×

zbMATH — the first resource for mathematics

Safavi-Naini, Reihaneh

Compute Distance To:
Author ID: safavi-naini.reihaneh Recent zbMATH articles by "Safavi-Naini, Reihaneh"
Published as: Safavi-Naini, R.; Safavi-Naini, Rai; Safavi-Naini, Rei; Safavi-Naini, Rei.; Safavi-Naini, Reihanah; Safavi-Naini, Reihaneh
Documents Indexed: 173 Publications since 1978, including 9 Books
all top 5

Co-Authors

3 single-authored
27 Wang, Huaxiong
21 Susilo, Willy
19 Pieprzyk, Josef P.
16 Wang, Yejing
10 Tonien, Dongvu
8 Tombak, Leonid M.
7 Martin, Keith M.
7 McAven, Luke F.
6 Ahmadi, Hadi
6 Tô, Vu Dong D.
5 Baek, Joonsang
5 Desmedt, Yvo G.
5 Gagné, Martin
5 Kurnio, Hartono
5 Wild, Peter R.
4 Bakhtiari, Shahram
4 Jhanwar, Mahabir Prasad
4 Jiang, Shaoquan
4 Nguyen, Lan T. T.
4 Saeednia, Shahrokh
4 Shahandashti, Siamak F.
4 Wang, Pengwei
4 Zhang, Fangguo
4 Zhang, Liang Feng
3 Charnes, Chris
3 Ghodosi, Hossein
3 Lafourcade, Pascal
3 Lakhnech, Yassine
3 Lin, Fuchun
3 Seberry, Jennifer R.
3 Yung, Moti
2 Akand, Mamunur Rashid
2 Alimomeni, Mohsen
2 Baraani-Dastjerdi, Ahmad
2 Horton, Jeffrey
2 Jacobson, Michael John jun.
2 Kurosawa, Kaoru
2 Lu, Liang
2 Narayan, Shivaramakrishnan
2 Nickolas, Peter
2 Ogunbona, Philip O.
2 Pei, Dingyi
2 Sharifian, Setareh
2 Tuhin, Mohammed Ashraful Alam
2 Wang, Shuhong
2 Xing, Chaoping
1 Ahmadi, Ahmad
1 Ang, Russell
1 Atallah, Mikhail J.
1 Batten, Lynn Margaret
1 Brisbane, Gareth
1 Canetti, Ran
1 Christin, Nicolas
1 Curtis, Nathan
1 Erotokritou, Stelios
1 Frikken, Keith B.
1 Fuji-Hara, Ryoh
1 Getta, Janusz R.
1 Hinek, M. Jason
1 Kalach, Kassem
1 Lam, Kwokyan
1 Li, Chih-Hung
1 Li, Yuqiang
1 Lin, Chih-Yin
1 Lisý, Viliam
1 Locasto, Michael E.
1 Man, Chor Wah
1 Mohassel, Payman
1 O’Connor, L. J.
1 Phan Duong Hieu
1 Piper, Angela
1 Prabhakar, Sunil
1 Reyhanitabar, Mohammad Reza
1 Rijmen, Vincent
1 Sarkar, Sumanta
1 Shi, Hongsong
1 Uehara, Takeyuki
1 Venkateswarlu, Ayineedi
1 Wang, Yongge
1 Wong, Duncan S.
1 Zheng, Yuechen

