Reihaneh Safavi-Naini

From MaRDI portal
Revision as of 17:00, 9 December 2023 by AuthorDisambiguator (talk | contribs) (AuthorDisambiguator moved page Person:236441 to Reihaneh Safavi-Naini: Duplicate)

Person:398962

Available identifiers

zbMath Open safavi-naini.reihanehMaRDI QIDQ398962

List of research outcomes





PublicationDate of PublicationType
A lower bound on the share size of leakage-resilient secret-sharing schemes2024-10-02Paper
Cryptography based on transcendental numbers2024-07-11Paper
Cryptosystems for hierarchical groups2024-07-11Paper
On selectable collisionful hash functions2024-07-11Paper
On password-based authenticated key exchange using collisionful hash functions2024-07-11Paper
Group encryption: full dynamicity, message filtering and code-based instantiation2024-06-28Paper
Lower bounds on the share size of leakage resilient cheating detectable secret sharing2024-06-05Paper
Traceable policy-based signatures and instantiation from lattices2024-03-13Paper
Leakage-Resilient Secret Sharing in Non-Compartmentalized Models.2023-11-02Paper
Game-Theoretic Analysis of an Incentivized Verifiable Computation System2023-08-03Paper
Leakage Resilient Cheating Detectable Secret Sharing Schemes2023-04-13Paper
Batch Verifiable Computation of Polynomials on Outsourced Data2022-08-19Paper
https://portal.mardi4nfdi.de/entity/Q50904312022-07-18Paper
Privacy-preserving resource sharing using permissioned blockchains (the case of smart neighbourhood)2022-06-01Paper
An intermediate secret-guessing attack on hash-based signatures2022-04-22Paper
Password protected secret sharing from lattices2022-03-21Paper
Group encryption: full dynamicity, message filtering and code-based instantiation2021-12-21Paper
Privacy-preserving verifiable delegation of polynomial and matrix functions2021-05-03Paper
Economically Optimal Variable Tag Length Message Authentication2021-03-17Paper
Protecting data privacy in publicly verifiable delegation of matrix and polynomial functions2020-03-27Paper
Keyed hash functions2019-10-10Paper
New attacks and secure design for anonymous distance-bounding2018-09-26Paper
In-region authentication2018-08-10Paper
Secret Sharing with Binary Shares2018-08-08Paper
MRD Hashing2018-05-09Paper
A virtual wiretap channel for secure message transmission2017-10-23Paper
On Optimal Secure Message Transmission by Public Discussion2017-07-27Paper
Codes for Detection of Limited View Algebraic Tampering2017-05-05Paper
A Model for Adversarial Wiretap Channels2017-04-28Paper
Detecting Algebraic Manipulation in Leaky Storage Systems2017-01-06Paper
Automated proofs of block cipher modes of operation2016-05-26Paper
An Efficient Post-Quantum One-Time Signature Scheme2016-05-19Paper
Almost Optimum Secret Sharing with Cheating Detection2015-11-25Paper
Batch verifiable computation of outsourced functions2015-10-26Paper
Detection of Algebraic Manipulation in the Presence of Leakage2015-09-30Paper
Limited View Adversary Codes: Bounds, Constructions and Applications2015-09-24Paper
A True Random Generator Using Human Gameplay2014-09-15Paper
Paillier-based publicly verifiable (non-interactive) secret sharing2014-08-18Paper
Verifiable Multi-server Private Information Retrieval2014-07-07Paper
Private Message Transmission Using Disjoint Paths2014-07-07Paper
Unconditionally-secure ideal robust secret sharing schemes for threshold and multilevel access structure2014-01-23Paper
On the Share Efficiency of Robust Secret Sharing and Secret Sharing with Cheating Detection2014-01-14Paper
Proofs of Retrievability via Fountain Code2013-08-07Paper
Message Transmission and Key Establishment: Conditions for Equality of Weak and Strong Capacities2013-08-07Paper
Short Pairing-Efficient Threshold-Attribute-Based Signature2013-04-04Paper
Attribute-based encryption without key cloning2012-11-16Paper
Guessing Secrecy2012-11-06Paper
Private Fingerprint Matching2012-09-07Paper
FUZZY UNIVERSAL HASHING AND APPROXIMATE AUTHENTICATION2012-08-27Paper
Bounds and Constructions for 1-Round (0,δ)-Secure Message Transmission against Generalized Adversary2012-07-23Paper
