Karim Baghery

Orcid: 0000-0001-7213-8496

According to our database1, Karim Baghery authored at least 35 papers between 2014 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Traceable Verifiable Secret Sharing and Applications.
IACR Cryptol. ePrint Arch., 2025

On Round-Optimal Computational VSS.
IACR Commun. Cryptol., 2025

Π: A Unified Framework for Computational Verifiable Secret Sharing.
Proceedings of the Public-Key Cryptography - PKC 2025, 2025

Pre-constructed Publicly Verifiable Secret Sharing and Applications.
Proceedings of the Applied Cryptography and Network Security, 2025

2024
Simulation extractable versions of Groth's zk-SNARK revisited.
Int. J. Inf. Sec., February, 2024

Verifiable FHE via Lattice-based SNARKs.
IACR Commun. Cryptol., 2024

2023
Π: A Unified Framework for Verifiable Secret Sharing.
IACR Cryptol. ePrint Arch., 2023

Benchmarking the Setup of Updatable Zk-SNARKs.
Proceedings of the Progress in Cryptology - LATINCRYPT 2023, 2023

VSS from Distributed ZK Proofs and Applications.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

Practical Robust DKG Protocols for CSIDH.
Proceedings of the Applied Cryptography and Network Security, 2023

CSI-SharK: CSI-FiSh with Sharing-friendly Keys.
Proceedings of the Information Security and Privacy - 28th Australasian Conference, 2023

2022
Updatable NIZKs from Non-Interactive Zaps.
Proceedings of the Cryptology and Network Security - 21st International Conference, 2022

2021
An Isogeny-Based ID Protocol Using Structured Public Keys.
Proceedings of the Cryptography and Coding - 18th IMA International Conference, 2021

Another Look at Extraction and Randomization of Groth's zk-SNARK.
Proceedings of the Financial Cryptography and Data Security, 2021

Compilation of Function Representations for Secure Computing Paradigms.
Proceedings of the Topics in Cryptology - CT-RSA 2021, 2021

Tiramisu: Black-Box Simulation Extractable NIZKs in the Updatable CRS Model.
Proceedings of the Cryptology and Network Security - 20th International Conference, 2021

2020
Signatures of Knowledge for Boolean Circuits under Standard Assumptions (Full version).
IACR Cryptol. ePrint Arch., 2020

Subversion-Resistant Commitment Schemes: Definitions and Constructions.
Proceedings of the Security and Trust Management - 16th International Workshop, 2020

Simulation Extractable Versions of Groth's zk-SNARK Revisited.
Proceedings of the Cryptology and Network Security - 19th International Conference, 2020

Signatures of Knowledge for Boolean Circuits Under Standard Assumptions.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2020, 2020

2019
Breaking anonymity of some recent lightweight RFID authentication protocols.
Wirel. Networks, 2019

Subversion-Resistant Simulation (Knowledge) Sound NIZKs.
Proceedings of the Cryptography and Coding - 17th IMA International Conference, 2019

Simulation Extractability in Groth's zk-SNARK.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2019

On the Efficiency of Privacy-Preserving Smart Contract Systems.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2019, 2019

UC-Secure CRS Generation for SNARKs.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2019, 2019

DL-Extractable UC-Commitment Schemes.
Proceedings of the Applied Cryptography and Network Security, 2019

2017
Game-Based Privacy Analysis of RFID Security Schemes for Confident Authentication in IoT.
Wirel. Pers. Commun., 2017

A Subversion-Resistant SNARK.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

2016
Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags.
IACR Cryptol. ePrint Arch., 2016

Game-Based Privacy Analysis of RFID Security Schemes for Confident Au-thentication in IoT.
IACR Cryptol. ePrint Arch., 2016

Analysis of Xiao et al.'s authentication protocol conforming to EPC C1 G2 standard.
Proceedings of the 8th International Symposium on Telecommunications, 2016

2015
Traceability Analysis of Recent RFID Authentication Protocols.
Wirel. Pers. Commun., 2015

Enhancing privacy of recent authentication schemes for low-cost RFID systems.
ISC Int. J. Inf. Secur., 2015

Analysis of an RFID Authentication Protocol in Accordance with EPC Standards.
IACR Cryptol. ePrint Arch., 2015

2014
Privacy analysis and improvements of two recent RFID authentication protocols.
Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014


  Loading...