


default search action
Behzad Abdolmaleki
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Behzad Abdolmaleki
, Céline Chevalier, Ehsan Ebrahimi
, Giulio Malavolta
, Quoc-Huy Vu
:
On Quantum Simulation-Soundness. IACR Commun. Cryptol. 1(4): 18 (2024) - [c18]Rabiah Alnashwan
, Yang Yang
, Yilu Dong
, Prosanta Gope
, Behzad Abdolmaleki
, Syed Rafiul Hussain
:
Strong Privacy-Preserving Universally Composable AKA Protocol with Seamless Handover Support for Mobile Virtual Network Operator. CCS 2024: 2057-2071 - [c17]Behzad Abdolmaleki, Noemi Glaeser, Sebastian Ramacher
, Daniel Slamanig:
Circuit-Succinct Universally-Composable NIZKs with Updatable CRS. CSF 2024: 527-542 - [c16]Behzad Abdolmaleki
, Prastudy Fauzi
, Toomas Krips
, Janno Siim
:
Shuffle Arguments Based on Subset-Checking. SCN (1) 2024: 345-366 - [i24]Rabiah Alnashwan, Yang Yang, Yilu Dong, Prosanta Gope, Behzad Abdolmaleki, Syed Rafiul Hussain:
Strong Privacy-Preserving Universally Composable AKA Protocol with Seamless Handover Support for Mobile Virtual Network Operator. CoRR abs/2409.04877 (2024) - [i23]Reyhaneh Rabaninejad, Behzad Abdolmaleki, Sebastian Ramacher, Daniel Slamanig, Antonis Michalas:
Attribute-Based Threshold Issuance Anonymous Counting Tokens and Its Application to Sybil-Resistant Self-Sovereign Identity. IACR Cryptol. ePrint Arch. 2024: 1024 (2024) - [i22]Behzad Abdolmaleki, Prastudy Fauzi, Toomas Krips, Janno Siim:
Shuffle Arguments Based on Subset-Checking. IACR Cryptol. ePrint Arch. 2024: 1056 (2024) - [i21]Behzad Abdolmaleki, Hannes Blümel, Giacomo Fenzi, Homa Khajeh, Stefan Köpsell, Maryam Zarezadeh:
Post-Quantum Access Control with Application to Secure Data Retrieval. IACR Cryptol. ePrint Arch. 2024: 1160 (2024) - 2023
- [c15]Behzad Abdolmaleki, Saikrishna Badrinarayanan, Rex Fernando, Giulio Malavolta, Ahmadreza Rahimi, Amit Sahai:
Two-Round Concurrent 2PC from Sub-exponential LWE. ASIACRYPT (1) 2023: 71-105 - [c14]Reyhaneh Rabaninejad, Behzad Abdolmaleki, Giulio Malavolta, Antonis Michalas
, Amir Nabizadeh:
stoRNA: Stateless Transparent Proofs of Storage-time. ESORICS (3) 2023: 389-410 - [i20]Behzad Abdolmaleki, Noemi Glaeser, Sebastian Ramacher, Daniel Slamanig:
Universally Composable NIZKs: Circuit-Succinct, Non-Malleable and CRS-Updatable. IACR Cryptol. ePrint Arch. 2023: 97 (2023) - [i19]Reyhaneh Rabaninejad, Behzad Abdolmaleki, Giulio Malavolta, Antonis Michalas, Amir Nabizadeh:
stoRNA: Stateless Transparent Proofs of Storage-time. IACR Cryptol. ePrint Arch. 2023: 515 (2023) - [i18]Behzad Abdolmaleki, Céline Chevalier, Ehsan Ebrahimi
, Giulio Malavolta, Quoc-Huy Vu:
On Quantum Simulation-Soundness. IACR Cryptol. ePrint Arch. 2023: 1702 (2023) - 2022
- [c13]Behzad Abdolmaleki, Daniel Slamanig
:
CRS-Updatable Asymmetric Quasi-Adaptive NIZK Arguments. INDOCRYPT 2022: 3-25 - [c12]Behzad Abdolmaleki, Nils Fleischhacker, Vipul Goyal, Abhishek Jain, Giulio Malavolta
:
Steganography-Free Zero-Knowledge. TCC (1) 2022: 143-172 - [i17]Behzad Abdolmaleki, Nils Fleischhacker, Vipul Goyal, Abhishek Jain, Giulio Malavolta:
Steganography-Free Zero-Knowledge. IACR Cryptol. ePrint Arch. 2022: 1263 (2022) - [i16]Behzad Abdolmaleki, Saikrishna Badrinarayanan, Rex Fernando, Giulio Malavolta, Ahmadreza Rahimi, Amit Sahai:
Two-Round Concurrent 2PC from Sub-Exponential LWE. IACR Cryptol. ePrint Arch. 2022: 1719 (2022) - [i15]Behzad Abdolmaleki, Daniel Slamanig:
CRS-Updatable Asymmetric Quasi-Adaptive NIZK Arguments. IACR Cryptol. ePrint Arch. 2022: 1756 (2022) - 2021
- [j5]Behzad Abdolmaleki, Helger Lipmaa, Janno Siim
, Michal Zajac:
On Subversion-Resistant SNARKs. J. Cryptol. 34(3): 17 (2021) - [c11]Behzad Abdolmaleki, Daniel Slamanig
:
Updatable Trapdoor SPHFs: Modular Construction of Updatable Zero-Knowledge Arguments and More. ACISP 2021: 46-67 - [c10]Behzad Abdolmaleki, Daniel Slamanig
:
Subversion-Resistant Quasi-adaptive NIZK and Applications to Modular Zk-SNARKs. CANS 2021: 492-512 - [c9]Behzad Abdolmaleki, Hamidreza Khoshakhlagh
, Helger Lipmaa:
Smooth Zero-Knowledge Hash Functions. INDOCRYPT 2021: 510-535 - [i14]Behzad Abdolmaleki, Hamidreza Khoshakhlagh, Helger Lipmaa:
Smooth Zero-Knowledge Hash Functions. IACR Cryptol. ePrint Arch. 2021: 653 (2021) - [i13]Behzad Abdolmaleki, Daniel Slamanig:
Updatable Trapdoor SPHFs: Modular Construction of Updatable Zero-Knowledge Arguments and More. IACR Cryptol. ePrint Arch. 2021: 1360 (2021) - 2020
- [c8]Behzad Abdolmaleki, Sebastian Ramacher
, Daniel Slamanig
:
Lift-and-Shift: Obtaining Simulation Extractable Subversion and Updatable SNARKs Generically. CCS 2020: 1987-2005 - [c7]Behzad Abdolmaleki, Helger Lipmaa, Janno Siim
, Michal Zajac:
On QA-NIZK in the BPK Model. Public Key Cryptography (1) 2020: 590-620 - [i12]Behzad Abdolmaleki, Sebastian Ramacher, Daniel Slamanig:
Lift-and-Shift: Obtaining Simulation Extractable Subversion and Updatable SNARKs Generically. IACR Cryptol. ePrint Arch. 2020: 62 (2020) - [i11]Behzad Abdolmaleki, Daniel Slamanig:
Unbounded Simulation-Sound Subversion Resistant Quasi-Adaptive NIZK Proofs and Applications to Modular zk-SNARKs. IACR Cryptol. ePrint Arch. 2020: 364 (2020) - [i10]Behzad Abdolmaleki, Helger Lipmaa, Janno Siim, Michal Zajac:
On Subversion-Resistant SNARKs. IACR Cryptol. ePrint Arch. 2020: 668 (2020)
2010 – 2019
- 2019
- [j4]Karim Baghery
, Behzad Abdolmaleki, Shahram Khazaei
, Mohammad Reza Aref:
Breaking anonymity of some recent lightweight RFID authentication protocols. Wirel. Networks 25(3): 1235-1252 (2019) - [c6]Behzad Abdolmaleki, Karim Baghery
, Helger Lipmaa, Janno Siim
, Michal Zajac:
DL-Extractable UC-Commitment Schemes. ACNS 2019: 385-405 - [c5]Behzad Abdolmaleki, Karim Baghery
, Helger Lipmaa, Janno Siim
, Michal Zajac:
UC-Secure CRS Generation for SNARKs. AFRICACRYPT 2019: 99-117 - [c4]Behzad Abdolmaleki, Hamidreza Khoshakhlagh
, Daniel Slamanig
:
