Shahram Khazaei

Orcid: 0000-0002-2493-8840

According to our database1, Shahram Khazaei authored at least 39 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Partial Secret Sharing Schemes.
IEEE Trans. Inf. Theory, August, 2023

Randomness Recoverable Secret Sharing Schemes.
IACR Cryptol. ePrint Arch., 2023

On ideal and weakly-ideal access structures.
Adv. Math. Commun., 2023

2022
Towards More Secure Constructions of Adjustable Join Schemes.
IEEE Trans. Dependable Secur. Comput., 2022

2021
On group-characterizability of homomorphic secret sharing schemes.
Theor. Comput. Sci., 2021

On Abelian and Homomorphic Secret Sharing Schemes.
J. Cryptol., 2021

On ideal homomorphic secret sharing schemes and their decomposition.
Des. Codes Cryptogr., 2021

Private Set Operations Over Encrypted Cloud Dataset and Applications.
Comput. J., 2021

2020
Security of Multi-Adjustable Join Schemes: Separations and Implications.
IACR Cryptol. ePrint Arch., 2020

2019
Breaking anonymity of some recent lightweight RFID authentication protocols.
Wirel. Networks, 2019

Optimal linear secret sharing schemes for graph access structures on six participants.
Theor. Comput. Sci., 2019

Multi-Adjustable Join Scheme.
IACR Cryptol. ePrint Arch., 2019

A Candidate Access Structure for Super-polynomial Lower Bound on Information Ratio.
IACR Cryptol. ePrint Arch., 2019

Group-homomorphic Secret Sharing Schemes Are Group-characterizable with Normal Subgroups.
IACR Cryptol. ePrint Arch., 2019

On Abelian Secret Sharing: duality and separation.
IACR Cryptol. ePrint Arch., 2019

Publicly verifiable searchable symmetric encryption based on efficient cryptographic components.
Des. Codes Cryptogr., 2019

2018
A rigorous security analysis of a decentralized electronic voting protocol in the universal composability framework.
J. Inf. Secur. Appl., 2018

Conjecturally Superpolynomial Lower Bound for Share Size.
IACR Cryptol. ePrint Arch., 2018

Reduced access structures with four minimal qualified subsets on six participants.
Adv. Math. Commun., 2018

2017
Game-Based Privacy Analysis of RFID Security Schemes for Confident Authentication in IoT.
Wirel. Pers. Commun., 2017

On the computational complexity of finding a minimal basis for the guess and determine attack.
ISC Int. J. Inf. Secur., 2017

Ciphertext-only attack on d × d Hill in O(d13<sup>d</sup>).
Inf. Process. Lett., 2017

Return Code Schemes for Electronic Voting Systems.
Proceedings of the Electronic Voting - Second International Joint Conference, 2017

2016
Game-Based Privacy Analysis of RFID Security Schemes for Confident Au-thentication in IoT.
IACR Cryptol. ePrint Arch., 2016

2012
Randomized Partial Checking Revisited.
IACR Cryptol. ePrint Arch., 2012

Cryptanalysis of a Universally Verifiable Efficient Re-encryption Mixnet.
IACR Cryptol. ePrint Arch., 2012

A Mix-Net from Any CCA2 Secure Cryptosystem.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

2010
Neutrality-Based Symmetric Cryptanalysis.
PhD thesis, 2010

Improved Linear Differential Attacks on CubeHash.
Proceedings of the Progress in Cryptology, 2010

2009
Linearization Framework for Collision Attacks: Application to CubeHash and MD6.
IACR Cryptol. ePrint Arch., 2009

2008
New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers.
IACR Cryptol. ePrint Arch., 2008

On Reconstruction of RC4 Keys from Internal States.
Proceedings of the Mathematical Methods in Computer Science, 2008

Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers.
Proceedings of the Progress in Cryptology, 2008

2007
New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba.
IACR Cryptol. ePrint Arch., 2007

Reduced Complexity Attacks on the Alternating Step Generator.
Proceedings of the Selected Areas in Cryptography, 14th International Workshop, 2007

2006
Linear Sequential Circuit Approximation of Grain and Trivium Stream Ciphers.
IACR Cryptol. ePrint Arch., 2006

Security of Jump Controlled Sequence Generators for Stream Ciphers.
Proceedings of the Sequences and Their Applications, 2006

Efficient Fully Format Compliant Selective Scrambling Methods for Compressed Video Streams.
Proceedings of the Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT/ICIW 2006), 2006

2005
On the Statistically Optimal Divide and Conquer Correlation Attack on the Shrinking Generator.
IACR Cryptol. ePrint Arch., 2005


  Loading...