Ahmad-Reza Sadeghi

From MaRDI portal
Person:2707458


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Towards a Unified Security Model for Physically Unclonable Functions
Topics in Cryptology - CT-RSA 2016
2016-04-08Paper
On constructing homomorphic encryption schemes from coding theory
Cryptography and Coding
2011-12-16Paper
Recyclable PUFs: Logically Reconfigurable PUFs
Cryptographic hardware and embedded systems -- CHES 2011. 13th international workshop, Nara, Japan, September 28--October 1, 2011. Proceedings
2011-10-07Paper
Secure set intersection with untrusted hardware tokens
Topics in Cryptology – CT-RSA 2011
2011-02-11Paper
Automatic generation of \(\Sigma\)-protocols
Public Key Infrastructures, Services and Applications
2011-02-04Paper
Cryptography meets hardware: selected topics of hardware-based cryptography (invited talk)
Cryptology and Network Security
2010-12-07Paper
Memory leakage-resilient encryption based on physically unclonable functions
Advances in Cryptology – ASIACRYPT 2009
2009-12-15Paper
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima
Cryptology and Network Security
2009-11-26Paper
Efficient Implementation of Zero-Knowledge Proofs for Watermark Detection in Multimedia Data
Lecture Notes in Computer Science
2009-03-11Paper
Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems
Advances in Cryptology - ASIACRYPT 2008
2009-02-10Paper
Universally Composable Security Analysis of TLS
Provable Security
2009-01-27Paper
Property-Based Attestation without a Trusted Third Party
Lecture Notes in Computer Science
2008-11-20Paper
A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption
Lecture Notes in Computer Science
2008-06-17Paper
A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting
Financial Cryptography and Data Security
2008-03-07Paper
Fingercasting–Joint Fingerprinting and Decryption of Broadcast Messages
Transactions on Data Hiding and Multimedia Security II
2007-11-13Paper
Fingercasting—Joint Fingerprinting and Decryption of Broadcast Messages
Information Security and Privacy
2007-09-07Paper
Information Security and Cryptology - ICISC 2005
Lecture Notes in Computer Science
2007-05-02Paper
Financial Cryptography and Data Security
Lecture Notes in Computer Science
2005-12-22Paper
Information Security Practice and Experience
Lecture Notes in Computer Science
2005-09-13Paper
Optimized Self-Synchronizing Mode of Operation
Fast Software Encryption
2004-08-12Paper
scientific article; zbMATH DE number 1893221 (Why is no real title available?)
 
2003-04-06Paper
scientific article; zbMATH DE number 1893227 (Why is no real title available?)
 
2003-04-06Paper
scientific article; zbMATH DE number 1759346 (Why is no real title available?)
 
2002-11-28Paper
scientific article; zbMATH DE number 1722682 (Why is no real title available?)
 
2002-03-21Paper
scientific article; zbMATH DE number 1583811 (Why is no real title available?)
 
2001-12-18Paper
On the Performance of Hyperelliptic Cryptosystems
Advances in Cryptology — EUROCRYPT ’99
1999-06-17Paper


Research outcomes over time


This page was built for person: Ahmad-Reza Sadeghi