Reihaneh Safavi-Naini

From MaRDI portal
(Redirected from Person:398962)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
A lower bound on the share size of leakage-resilient secret-sharing schemes2024-10-02Paper
Cryptography based on transcendental numbers2024-07-11Paper
Cryptosystems for hierarchical groups2024-07-11Paper
On selectable collisionful hash functions2024-07-11Paper
On password-based authenticated key exchange using collisionful hash functions2024-07-11Paper
Group encryption: full dynamicity, message filtering and code-based instantiation
Theoretical Computer Science
2024-06-28Paper
Lower bounds on the share size of leakage resilient cheating detectable secret sharing2024-06-05Paper
Traceable policy-based signatures and instantiation from lattices
Information Sciences
2024-03-13Paper
Leakage-Resilient Secret Sharing in Non-Compartmentalized Models.2023-11-02Paper
Game-Theoretic Analysis of an Incentivized Verifiable Computation System
Financial Cryptography and Data Security
2023-08-03Paper
Leakage Resilient Cheating Detectable Secret Sharing Schemes2023-04-13Paper
Batch verifiable computation of polynomials on outsourced data
Computer Security -- ESORICS 2015
2022-08-19Paper
scientific article; zbMATH DE number 7559096 (Why is no real title available?)
(available as arXiv preprint)
2022-07-18Paper
Privacy-preserving resource sharing using permissioned blockchains (the case of smart neighbourhood)2022-06-01Paper
An intermediate secret-guessing attack on hash-based signatures2022-04-22Paper
Password protected secret sharing from lattices2022-03-21Paper
Group encryption: full dynamicity, message filtering and code-based instantiation2021-12-21Paper
Privacy-preserving verifiable delegation of polynomial and matrix functions
Journal of Mathematical Cryptology
2021-05-03Paper
Economically optimal variable tag length message authentication
Financial Cryptography and Data Security
2021-03-17Paper
Protecting data privacy in publicly verifiable delegation of matrix and polynomial functions
Designs, Codes and Cryptography
2020-03-27Paper
Keyed hash functions
Cryptography: Policy and Algorithms
2019-10-10Paper
New attacks and secure design for anonymous distance-bounding2018-09-26Paper
In-region authentication2018-08-10Paper
Secret Sharing with Binary Shares
(available as arXiv preprint)
2018-08-08Paper
MRD hashing
Fast Software Encryption
2018-05-09Paper
A virtual wiretap channel for secure message transmission2017-10-23Paper
On Optimal Secure Message Transmission by Public Discussion
IEEE Transactions on Information Theory
2017-07-27Paper
Codes for detection of limited view algebraic tampering
Information Security and Cryptology
2017-05-05Paper
A Model for Adversarial Wiretap Channels
IEEE Transactions on Information Theory
2017-04-28Paper
Detecting algebraic manipulation in leaky storage systems
Lecture Notes in Computer Science
2017-01-06Paper
Automated proofs of block cipher modes of operation
Journal of Automated Reasoning
2016-05-26Paper
An efficient post-quantum one-time signature scheme
Lecture Notes in Computer Science
2016-05-19Paper
Almost optimum secret sharing with cheating detection
Security, Privacy, and Applied Cryptography Engineering
2015-11-25Paper
Batch verifiable computation of outsourced functions
Designs, Codes and Cryptography
2015-10-26Paper
Detection of algebraic manipulation in the presence of leakage
Lecture Notes in Computer Science
2015-09-30Paper
Limited view adversary codes: bounds, constructions and applications
Lecture Notes in Computer Science
2015-09-24Paper
A True Random Generator Using Human Gameplay
Lecture Notes in Computer Science
2014-09-15Paper
Paillier-based publicly verifiable (non-interactive) secret sharing
Designs, Codes and Cryptography
2014-08-18Paper
Private message transmission using disjoint paths
Applied Cryptography and Network Security
2014-07-07Paper
Verifiable multi-server private information retrieval
Applied Cryptography and Network Security
2014-07-07Paper
Unconditionally-secure ideal robust secret sharing schemes for threshold and multilevel access structure
Journal of Mathematical Cryptology
2014-01-23Paper
On the Share Efficiency of Robust Secret Sharing and Secret Sharing with Cheating Detection
Lecture Notes in Computer Science
2014-01-14Paper
Proofs of retrievability via fountain code
Foundations and Practice of Security
2013-08-07Paper
Message transmission and key establishment: conditions for equality of weak and strong capacities
Foundations and Practice of Security
2013-08-07Paper
Short pairing-efficient threshold-attribute-based signature
Pairing-Based Cryptography – Pairing 2012
2013-04-04Paper
Attribute-based encryption without key cloning
International Journal of Applied Cryptography
2012-11-16Paper
Guessing Secrecy
Lecture Notes in Computer Science
2012-11-06Paper
Private fingerprint matching
Information Security and Privacy
2012-09-07Paper
