Zobrazeno 1 - 10
of 27
pro vyhledávání: '"Karim Baghery"'
Publikováno v:
International Journal of Information and Communication Technology Research, Vol 6, Iss 4, Pp 7-12 (2014)
In the past few years, the design of RFID authentication protocols in accordance with the EPC Class-1 Generation-2 (EPC C1 G2) standards, has been one of the most important challenges in the information security domain. Although RFID systems provide
Externí odkaz:
https://doaj.org/article/22c24a5e6ea545c881a857ade5f7b3d6
Publikováno v:
Progress in Cryptology-AFRICACRYPT 2020 ISBN: 9783030519377
AFRICACRYPT
Progress in Cryptology-AFRICACRYPT 2020
AFRICACRYPT
Progress in Cryptology-AFRICACRYPT 2020
Comunicació presentada al AFRICACRYPT 2020: 12th International Conference on Cryptology in Africa, celebrat del 20 al 22 de juliol de 2021 al Caire, Egipte. This paper constructs unbounded simulation sound proofs for boolean circuit satisfiability u
Publikováno v:
Applied Cryptography and Network Security ISBN: 9783031334900
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9519c7eb7d827cb56c87a04c0e9a3fd4
https://doi.org/10.1007/978-3-031-33491-7_9
https://doi.org/10.1007/978-3-031-33491-7_9
Autor:
Karim Baghery, Navid Ghaedi Bardeh
Publikováno v:
Cryptology and Network Security ISBN: 9783031209734
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::47de7d6152a124f17dd2cff02c608b54
https://doi.org/10.1007/978-3-031-20974-1_2
https://doi.org/10.1007/978-3-031-20974-1_2
Publikováno v:
Financial Cryptography and Data Security ISBN: 9783662643211
Financial Cryptography (1)
Financial Cryptography (1)
Due to the simplicity and performance of zk-SNARKs they are widely used in real-world cryptographic protocols, including blockchain and smart contract systems. Simulation Extractability (SE) is a necessary security property for a NIZK argument to ach
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::fcac9b007d8c4af522e222584e21f52b
https://doi.org/10.1007/978-3-662-64322-8_22
https://doi.org/10.1007/978-3-662-64322-8_22
Publikováno v:
Cryptography and Coding ISBN: 9783030926403
Cryptography and Coding-IMACC 2021
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Cryptography and Coding
Cryptography and Coding-IMACC 2021
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Cryptography and Coding
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::9b0c5e5d20cce5baaa6e0001370fa25b
https://doi.org/10.1007/978-3-030-92641-0_9
https://doi.org/10.1007/978-3-030-92641-0_9
Autor:
Nigel P. Smart, Cyprien Delpech de Saint Guilhem, Karim Baghery, Emmanuela Orsini, Titouan Tanguy
Publikováno v:
Topics in Cryptology-CT-RSA 2021
Topics in Cryptology – CT-RSA 2021 ISBN: 9783030755386
CT-RSA
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Topics in Cryptology – CT-RSA 2021
Topics in Cryptology – CT-RSA 2021 ISBN: 9783030755386
CT-RSA
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Topics in Cryptology – CT-RSA 2021
This paper introduces M-Circuits, a program representation which generalizes arithmetic and binary circuits. This new representation is motivated by the way modern multi-party computation (MPC) systems based on linear secret sharing schemes actually
Publikováno v:
Cryptology and Network Security ISBN: 9783030654108
CANS
CANS
Among various NIZK arguments, zk-SNARKs are the most efficient constructions in terms of proof size and verification which are two critical criteria for large scale applications. Currently, Groth’s construction, \(\textsf {Groth16}\), from Eurocryp
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6d502fa6a5de420ad1eeb4eba4d05cee
https://doi.org/10.1007/978-3-030-65411-5_22
https://doi.org/10.1007/978-3-030-65411-5_22
Autor:
Karim Baghery
Publikováno v:
Security and Trust Management ISBN: 9783030598167
STM
STM
Recently, various news is reported about the subversion of trusted setup phase in mass-surveillance activities; strictly speaking about commitment schemes, recently it was discovered that the SwissPost-Scytl mix-net uses a trapdoor commitment scheme,
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c19bf8324aec61247bb4dda282ad4ccf
https://doi.org/10.1007/978-3-030-59817-4_7
https://doi.org/10.1007/978-3-030-59817-4_7
Publikováno v:
Wireless Networks. 25:1235-1252
Due to their impressive advantages, Radio Frequency IDentification (RFID) systems are ubiquitously found in various novel applications. These applications are usually in need of quick and accurate authentication or identification. In many cases, it h