Publications by Year

Citations contained in zbMATH Open

86 Publications have been cited 328 times in 270 Documents Cited by Year
An efficient signature scheme from bilinear pairings and its applications. Zbl 1198.94169
Zhang, Fangguo; Safavi-Naini, Reihaneh; Susilo, Willy
32
2004
Linear authentication codes: bounds and constructions. Zbl 1063.94087
Wang, Huaxiong; Xing, Chaoping; Safavi-Naini, Rei
20
2003
Certificateless public key encryption without pairing. Zbl 1127.94358
Baek, Joonsang; Safavi-Naini, Reihaneh; Susilo, Willy
17
2005
Threshold attribute-based signatures and their application to anonymous credential systems. Zbl 1246.94048
Shahandashti, Siamak F.; Safavi-Naini, Reihaneh
16
2009
On the integration of public key data encryption and public key encryption with keyword search. Zbl 1156.94331
Baek, Joonsang; Safavi-Naini, Reihaneh; Susilo, Willy
12
2006
Characterization of optimal authentication codes with arbitration. Zbl 1031.94014
Pei, Dingyi; Li, Yuqiang; Wang, Yejing; Safavi-Naini, Rei
12
1999
Efficient verifiably encrypted signature and partially blind signature from bilinear pairings. Zbl 1123.94369
Zhang, Fangguo; Safavi-Naini, Reihaneh; Susilo, Willy
11
2003
Efficient multi-receiver identity-based encryption and its application to broadcast encryption. Zbl 1081.94516
Baek, Joonsang; Safavi-Naini, Reihaneh; Susilo, Willy
10
2005
Some new proxy signature schemes from pairings. Zbl 1084.94521
Zhang, Fangguo; Safavi-Naini, Reihaneh; Lin, Chih-Yin
9
2004
Multireceiver authentication codes: Models, bounds, constructions, and extensions. Zbl 1011.94018
Safavi-Naini, R.; Wang, H.
9
1999
Efficient and provably secure trapdoor-free group signature schemes from bilinear pairings. Zbl 1094.94530
Nguyen, Lan; Safavi-Naini, Rei
8
2004
Bounds and techniques for efficient redistribution of secret shares to new access structures. Zbl 0955.68045
Martin, Keith M.; Safavi-Naini, Rei; Wang, Huaxiong
8
1999
Changing thresholds in the absence of secure channels. Zbl 0919.94041
Martin, Keith M.; Pieprzyk, Josef; Safavi-Naini, Rei; Wang, Huaxiong
7
1999
New results on multi-receiver authentication codes. Zbl 0934.94016
Safavi-Naini, R.; Wang, H.
7
1998
Detection of algebraic manipulation in the presence of leakage. Zbl 1395.94265
Ahmadi, Hadi; Safavi-Naini, Reihaneh
6
2014
Distributing the encryption and decryption of a block cipher. Zbl 1136.94322
Martin, Keith M.; Safavi-Naini, Rei; Wang, Huaxiong; Wild, Peter R.
6
2005
Changing thresholds in the absence of secure channels. Zbl 0945.68055
Martin, Keith M.; Pieprzyk, Josef; Safavi-Naini, Rei; Wang, Huaxiong
6
1999
Secret sharing in multilevel and compartmented groups. Zbl 0931.94022
Ghodosi, Hossein; Pieprzyk, Josef; Safavi-Naini, Rei
6
1998
On the weaknesses of Gong’s collisionful hash function. Zbl 0960.68042
Bakhtiari, S.; Safavi-Naini, R.; Pieprzyk, J.
6
1997
Recursive constructions of secure codes and hash families using difference function families. Zbl 1140.94014
Tonien, Dongvu; Safavi-Naini, Reihaneh
5
2006
Construction of universal designated-verifier signatures and identity-based signatures from standard signatures. Zbl 1162.94401
Shahandashti, Siamak F.; Safavi-Naini, Reihaneh
4
2008
Multi-party concurrent signatures. Zbl 1156.94423
Tonien, Dongvu; Susilo, Willy; Safavi-Naini, Reihaneh
4
2006
Generic construction of hybrid public key traitor tracing with full-public-traceability. Zbl 1133.94333
Phan, Duong Hieu; Safavi-Naini, Reihaneh; Tonien, Dongvu
4
2006
Universal designated verifier signature proof (or how to efficiently prove knowledge of a signature). Zbl 1154.94447
Baek, Joonsang; Safavi-Naini, Reihaneh; Susilo, Willy
4
2005
New results on frame-proof codes and traceability schemes. Zbl 1018.94019
Safavi-Naini, Reihaneh; Wang, Yejing
4
2001
Sequential traitor tracing. Zbl 0995.94536
Safavi-Naini, Reihaneh; Wang, Yejing
4
2000
Fail-stop threshold signature schemes based on elliptic curves. Zbl 0919.94045
Susilo, Willy; Safavi-Naini, Rei; Pieprzyk, Josef
4
1999
