default search action
Aysajan Abidin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Leonard Schild, Aysajan Abidin, Bart Preneel:
Fast Transciphering Via Batched And Reconfigurable LUT Evaluation. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(4): 205-230 (2024) - [j9]Erik Pohle, Aysajan Abidin, Bart Preneel:
Fast Evaluation of S-Boxes With Garbled Circuits. IEEE Trans. Inf. Forensics Secur. 19: 5530-5544 (2024) - [c24]Martin Zbudila, Erik Pohle, Aysajan Abidin, Bart Preneel:
MaSTer: Maliciously Secure Truncation for Replicated Secret Sharing Without Pre-processing. CANS (1) 2024: 49-73 - [c23]Kevin Bogner, Dave Singelée, Aysajan Abidin:
Entangled States and Bell's Inequality: A New Approach to Quantum Distance Bounding. ISCC 2024: 1-6 - [i22]Erik Pohle, Aysajan Abidin, Bart Preneel:
Fast Evaluation of S-boxes with Garbled Circuits. CoRR abs/2405.20713 (2024) - [i21]Martin Zbudila, Erik Pohle, Aysajan Abidin, Bart Preneel:
MaSTer: Maliciously Secure Truncation for Replicated Secret Sharing without Pre-Processing. IACR Cryptol. ePrint Arch. 2024: 1026 (2024) - 2023
- [c22]Amit Singh Bhati, Erik Pohle, Aysajan Abidin, Elena Andreeva, Bart Preneel:
Let's Go Eevee! A Friendly and Suitable Family of AEAD Modes for IoT-to-Cloud Secure Computation. CCS 2023: 2546-2560 - [c21]Aysajan Abidin, Enzo Marquet, Jerico Moeyersons, Xhulio Limani, Erik Pohle, Michiel Van Kenhove, Johann M. Márquez-Barja, Nina Slamnik-Krijestorac, Bruno Volckaert:
MOZAIK: An End-to-End Secure Data Sharing Platform. DEC@SIGMOD 2023: 34-40 - [c20]Aysajan Abidin, Erik Pohle, Bart Preneel:
Arithmetic Circuit Implementations of S-boxes for SKINNY and PHOTON in MPC. ESORICS (1) 2023: 86-105 - [c19]Enzo Marquet, Jerico Moeyersons, Erik Pohle, Michiel Van Kenhove, Aysajan Abidin, Bruno Volckaert:
Secure Key Management for Multi-Party Computation in MOZAIK. EuroS&P Workshops 2023: 133-140 - [c18]Omid Mirzamohammadi, Kristof Jannes, Laurens Sion, Dimitri Van Landuyt, Aysajan Abidin, Dave Singelée:
Security and Privacy Threat Analysis for Solid. SecDev 2023: 196-206 - [i20]Aysajan Abidin, Karim Eldefrawy, Dave Singelée:
Entanglement-based Mutual Quantum Distance Bounding. CoRR abs/2305.09905 (2023) - [i19]Amit Singh Bhati, Erik Pohle, Aysajan Abidin, Elena Andreeva, Bart Preneel:
Let's Go Eevee! A Friendly and Suitable Family of AEAD Modes for IoT-to-Cloud Secure Computation. IACR Cryptol. ePrint Arch. 2023: 1361 (2023) - [i18]Aysajan Abidin, Erik Pohle, Bart Preneel:
Arithmetic Circuit Implementations of S-boxes for SKINNY and PHOTON in MPC. IACR Cryptol. ePrint Arch. 2023: 1426 (2023) - 2022
- [j8]Giuseppe Garofalo, Tim Van hamme, Davy Preuveneers, Wouter Joosen, Aysajan Abidin, Mustafa A. Mustafa:
PIVOT: Private and Effective Contact Tracing. IEEE Internet Things J. 9(22): 22466-22489 (2022) - [i17]Erik Pohle, Aysajan Abidin, Bart Preneel:
Fast Evaluation of S-boxes with Garbled Circuits. IACR Cryptol. ePrint Arch. 2022: 1278 (2022) - 2021
- [j7]Aysajan Abidin, Mohieddine El Soussi, Jac Romme, Pepijn Boer, Dave Singelée, Christian Bachmann:
Secure, Accurate, and Practical Narrow-Band Ranging System. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(2): 106-135 (2021) - [i16]Aysajan Abidin, Mohieddine El Soussi, Jac Romme, Pepijn Boer, Dave Singelée, Christian Bachmann:
Secure, Accurate, and Practical Narrow-Band Ranging System. IACR Cryptol. ePrint Arch. 2021: 70 (2021) - 2020
- [j6]Aysajan Abidin:
