Behzad Abdolmaleki
Behzad Abdolmaleki
Max Planck Institute for Security and Privacy, Germany
Verified email at ut.ee - Homepage
Title
Cited by
Cited by
Year
A subversion-resistant SNARK
B Abdolmaleki, K Baghery, H Lipmaa, M Zając
International Conference on the Theory and Application of Cryptology and …, 2017
632017
Traceability analysis of recent RFID authentication protocols
SM Alavi, K Baghery, B Abdolmaleki, MR Aref
Wireless Personal Communications 83 (3), 1663-1682, 2015
292015
Security and privacy flaws in a recent authentication protocol for EPC C1 G2 RFID tags
SM Alavi, K Baghery, B Abdolmaleki
Advances in Computer Science: an International Journal 3 (5), 44-52, 2014
152014
Attacks and improvements on two new-found RFID authentication protocols
B Abdolmaleki, K Baghery, B Akhbari, MR Aref
7'th International Symposium on Telecommunications (IST'2014), 895-900, 2014
142014
On QA-NIZK in the BPK model
B Abdolmaleki, H Lipmaa, J Siim, M Zając
IACR International Conference on Public-Key Cryptography, 590-620, 2020
132020
UC-Secure CRS Generation for SNARKs
B Abdolmaleki, K Baghery, H Lipmaa, J Siim
International Conference on Cryptology in Africa, 99-117, 2019
122019
Lift-and-Shift: Obtaining Simulation Extractable Subversion and Updatable SNARKs Generically
B Abdolmaleki, S Ramacher, D Slamanig
ACM SIGSAC Conference on Computer and Communications Security, CCS 2020, 2020
112020
Privacy analysis and improvements of two recent RFID authentication protocols
K Baghery, B Abdolmaleki, B Akhbari, MR Aref
2014 11th International ISC Conference on Information Security and …, 2014
92014
Enhancing Privacy of Recent Authentication Schemes for Low-Cost RFID Systems.
K Baghery, B Abdolmaleki, B Akhbari, MR Aref
ISeCure 7 (2), 2015
82015
Vulnerabilities and improvements on HRAP+, a hash based RFID authentication protocol
SM Alavi, B Abdolmaleki, K Baghery
Advances in Computer Science: an International Journal 3 (6), 51-56, 2014
72014
DL-Extractable UC-Commitment Schemes
B Abdolmaleki, K Baghery, H Lipmaa, J Siim, M Zając
Applied Cryptography and Network Security 2019 (ACNS 2019) 11464, 385-405, 2019
62019
Cryptanalysis of two EPC-based RFID security schemes
B Abdolmaleki, K Baghery, B Akhbari, MR Aref
2015 12th International Iranian Society of Cryptology Conference on …, 2015
62015
Untraceable RFID authentication protocols for EPC compliant tags
K Baghery, B Abdolmaleki, B Akhbari, MR Aref
2015 23rd Iranian Conference on Electrical Engineering, 426-431, 2015
62015
Analysis of a novel audio hash function based upon stationary wavelet transform
M Nouri, Z Zeinolabedini, B Abdolmaleki, N Farhangian
2012 6th International Conference on Application of Information and …, 2014
62014
Game-Based Privacy Analysis of RFID Security Schemes for Confident Authentication in IoT
B Abdolmaleki, K Baghery, S Khazaei, MR Aref
Wireless Personal Communications 95 (4), 5057--5080, 2017
52017
Game-based cryptanalysis of a lightweight CRC-based authentication protocol for EPC tags
K Baghery, B Abdolmaleki, MJ Emadi
AUT Journal of Electrical Engineering 46 (1), 27-36, 2014
52014
SoK: Lifting Transformations for Simulation Extractable Subversion and Updatable SNARKs
B Abdolmaleki, S Ramacher, D Slamanig
The 3rd ZKProof Workshop, 2020
42020
Unbounded Simulation-Sound Subversion Resistant Quasi-Adaptive NIZK Proofs and Applications to Modular zk-SNARKs
B Abdolmaleki, D Slamanig
Cryptology ePrint Archive, 2020
32020
Breaking anonymity of some recent lightweight RFID authentication protocols
K Baghery, B Abdolmaleki, S Khazaei, MR Aref
Wireless Networks, Springer, 1-18, 2018
22018
Analysis of Xiao et al.'s authentication protocol conforming to EPC C1 G2 standard
B Abdolmaleki, K Baghery, B Akhbari, MR Aref
2016 8th International Symposium on Telecommunications (IST), 111-116, 2016
22016
The system can't perform the operation now. Try again later.
Articles 1–20