Automated verification of block cipher modes of operation, an improved method. Zbl 1303.68051
Gagné, Martin; Lafourcade, Pascal; Lakhnech, Yassine; Safavi-Naini, Reihaneh
3
2012
Threshold attribute-based signcryption. Zbl 1291.94086
Gagné, Martin; Narayan, Shivaramakrishnan; Safavi-Naini, Reihaneh
3
2010
Automated security proof for symmetric encryption modes. Zbl 1273.68109
Gagné, Martin; Lafourcade, Pascal; Lakhnech, Yassine; Safavi-Naini, Reihaneh
3
2009
Traitor tracing for shortened and corrupted fingerprints. Zbl 1327.94072
Safavi-Naini, Reihaneh; Wang, Yejing
3
2003
Combinatorial characterisation of \(\ell\)-optimal authentication codes with arbitration. Zbl 0987.94037
Wang, Yejing; Safavi-Naini, Reihaneh; Pei, Dingyi
3
2001
A model for adversarial wiretap channels. Zbl 1359.94531
Wang, Pengwei; Safavi-Naini, Reihaneh
2
2016
Batch verifiable computation of outsourced functions. Zbl 1357.68052
Zhang, Liang Feng; Safavi-Naini, Reihaneh
2
2015
Short pairing-efficient threshold-attribute-based signature. Zbl 1305.94087
Gagné, Martin; Narayan, Shivaramakrishnan; Safavi-Naini, Reihaneh
2
2013
Attribute-based encryption without key cloning. Zbl 1276.94014
Hinek, M. Jason; Jiang, Shaoquan; Safavi-Naini, Reihaneh; Shahandashti, Siamak F.
2
2012
Advances in cryptology – CRYPTO 2012. 32nd annual cryptology conference, Santa Barbara, CA, USA, August 19–23, 2012. Proceedings. Zbl 1246.94010
Safavi-Naini, Reihaneh (ed.); Canetti, Ran (ed.)
2
2012
On optimal secure message transmission by public discussion. Zbl 1366.94533
Shi, Hongsong; Jiang, Shaoquan; Safavi-Naini, Reihaneh; Tuhin, Mohammed Ashraful
2
2011
An efficient deniable key exchange protocol (extended abstract). Zbl 1175.94083
Jiang, Shaoquan; Safavi-Naini, Reihaneh
2
2008
An efficient single-key pirates tracing scheme using cover-free families. Zbl 1151.94576
Tonien, Dongvu; Safavi-Naini, Reihaneh
2
2006
On the maximal codes of length 3 with the 2-identifiable parent property. Zbl 1101.68070
Tô, Vu Dong; Safavi-Naini, Reihaneh
2
2004
Deletion correcting using generalized Reed-Solomon codes. Zbl 1059.94041
Wang, Yejing; McAven, Luke; Safavi-Naini, Reihaneh
2
2004
Sequential traitor tracing. Zbl 1063.94085
Safavi-Naini, Reihaneh; Wang, Yejing
2
2003
Threshold MACs. Zbl 1031.94522
Martin, Keith M.; Pieprzyk, Josef; Safavi-Naini, Rei; Wang, Huaxiong; Wild, Peter R.
2
2003
An efficient fail-stop signature scheme based on factorization. Zbl 1031.94540
Susilo, Willy; Safavi-Naini, Rei
2
2003
Threshold fail-stop signature schemes based on discrete logarithm and factorization. Zbl 1044.68615
Safavi-Naini, Rei; Susilo, Willy
2
2000
Bounds and constructions for multireceiver authentication codes. Zbl 0930.94040
Safavi-Naini, R.; Wang, H.
2
1998
On the security of Girault’s identification scheme. Zbl 1067.94559
Saeednia, Shahrokh; Safavi-Naini, Rei
2
1998
Multisender authentication systems with unconditional security. Zbl 0888.94019
Martin, K. M.; Safavi-Naini, R.
2
1997
Remarks on the multiple assignment secret sharing scheme. Zbl 0957.94026
Ghodosi, Hossein; Pieprzyk, Josef; Safavi-Naini, Rei
2
1997
Detecting algebraic manipulation in leaky storage systems. Zbl 1407.94137
Lin, Fuchun; Safavi-Naini, Reihaneh; Wang, Pengwei
1
2016
Automated proofs of block cipher modes of operation. Zbl 1356.68188
Gagné, Martin; Lafourcade, Pascal; Lakhnech, Yassine; Safavi-Naini, Reihaneh
1
2016
Limited view adversary codes: bounds, constructions and applications. Zbl 1375.94162
Wang, Pengwei; Safavi-Naini, Reihaneh
1
2015
Private fingerprint matching. Zbl 1308.94088
Shahandashti, Siamak F.; Safavi-Naini, Reihaneh; Ogunbona, Philip
1
2012
Secret keys from channel noise. Zbl 1281.94010
Ahmadi, Hadi; Safavi-Naini, Reihaneh
1
2011
New results on unconditionally secure multi-receiver manual authentication. Zbl 1263.94035
Wang, Shuhong; Safavi-Naini, Reihaneh
1
2009
Selected areas in cryptography. 16th annual international workshop, SAC 2009, Calgary, Alberta, Canada, August 13–14, 2009. Revised selected papers. Zbl 1177.94012
