Volgen
Shahram Khazaei
Shahram Khazaei
Geverifieerd e-mailadres voor sharif.edu
Titel
Geciteerd door
Geciteerd door
Jaar
New features of Latin dances: analysis of Salsa, ChaCha, and Rumba
JP Aumasson, S Fischer, S Khazaei, W Meier, C Rechberger
International Workshop on Fast Software Encryption, 470-488, 2008
1762008
Chosen IV statistical analysis for key recovery attacks on stream ciphers
S Fischer, S Khazaei, W Meier
Progress in Cryptology–AFRICACRYPT 2008: First International Conference on …, 2008
1232008
Randomized partial checking revisited
S Khazaei, D Wikström
Topics in Cryptology–CT-RSA 2013: The Cryptographers’ Track at the RSA …, 2013
522013
Distinguishing Attack on Grain. ECRYPT Stream Cipher Project Report 2005/071 (2005)
S Khazaei, M Hassanzadeh, M Kiaei
ECRYPT Stream Cipher Project Report 6477 (2005/071), 130-145, 2005
39*2005
Evaluation of SOSEMANUK With Regard to Guess-and-Determine Attacks, eSTREAM report 2006/009 (2006)
Y Tsunoo, T Saito, M Shigeri, T Suzaki, H Ahmadi, T Eghlidos, S Khazaei
URL: http://www. ecrypt. eu. org/stream/papers. html. Citations in this …, 0
36*
Linear Sequential Circuit Approximation of Grain and Trivium Stream Ciphers. eSTREAM
S Khazaei, MM Hasanzadeh, MS Kiaei
ECRYPT Stream Cipher Project, Report 63, 2005, 2005
34*2005
Publicly verifiable searchable symmetric encryption based on efficient cryptographic components
A Soleimanian, S Khazaei
Designs, Codes and Cryptography 87 (1), 123-147, 2019
332019
A mix-net from any CCA2 secure cryptosystem
S Khazaei, T Moran, D Wikström
Advances in Cryptology–ASIACRYPT 2012: 18th International Conference on the …, 2012
332012
Linearization Framework for Collision Attacks: Application to CubeHash and MD6.
E Brier, S Khazaei, W Meier, T Peyrin
ASIACRYPT 9, 560-577, 2009
272009
Cryptanalysis of a Universally Verifiable Efficient Re-encryption Mixnet.
S Khazaei, B Terelius, D Wikström
EVT/WOTE, 2012
172012
Optimal linear secret sharing schemes for graph access structures on six participants
M Gharahi, S Khazaei
Theoretical Computer Science 771, 1-8, 2019
142019
New directions in cryptanalysis of self-synchronizing stream ciphers
S Khazaei, W Meier
Progress in Cryptology-INDOCRYPT 2008: 9th International Conference on …, 2008
132008
Reduced complexity attacks on the alternating step generator
S Khazaei, S Fischer, W Meier
Selected Areas in Cryptography: 14th International Workshop, SAC 2007 …, 2007
122007
On abelian and homomorphic secret sharing schemes
A Jafari, S Khazaei
Journal of Cryptology 34, 1-36, 2021
11*2021
Ciphertext-only attack on d× d Hill in O (d13d)
S Khazaei, S Ahmadi
Information Processing Letters 118, 25-29, 2017
112017
On reconstruction of RC4 keys from internal states
S Khazaei, W Meier
Mathematical Methods in Computer Science: Essays in Memory of Thomas Beth …, 2008
112008
Cryptanalysis of Pomaranch (CJCSG)
S Khazaei
eSTREAM, ECRYPT Stream Cipher Project, Report 65, 2005, 2005
11*2005
A rigorous security analysis of a decentralized electronic voting protocol in the universal composability framework
S Khazaei, M Rezaei-Aliabadi
Journal of information security and applications 43, 99-109, 2018
82018
Return code schemes for electronic voting systems
S Khazaei, D Wikström
Electronic Voting: Second International Joint Conference, E-Vote-ID 2017 …, 2017
82017
Divide and conquer attack on ABC stream cipher. eSTREAM, ECRYPT Stream Cipher Project, Report 2005/052, 2005
S Khazaei
8*
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20