Follow
Karim Baghery
Karim Baghery
Postdoc at COSIC, KU Leuven
Verified email at kuleuven.be - Homepage
Title
Cited by
Cited by
Year
A Subversion-Resistant SNARK
B Abdolmaleki, K Baghery, H Lipmaa, M Zając
International Conference on the Theory and Application of Cryptology and …, 2017
96*2017
Traceability analysis of recent RFID authentication protocols
SM Alavi, K Baghery, B Abdolmaleki, MR Aref
Wireless Personal Communications 83 (3), 1663-1682, 2015
332015
Another look at extraction and randomization of Groth’s zk-SNARK
K Baghery, M Kohlweiss, J Siim, M Volkhov
International Conference on Financial Cryptography and Data Security, 457-475, 2021
302021
UC-Secure CRS Generation for SNARKs
B Abdolmaleki, K Baghery, H Lipmaa, J Siim
Progress in Cryptology-AFRICACRYPT 2019: 11th International Conference on …, 2019
282019
On the efficiency of privacy-preserving smart contract systems
K Baghery
Progress in Cryptology-AFRICACRYPT 2019: 11th International Conference on …, 2019
232019
Simulation extractability in Groth’s zk-SNARK
S Atapoor, K Baghery
Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS …, 2019
212019
Security and privacy flaws in a recent authentication protocol for EPC C1 G2 RFID tags
SM Alavi, K Baghery, B Abdolmaleki
Advances in Computer Science: an Int. Journal 3 (5), 44-52, 2014
192014
Subversion-resistant simulation (knowledge) sound NIZKs
K Baghery
Cryptography and Coding: 17th IMA International Conference, IMACC 2019 …, 2019
172019
Attacks and improvements on two new-found RFID authentication protocols
B Abdolmaleki, K Baghery, B Akhbari, MR Aref
7'th International Symposium on Telecommunications (IST'2014), 895-900, 2014
162014
Simulation extractable versions of Groth’s zk-SNARK revisited
K Baghery, Z Pindado, C Rāfols
Cryptology and Network Security: 19th International Conference, CANS 2020 …, 2020
142020
DL-extractable UC-commitment schemes
B Abdolmaleki, K Baghery, H Lipmaa, J Siim, M Zając
Applied Cryptography and Network Security: 17th International Conference …, 2019
92019
Privacy analysis and improvements of two recent RFID authentication protocols
K Baghery, B Abdolmaleki, B Akhbari, MR Aref
2014 11th International ISC Conference on Information Security and …, 2014
92014
Enhancing privacy of recent authentication schemes for low-cost RFID systems
K Baghery, B Abdolmaleki, B Akhbari, MR Aref
The ISC International Journal of Information Security 7 (2), 135-149, 2015
82015
Cryptanalysis of two EPC-based RFID security schemes
B Abdolmaleki, K Baghery, B Akhbari, MR Aref
2015 12th International ISC Conference on Information Security and …, 2015
82015
Vulnerabilities and improvements on HRAP+, a Hash-based RFID authentication protocol
SM Alavi, B Abdolmaleki, K Baghery
Advances in Computer Science: an International Journal 3 (6), 51-56, 2014
82014
Tiramisu: Black-Box Simulation Extractable NIZKs in the Updatable CRS Model
K Baghery, M Sedaghat
International Conference on Cryptology and Network Security, 531-551, 2021
62021
Signatures of knowledge for boolean circuits under standard assumptions
K Baghery, A González, Z Pindado, C Rāfols
Progress in Cryptology-AFRICACRYPT 2020: 12th International Conference on …, 2020
62020
Game-based privacy analysis of RFID security schemes for confident authentication in IoT
B Abdolmaleki, K Baghery, S Khazaei, MR Aref
Wireless Personal Communications 95, 5057-5080, 2017
62017
Untraceable rfid authentication protocols for epc compliant tags
K Baghery, B Abdolmaleki, B Akhbari, MR Aref
2015 23rd Iranian Conference on Electrical Engineering, 426-431, 2015
62015
Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags
K Baghery, B Abdolmaleki, MJ Emadi
AUT Journal of Electrical Engineering 46 (1), 27-36, 2014
62014
The system can't perform the operation now. Try again later.
Articles 1–20