Fuzzy universal hashing and approximate authentication
Discrete Mathematics, Algorithms and Applications
2012-08-27Paper
Bounds and constructions for \(1\)-round \((0,\delta )\)-secure message transmission against generalized adversary
Progress in Cryptology - AFRICACRYPT 2012
2012-07-23Paper
On ``the power of verification queries in unconditionally secure message authentication
Discrete Mathematics, Algorithms and Applications
2012-06-12Paper
Breaking and repairing an approximate message authentication scheme
Discrete Mathematics, Algorithms and Applications
2012-06-12Paper
Secret key establishment over noisy channels
Foundations and Practice of Security
2012-06-08Paper
Automated verification of block cipher modes of operation, an improved method
Foundations and Practice of Security
2012-06-08Paper
UNCONDITIONALLY SECURE CONFERENCE KEY DISTRIBUTION: SECURITY NOTIONS, BOUNDS AND CONSTRUCTIONS
International Journal of Foundations of Computer Science
2011-10-10Paper
Secret keys from channel noise
Advances in Cryptology – EUROCRYPT 2011
2011-05-27Paper
Common Randomness and Secret Key Capacities of Two-Way Channels
Lecture Notes in Computer Science
2011-05-19Paper
Redistribution of mechanical secret shares
Financial Cryptography
2011-04-20Paper
Traitor tracing for shortened and corrupted fingerprints
Lecture Notes in Computer Science
2011-03-18Paper
Threshold Attribute-Based Signcryption
Lecture Notes in Computer Science
2010-09-10Paper
Simple and communication complexity efficient almost secure and perfectly secure message transmission schemes
Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings
2010-05-04Paper
Automated security proof for symmetric encryption modes
Advances in Computer Science - ASIAN 2009. Information Security and Privacy
2010-01-14Paper
New results on unconditionally secure multi-receiver manual authentication
Lecture Notes in Computer Science
2009-12-03Paper
How to Compare Image Watermarking Algorithms
Transactions on Data Hiding and Multimedia Security IV
2009-07-24Paper
Unconditionally Secure Approximate Message Authentication
Lecture Notes in Computer Science
2009-07-23Paper
Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems
Progress in Cryptology – AFRICACRYPT 2009
2009-07-07Paper
Public Key Cryptography – PKC 2004
Lecture Notes in Computer Science
2009-05-14Paper
Public Key Cryptography – PKC 2004
Lecture Notes in Computer Science
2009-05-14Paper
An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme
Applied Cryptography and Network Security
2009-03-10Paper
Authentication Codes in the Query Model
Coding and Cryptology
2009-03-09Paper
Non-interactive Manual Channel Message Authentication Based on eTCR Hash Functions
Information Security and Privacy
2009-03-06Paper
Information Theoretic Bounds on Authentication Systems in Query Model
IEEE Transactions on Information Theory
2009-02-24Paper
An Efficient Deniable Key Exchange Protocol (Extended Abstract)
Financial Cryptography and Data Security
2009-02-12Paper
Classification of the Deletion Correcting Capabilities of Reed–Solomon Codes of Dimension $2$ Over Prime Fields
IEEE Transactions on Information Theory
2008-12-21Paper
RFID Privacy Models Revisited
Computer Security - ESORICS 2008
2008-10-27Paper
Multi-party Concurrent Signatures
Lecture Notes in Computer Science
2008-06-17Paper
On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search
Lecture Notes in Computer Science
2008-06-17Paper
Universal Designated Verifier Signature Proof (or How to Efficiently Prove Knowledge of a Signature)
Lecture Notes in Computer Science
2008-03-18Paper
Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures
Public key cryptography -- PKC 2008. 11th international workshop on practice and theory in public-key cryptography, Barcelona, Spain, March 9--12, 2008. Proceedings
2008-03-05Paper
Progress in Cryptology - INDOCRYPT 2003
Lecture Notes in Computer Science
2007-11-29Paper
Construction of deletion correcting codes using generalized Reed-Solomon codes and their subcodes
Designs, Codes and Cryptography
2007-09-20Paper
Generic Construction of Hybrid Public Key Traitor Tracing with Full-Public-Traceability
Automata, Languages and Programming
2007-09-11Paper
A Note on the Exposure Property of SBIBD
Electronic Notes in Discrete Mathematics
2007-05-29Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2007-05-02Paper
Secret sharing schemes with partial broadcast channels
Designs, Codes and Cryptography
2006-11-22Paper
Cryptology and Network Security
Lecture Notes in Computer Science
2006-11-14Paper
Information Security
Lecture Notes in Computer Science
2006-10-20Paper
RESILIENT LKH: SECURE MULTICAST KEY DISTRIBUTION SCHEMES
International Journal of Foundations of Computer Science
2006-10-16Paper
Information Security and Privacy
Lecture Notes in Computer Science
2006-06-22Paper
Recursive constructions of secure codes and hash families using difference function families.
