On the Statistically Optimal Divide and Conquer Correlation Attack on the Shrinking Generator.

Javad Mohajeri , Mahmoud Salmasizadeh , Shahram Khazaei
IACR Cryptology ePrint Archive 2005 126

2005
Multi-Adjustable Join Scheme.

Shahram Khazaei , Mojtaba Rafiee
IACR Cryptology ePrint Archive 2019 562

2019
Game-Based Privacy Analysis of RFID Security Schemes for Confident Au-thentication in IoT.

Behzad Abdolmaleki , Karim Baghery , Mohammad Reza Aref , Shahram Khazaei
IACR Cryptology ePrint Archive 2016 649

2016
Security of Multi-Adjustable Join Schemes: Separations and Implications

Shahram Khazaei , Mojtaba Rafiee
IEEE Transactions on Dependable and Secure Computing 1 -1

2021
New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba

Jean-Philippe Aumasson , Simon Fischer , Shahram Khazaei , Willi Meier
fast software encryption 470 -488

79
2008
Ciphertext-only attack on dd Hill in O(d13d)

Shahram Khazaei , Siavash Ahmadi
Information Processing Letters 118 25 -29

1
2017
A Mix-Net from Any CCA2 Secure Cryptosystem

Shahram Khazaei , Tal Moran , Douglas Wikström
Advances in Cryptology – ASIACRYPT 2012 607 -625

20
2012
Publicly verifiable searchable symmetric encryption based on efficient cryptographic components

Azam Soleimanian , Shahram Khazaei
Designs, Codes and Cryptography 87 ( 1) 123 -147

8
2019
Randomized partial checking revisited

Shahram Khazaei , Douglas Wikström
the cryptographers track at the rsa conference 2012 115 -128

21
2013
Towards More Secure Constructions of Adjustable Join Schemes

Shahram Khazaei , Mojtaba Rafiee
IEEE Transactions on Dependable and Secure Computing 1 -1

2020
Security of Jump Controlled Sequence Generators for Stream Ciphers

Tor Helleseth , Cees J. A. Jansen , Shahram Khazaei , Alexander Kholosha
Sequences and Their Applications – SETA 2006 4086 141 -152

4
2006
A rigorous security analysis of a decentralized electronic voting protocol in the universal composability framework

Shahram Khazaei , Mehri Rezaei-Aliabadi
workshop on information security applications 43 99 -109

1
2018
Linearization Framework for Collision Attacks: Application to CubeHash and MD6

Eric Brier , Shahram Khazaei , Willi Meier , Thomas Peyrin
international conference on the theory and application of cryptology and information security 2009 560 -577

27
2009
Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers

Simon Fischer , Shahram Khazaei , Willi Meier
Progress in Cryptology – AFRICACRYPT 2008 236 -245

84
2008
Optimal linear secret sharing schemes for graph access structures on six participants

Motahhareh Gharahi , Shahram Khazaei
Theoretical Computer Science 771 1 -8

2
2019
Improved linear differential attacks on cubehash

Shahram Khazaei , Simon Knellwolf , Willi Meier , Deian Stefan
international conference on cryptology in africa 6055 407 -418

7
2010
Reduced complexity attacks on the alternating step generator

Shahram Khazaei , Simon Fischer , Willi Meier
international conference on selected areas in cryptography 4876 1 -16

18
2007
New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers

Shahram Khazaei , Willi Meier
international conference on cryptology in india 5365 15 -26

8
2008
On Reconstruction of RC4 Keys from Internal States

Shahram Khazaei , Willi Meier
mathematical methods in computer science 5393 179 -189

12
2008
Group ID U11265 Affiliated authors Augier, Maxime

Anja Becker , Joppe Willem Bos , Alina Dudeanu , Aymeric Genet