On Detecting Relay Attacks on RFID Systems Using Qubits. Cryptogr. 4(2): 14 (2020) - [j5]Carmela Troncoso, Mathias Payer, Jean-Pierre Hubaux, Marcel Salathé, James R. Larus, Wouter Lueks, Theresa Stadler, Apostolos Pyrgelis, Daniele Antonioli, Ludovic Barman, Sylvain Chatel, Kenneth G. Paterson, Srdjan Capkun, David A. Basin, Jan Beutel, Dennis Jackson, Marc Roeschlin, Patrick Leu, Bart Preneel, Nigel P. Smart, Aysajan Abidin, Seda Gurses, Michael Veale, Cas Cremers, Michael Backes, Nils Ole Tippenhauer, Reuben Binns, Ciro Cattuto, Alain Barrat, Dario Fiore, Manuel Barbosa, Rui Oliveira, José Pereira:
Decentralized Privacy-Preserving Proximity Tracing. IEEE Data Eng. Bull. 43(2): 36-66 (2020) - [i15]Carmela Troncoso, Mathias Payer, Jean-Pierre Hubaux, Marcel Salathé, James R. Larus, Edouard Bugnion, Wouter Lueks, Theresa Stadler, Apostolos Pyrgelis, Daniele Antonioli, Ludovic Barman, Sylvain Chatel, Kenneth G. Paterson, Srdjan Capkun, David A. Basin, Jan Beutel, Dennis Jackson, Marc Roeschlin, Patrick Leu, Bart Preneel, Nigel P. Smart, Aysajan Abidin, Seda F. Gürses, Michael Veale, Cas Cremers, Michael Backes, Nils Ole Tippenhauer, Reuben Binns, Ciro Cattuto, Alain Barrat, Dario Fiore, Manuel Barbosa, Rui Oliveira, José Pereira:
Decentralized Privacy-Preserving Proximity Tracing. CoRR abs/2005.12273 (2020) - [i14]Giuseppe Garofalo, Tim Van hamme, Davy Preuveneers, Wouter Joosen, Aysajan Abidin, Mustafa A. Mustafa:
Striking the Balance: Effective yet Privacy Friendly Contact Tracing. IACR Cryptol. ePrint Arch. 2020: 559 (2020) - [i13]Seyed Farhad Aghili, Amirhossein Adavoudi Jolfaei, Aysajan Abidin:
SAKE+: Strengthened Symmetric-Key Authenticated Key Exchange with Perfect Forward Secrecy for IoT. IACR Cryptol. ePrint Arch. 2020: 778 (2020)
2010 – 2019
- 2019
- [j4]Enrique Argones-Rúa, Aysajan Abidin, Roel Peeters, Jac Romme:
Efficient and Privacy-Preserving Cryptographic Key Derivation From Continuous Sources. IEEE Trans. Inf. Forensics Secur. 14(11): 2834-2847 (2019) - [j3]Mustafa A. Mustafa, Sara Cleemput, Abdelrahaman Aly, Aysajan Abidin:
A Secure and Privacy-Preserving Protocol for Smart Metering Operational Data Collection. IEEE Trans. Smart Grid 10(6): 6481-6490 (2019) - [c17]Aysajan Abidin, Abdelrahaman Aly, Mustafa A. Mustafa:
Collaborative Authentication Using Threshold Cryptography. ETAA@ESORICS 2019: 122-137 - [c16]Aysajan Abidin:
Quantum distance bounding. WiSec 2019: 233-238 - [i12]Abdelrahaman Aly, Aysajan Abidin, Svetla Nikova:
Practically Efficient Secure Distributed Exponentiation without Bit-Decomposition. IACR Cryptol. ePrint Arch. 2019: 334 (2019) - 2018
- [c15]Ryan Amiri, Aysajan Abidin, Petros Wallden, Erika Andersson:
Efficient Unconditionally Secure Signatures Using Universal Hashing. ACNS 2018: 143-162 - [c14]Abdelrahaman Aly, Aysajan Abidin, Svetla Nikova:
Practically Efficient Secure Distributed Exponentiation Without Bit-Decomposition. Financial Cryptography 2018: 291-309 - [i11]Mustafa A. Mustafa, Sara Cleemput, Abdelrahaman Aly, Aysajan Abidin:
A Secure and Privacy-preserving Protocol for Smart Metering Operational Data Collection. CoRR abs/1801.08353 (2018) - [i10]Aysajan Abidin, Abdelrahaman Aly, Sara Cleemput, Mustafa A. Mustafa:
Secure and Privacy-Friendly Local Electricity Trading and Billing in Smart Grid. CoRR abs/1801.08354 (2018) - [i9]Mustafa A. Mustafa, Aysajan Abidin, Enrique Argones-Rúa:
Frictionless Authentication System: Security & Privacy Analysis and Potential Solutions. CoRR abs/1802.07231 (2018) - [i8]Tim Van hamme, Vera Rimmer, Davy Preuveneers, Wouter Joosen, Mustafa A. Mustafa, Aysajan Abidin, Enrique Argones-Rúa:
Frictionless Authentication Systems: Emerging Trends, Research Challenges and Opportunities. CoRR abs/1802.07233 (2018) - [i7]Mustafa A. Mustafa, Sara Cleemput, Abdelrahaman Aly, Aysajan Abidin:
A Secure and Privacy-preserving Protocol for Smart Metering Operational Data Collection. IACR Cryptol. ePrint Arch. 2018: 101 (2018) - 2017