Journal of Combinatorial Theory. Series A
2006-05-18Paper
2-secure codes from 2-SFP codes
Journal of Discrete Mathematical Sciences and Cryptography
2006-01-13Paper
Computing and Combinatorics
Lecture Notes in Computer Science
2006-01-11Paper
Progress in Cryptology - INDOCRYPT 2004
Lecture Notes in Computer Science
2005-12-22Paper
Public Key Cryptography - PKC 2005
Lecture Notes in Computer Science
2005-12-07Paper
Attack on Han et al.'s ID-based confirmer (undeniable) signature at ACM-EC'03
Applied Mathematics and Computation
2005-11-22Paper
Distributing the encryption and decryption of a block cipher
Designs, Codes and Cryptography
2005-11-07Paper
scientific article; zbMATH DE number 2222187 (Why is no real title available?)2005-11-02Paper
Information Security Practice and Experience
Lecture Notes in Computer Science
2005-09-13Paper
Information Security and Privacy
Lecture Notes in Computer Science
2005-09-07Paper
Information Security and Privacy
Lecture Notes in Computer Science
2005-09-07Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2005-06-13Paper
scientific article; zbMATH DE number 2174614 (Why is no real title available?)2005-06-09Paper
Linear authentication codes: bounds and constructions
IEEE Transactions on Information Theory
2005-06-01Paper
Sequential traitor tracing
IEEE Transactions on Information Theory
2005-06-01Paper
On the Maximal Codes of Length 3 with the 2-Identifiable Parent Property
SIAM Journal on Discrete Mathematics
2005-02-28Paper
scientific article; zbMATH DE number 2127884 (Why is no real title available?)2005-01-14Paper
scientific article; zbMATH DE number 2087911 (Why is no real title available?)2004-08-11Paper
scientific article; zbMATH DE number 2080186 (Why is no real title available?)2004-08-04Paper
scientific article; zbMATH DE number 2080169 (Why is no real title available?)2004-08-04Paper
scientific article; zbMATH DE number 2069521 (Why is no real title available?)2004-05-27Paper
scientific article; zbMATH DE number 2065946 (Why is no real title available?)2004-05-18Paper
scientific article; zbMATH DE number 1303980 (Why is no real title available?)2004-03-09Paper
scientific article; zbMATH DE number 2048539 (Why is no real title available?)2004-03-01Paper
Bounds And Constructions For Threshold Shared Generation Of Authenticators
International Journal of Computer Mathematics
2003-10-21Paper
scientific article; zbMATH DE number 1955789 (Why is no real title available?)2003-07-29Paper
scientific article; zbMATH DE number 1952895 (Why is no real title available?)2003-07-24Paper
scientific article; zbMATH DE number 1950616 (Why is no real title available?)2003-07-17Paper
scientific article; zbMATH DE number 1950604 (Why is no real title available?)2003-07-17Paper
scientific article; zbMATH DE number 1950632 (Why is no real title available?)2003-07-17Paper
scientific article; zbMATH DE number 1950331 (Why is no real title available?)2003-07-17Paper
scientific article; zbMATH DE number 1945880 (Why is no real title available?)2003-07-03Paper
scientific article; zbMATH DE number 1857521 (Why is no real title available?)2003-05-19Paper
Multireceiver authentication codes: Models, bounds, constructions, and extensions
Information and Computation
2003-01-14Paper
scientific article; zbMATH DE number 1759651 (Why is no real title available?)2002-11-23Paper
scientific article; zbMATH DE number 1696657 (Why is no real title available?)2002-10-07Paper
scientific article; zbMATH DE number 1759787 (Why is no real title available?)2002-10-07Paper
scientific article; zbMATH DE number 1808278 (Why is no real title available?)2002-09-26Paper
scientific article; zbMATH DE number 1808250 (Why is no real title available?)2002-09-26Paper
New results on frame-proof codes and traceability schemes
IEEE Transactions on Information Theory
2002-08-04Paper
scientific article; zbMATH DE number 1500490 (Why is no real title available?)2002-07-28Paper
Broadcast authentication for group communication
Theoretical Computer Science
2002-03-03Paper
