Non-interactive secure computation based on cut-and-choose A Afshar, P Mohassel, B Pinkas, B Riva Advances in Cryptology–EUROCRYPT 2014: 33rd Annual International Conference …, 2014 | 126 | 2014 |
How to efficiently evaluate RAM programs with malicious security A Afshar, Z Hu, P Mohassel, M Rosulek Annual International Conference on the Theory and Applications of …, 2015 | 49 | 2015 |
Analysis of federated learning as a distributed solution for learning on edge devices SF Lameh, W Noble, Y Amannejad, A Afshar 2020 International Conference on Intelligent Data Science Technologies and …, 2020 | 8 | 2020 |
Efficient maliciously secure two party computation for mixed programs A Afshar, P Mohassel, M Rosulek Cryptology ePrint Archive, 2017 | 5 | 2017 |
Method and system for private identity verification A Afshar, A Jivanyan US Patent 11,489,819, 2022 | 1 | 2022 |
Reconstructing security types for automated policy enforcement in FABLE A Afshar, MS Fallah 2011 5th International Conference on Network and System Security, 358-363, 2011 | 1 | 2011 |
Modeling sequential and concurrent programs with Reo and constraint automata B Pourvatan, A Afshar, N Rouhy Technical report, 2007 | 1 | 2007 |
Method and system for private identity verification A Afshar, A Jivanyan US Patent App. 18/762,118, 2025 | | 2025 |
Method and system for private identity verification A Afshar, A Jivanyan US Patent 12,034,706, 2024 | | 2024 |
MERCAT: Mediated, Encrypted, Reversible, SeCure Asset Transfers A Jivanyan, J Lancaster, A Afshar, P Alimi Cryptology ePrint Archive, 2021 | | 2021 |
Design and Implementation of Maliciously Secure Two-Party Computation Based on Garbled Circuits. A Afshar University of Calgary, Alberta, Canada, 2017 | | 2017 |