ON "THE POWER OF VERIFICATION QUERIES" IN UNCONDITIONALLY SECURE MESSAGE AUTHENTICATION2012-06-12Paper
BREAKING AND REPAIRING AN APPROXIMATE MESSAGE AUTHENTICATION SCHEME2012-06-12Paper
Automated Verification of Block Cipher Modes of Operation, an Improved Method2012-06-08Paper
Secret Key Establishment over Noisy Channels2012-06-08Paper
UNCONDITIONALLY SECURE CONFERENCE KEY DISTRIBUTION: SECURITY NOTIONS, BOUNDS AND CONSTRUCTIONS2011-10-10Paper
Secret Keys from Channel Noise2011-05-27Paper
Common Randomness and Secret Key Capacities of Two-Way Channels2011-05-19Paper
Redistribution of Mechanical Secret Shares2011-04-20Paper
Traitor Tracing for Shortened and Corrupted Fingerprints2011-03-18Paper
Threshold Attribute-Based Signcryption2010-09-10Paper
Simple and Communication Complexity Efficient Almost Secure and Perfectly Secure Message Transmission Schemes2010-05-04Paper
Automated Security Proof for Symmetric Encryption Modes2010-01-14Paper
New Results on Unconditionally Secure Multi-receiver Manual Authentication2009-12-03Paper
How to Compare Image Watermarking Algorithms2009-07-24Paper
Unconditionally Secure Approximate Message Authentication2009-07-23Paper
Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems2009-07-07Paper
Public Key Cryptography – PKC 20042009-05-14Paper
Public Key Cryptography – PKC 20042009-05-14Paper
An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme2009-03-10Paper
Authentication Codes in the Query Model2009-03-09Paper
Non-interactive Manual Channel Message Authentication Based on eTCR Hash Functions2009-03-06Paper
Information Theoretic Bounds on Authentication Systems in Query Model2009-02-24Paper
An Efficient Deniable Key Exchange Protocol (Extended Abstract)2009-02-12Paper
Classification of the Deletion Correcting Capabilities of Reed–Solomon Codes of Dimension $2$ Over Prime Fields2008-12-21Paper
RFID Privacy Models Revisited2008-10-27Paper
Multi-party Concurrent Signatures2008-06-17Paper
On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search2008-06-17Paper
Universal Designated Verifier Signature Proof (or How to Efficiently Prove Knowledge of a Signature)2008-03-18Paper
Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures2008-03-05Paper
Progress in Cryptology - INDOCRYPT 20032007-11-29Paper
Construction of deletion correcting codes using generalized Reed-Solomon codes and their subcodes2007-09-20Paper
Generic Construction of Hybrid Public Key Traitor Tracing with Full-Public-Traceability2007-09-11Paper
A Note on the Exposure Property of SBIBD2007-05-29Paper
Applied Cryptography and Network Security2007-05-02Paper
Secret sharing schemes with partial broadcast channels2006-11-22Paper
Cryptology and Network Security2006-11-14Paper
Information Security2006-10-20Paper
RESILIENT LKH: SECURE MULTICAST KEY DISTRIBUTION SCHEMES2006-10-16Paper
Information Security and Privacy2006-06-22Paper
Recursive constructions of secure codes and hash families using difference function families.2006-05-18Paper
2-secure codes from 2-SFP codes2006-01-13Paper
Computing and Combinatorics2006-01-11Paper
Progress in Cryptology - INDOCRYPT 20042005-12-22Paper
Public Key Cryptography - PKC 20052005-12-07Paper
Attack on Han et al.'s ID-based confirmer (undeniable) signature at ACM-EC'032005-11-22Paper
Distributing the encryption and decryption of a block cipher2005-11-07Paper
https://portal.mardi4nfdi.de/entity/Q57009802005-11-02Paper
Information Security Practice and Experience2005-09-13Paper
Information Security and Privacy2005-09-07Paper
Information Security and Privacy2005-09-07Paper
Applied Cryptography and Network Security2005-06-13Paper
https://portal.mardi4nfdi.de/entity/Q46819872005-06-09Paper
Linear authentication codes: bounds and constructions2005-06-01Paper
Sequential traitor tracing2005-06-01Paper
On the Maximal Codes of Length 3 with the 2-Identifiable Parent Property2005-02-28Paper
https://portal.mardi4nfdi.de/entity/Q31548772005-01-14Paper
https://portal.mardi4nfdi.de/entity/Q47389382004-08-11Paper