A Framework for UC-Secure Commitments from Publicly Computable Smooth Projective Hashing. IMACC 2019: 1-21 - [i9]Behzad Abdolmaleki, Karim Baghery, Helger Lipmaa, Janno Siim, Michal Zajac:
DL-Extractable UC-Commitment Schemes. IACR Cryptol. ePrint Arch. 2019: 201 (2019) - [i8]Behzad Abdolmaleki, Karim Baghery, Helger Lipmaa, Janno Siim, Michal Zajac:
UC-Secure CRS Generation for SNARKs. IACR Cryptol. ePrint Arch. 2019: 471 (2019) - [i7]Behzad Abdolmaleki, Hamidreza Khoshakhlagh, Daniel Slamanig:
A Framework for UC-Secure Commitments from Publicly Computable Smooth Projective Hashing. IACR Cryptol. ePrint Arch. 2019: 1063 (2019) - [i6]Karim Baghery, Behzad Abdolmaleki, Shahram Khazaei, Mohammad Reza Aref:
Breaking Anonymity of Some Recent Lightweight RFID Authentication Protocols. IACR Cryptol. ePrint Arch. 2019: 1125 (2019) - 2018
- [i5]Behzad Abdolmaleki, Helger Lipmaa, Janno Siim, Michal Zajac:
On QA-NIZK in the BPK Model. IACR Cryptol. ePrint Arch. 2018: 877 (2018) - 2017
- [j3]Behzad Abdolmaleki, Karim Baghery
, Shahram Khazaei
, Mohammad Reza Aref:
Game-Based Privacy Analysis of RFID Security Schemes for Confident Authentication in IoT. Wirel. Pers. Commun. 95(4): 5057-5080 (2017) - [c3]Behzad Abdolmaleki, Karim Baghery
, Helger Lipmaa, Michal Zajac:
A Subversion-Resistant SNARK. ASIACRYPT (3) 2017: 3-33 - [i4]Behzad Abdolmaleki, Karim Baghery, Helger Lipmaa, Michal Zajac:
A Subversion-Resistant SNARK. IACR Cryptol. ePrint Arch. 2017: 599 (2017) - 2016
- [c2]Behzad Abdolmaleki, Karim Baghery
, Bahareh Akhbari, Mohammad Reza Aref:
Analysis of Xiao et al.'s authentication protocol conforming to EPC C1 G2 standard. IST 2016: 111-116 - [i3]Karim Baghery, Behzad Abdolmaleki, Mohammad Javad Emadi:
Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags. IACR Cryptol. ePrint Arch. 2016: 387 (2016) - [i2]Behzad Abdolmaleki, Karim Baghery, Shahram Khazaei, Mohammad Reza Aref:
Game-Based Privacy Analysis of RFID Security Schemes for Confident Au-thentication in IoT. IACR Cryptol. ePrint Arch. 2016: 649 (2016) - 2015
- [j2]Karim Baghery
, Behzad Abdolmaleki, Bahareh Akhbari, Mohammad Reza Aref:
Enhancing privacy of recent authentication schemes for low-cost RFID systems. ISC Int. J. Inf. Secur. 7(2): 135-149 (2015) - [j1]Seyed Mohammad Alavi, Karim Baghery
, Behzad Abdolmaleki, Mohammad Reza Aref:
Traceability Analysis of Recent RFID Authentication Protocols. Wirel. Pers. Commun. 83(3): 1663-1682 (2015) - [i1]Behzad Abdolmaleki, Hamidreza Bakhshi, Karim Baghery, Mohammad Reza Aref:
Analysis of an RFID Authentication Protocol in Accordance with EPC Standards. IACR Cryptol. ePrint Arch. 2015: 980 (2015) - 2014
- [c1]Karim Baghery
, Behzad Abdolmaleki, Bahareh Akhbari, Mohammad Reza Aref:
Privacy analysis and improvements of two recent RFID authentication protocols. ISCISC 2014: 137-142
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-04-03 00:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint