage. Zbl 1430.94062
Cash, David; Zhang, Cong
1
2018
Parameter-hiding order revealing encryption. Zbl 1440.68055
Cash, David; Liu, Feng-Hao; O’Neill, Adam; Zhandry, Mark; Zhang, Cong
1
2018
Memory-tight reductions. Zbl 1407.94076
Auerbach, Benedikt; Cash, David; Fersch, Manuel; Kiltz, Eike
5
2017
Efficient authentication from hard learning problems. Zbl 1386.94096
Kiltz, Eike; Pietrzak, Krzysztof; Venturi, Daniele; Cash, David; Jain, Abhishek
1
2017
Dynamic proofs of retrievability via oblivious RAM. Zbl 1372.68085
Cash, David; Küpçü, Alptekin; Wichs, Daniel
1
2017
Targeted homomorphic attribute-based encryption. Zbl 1394.94928
Brakerski, Zvika; Cash, David; Tsabary, Rotem; Wee, Hoeteck
9
2016
Two-round man-in-the-middle security from LPN. Zbl 1378.94074
Cash, David; Kiltz, Eike; Tessaro, Stefano
4
2016
Combiners for chosen-ciphertext security. Zbl 1394.94944
Zhang, Cong; Cash, David; Wang, Xiuhua; Yu, Xiaoqi; Chow, Sherman S. M.
1
2016
Digital signatures from strong RSA without prime generation. Zbl 1345.94048
Cash, David; Dowsley, Rafael; Kiltz, Eike
1
2015
The locality of searchable symmetric encryption. Zbl 1332.94061
Cash, David; Tessaro, Stefano
8
2014
Highly-scalable searchable symmetric encryption with support for Boolean queries. Zbl 1311.68057
Cash, David; Jarecki, Stanislaw; Jutla, Charanjit; Krawczyk, Hugo; Roşu, Marcel-Cătălin; Steiner, Michael
26
2013
Dynamic proofs of retrievability via oblivious RAM. Zbl 1306.94037
Cash, David; Küpçü, Alptekin; Wichs, Daniel
5
2013
Bonsai trees, or how to delegate a lattice basis. Zbl 1277.94017
Cash, David; Hofheinz, Dennis; Kiltz, Eike; Peikert, Chris
29
2012
New definitions and separations for circular security. Zbl 1300.94044
Cash, David; Green, Matthew; Hohenberger, Susan
9
2012
Cryptography secure against related-key attacks and tampering. Zbl 1227.94028
Bellare, Mihir; Cash, David; Miller, Rachel
24
2011
Efficient authentication from hard learning problems. Zbl 1281.94083
Kiltz, Eike; Pietrzak, Krzysztof; Cash, David; Jain, Abhishek; Venturi, Daniele
13
2011
Bonsai trees, or how to delegate a lattice basis. Zbl 1280.94043
Cash, David; Hofheinz, Dennis; Kiltz, Eike; Peikert, Chris
100
2010
Pseudorandom functions and permutations provably secure against related-key attacks. Zbl 1283.94050
Bellare, Mihir; Cash, David
24
2010
Cryptographic agility and its relation to circular encryption. Zbl 1280.94034
Acar, Tolga; Belenkiy, Mira; Bellare, Mihir; Cash, David
9
2010
Fast cryptographic primitives and circular-secure encryption based on hard learning problems. Zbl 1252.94044
Applebaum, Benny; Cash, David; Peikert, Chris; Sahai, Amit
90
2009
Foundations of non-malleable hash and one-way functions. Zbl 1267.94042
Boldyreva, Alexandra; Cash, David; Fischlin, Marc; Warinschi, Bogdan
11
2009
The twin Diffie-Hellman problem and applications. Zbl 1220.94034
Cash, David; Kiltz, Eike; Shoup, Victor
4
2009
The twin Diffie-Hellman problem and applications. Zbl 1149.94307
Cash, David; Kiltz, Eike; Shoup, Victor
39
2008
Intrusion-resilient key exchange in the bounded retrieval model. Zbl 1156.94338
Cash, David; Ding, Yan Zong; Dodis, Yevgeniy; Lee, Wenke; Lipton, Richard; Walfish, Shabsi
11
2007
all top 5

Cited by 627 Authors

11 Susilo, Willy
11 Wang, Huaxiong
10 Hanaoka, Goichiro
10 Matsuda, Takahiro
10 Segev, Gil
9 Hofheinz, Dennis
9 Kiltz, Eike
9 Ling, San
9 Nguyen, Khoa
8 Wichs, Daniel
8 Yamada, Shota
8 Zhang, Jiang
7 Brakerski, Zvika
7 Hu, Yupu
7 Katsumata, Shuichi
7 Peikert, Chris
7 Venturi, Daniele
7 Waters, Brent
6 Libert, Benoît
6 Tanaka, Keisuke
6 Wang, Baocang
6 Wee, Hoeteck
5 Abdalla, Michel
5 Albrecht, Martin R.
5 Canetti, Ran
5 Cash, David M.
5 Chen, Yu
5 Duong, Dung Hoang
5 Emura, Keita
5 Hajiabadi, Mohammad
5 Mouhartem, Fabrice
5 Mu, Yi
5 Park, Jonghwan
5 Paterson, Kenneth G.
5 Prest, Thomas
5 Sarathi Roy, Partha
5 Stehlé, Damien
5 Steinfeld, Ron
5 Takayasu, Atsushi
5 Vaikuntanathan, Vinod
5 Vaudenay, Serge
5 Yu, Yu
4 Applebaum, Benny
4 Boyen, Xavier
4 Chen, Yilei
4 Goyal, Rishab
4 Gu, Dawu
4 Guo, Fuchun
4 Komargodski, Ilan
4 Koppula, Venkata
4 Lai, Qiqi
4 Pan, Jiaxin
4 Pietrzak, Krzysztof
4 Qin, Baodong
4 Sun, Shifeng
4 Tessaro, Stefano
4 Watanabe, Yodai
4 Wu, David J.
4 Xagawa, Keita
4 Xue, Rui
3 Al-Kuwari, Saif
3 Asharov, Gilad
3 Benhamouda, Fabrice
3 Bogos, Sonia
3 Boneh, Dan
3 Chen, Jie
3 Damgård, Ivan Bjerre
3 Dung Hoang Duong
3 Farshim, Pooya
3 Fouque, Pierre-Alain
3 Fujioka, Atsushi
3 Fujisaki, Eiichiro
3 Garg, Sanjam
3 Gentry, Craig
3 Guo, Qian
3 Halevi, Shai
3 Han, Shuai
3 Jager, Tibor
3 Jain, Aayush
3 Johansson, Thomas
3 Kamara, Seny
3 Kapron, Bruce M.
3 Kitagawa, Fuyuki
3 Kurosawa, Kaoru
3 Li, Qinyi
3 Liu, Feng-Hao
3 Liu, Joseph K. K.
3 Liu, Shengli
3 Lu, Xianhui
3 Luo, Fucai
3 Lyubashevsky, Vadim
3 Ma, Jianfeng
3 Masny, Daniel
3 Micciancio, Daniele
3 Nishimaki, Ryo
3 Roux-Langlois, Adeline
3 Sakzad, Amin
3 Shahaf, Ido
3 Tibouchi, Mehdi
3 Wang, Zhedong
...and 527 more Authors

Citations by Year