Follow
kooshiar azimian
kooshiar azimian
concertboom
Verified email at concertboom.com
Title
Cited by
Cited by
Year
Relations between semantic security and indistinguishability against cpa, non-adaptive cca and adaptive cca in comparison based framework
A Bagherzandi, K Azimian, J Mohajeri, M Salmasizadeh
arXiv preprint cs/0508110, 2005
72005
Parallel repetition of the odd cycle game
K Azimian, M Szegedy
LATIN 2008: Theoretical Informatics: 8th Latin American Symposium, Búzios …, 2008
62008
Provable Partial Key Escrow.
K Azimian, J Mohajeri, M Salmasizadeh, SS Wagstaff Jr
Int. J. Netw. Secur. 10 (2), 121-124, 2010
32010
Weak Composite Diffie-Hellman.
K Azimian, J Mohajeri, M Salmasizadeh
Int. J. Netw. Secur. 7 (3), 383-387, 2008
32008
A Verifiable Partial Key Escrow, Based on McCurley Encryption Scheme
K Azimian, J Mohajeri, M Salmasizadeh, S Fayyaz
arXiv preprint cs/0505055, 2005
12005
Breaking Diffie-Hellman is no easier than root finding
K Azimian
Electronic Colloquium on Computational Complexity (ECCC, https://eccc …, 2005
12005
Weak Composite Diffie-Hellman is not weaker than factoring
K Azimian, J Mohajeri, M Salmasizadeh
Cryptology ePrint Archive, 2005
12005
The system can't perform the operation now. Try again later.
Articles 1–7