Reihaneh Safavi-Naini

From MaRDI portal
Person:398962

Available identifiers

zbMath Open safavi-naini.reihanehMaRDI QIDQ398962

List of research outcomes

PublicationDate of PublicationType
Traceable policy-based signatures and instantiation from lattices2024-03-13Paper
https://portal.mardi4nfdi.de/entity/Q60593662023-11-02Paper
Game-Theoretic Analysis of an Incentivized Verifiable Computation System2023-08-03Paper
Batch Verifiable Computation of Polynomials on Outsourced Data2022-08-19Paper
https://portal.mardi4nfdi.de/entity/Q50904312022-07-18Paper
Privacy-preserving resource sharing using permissioned blockchains (the case of smart neighbourhood)2022-06-01Paper
An intermediate secret-guessing attack on hash-based signatures2022-04-22Paper
Password protected secret sharing from lattices2022-03-21Paper
Group encryption: full dynamicity, message filtering and code-based instantiation2021-12-21Paper
Privacy-preserving verifiable delegation of polynomial and matrix functions2021-05-03Paper
Economically Optimal Variable Tag Length Message Authentication2021-03-17Paper
Protecting data privacy in publicly verifiable delegation of matrix and polynomial functions2020-03-27Paper
Keyed hash functions2019-10-10Paper
New attacks and secure design for anonymous distance-bounding2018-09-26Paper
In-region authentication2018-08-10Paper
MRD Hashing2018-05-09Paper
A virtual wiretap channel for secure message transmission2017-10-23Paper
On Optimal Secure Message Transmission by Public Discussion2017-07-27Paper
Codes for Detection of Limited View Algebraic Tampering2017-05-05Paper
A Model for Adversarial Wiretap Channels2017-04-28Paper
Detecting Algebraic Manipulation in Leaky Storage Systems2017-01-06Paper
Automated proofs of block cipher modes of operation2016-05-26Paper
An Efficient Post-Quantum One-Time Signature Scheme2016-05-19Paper
Almost Optimum Secret Sharing with Cheating Detection2015-11-25Paper
Batch verifiable computation of outsourced functions2015-10-26Paper
Detection of Algebraic Manipulation in the Presence of Leakage2015-09-30Paper
Limited View Adversary Codes: Bounds, Constructions and Applications2015-09-24Paper
A True Random Generator Using Human Gameplay2014-09-15Paper
Paillier-based publicly verifiable (non-interactive) secret sharing2014-08-18Paper
Verifiable Multi-server Private Information Retrieval2014-07-07Paper
Private Message Transmission Using Disjoint Paths2014-07-07Paper
Unconditionally-secure ideal robust secret sharing schemes for threshold and multilevel access structure2014-01-23Paper
On the Share Efficiency of Robust Secret Sharing and Secret Sharing with Cheating Detection2014-01-14Paper
Proofs of Retrievability via Fountain Code2013-08-07Paper
Message Transmission and Key Establishment: Conditions for Equality of Weak and Strong Capacities2013-08-07Paper
Short Pairing-Efficient Threshold-Attribute-Based Signature2013-04-04Paper
Attribute-based encryption without key cloning2012-11-16Paper
Guessing Secrecy2012-11-06Paper
Private Fingerprint Matching2012-09-07Paper
FUZZY UNIVERSAL HASHING AND APPROXIMATE AUTHENTICATION2012-08-27Paper
Bounds and Constructions for 1-Round (0,δ)-Secure Message Transmission against Generalized Adversary2012-07-23Paper
ON "THE POWER OF VERIFICATION QUERIES" IN UNCONDITIONALLY SECURE MESSAGE AUTHENTICATION2012-06-12Paper
BREAKING AND REPAIRING AN APPROXIMATE MESSAGE AUTHENTICATION SCHEME2012-06-12Paper
Automated Verification of Block Cipher Modes of Operation, an Improved Method2012-06-08Paper
Secret Key Establishment over Noisy Channels2012-06-08Paper
UNCONDITIONALLY SECURE CONFERENCE KEY DISTRIBUTION: SECURITY NOTIONS, BOUNDS AND CONSTRUCTIONS2011-10-10Paper
Secret Keys from Channel Noise2011-05-27Paper
Common Randomness and Secret Key Capacities of Two-Way Channels2011-05-19Paper
