Follow
Adam O'Neill
Adam O'Neill
Verified email at cs.umass.edu - Homepage
Title
Cited by
Cited by
Year
Order-preserving symmetric encryption
A Boldyreva, N Chenette, Y Lee, A O’neill
Advances in Cryptology-EUROCRYPT 2009: 28th Annual International Conference …, 2009
11972009
Deterministic and efficiently searchable encryption
M Bellare, A Boldyreva, A O’Neill
Advances in Cryptology-CRYPTO 2007: 27th Annual International Cryptology …, 2007
10632007
Order-preserving encryption revisited: Improved security analysis and alternative solutions
A Boldyreva, N Chenette, A O’Neill
Advances in Cryptology–CRYPTO 2011: 31st Annual Cryptology Conference, Santa …, 2011
6562011
Definitional issues in functional encryption
A O'Neill
Cryptology ePrint Archive, 2010
3082010
Generic attacks on secure outsourced databases
G Kellaris, G Kollios, K Nissim, A O'neill
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
2622016
On notions of security for deterministic encryption, and efficient constructions without random oracles
A Boldyreva, S Fehr, A O’Neill
Advances in Cryptology–CRYPTO 2008: 28th Annual International Cryptology …, 2008
2592008
Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing
A Boldyreva, C Gentry, A O'Neill, DH Yum
Proceedings of the 14th ACM conference on Computer and communications …, 2007
2112007
Deterministic encryption: Definitional equivalences and constructions without random oracles
M Bellare, M Fischlin, A O’Neill, T Ristenpart
Advances in Cryptology–CRYPTO 2008: 28th Annual International Cryptology …, 2008
1972008
Bi-deniable public-key encryption
A O’Neill, C Peikert, B Waters
Advances in Cryptology–CRYPTO 2011: 31st Annual Cryptology Conference, Santa …, 2011
1362011
Correlated-Input Secure Hash Functions.
V Goyal, A O'Neill, V Rao
TCC 6597, 182-200, 2011
1242011
Instantiability of RSA-OAEP under chosen-plaintext attack
E Kiltz, A O’Neill, A Smith
Journal of Cryptology 30 (3), 889-919, 2017
1152017
On the achievability of simulation-based security for functional encryption
A De Caro, V Iovino, A Jain, A O’Neill, O Paneth, G Persiano
Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013
1092013
A unified approach to deterministic encryption: New constructions and a connection to computational entropy
B Fuller, A O’neill, L Reyzin
Journal of Cryptology 28, 671-717, 2015
1012015
Provably-secure schemes for basic query support in outsourced databases
G Amanatidis, A Boldyreva, A O’Neill
Data and Applications Security XXI: 21st Annual IFIP WG 11.3 Working …, 2007
932007
Modular order-preserving encryption, revisited
C Mavroforakis, N Chenette, A O'Neill, G Kollios, R Canetti
Proceedings of the 2015 ACM SIGMOD International Conference on Management of …, 2015
922015
Adaptive trapdoor functions and chosen-ciphertext security
E Kiltz, P Mohassel, A O’Neill
Advances in Cryptology–EUROCRYPT 2010: 29th Annual International Conference …, 2010
922010
Semantically-secure functional encryption: Possibility results, impossibility results and the quest for a general definition
M Bellare, A O’Neill
Cryptology and Network Security: 12th International Conference, CANS 2013 …, 2013
692013
Dual form signatures: An approach for proving security from static assumptions
M Gerbush, A Lewko, A O’Neill, B Waters
Advances in Cryptology–ASIACRYPT 2012: 18th International Conference on the …, 2012
542012
Accessing data while preserving privacy
G Kellaris, G Kollios, K Nissim, A O’Neill
CoRR, abs/1706.01552 5, 2017
352017
Reducing the leakage in practical order-revealing encryption
D Cash, FH Liu, A O'Neill, C Zhang
Cryptology ePrint Archive, 2016
352016
The system can't perform the operation now. Try again later.
Articles 1–20