Folgen
Behzad Abdolmaleki
Behzad Abdolmaleki
Max Planck Institute for Security and Privacy, Germany
Bestätigte E-Mail-Adresse bei csp.mpg.de - Startseite
Titel
Zitiert von
Zitiert von
Jahr
On Subversion-Resistant SNARKs
B Abdolmaleki, H Lipmaa, J Siim, M Zając
Journal of Cryptology 34 (3), 1-42, 2021
952021
Traceability analysis of recent RFID authentication protocols
SM Alavi, K Baghery, B Abdolmaleki, MR Aref
Wireless Personal Communications 83, 1663-1682, 2015
332015
UC-Secure CRS Generation for SNARKs
B Abdolmaleki, K Baghery, H Lipmaa, J Siim
International Conference on Cryptology in Africa, 99-117, 2019
282019
On QA-NIZK in the BPK model
B Abdolmaleki, H Lipmaa, J Siim, M Zając
Public-Key Cryptography–PKC 2020: 23rd IACR International Conference on …, 2020
262020
Lift-and-Shift: Obtaining Simulation Extractable Subversion and Updatable SNARKs Generically
B Abdolmaleki, S Ramacher, D Slamanig
ACM SIGSAC Conference on Computer and Communications Security, CCS 2020, 2020
252020
Security and privacy flaws in a recent authentication protocol for EPC C1 G2 RFID tags
SM Alavi, K Baghery, B Abdolmaleki
Advances in Computer Science: an International Journal 3 (5), 44-52, 2014
182014
Attacks and improvements on two new-found RFID authentication protocols
B Abdolmaleki, K Baghery, B Akhbari, MR Aref
7'th International Symposium on Telecommunications (IST'2014), 895-900, 2014
162014
DL-Extractable UC-Commitment Schemes
B Abdolmaleki, K Baghery, H Lipmaa, J Siim, M Zając
Applied Cryptography and Network Security 2019 (ACNS 2019) 11464, 385-405, 2019
92019
Privacy analysis and improvements of two recent RFID authentication protocols
K Baghery, B Abdolmaleki, B Akhbari, MR Aref
2014 11th International ISC Conference on Information Security and …, 2014
92014
Cryptanalysis of two EPC-based RFID security schemes
B Abdolmaleki, K Baghery, B Akhbari, MR Aref
2015 12th International Iranian Society of Cryptology Conference on …, 2015
82015
Vulnerabilities and improvements on HRAP+, a hash based RFID authentication protocol
SM Alavi, B Abdolmaleki, K Baghery
Advances in Computer Science: an International Journal 3 (6), 51-56, 2014
82014
Enhancing Privacy of Recent Authentication Schemes for Low-Cost RFID Systems.
K Baghery, B Abdolmaleki, B Akhbari, MR Aref
ISeCure 7 (2), 2015
72015
Analysis of a novel audio hash function based upon stationary wavelet transform
M Nouri, Z Zeinolabedini, B Abdolmaleki, N Farhangian
2012 6th International Conference on Application of Information and …, 2014
72014
Subversion-Resistant Quasi-Adaptive NIZK and Applications to Modular zk-SNARKs
B Abdolmaleki, D Slamanig
International Conference on Cryptology and Network Security CANS, 2021, 2021
6*2021
Game-Based Privacy Analysis of RFID Security Schemes for Confident Authentication in IoT
B Abdolmaleki, K Baghery, S Khazaei, MR Aref
Wireless Personal Communications 95 (4), 5057--5080, 2017
62017
Game-based cryptanalysis of a lightweight CRC-based authentication protocol for EPC tags
K Baghery, B Abdolmaleki, MJ Emadi
Cryptology ePrint Archive, 2016
62016
Untraceable RFID authentication protocols for EPC compliant tags
K Baghery, B Abdolmaleki, B Akhbari, MR Aref
2015 23rd Iranian Conference on Electrical Engineering, 426-431, 2015
62015
SoK: Lifting Transformations for Simulation Extractable Subversion and Updatable SNARKs
B Abdolmaleki, S Ramacher, D Slamanig
The 3rd ZKProof Workshop, 2020
52020
A subversion-resistant SNARK
B Abdolmaleki, K Baghery, H Lipmaa, M Zając
International Conference on the Theory and Application of Cryptology and …, 2017
4*2017
Two-Round Concurrently Secure Two-Party Computation
B Abdolmaleki, G Malavolta, A Rahimi
Cryptology ePrint Archive, 2021
32021
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20