On Subversion-Resistant SNARKs B Abdolmaleki, H Lipmaa, J Siim, M Zając Journal of Cryptology 34 (3), 1-42, 2021 | 118 | 2021 |
Lift-and-Shift: Obtaining Simulation Extractable Subversion and Updatable SNARKs Generically B Abdolmaleki, S Ramacher, D Slamanig ACM SIGSAC Conference on Computer and Communications Security, CCS 2020, 2020 | 52 | 2020 |
Traceability analysis of recent RFID authentication protocols SM Alavi, K Baghery, B Abdolmaleki, MR Aref Wireless Personal Communications 83, 1663-1682, 2015 | 34 | 2015 |
UC-Secure CRS Generation for SNARKs B Abdolmaleki, K Baghery, H Lipmaa, J Siim International Conference on Cryptology in Africa, 99-117, 2019 | 33 | 2019 |
On QA-NIZK in the BPK model B Abdolmaleki, H Lipmaa, J Siim, M Zając Public-Key Cryptography–PKC 2020: 23rd IACR International Conference on …, 2020 | 31 | 2020 |
Security and privacy flaws in a recent authentication protocol for EPC C1 G2 RFID tags SM Alavi, K Baghery, B Abdolmaleki Advances in Computer Science: an International Journal 3 (5), 44-52, 2014 | 19 | 2014 |
Attacks and improvements on two new-found RFID authentication protocols B Abdolmaleki, K Baghery, B Akhbari, MR Aref 7'th International Symposium on Telecommunications (IST'2014), 895-900, 2014 | 15 | 2014 |
Circuit-Succinct Universally-Composable NIZKs with Updatable CRS B Abdolmaleki, N Glaeser, S Ramacher, D Slamanig IEEE 37th Computer Security Foundations Symposium (CSF), Enschede, Netherlands,, 2024 | 13* | 2024 |
DL-Extractable UC-Commitment Schemes B Abdolmaleki, K Baghery, H Lipmaa, J Siim, M Zając Applied Cryptography and Network Security 2019 (ACNS 2019) 11464, 385-405, 2019 | 11 | 2019 |
Privacy analysis and improvements of two recent RFID authentication protocols K Baghery, B Abdolmaleki, B Akhbari, MR Aref 2014 11th International ISC Conference on Information Security and …, 2014 | 10 | 2014 |
Cryptanalysis of two EPC-based RFID security schemes B Abdolmaleki, K Baghery, B Akhbari, MR Aref 2015 12th International Iranian Society of Cryptology Conference on …, 2015 | 8 | 2015 |
Enhancing Privacy of Recent Authentication Schemes for Low-Cost RFID Systems. K Baghery, B Abdolmaleki, B Akhbari, MR Aref ISeCure 7 (2), 2015 | 8 | 2015 |
Vulnerabilities and improvements on HRAP+, a hash based RFID authentication protocol SM Alavi, B Abdolmaleki, K Baghery Advances in Computer Science: an International Journal 3 (6), 51-56, 2014 | 8 | 2014 |
Subversion-Resistant Quasi-Adaptive NIZK and Applications to Modular zk-SNARKs B Abdolmaleki, D Slamanig International Conference on Cryptology and Network Security CANS, 2021, 2021 | 7* | 2021 |
Analysis of a novel audio hash function based upon stationary wavelet transform M Nouri, Z Zeinolabedini, B Abdolmaleki, N Farhangian 2012 6th International Conference on Application of Information and …, 2014 | 7 | 2014 |
SoK: Lifting Transformations for Simulation Extractable Subversion and Updatable SNARKs B Abdolmaleki, S Ramacher, D Slamanig The 3rd ZKProof Workshop, 2020 | 6 | 2020 |
Game-Based Privacy Analysis of RFID Security Schemes for Confident Authentication in IoT B Abdolmaleki, K Baghery, S Khazaei, MR Aref Wireless Personal Communications 95 (4), 5057--5080, 2017 | 6 | 2017 |
Game-based cryptanalysis of a lightweight CRC-based authentication protocol for EPC tags K Baghery, B Abdolmaleki, MJ Emadi Cryptology ePrint Archive, 2016 | 6 | 2016 |
Untraceable RFID authentication protocols for EPC compliant tags K Baghery, B Abdolmaleki, B Akhbari, MR Aref 2015 23rd Iranian Conference on Electrical Engineering, 426-431, 2015 | 6 | 2015 |
A Framework for UC-Secure Commitments from Publicly Computable Smooth Projective Hashing B Abdolmaleki, H Khoshakhlagh, D Slamanig IMA International Conference on Cryptography and Coding, 1-21, 2019 | 5 | 2019 |