Behzad Abdolmaleki

According to our database1, Behzad Abdolmaleki authored at least 26 papers between 2014 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
stoRNA: Stateless Transparent Proofs of Storage-time.
IACR Cryptol. ePrint Arch., 2023

Universally Composable NIZKs: Circuit-Succinct, Non-Malleable and CRS-Updatable.
IACR Cryptol. ePrint Arch., 2023

On Quantum Simulation-Soundness.
IACR Cryptol. ePrint Arch., 2023

2022
CRS-Updatable Asymmetric Quasi-Adaptive NIZK Arguments.
IACR Cryptol. ePrint Arch., 2022

Steganography-Free Zero-Knowledge.
IACR Cryptol. ePrint Arch., 2022

Two-Round Concurrent 2PC from Sub-Exponential LWE.
IACR Cryptol. ePrint Arch., 2022

2021
On Subversion-Resistant SNARKs.
J. Cryptol., 2021

Updatable Trapdoor SPHFs: Modular Construction of Updatable Zero-Knowledge Arguments and More.
IACR Cryptol. ePrint Arch., 2021

Smooth Zero-Knowledge Hash Functions.
IACR Cryptol. ePrint Arch., 2021

Subversion-Resistant Quasi-adaptive NIZK and Applications to Modular Zk-SNARKs.
Proceedings of the Cryptology and Network Security - 20th International Conference, 2021

2020
Unbounded Simulation-Sound Subversion Resistant Quasi-Adaptive NIZK Proofs and Applications to Modular zk-SNARKs.
IACR Cryptol. ePrint Arch., 2020

Lift-and-Shift: Obtaining Simulation Extractable Subversion and Updatable SNARKs Generically.
IACR Cryptol. ePrint Arch., 2020

2019
Breaking anonymity of some recent lightweight RFID authentication protocols.
Wirel. Networks, 2019

A Framework for UC-Secure Commitments from Publicly Computable Smooth Projective Hashing.
IACR Cryptol. ePrint Arch., 2019

UC-Secure CRS Generation for SNARKs.
IACR Cryptol. ePrint Arch., 2019

DL-Extractable UC-Commitment Schemes.
IACR Cryptol. ePrint Arch., 2019

2018
On QA-NIZK in the BPK Model.
IACR Cryptol. ePrint Arch., 2018

2017
Game-Based Privacy Analysis of RFID Security Schemes for Confident Authentication in IoT.
Wirel. Pers. Commun., 2017

A Subversion-Resistant SNARK.
IACR Cryptol. ePrint Arch., 2017

2016
Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags.
IACR Cryptol. ePrint Arch., 2016

Game-Based Privacy Analysis of RFID Security Schemes for Confident Au-thentication in IoT.
IACR Cryptol. ePrint Arch., 2016

Analysis of Xiao et al.'s authentication protocol conforming to EPC C1 G2 standard.
Proceedings of the 8th International Symposium on Telecommunications, 2016

2015
Traceability Analysis of Recent RFID Authentication Protocols.
Wirel. Pers. Commun., 2015

Enhancing privacy of recent authentication schemes for low-cost RFID systems.
ISC Int. J. Inf. Secur., 2015

Analysis of an RFID Authentication Protocol in Accordance with EPC Standards.
IACR Cryptol. ePrint Arch., 2015

2014
Privacy analysis and improvements of two recent RFID authentication protocols.
Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014


  Loading...