Relations between semantic security and indistinguishability against cpa, non-adaptive cca and adaptive cca in comparison based framework A Bagherzandi, K Azimian, J Mohajeri, M Salmasizadeh arXiv preprint cs/0508110, 2005 | 7 | 2005 |
Parallel repetition of the odd cycle game K Azimian, M Szegedy LATIN 2008: Theoretical Informatics: 8th Latin American Symposium, Búzios …, 2008 | 6 | 2008 |
Provable Partial Key Escrow. K Azimian, J Mohajeri, M Salmasizadeh, SS Wagstaff Jr Int. J. Netw. Secur. 10 (2), 121-124, 2010 | 3 | 2010 |
Weak Composite Diffie-Hellman. K Azimian, J Mohajeri, M Salmasizadeh Int. J. Netw. Secur. 7 (3), 383-387, 2008 | 3 | 2008 |
A Verifiable Partial Key Escrow, Based on McCurley Encryption Scheme K Azimian, J Mohajeri, M Salmasizadeh, S Fayyaz arXiv preprint cs/0505055, 2005 | 1 | 2005 |
Breaking Diffie-Hellman is no easier than root finding K Azimian Electronic Colloquium on Computational Complexity (ECCC, https://eccc …, 2005 | 1 | 2005 |
Weak Composite Diffie-Hellman is not weaker than factoring K Azimian, J Mohajeri, M Salmasizadeh Cryptology ePrint Archive, 2005 | 1 | 2005 |