- [c13]Mustafa A. Mustafa, Sara Cleemput, Abdelrahaman Aly, Aysajan Abidin:
An MPC-based protocol for secure and privacy-preserving smart metering. ISGT Europe 2017: 1-6 - [c12]Aysajan Abidin, Enrique Argones-Rúa, Roel Peeters:
Uncoupling Biometrics from Templates for Secure and Privacy-Preserving Authentication. SACMAT 2017: 21-29 - [i6]Roel Peeters, Jens Hermans, Aysajan Abidin:
Attacks on Karlsson and Mitrokotsa's Grouping-Proof-Distance-Bounding Protocol. IACR Cryptol. ePrint Arch. 2017: 132 (2017) - 2016
- [j2]Christoph Pacher, Aysajan Abidin, Thomas Lorünser, Momtchil Peev, Rupert Ursin, Anton Zeilinger, Jan-Åke Larsson:
Attacks on quantum key distribution protocols that employ non-ITS authentication. Quantum Inf. Process. 15(1): 327-362 (2016) - [c11]Aysajan Abidin, Abdelrahaman Aly, Enrique Argones-Rúa, Aikaterini Mitrokotsa:
Efficient Verifiable Computation of XOR for Biometric Authentication. CANS 2016: 284-298 - [c10]Aysajan Abidin, Enrique Argones-Rúa, Bart Preneel:
An Efficient Entity Authentication Protocol with Enhanced Security and Privacy Properties. CANS 2016: 335-349 - [c9]Aysajan Abidin, Abdelrahaman Aly, Sara Cleemput, Mustafa A. Mustafa:
An MPC-Based Privacy-Preserving Protocol for a Local Electricity Trading Market. CANS 2016: 615-625 - [c8]Aysajan Abidin:
On Privacy-Preserving Biometric Authentication. Inscrypt 2016: 169-186 - [c7]Mustafa A. Mustafa, Sara Cleemput, Aysajan Abidin:
A local electricity trading market: Security analysis. ISGT Europe 2016: 1-6 - [c6]Aysajan Abidin, Eduard Marin, Dave Singelée, Bart Preneel:
Towards Quantum Distance Bounding Protocols. RFIDSec 2016: 151-162 - [i5]Ryan Amiri, Aysajan Abidin, Petros Wallden, Erika Andersson:
Unconditionally Secure Signatures. IACR Cryptol. ePrint Arch. 2016: 739 (2016) - [i4]Aysajan Abidin, Abdelrahaman Aly, Sara Cleemput, Mustafa A. Mustafa:
An MPC-based Privacy-Preserving Protocol for a Local Electricity Trading Market. IACR Cryptol. ePrint Arch. 2016: 797 (2016) - 2014
- [j1]Aysajan Abidin, Jan-Åke Larsson:
Direct proof of security of Wegman-Carter authentication with partially known key. Quantum Inf. Process. 13(10): 2155-2170 (2014) - [c5]Aysajan Abidin, Kanta Matsuura, Aikaterini Mitrokotsa:
Security of a Privacy-Preserving Biometric Authentication Protocol Revisited. CANS 2014: 290-304 - [c4]Elena Pagnin, Christos Dimitrakakis, Aysajan Abidin, Aikaterini Mitrokotsa:
On the Leakage of Information in Biometric Authentication. INDOCRYPT 2014: 265-280 - [c3]Aysajan Abidin, Aikaterini Mitrokotsa:
Security aspects of privacy-preserving biometric authentication based on ideal lattices and ring-LWE. WIFS 2014: 60-65 - 2013
- [b1]Aysajan Abidin:
Authentication in Quantum Key Distribution : Security Proof and Universal Hash Functions. Linköping University, Sweden, 2013 - [i3]Aysajan Abidin, Jan-Åke Larsson:
Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key. CoRR abs/1303.0210 (2013) - [i2]Aysajan Abidin, Jan-Åke Larsson:
Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key. IACR Cryptol. ePrint Arch. 2013: 126 (2013) - 2012
- [c2]Aysajan Abidin:
On Security of Universal Hash Function Based Multiple Authentication. ICICS 2012: 303-310 - [i1]Christoph Pacher, Aysajan Abidin, Thomas Lorünser, Momtchil Peev, Rupert Ursin, Anton Zeilinger, Jan-Åke Larsson:
Attacks on quantum key distribution protocols that employ non-ITS authentication. CoRR abs/1209.0365 (2012) - 2011
- [c1]Aysajan Abidin, Jan-Åke Larsson:
New Universal Hash Functions. WEWoRC 2011: 99-108
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 20:45 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint