Follow
Behzad Abdolmaleki
Behzad Abdolmaleki
University of Sheffield, United Kingdom
Verified email at sheffield.ac.uk - Homepage
Title
Cited by
Cited by
Year
On Subversion-Resistant SNARKs
B Abdolmaleki, H Lipmaa, J Siim, M Zając
Journal of Cryptology 34 (3), 1-42, 2021
1162021
Lift-and-Shift: Obtaining Simulation Extractable Subversion and Updatable SNARKs Generically
B Abdolmaleki, S Ramacher, D Slamanig
ACM SIGSAC Conference on Computer and Communications Security, CCS 2020, 2020
482020
Traceability analysis of recent RFID authentication protocols
SM Alavi, K Baghery, B Abdolmaleki, MR Aref
Wireless Personal Communications 83, 1663-1682, 2015
342015
UC-Secure CRS Generation for SNARKs
B Abdolmaleki, K Baghery, H Lipmaa, J Siim
International Conference on Cryptology in Africa, 99-117, 2019
332019
On QA-NIZK in the BPK model
B Abdolmaleki, H Lipmaa, J Siim, M Zając
Public-Key Cryptography–PKC 2020: 23rd IACR International Conference on …, 2020
302020
Security and privacy flaws in a recent authentication protocol for EPC C1 G2 RFID tags
SM Alavi, K Baghery, B Abdolmaleki
Advances in Computer Science: an International Journal 3 (5), 44-52, 2014
172014
Attacks and improvements on two new-found RFID authentication protocols
B Abdolmaleki, K Baghery, B Akhbari, MR Aref
7'th International Symposium on Telecommunications (IST'2014), 895-900, 2014
152014
DL-Extractable UC-Commitment Schemes
B Abdolmaleki, K Baghery, H Lipmaa, J Siim, M Zając
Applied Cryptography and Network Security 2019 (ACNS 2019) 11464, 385-405, 2019
102019
Privacy analysis and improvements of two recent RFID authentication protocols
K Baghery, B Abdolmaleki, B Akhbari, MR Aref
2014 11th International ISC Conference on Information Security and …, 2014
102014
Universally Composable NIZKs: Circuit-Succinct, Non-Malleable and CRS-Updatable
B Abdolmaleki, N Glaeser, S Ramacher, D Slamanig
Cryptology ePrint Archive, 2023
9*2023
Cryptanalysis of two EPC-based RFID security schemes
B Abdolmaleki, K Baghery, B Akhbari, MR Aref
2015 12th International Iranian Society of Cryptology Conference on …, 2015
82015
Enhancing Privacy of Recent Authentication Schemes for Low-Cost RFID Systems.
K Baghery, B Abdolmaleki, B Akhbari, MR Aref
ISeCure 7 (2), 2015
82015
Vulnerabilities and improvements on HRAP+, a hash based RFID authentication protocol
SM Alavi, B Abdolmaleki, K Baghery
Advances in Computer Science: an International Journal 3 (6), 51-56, 2014
82014
Subversion-Resistant Quasi-Adaptive NIZK and Applications to Modular zk-SNARKs
B Abdolmaleki, D Slamanig
International Conference on Cryptology and Network Security CANS, 2021, 2021
7*2021
Analysis of a novel audio hash function based upon stationary wavelet transform
M Nouri, Z Zeinolabedini, B Abdolmaleki, N Farhangian
2012 6th International Conference on Application of Information and …, 2014
72014
SoK: Lifting Transformations for Simulation Extractable Subversion and Updatable SNARKs
B Abdolmaleki, S Ramacher, D Slamanig
The 3rd ZKProof Workshop, 2020
62020
Game-Based Privacy Analysis of RFID Security Schemes for Confident Authentication in IoT
B Abdolmaleki, K Baghery, S Khazaei, MR Aref
Wireless Personal Communications 95 (4), 5057--5080, 2017
62017
Game-based cryptanalysis of a lightweight CRC-based authentication protocol for EPC tags
K Baghery, B Abdolmaleki, MJ Emadi
Cryptology ePrint Archive, 2016
62016
Untraceable RFID authentication protocols for EPC compliant tags
K Baghery, B Abdolmaleki, B Akhbari, MR Aref
2015 23rd Iranian Conference on Electrical Engineering, 426-431, 2015
62015
Two-Round Concurrently Secure Two-Party Computation
B Abdolmaleki, G Malavolta, A Rahimi
Cryptology ePrint Archive, 2021
42021
The system can't perform the operation now. Try again later.
Articles 1–20