Setareh Sharifian

According to our database1, Setareh Sharifian authored at least 15 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
CCA-Secure Hybrid Encryption in Correlated Randomness Model and KEM Combiners.
CoRR, 2024

2021
Identifiable Cheating Entity Flexible Round-Optimized Schnorr Threshold (ICE FROST) Signature Protocol.
IACR Cryptol. ePrint Arch., 2021

Hybrid Encryption in Correlated Randomness Model.
Proceedings of the IEEE Information Theory Workshop, 2021

Information-theoretic Key Encapsulation and its Application to Secure Communication.
Proceedings of the IEEE International Symposium on Information Theory, 2021

Privacy-Preserving Resource Sharing Using Permissioned Blockchains - (The Case of Smart Neighbourhood).
Proceedings of the Financial Cryptography and Data Security. FC 2021 International Workshops, 2021

2020
Contributions to Information Theoretically Secure Communication.
PhD thesis, 2020

A Capacity-achieving One-way Key Agreement with Improved Finite Blocklength Analysis.
Proceedings of the International Symposium on Information Theory and Its Applications, 2020

2019
A One-Round Key Agreement Protocol with Information-Theoretic Security.
CoRR, 2019

A Modular Semantically Secure Wiretap Code with Shared Key for Weakly Symmetric Channels.
Proceedings of the 2019 IEEE Information Theory Workshop, 2019

2018
Post-quantum Security using Channel Noise.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
A Virtual Wiretap Channel for Secure MessageTransmission.
IACR Cryptol. ePrint Arch., 2017

Secret key agreement using a virtual wiretap channel.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

2016
A Virtual Wiretap Channel for Secure Message Transmission.
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016

2013
A True Random Generator Using Human Gameplay.
Proceedings of the Decision and Game Theory for Security - 4th International Conference, 2013

2010
Fuzzy Nash equilibrium in fuzzy games using ranking fuzzy numbers.
Proceedings of the FUZZ-IEEE 2010, 2010


  Loading...