Behzad Abdolmaleki
Orcid: 0009-0008-8335-2787
According to our database1,
Behzad Abdolmaleki
authored at least 35 papers
between 2014 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
A Generic Framework for Practical Lattice-Based Non-interactive Publicly Verifiable Secret Sharing.
IACR Cryptol. ePrint Arch., 2025
IACR Cryptol. ePrint Arch., 2025
IACR Commun. Cryptol., 2025
PGUS: Pretty Good User Security for Thick MVNOs with a Novel Sanitizable Blind Signature.
Proceedings of the IEEE Symposium on Security and Privacy, 2025
2024
Attribute-Based Threshold Issuance Anonymous Counting Tokens and Its Application to Sybil-Resistant Self-Sovereign Identity.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Proceedings of the Security and Cryptography for Networks - 14th International Conference, 2024
Proceedings of the 37th IEEE Computer Security Foundations Symposium, 2024
Strong Privacy-Preserving Universally Composable AKA Protocol with Seamless Handover Support for Mobile Virtual Network Operator.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Computer Security - ESORICS 2023, 2023
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023
2022
Proceedings of the Theory of Cryptography - 20th International Conference, 2022
Proceedings of the Progress in Cryptology - INDOCRYPT 2022, 2022
2021
Proceedings of the Progress in Cryptology - INDOCRYPT 2021, 2021
Proceedings of the Cryptology and Network Security - 20th International Conference, 2021
Updatable Trapdoor SPHFs: Modular Construction of Updatable Zero-Knowledge Arguments and More.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021
2020
Unbounded Simulation-Sound Subversion Resistant Quasi-Adaptive NIZK Proofs and Applications to Modular zk-SNARKs.
IACR Cryptol. ePrint Arch., 2020
Proceedings of the Public-Key Cryptography - PKC 2020, 2020
Lift-and-Shift: Obtaining Simulation Extractable Subversion and Updatable SNARKs Generically.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
Wirel. Networks, 2019
A Framework for UC-Secure Commitments from Publicly Computable Smooth Projective Hashing.
Proceedings of the Cryptography and Coding - 17th IMA International Conference, 2019
Proceedings of the Progress in Cryptology - AFRICACRYPT 2019, 2019
Proceedings of the Applied Cryptography and Network Security, 2019
2017
Game-Based Privacy Analysis of RFID Security Schemes for Confident Authentication in IoT.
Wirel. Pers. Commun., 2017
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017
2016
Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags.
IACR Cryptol. ePrint Arch., 2016
Game-Based Privacy Analysis of RFID Security Schemes for Confident Au-thentication in IoT.
IACR Cryptol. ePrint Arch., 2016
Proceedings of the 8th International Symposium on Telecommunications, 2016
2015
Wirel. Pers. Commun., 2015
ISC Int. J. Inf. Secur., 2015
IACR Cryptol. ePrint Arch., 2015
2014
Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014