Shahram Khazaei
Shahram Khazaei
Verified email at sharif.edu
Title
Cited by
Cited by
Year
New features of Latin dances: analysis of Salsa, ChaCha, and Rumba
JP Aumasson, S Fischer, S Khazaei, W Meier, C Rechberger
International Workshop on Fast Software Encryption, 470-488, 2008
1252008
Chosen IV statistical analysis for key recovery attacks on stream ciphers
S Fischer, S Khazaei, W Meier
International Conference on Cryptology in Africa, 236-245, 2008
1182008
Randomized partial checking revisited
S Khazaei, D Wikström
Cryptographers’ Track at the RSA Conference, 115-128, 2013
432013
Distinguishing Attack on Grain. ECRYPT Stream Cipher Project Report 2005/071 (2005)
S Khazaei, M Hassanzadeh, M Kiaei
ECRYPT Stream Cipher Project Report 6477 (2005/071), 130-145, 2005
32*2005
Linear sequential circuit approximation of the trivium stream cipher
S Khazaei, M Hassanzadeh
ECRYPT Stream Cipher Project, EU, Rep 63, 2005
28*2005
A mix-net from any CCA2 secure cryptosystem
S Khazaei, T Moran, D Wikström
International Conference on the Theory and Application of Cryptology and …, 2012
272012
Linearization framework for collision attacks: Application to CubeHash and MD6
E Brier, S Khazaei, W Meier, T Peyrin
International Conference on the Theory and Application of Cryptology and …, 2009
242009
Improved guess and determine attack on SOSEMANUK
H Ahmadi, T Eghlidos, S Khazaei
ECRYPT Stream Cipher Project, Report 85, 2005, 2005
202005
Evaluation of SOSEMANUK with regard to guess-and-determine attacks
Y Tsunoo, T Saito, M Shigeri, T Suzaki, H Ahmadi, T Eghlidos, S Khazaei
SASC 2006 Stream Ciphers Revisited, 25, 2006
192006
Cryptanalysis of a Universally Verifiable Efficient Re-encryption Mixnet.
S Khazaei, B Terelius, D Wikström
EVT/WOTE, 2012
152012
New directions in cryptanalysis of self-synchronizing stream ciphers
S Khazaei, W Meier
International Conference on Cryptology in India, 15-26, 2008
132008
Reduced complexity attacks on the alternating step generator
S Khazaei, S Fischer, W Meier
International Workshop on Selected Areas in Cryptography, 1-16, 2007
122007
Optimal linear secret sharing schemes for graph access structures on six participants
M Gharahi, S Khazaei
Theoretical Computer Science 771, 1-8, 2019
112019
Publicly verifiable searchable symmetric encryption based on efficient cryptographic components
A Soleimanian, S Khazaei
Designs, Codes and Cryptography 87 (1), 123-147, 2019
112019
On reconstruction of RC4 keys from internal states
S Khazaei, W Meier
Mathematical Methods in Computer Science, 179-189, 2008
112008
Cryptanalysis of Pomaranch (CJCSG)
S Khazaei
eSTREAM, ECRYPT Stream Cipher Project, Report 65, 2005, 2005
11*2005
Ciphertext-only attack on d× d Hill in O (d13d)
S Khazaei, S Ahmadi
IACR Cryptology ePrint Archive, 2015
82015
Reduced access structures with four minimal qualified subsets on six participants
M Gharahi, S Khazaei
Advances in Mathematics of Communications 12 (1), 199, 2018
72018
Improved linear differential attacks on CubeHash
S Khazaei, S Knellwolf, W Meier, D Stefan
International Conference on Cryptology in Africa, 407-418, 2010
72010
Re: A reformulation of TRIVIUM. Posted on the eSTREAM Forum
S Khazaei
7*2006
The system can't perform the operation now. Try again later.
Articles 1–20