Redistribution of Mechanical Secret Shares2011-04-20Paper
Traitor Tracing for Shortened and Corrupted Fingerprints2011-03-18Paper
Threshold Attribute-Based Signcryption2010-09-10Paper
Simple and Communication Complexity Efficient Almost Secure and Perfectly Secure Message Transmission Schemes2010-05-04Paper
Automated Security Proof for Symmetric Encryption Modes2010-01-14Paper
New Results on Unconditionally Secure Multi-receiver Manual Authentication2009-12-03Paper
How to Compare Image Watermarking Algorithms2009-07-24Paper
Unconditionally Secure Approximate Message Authentication2009-07-23Paper
Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems2009-07-07Paper
Public Key Cryptography – PKC 20042009-05-14Paper
Public Key Cryptography – PKC 20042009-05-14Paper
An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme2009-03-10Paper
Authentication Codes in the Query Model2009-03-09Paper
Non-interactive Manual Channel Message Authentication Based on eTCR Hash Functions2009-03-06Paper
Information Theoretic Bounds on Authentication Systems in Query Model2009-02-24Paper
An Efficient Deniable Key Exchange Protocol (Extended Abstract)2009-02-12Paper
Classification of the Deletion Correcting Capabilities of Reed–Solomon Codes of Dimension $2$ Over Prime Fields2008-12-21Paper
RFID Privacy Models Revisited2008-10-27Paper
Multi-party Concurrent Signatures2008-06-17Paper
On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search2008-06-17Paper
Universal Designated Verifier Signature Proof (or How to Efficiently Prove Knowledge of a Signature)2008-03-18Paper
Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures2008-03-05Paper
Progress in Cryptology - INDOCRYPT 20032007-11-29Paper
Construction of deletion correcting codes using generalized Reed-Solomon codes and their subcodes2007-09-20Paper
Generic Construction of Hybrid Public Key Traitor Tracing with Full-Public-Traceability2007-09-11Paper
A Note on the Exposure Property of SBIBD2007-05-29Paper
Applied Cryptography and Network Security2007-05-02Paper
Secret sharing schemes with partial broadcast channels2006-11-22Paper
Cryptology and Network Security2006-11-14Paper
Information Security2006-10-20Paper
RESILIENT LKH: SECURE MULTICAST KEY DISTRIBUTION SCHEMES2006-10-16Paper
Information Security and Privacy2006-06-22Paper
Recursive constructions of secure codes and hash families using difference function families.2006-05-18Paper
2-secure codes from 2-SFP codes2006-01-13Paper
Computing and Combinatorics2006-01-11Paper
Progress in Cryptology - INDOCRYPT 20042005-12-22Paper
Public Key Cryptography - PKC 20052005-12-07Paper
Attack on Han et al.'s ID-based confirmer (undeniable) signature at ACM-EC'032005-11-22Paper
Distributing the encryption and decryption of a block cipher2005-11-07Paper
https://portal.mardi4nfdi.de/entity/Q57009802005-11-02Paper
Information Security Practice and Experience2005-09-13Paper
Information Security and Privacy2005-09-07Paper
Information Security and Privacy2005-09-07Paper
Applied Cryptography and Network Security2005-06-13Paper
https://portal.mardi4nfdi.de/entity/Q46819872005-06-09Paper
Linear authentication codes: bounds and constructions2005-06-01Paper
Sequential traitor tracing2005-06-01Paper
On the Maximal Codes of Length 3 with the 2-Identifiable Parent Property2005-02-28Paper
https://portal.mardi4nfdi.de/entity/Q31548772005-01-14Paper
https://portal.mardi4nfdi.de/entity/Q47389382004-08-11Paper
https://portal.mardi4nfdi.de/entity/Q44723972004-08-04Paper
https://portal.mardi4nfdi.de/entity/Q44724282004-08-04Paper
https://portal.mardi4nfdi.de/entity/Q44634592004-05-27Paper
https://portal.mardi4nfdi.de/entity/Q44605622004-05-18Paper
https://portal.mardi4nfdi.de/entity/Q42506492004-03-09Paper
