Shahram Khazaei
Shahram Khazaei
Verified email at
Cited by
Cited by
New features of Latin dances: analysis of Salsa, ChaCha, and Rumba
JP Aumasson, S Fischer, S Khazaei, W Meier, C Rechberger
International Workshop on Fast Software Encryption, 470-488, 2008
Chosen IV statistical analysis for key recovery attacks on stream ciphers
S Fischer, S Khazaei, W Meier
Progress in Cryptology–AFRICACRYPT 2008: First International Conference on …, 2008
Randomized partial checking revisited
S Khazaei, D Wikström
Cryptographers’ Track at the RSA Conference, 115-128, 2013
Publicly verifiable searchable symmetric encryption based on efficient cryptographic components
A Soleimanian, S Khazaei
Designs, Codes and Cryptography 87 (1), 123-147, 2019
Distinguishing Attack on Grain. ECRYPT Stream Cipher Project Report 2005/071 (2005)
S Khazaei, M Hassanzadeh, M Kiaei
ECRYPT Stream Cipher Project Report 6477 (2005/071), 130-145, 2005
Evaluation of SOSEMANUK With Regard to Guess-and-Determine Attacks, eSTREAM report 2006/009 (2006)
Y Tsunoo, T Saito, M Shigeri, T Suzaki, H Ahmadi, T Eghlidos, S Khazaei
URL: http://www. ecrypt. eu. org/stream/papers. html. Citations in this …, 0
A mix-net from any CCA2 secure cryptosystem
S Khazaei, T Moran, D Wikström
Advances in Cryptology–ASIACRYPT 2012: 18th International Conference on the …, 2012
Linear Sequential Circuit Approximation of Grain and Trivium Stream Ciphers. eSTREAM
S Khazaei, MM Hasanzadeh, MS Kiaei
ECRYPT Stream Cipher Project, Report 63, 2005, 2005
Linearization framework for collision attacks: Application to CubeHash and MD6
E Brier, S Khazaei, W Meier, T Peyrin
Advances in Cryptology–ASIACRYPT 2009: 15th International Conference on the …, 2009
Optimal linear secret sharing schemes for graph access structures on six participants
M Gharahi, S Khazaei
Theoretical Computer Science 771, 1-8, 2019
Cryptanalysis of a Universally Verifiable Efficient Re-encryption Mixnet.
S Khazaei, B Terelius, D Wikström
EVT/WOTE, 2012
Reduced complexity attacks on the alternating step generator
S Khazaei, S Fischer, W Meier
International Workshop on Selected Areas in Cryptography, 1-16, 2007
Ciphertext-only attack on d× d Hill in O (d13d)
S Khazaei, S Ahmadi
Information Processing Letters 118, 25-29, 2017
On abelian and homomorphic secret sharing schemes
A Jafari, S Khazaei
Journal of Cryptology 34, 1-36, 2021
On reconstruction of RC4 keys from internal states
S Khazaei, W Meier
Mathematical Methods in Computer Science: Essays in Memory of Thomas Beth …, 2008
New directions in cryptanalysis of self-synchronizing stream ciphers
S Khazaei, W Meier
Progress in Cryptology-INDOCRYPT 2008: 9th International Conference on …, 2008
Cryptanalysis of Pomaranch (CJCSG)
S Khazaei
eSTREAM, ECRYPT Stream Cipher Project, Report 65, 2005, 2005
A rigorous security analysis of a decentralized electronic voting protocol in the universal composability framework
S Khazaei, M Rezaei-Aliabadi
Journal of information security and applications 43, 99-109, 2018
Return code schemes for electronic voting systems
S Khazaei, D Wikström
Electronic Voting: Second International Joint Conference, E-Vote-ID 2017 …, 2017
Divide and conquer attack on ABC stream cipher. eSTREAM, ECRYPT Stream Cipher Project, Report 2005/052, 2005
S Khazaei
The system can't perform the operation now. Try again later.
Articles 1–20