scientific article; zbMATH DE number 1504565 (Why is no real title available?)2002-01-27Paper
scientific article; zbMATH DE number 1504564 (Why is no real title available?)2002-01-27Paper
Combinatorial characterisation of \(\ell\)-optimal authentication codes with arbitration
JCMCC. The Journal of Combinatorial Mathematics and Combinatorial Computing
2001-09-19Paper
scientific article; zbMATH DE number 1588486 (Why is no real title available?)2001-07-17Paper
scientific article; zbMATH DE number 1588485 (Why is no real title available?)2001-07-17Paper
scientific article; zbMATH DE number 1583943 (Why is no real title available?)2001-07-08Paper
scientific article; zbMATH DE number 1612510 (Why is no real title available?)2001-07-01Paper
scientific article; zbMATH DE number 1487949 (Why is no real title available?)2001-04-26Paper
scientific article; zbMATH DE number 1583950 (Why is no real title available?)2001-04-03Paper
Remarks on the multiple assignment secret sharing scheme
Information and Communications Security
2001-04-01Paper
scientific article; zbMATH DE number 1543053 (Why is no real title available?)2001-02-26Paper
scientific article; zbMATH DE number 1543036 (Why is no real title available?)2001-02-26Paper
scientific article; zbMATH DE number 1500495 (Why is no real title available?)2000-09-04Paper
scientific article; zbMATH DE number 1487952 (Why is no real title available?)2000-08-10Paper
Bounds and Techniques for Efficient Redistribution of Secret Shares to New Access Structures
The Computer Journal
2000-07-27Paper
scientific article; zbMATH DE number 1303147 (Why is no real title available?)2000-02-04Paper
scientific article; zbMATH DE number 1394303 (Why is no real title available?)2000-01-31Paper
scientific article; zbMATH DE number 1360745 (Why is no real title available?)1999-11-10Paper
scientific article; zbMATH DE number 1304306 (Why is no real title available?)1999-09-26Paper
scientific article; zbMATH DE number 1303964 (Why is no real title available?)1999-06-17Paper
scientific article; zbMATH DE number 1303970 (Why is no real title available?)1999-06-17Paper
scientific article; zbMATH DE number 1302798 (Why is no real title available?)1999-06-17Paper
scientific article; zbMATH DE number 1189397 (Why is no real title available?)1998-10-08Paper
scientific article; zbMATH DE number 1189396 (Why is no real title available?)1998-08-13Paper
A multi-level view model for secure object-oriented databases
Data & Knowledge Engineering
1998-07-22Paper
scientific article; zbMATH DE number 1107681 (Why is no real title available?)1998-06-07Paper
scientific article; zbMATH DE number 1153455 (Why is no real title available?)1998-05-17Paper
scientific article; zbMATH DE number 1088920 (Why is no real title available?)1998-04-22Paper
Secret sharing in hierarchical groups
Information and Communications Security
1998-02-16Paper
scientific article; zbMATH DE number 1189392 (Why is no real title available?)1998-01-01Paper
scientific article; zbMATH DE number 1189378 (Why is no real title available?)1998-01-01Paper
scientific article; zbMATH DE number 1186875 (Why is no real title available?)1998-01-01Paper
scientific article; zbMATH DE number 1023997 (Why is no real title available?)1997-08-26Paper
scientific article; zbMATH DE number 1023995 (Why is no real title available?)1997-08-10Paper
scientific article; zbMATH DE number 1024097 (Why is no real title available?)1997-06-18Paper
Authentication codes in plaintext and chosen-content attacks
Designs, Codes and Cryptography
1997-01-14Paper
scientific article; zbMATH DE number 842002 (Why is no real title available?)1996-08-05Paper
scientific article; zbMATH DE number 697810 (Why is no real title available?)1995-02-19Paper
scientific article; zbMATH DE number 177611 (Why is no real title available?)1993-05-18Paper
scientific article; zbMATH DE number 4199439 (Why is no real title available?)1990-01-01Paper


Research outcomes over time


This page was built for person: Reihaneh Safavi-Naini