https://portal.mardi4nfdi.de/entity/Q44723972004-08-04Paper
https://portal.mardi4nfdi.de/entity/Q44724282004-08-04Paper
https://portal.mardi4nfdi.de/entity/Q44634592004-05-27Paper
https://portal.mardi4nfdi.de/entity/Q44605622004-05-18Paper
https://portal.mardi4nfdi.de/entity/Q42506492004-03-09Paper
https://portal.mardi4nfdi.de/entity/Q44525752004-03-01Paper
Bounds And Constructions For Threshold Shared Generation Of Authenticators2003-10-21Paper
https://portal.mardi4nfdi.de/entity/Q44174022003-07-29Paper
https://portal.mardi4nfdi.de/entity/Q44142752003-07-24Paper
https://portal.mardi4nfdi.de/entity/Q44129592003-07-17Paper
https://portal.mardi4nfdi.de/entity/Q44133132003-07-17Paper
https://portal.mardi4nfdi.de/entity/Q44133282003-07-17Paper
https://portal.mardi4nfdi.de/entity/Q44133462003-07-17Paper
https://portal.mardi4nfdi.de/entity/Q44106952003-07-03Paper
https://portal.mardi4nfdi.de/entity/Q47885702003-05-19Paper
Multireceiver authentication codes: Models, bounds, constructions, and extensions2003-01-14Paper
https://portal.mardi4nfdi.de/entity/Q45366472002-11-23Paper
https://portal.mardi4nfdi.de/entity/Q45368102002-10-07Paper
https://portal.mardi4nfdi.de/entity/Q27668522002-10-07Paper
https://portal.mardi4nfdi.de/entity/Q31497082002-09-26Paper
https://portal.mardi4nfdi.de/entity/Q31497622002-09-26Paper
New results on frame-proof codes and traceability schemes2002-08-04Paper
https://portal.mardi4nfdi.de/entity/Q45015002002-07-28Paper
Broadcast authentication for group communication2002-03-03Paper
https://portal.mardi4nfdi.de/entity/Q45025162002-01-27Paper
https://portal.mardi4nfdi.de/entity/Q45025172002-01-27Paper
https://portal.mardi4nfdi.de/entity/Q27443912001-09-19Paper
https://portal.mardi4nfdi.de/entity/Q27086332001-07-17Paper
https://portal.mardi4nfdi.de/entity/Q27086342001-07-17Paper
https://portal.mardi4nfdi.de/entity/Q27076032001-07-08Paper
https://portal.mardi4nfdi.de/entity/Q27211372001-07-01Paper
https://portal.mardi4nfdi.de/entity/Q44950772001-04-26Paper
https://portal.mardi4nfdi.de/entity/Q27076132001-04-03Paper
Remarks on the multiple assignment secret sharing scheme2001-04-01Paper
https://portal.mardi4nfdi.de/entity/Q45204862001-02-26Paper
https://portal.mardi4nfdi.de/entity/Q45205062001-02-26Paper
https://portal.mardi4nfdi.de/entity/Q45015072000-09-04Paper
https://portal.mardi4nfdi.de/entity/Q44950802000-08-10Paper
Bounds and Techniques for Efficient Redistribution of Secret Shares to New Access Structures2000-07-27Paper
https://portal.mardi4nfdi.de/entity/Q42496632000-02-04Paper
https://portal.mardi4nfdi.de/entity/Q49347172000-01-31Paper
https://portal.mardi4nfdi.de/entity/Q42697541999-11-10Paper
https://portal.mardi4nfdi.de/entity/Q42510341999-09-26Paper
https://portal.mardi4nfdi.de/entity/Q42492701999-06-17Paper
https://portal.mardi4nfdi.de/entity/Q42506321999-06-17Paper
https://portal.mardi4nfdi.de/entity/Q42506381999-06-17Paper
https://portal.mardi4nfdi.de/entity/Q38391991998-10-08Paper
https://portal.mardi4nfdi.de/entity/Q38391981998-08-13Paper
A multi-level view model for secure object-oriented databases1998-07-22Paper
https://portal.mardi4nfdi.de/entity/Q43736241998-06-07Paper
https://portal.mardi4nfdi.de/entity/Q43882061998-05-17Paper
https://portal.mardi4nfdi.de/entity/Q43657451998-04-22Paper
Secret sharing in hierarchical groups1998-02-16Paper
https://portal.mardi4nfdi.de/entity/Q38391741998-01-01Paper
https://portal.mardi4nfdi.de/entity/Q38391921998-01-01Paper
https://portal.mardi4nfdi.de/entity/Q38400881998-01-01Paper
https://portal.mardi4nfdi.de/entity/Q43416701997-08-26Paper
https://portal.mardi4nfdi.de/entity/Q43416681997-08-10Paper
https://portal.mardi4nfdi.de/entity/Q43417911997-06-18Paper
Authentication codes in plaintext and chosen-content attacks1997-01-14Paper
https://portal.mardi4nfdi.de/entity/Q48622241996-08-05Paper
https://portal.mardi4nfdi.de/entity/Q43140251995-02-19Paper
https://portal.mardi4nfdi.de/entity/Q40374891993-05-18Paper
https://portal.mardi4nfdi.de/entity/Q33506401990-01-01Paper

Research outcomes over time

This page was built for person: Reihaneh Safavi-Naini