The following pages link to Reihaneh Safavi-Naini (Q398962):
Displaying 50 items.
- (Q236441) (redirect page) (← links)
- (Q1854287) (redirect page) (← links)
- Automated proofs of block cipher modes of operation (Q287326) (← links)
- Paillier-based publicly verifiable (non-interactive) secret sharing (Q398963) (← links)
- Secret sharing schemes with partial broadcast channels (Q851779) (← links)
- Batch verifiable computation of outsourced functions (Q887441) (← links)
- In-region authentication (Q1656073) (← links)
- Attribute-based encryption without key cloning (Q1758896) (← links)
- New attacks and secure design for anonymous distance-bounding (Q1784496) (← links)
- Multireceiver authentication codes: Models, bounds, constructions, and extensions (Q1854288) (← links)
- Authentication codes in plaintext and chosen-content attacks (Q1910424) (← links)
- Privacy-preserving verifiable delegation of polynomial and matrix functions (Q2023805) (← links)
- Group encryption: full dynamicity, message filtering and code-based instantiation (Q2061981) (← links)
- Password protected secret sharing from lattices (Q2117043) (← links)
- An intermediate secret-guessing attack on hash-based signatures (Q2128758) (← links)
- Protecting data privacy in publicly verifiable delegation of matrix and polynomial functions (Q2306905) (← links)
- Construction of deletion correcting codes using generalized Reed-Solomon codes and their subcodes (Q2383997) (← links)
- A virtual wiretap channel for secure message transmission (Q2412224) (← links)
- Recursive constructions of secure codes and hash families using difference function families. (Q2490863) (← links)
- Distributing the encryption and decryption of a block cipher (Q2572965) (← links)
- Attack on Han et al.'s ID-based confirmer (undeniable) signature at ACM-EC'03 (Q2573579) (← links)
- Privacy-preserving resource sharing using permissioned blockchains (the case of smart neighbourhood) (Q2670868) (← links)
- (Q2707603) (← links)
- (Q2707613) (← links)
- (Q2708633) (← links)
- (Q2708634) (← links)
- (Q2721137) (← links)
- (Q2744391) (← links)
- (Q2766852) (← links)
- An Efficient Post-Quantum One-Time Signature Scheme (Q2807220) (← links)
- On the Share Efficiency of Robust Secret Sharing and Secret Sharing with Cheating Detection (Q2872050) (← links)
- Unconditionally-secure ideal robust secret sharing schemes for threshold and multilevel access structure (Q2873162) (← links)
- Automated Verification of Block Cipher Modes of Operation, an Improved Method (Q2889811) (← links)
- Secret Key Establishment over Noisy Channels (Q2889826) (← links)
- ON "THE POWER OF VERIFICATION QUERIES" IN UNCONDITIONALLY SECURE MESSAGE AUTHENTICATION (Q2890985) (← links)
- BREAKING AND REPAIRING AN APPROXIMATE MESSAGE AUTHENTICATION SCHEME (Q2890994) (← links)
- Bounds and Constructions for 1-Round (0,δ)-Secure Message Transmission against Generalized Adversary (Q2900611) (← links)
- FUZZY UNIVERSAL HASHING AND APPROXIMATE AUTHENTICATION (Q2905285) (← links)
- Private Fingerprint Matching (Q2907391) (← links)
- Limited View Adversary Codes: Bounds, Constructions and Applications (Q2947533) (← links)
- Detection of Algebraic Manipulation in the Presence of Leakage (Q2948267) (← links)
- Detecting Algebraic Manipulation in Leaky Storage Systems (Q2953813) (← links)
- A Model for Adversarial Wiretap Channels (Q2977017) (← links)
- Codes for Detection of Limited View Algebraic Tampering (Q2980863) (← links)
- Redistribution of Mechanical Secret Shares (Q2995373) (← links)
- Common Randomness and Secret Key Capacities of Two-Way Channels (Q3002104) (← links)
- Secret Keys from Channel Noise (Q3003387) (← links)
- Traitor Tracing for Shortened and Corrupted Fingerprints (Q3082984) (← links)
- (Q3149708) (← links)
- (Q3149762) (← links)
- (Q3154877) (← links)