Adam O'Neill
Adam O'Neill
Verified email at - Homepage
Cited by
Cited by
Order-preserving symmetric encryption
A Boldyreva, N Chenette, Y Lee, A O’neill
Annual International Conference on the Theory and Applications of …, 2009
Deterministic and efficiently searchable encryption
M Bellare, A Boldyreva, A O’Neill
Annual International Cryptology Conference, 535-552, 2007
Order-preserving encryption revisited: Improved security analysis and alternative solutions
A Boldyreva, N Chenette, A O’Neill
Annual Cryptology Conference, 578-595, 2011
Definitional issues in functional encryption
A O'Neill
Cryptology ePrint Archive, 2010
On notions of security for deterministic encryption, and efficient constructions without random oracles
A Boldyreva, S Fehr, A O’Neill
Annual International Cryptology Conference, 335-359, 2008
Generic attacks on secure outsourced databases
G Kellaris, G Kollios, K Nissim, A O'neill
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing
A Boldyreva, C Gentry, A O'Neill, DH Yum
Proceedings of the 14th ACM conference on Computer and communications …, 2007
Deterministic encryption: Definitional equivalences and constructions without random oracles
M Bellare, M Fischlin, A O’Neill, T Ristenpart
Annual International Cryptology Conference, 360-378, 2008
Bi-deniable public-key encryption
A O’Neill, C Peikert, B Waters
Annual Cryptology Conference, 525-542, 2011
Correlated-input secure hash functions
V Goyal, A O’Neill, V Rao
Theory of Cryptography Conference, 182-200, 2011
Instantiability of RSA-OAEP under chosen-plaintext attack
E Kiltz, A O’Neill, A Smith
Annual Cryptology Conference, 295-313, 2010
On the achievability of simulation-based security for functional encryption
AD Caro, V Iovino, A Jain, A O’Neill, O Paneth, G Persiano
Annual Cryptology Conference, 519-535, 2013
A unified approach to deterministic encryption: New constructions and a connection to computational entropy
B Fuller, A O’neill, L Reyzin
Journal of Cryptology 28 (3), 671-717, 2015
Adaptive trapdoor functions and chosen-ciphertext security
E Kiltz, P Mohassel, A O’Neill
Annual International Conference on the Theory and Applications of …, 2010
Provably-secure schemes for basic query support in outsourced databases
G Amanatidis, A Boldyreva, A O’Neill
IFIP Annual Conference on Data and Applications Security and Privacy, 14-30, 2007
Modular order-preserving encryption, revisited
C Mavroforakis, N Chenette, A O'Neill, G Kollios, R Canetti
Proceedings of the 2015 ACM SIGMOD International Conference on Management of …, 2015
Semantically-secure functional encryption: Possibility results, impossibility results and the quest for a general definition
M Bellare, A O’Neill
International Conference on Cryptology and Network Security, 218-234, 2013
Dual form signatures: An approach for proving security from static assumptions
M Gerbush, A Lewko, A O’Neill, B Waters
International Conference on the Theory and Application of Cryptology and …, 2012
Reducing the leakage in practical order-revealing encryption
D Cash, FH Liu, A O'Neill, C Zhang
Cryptology ePrint Archive, 2016
Accessing data while preserving privacy
G Kellaris, G Kollios, K Nissim, A O’Neill
CoRR, abs/1706.01552 5, 2017
The system can't perform the operation now. Try again later.
Articles 1–20