https://portal.mardi4nfdi.de/entity/Q44525752004-03-01Paper
Bounds And Constructions For Threshold Shared Generation Of Authenticators2003-10-21Paper
https://portal.mardi4nfdi.de/entity/Q44174022003-07-29Paper
https://portal.mardi4nfdi.de/entity/Q44142752003-07-24Paper
https://portal.mardi4nfdi.de/entity/Q44129592003-07-17Paper
https://portal.mardi4nfdi.de/entity/Q44133132003-07-17Paper
https://portal.mardi4nfdi.de/entity/Q44133282003-07-17Paper
https://portal.mardi4nfdi.de/entity/Q44133462003-07-17Paper
https://portal.mardi4nfdi.de/entity/Q44106952003-07-03Paper
https://portal.mardi4nfdi.de/entity/Q47885702003-05-19Paper
Multireceiver authentication codes: Models, bounds, constructions, and extensions2003-01-14Paper
https://portal.mardi4nfdi.de/entity/Q45366472002-11-23Paper
https://portal.mardi4nfdi.de/entity/Q45368102002-10-07Paper
https://portal.mardi4nfdi.de/entity/Q27668522002-10-07Paper
https://portal.mardi4nfdi.de/entity/Q31497082002-09-26Paper
https://portal.mardi4nfdi.de/entity/Q31497622002-09-26Paper
New results on frame-proof codes and traceability schemes2002-08-04Paper
https://portal.mardi4nfdi.de/entity/Q45015002002-07-28Paper
Broadcast authentication for group communication2002-03-03Paper
https://portal.mardi4nfdi.de/entity/Q45025162002-01-27Paper
https://portal.mardi4nfdi.de/entity/Q45025172002-01-27Paper
https://portal.mardi4nfdi.de/entity/Q27443912001-09-19Paper
https://portal.mardi4nfdi.de/entity/Q27086332001-07-17Paper
https://portal.mardi4nfdi.de/entity/Q27086342001-07-17Paper
https://portal.mardi4nfdi.de/entity/Q27076032001-07-08Paper
https://portal.mardi4nfdi.de/entity/Q27211372001-07-01Paper
https://portal.mardi4nfdi.de/entity/Q44950772001-04-26Paper
https://portal.mardi4nfdi.de/entity/Q27076132001-04-03Paper
Remarks on the multiple assignment secret sharing scheme2001-04-01Paper
https://portal.mardi4nfdi.de/entity/Q45204862001-02-26Paper
https://portal.mardi4nfdi.de/entity/Q45205062001-02-26Paper
https://portal.mardi4nfdi.de/entity/Q45015072000-09-04Paper
https://portal.mardi4nfdi.de/entity/Q44950802000-08-10Paper
Bounds and Techniques for Efficient Redistribution of Secret Shares to New Access Structures2000-07-27Paper
https://portal.mardi4nfdi.de/entity/Q42496632000-02-04Paper
https://portal.mardi4nfdi.de/entity/Q49347172000-01-31Paper
https://portal.mardi4nfdi.de/entity/Q42697541999-11-10Paper
https://portal.mardi4nfdi.de/entity/Q42510341999-09-26Paper
https://portal.mardi4nfdi.de/entity/Q42492701999-06-17Paper
https://portal.mardi4nfdi.de/entity/Q42506321999-06-17Paper
https://portal.mardi4nfdi.de/entity/Q42506381999-06-17Paper
https://portal.mardi4nfdi.de/entity/Q38391991998-10-08Paper
https://portal.mardi4nfdi.de/entity/Q38391981998-08-13Paper
A multi-level view model for secure object-oriented databases1998-07-22Paper
https://portal.mardi4nfdi.de/entity/Q43736241998-06-07Paper
https://portal.mardi4nfdi.de/entity/Q43882061998-05-17Paper
https://portal.mardi4nfdi.de/entity/Q43657451998-04-22Paper
Secret sharing in hierarchical groups1998-02-16Paper
https://portal.mardi4nfdi.de/entity/Q38391741998-01-01Paper
https://portal.mardi4nfdi.de/entity/Q38391921998-01-01Paper
https://portal.mardi4nfdi.de/entity/Q38400881998-01-01Paper
https://portal.mardi4nfdi.de/entity/Q43416701997-08-26Paper
https://portal.mardi4nfdi.de/entity/Q43416681997-08-10Paper
https://portal.mardi4nfdi.de/entity/Q43417911997-06-18Paper
Authentication codes in plaintext and chosen-content attacks1997-01-14Paper
https://portal.mardi4nfdi.de/entity/Q48622241996-08-05Paper
https://portal.mardi4nfdi.de/entity/Q43140251995-02-19Paper
https://portal.mardi4nfdi.de/entity/Q40374891993-05-18Paper
https://portal.mardi4nfdi.de/entity/Q33506401990-01-01Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Reihaneh Safavi-Naini