Shahram Khazaei
Shahram Khazaei
Verified email at
Cited by
Cited by
New features of Latin dances: analysis of Salsa, ChaCha, and Rumba
JP Aumasson, S Fischer, S Khazaei, W Meier, C Rechberger
International Workshop on Fast Software Encryption, 470-488, 2008
Chosen IV statistical analysis for key recovery attacks on stream ciphers
S Fischer, S Khazaei, W Meier
Progress in Cryptology–AFRICACRYPT 2008: First International Conference on …, 2008
Randomized partial checking revisited
S Khazaei, D Wikström
Topics in Cryptology–CT-RSA 2013: The Cryptographers’ Track at the RSA …, 2013
Distinguishing Attack on Grain. ECRYPT Stream Cipher Project Report 2005/071 (2005)
S Khazaei, M Hassanzadeh, M Kiaei
ECRYPT Stream Cipher Project Report 6477 (2005/071), 130-145, 2005
Evaluation of SOSEMANUK With Regard to Guess-and-Determine Attacks, eSTREAM report 2006/009 (2006)
Y Tsunoo, T Saito, M Shigeri, T Suzaki, H Ahmadi, T Eghlidos, S Khazaei
URL: http://www. ecrypt. eu. org/stream/papers. html. Citations in this …, 0
Linear Sequential Circuit Approximation of Grain and Trivium Stream Ciphers. eSTREAM
S Khazaei, MM Hasanzadeh, MS Kiaei
ECRYPT Stream Cipher Project, Report 63, 2005, 2005
Publicly verifiable searchable symmetric encryption based on efficient cryptographic components
A Soleimanian, S Khazaei
Designs, Codes and Cryptography 87 (1), 123-147, 2019
A mix-net from any CCA2 secure cryptosystem
S Khazaei, T Moran, D Wikström
Advances in Cryptology–ASIACRYPT 2012: 18th International Conference on the …, 2012
Linearization Framework for Collision Attacks: Application to CubeHash and MD6.
E Brier, S Khazaei, W Meier, T Peyrin
ASIACRYPT 9, 560-577, 2009
Cryptanalysis of a Universally Verifiable Efficient Re-encryption Mixnet.
S Khazaei, B Terelius, D Wikström
EVT/WOTE, 2012
Optimal linear secret sharing schemes for graph access structures on six participants
M Gharahi, S Khazaei
Theoretical Computer Science 771, 1-8, 2019
New directions in cryptanalysis of self-synchronizing stream ciphers
S Khazaei, W Meier
Progress in Cryptology-INDOCRYPT 2008: 9th International Conference on …, 2008
Reduced complexity attacks on the alternating step generator
S Khazaei, S Fischer, W Meier
Selected Areas in Cryptography: 14th International Workshop, SAC 2007 …, 2007
On abelian and homomorphic secret sharing schemes
A Jafari, S Khazaei
Journal of Cryptology 34, 1-36, 2021
Ciphertext-only attack on d× d Hill in O (d13d)
S Khazaei, S Ahmadi
Information Processing Letters 118, 25-29, 2017
On reconstruction of RC4 keys from internal states
S Khazaei, W Meier
Mathematical Methods in Computer Science: Essays in Memory of Thomas Beth …, 2008
Cryptanalysis of Pomaranch (CJCSG)
S Khazaei
eSTREAM, ECRYPT Stream Cipher Project, Report 65, 2005, 2005
A rigorous security analysis of a decentralized electronic voting protocol in the universal composability framework
S Khazaei, M Rezaei-Aliabadi
Journal of information security and applications 43, 99-109, 2018
Return code schemes for electronic voting systems
S Khazaei, D Wikström
Electronic Voting: Second International Joint Conference, E-Vote-ID 2017 …, 2017
Divide and conquer attack on ABC stream cipher. eSTREAM, ECRYPT Stream Cipher Project, Report 2005/052, 2005
S Khazaei
The system can't perform the operation now. Try again later.
Articles 1–20