Shahram Khazaei
Shahram Khazaei
Geverifieerd e-mailadres voor sharif.edu
Geciteerd door
Geciteerd door
New features of Latin dances: analysis of Salsa, ChaCha, and Rumba
JP Aumasson, S Fischer, S Khazaei, W Meier, C Rechberger
International Workshop on Fast Software Encryption, 470-488, 2008
Chosen IV statistical analysis for key recovery attacks on stream ciphers
S Fischer, S Khazaei, W Meier
International Conference on Cryptology in Africa, 236-245, 2008
Randomized partial checking revisited
S Khazaei, D Wikström
Cryptographers’ Track at the RSA Conference, 115-128, 2013
Distinguishing Attack on Grain. ECRYPT Stream Cipher Project Report 2005/071 (2005)
S Khazaei, M Hassanzadeh, M Kiaei
ECRYPT Stream Cipher Project Report 6477 (2005/071), 130-145, 2005
Linear Sequential Circuit Approximation of Grain and Trivium Stream Ciphers. eSTREAM
S Khazaei, MM Hasanzadeh, MS Kiaei
ECRYPT Stream Cipher Project, Report 63, 2005, 2005
Evaluation of SOSEMANUK With Regard to Guess-and-Determine Attacks, eSTREAM report 2006/009 (2006)
Y Tsunoo, T Saito, M Shigeri, T Suzaki, H Ahmadi, T Eghlidos, S Khazaei
URL: http://www. ecrypt. eu. org/stream/papers. html. Citations in this …, 0
A mix-net from any CCA2 secure cryptosystem
S Khazaei, T Moran, D Wikström
International Conference on the Theory and Application of Cryptology and …, 2012
Linearization framework for collision attacks: Application to CubeHash and MD6
E Brier, S Khazaei, W Meier, T Peyrin
International Conference on the Theory and Application of Cryptology and …, 2009
Publicly verifiable searchable symmetric encryption based on efficient cryptographic components
A Soleimanian, S Khazaei
Designs, Codes and Cryptography 87 (1), 123-147, 2019
Cryptanalysis of a Universally Verifiable Efficient Re-encryption Mixnet.
S Khazaei, B Terelius, D Wikström
EVT/WOTE, 2012
Optimal linear secret sharing schemes for graph access structures on six participants
M Gharahi, S Khazaei
Theoretical Computer Science 771, 1-8, 2019
New directions in cryptanalysis of self-synchronizing stream ciphers
S Khazaei, W Meier
International Conference on Cryptology in India, 15-26, 2008
Reduced complexity attacks on the alternating step generator
S Khazaei, S Fischer, W Meier
International Workshop on Selected Areas in Cryptography, 1-16, 2007
On reconstruction of RC4 keys from internal states
S Khazaei, W Meier
Mathematical Methods in Computer Science, 179-189, 2008
Cryptanalysis of Pomaranch (CJCSG)
S Khazaei
eSTREAM, ECRYPT Stream Cipher Project, Report 65, 2005, 2005
Ciphertext-only attack on d× d Hill in O (d13d)
S Khazaei, S Ahmadi
Information Processing Letters 118, 25-29, 2017
On abelian and homomorphic secret sharing schemes
A Jafari, S Khazaei
Journal of Cryptology 34 (4), 1-36, 2021
Divide and conquer attack on ABC stream cipher. eSTREAM, ECRYPT Stream Cipher Project, Report 2005/052, 2005
S Khazaei
A rigorous security analysis of a decentralized electronic voting protocol in the universal composability framework
S Khazaei, M Rezaei-Aliabadi
Journal of information security and applications 43, 99-109, 2018
On group-characterizability of homomorphic secret sharing schemes
R Kaboli, S Khazaei, M Parviz
Theoretical Computer Science 891, 116-130, 2021
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20