Jacobson, Michael J. jun. (ed.); Rijmen, Vincent (ed.); Safavi-Naini, Reihaneh (ed.)
1
2009
Information theoretic bounds on authentication systems in query model. Zbl 1308.94100
Safavi-Naini, Reihaneh; Wild, Peter R.
1
2008
Non-interactive manual channel message authentication based on eTCR hash functions. Zbl 1213.94162
Reyhanitabar, Mohammad Reza; Wang, Shuhong; Safavi-Naini, Reihaneh
1
2007
Construction of deletion correcting codes using generalized Reed-Solomon codes and their subcodes. Zbl 1148.94015
Tonien, Dongvu; Safavi-Naini, Reihaneh
1
2007
Verifiable shuffles: a formal model and a Paillier-based three-round construction with provable security. Zbl 1209.94046
Nguyen, Lan; Safavi-Naini, Rei; Kurosawa, Kaoru
1
2006
Dynamic \(k\)-times anonymous authentication. Zbl 1126.68409
Nguyen, Lan; Safavi-Naini, Rei
1
2005
Cancelable key-based fingerprint templates. Zbl 1127.94357
Ang, Russell; Safavi-Naini, Rei; McAven, Luke
1
2005
Radio networks with reliable communication. Zbl 1128.68300
Desmedt, Yvo; Wang, Yongge; Safavi-Naini, Rei; Wang, Huaxiong
1
2005
Token-controlled public key encryption. Zbl 1118.68473
Baek, Joonsang; Safavi-Naini, Reihaneh; Susilo, Willy
1
2005
General group authentication codes and their relation to “unconditionally-secure signatures”. Zbl 1198.94161
Safavi-Naini, Reihaneh; McAven, Luke; Yung, Moti
1
2004
Symmetric authentication codes with secrecy and unconditionally secure authenticated encryption. Zbl 1113.94314
McAven, Luke; Safavi-Naini, Reihaneh; Yung, Moti
1
2004
Verifiable shuffles: a formal model and a Paillier-based efficient construction with provable security. Zbl 1103.68533
Nguyen, Lan; Safavi-Naini, Rei; Kurosawa, Kaoru
1
2004
Redistribution of mechanical secret shares. Zbl 1275.94038
Desmedt, Yvo; Safavi-Naini, Rei; Wang, Huaxiong
1
2003
Explicit construction of secure frameproof codes. Zbl 1091.94504
Tô, Vu Dong D.; Safavi-Naini, R.
1
2003
Collusion secure \(q\)-ary fingerprinting for perceptual content. Zbl 1048.68898
Safavi-Naini, Reihaneh; Wang, Yejing
1
2002
Optimal parallel I/O for range queries through replication. Zbl 1017.68681
Frikken, Keith; Atallah, Mikhail; Prabhakar, Sunil; Safavi-Naini, Rei
1
2002
Broadcast authentication for group communication. Zbl 0983.68069
Safavi-Naini, Rei; Wang, Huaxiong
1
2001
Robust additive secret sharing schemes over \(\mathbb{Z}_m\). Zbl 0997.94550
Safavi-Naini, Rei; Wang, Huaxiong
1
2001
A general construction for fail-stop signature using authentication codes. Zbl 0997.94551
Safavi-Naini, Rei; Susilo, Willy
1
2001
A new approach to robust threshold RSA signature schemes. Zbl 1032.94524
Safavi-Naini, Rei; Wang, Huaxiong; Lam, Kwok-Yan
1
1999
\(A^3\)-codes under collusion attacks. Zbl 0977.94049
Wang, Yejing; Safavi-Naini, Rei
1
1999
On construction of cumulative secret sharing schemes. Zbl 0931.94023
Ghodosi, Hossein; Pieprzyk, Josef; Safavi-Naini, Rei; Wang, Huaxiong
1
1998
Efficient identity-based conference key distribution protocols. Zbl 1097.94517
Saeednia, Shahrokh; Safavi-Naini, Rei
1
1998
A message authentication code based on Latin squares. Zbl 0989.94520
Bakhtiari, S.; Safavi-Naini, R.; Pieprzyk, J.
1
1997
Authentication codes in plaintext and chosen-content attacks. Zbl 0853.94018
Safavi-Naini, R.; Tombak, L.
1
1996
Comments on Soviet encryption algorithm. Zbl 0879.94033
Charnes, C.; O’Connor, L.; Pieprzyk, J.; Safavi-Naini, R.; Zheng, Y.
1
1995
Authentication codes in plaintext and chosen-content attacks. Zbl 0885.94026
Safavi-Naini, R.; Tombak, L.
1
1995
Combinatorial structure of \(A\)-codes with \(r\)-fold security. Zbl 0872.94037
Safavi-Naini, R.; Tombak, L.
1
1995
Optimal authentication systems. Zbl 0951.94533
Safavi-Naini, R.; Tombak, L.
1
1994
Automated cryptanalysis of substitution ciphers. Zbl 0833.94013
Forsyth, W. S.; Safavi-Naini, R.
1
1993
A model for adversarial wiretap channels. Zbl 1359.94531
Wang, Pengwei; Safavi-Naini, Reihaneh
2
2016
Detecting algebraic manipulation in leaky storage systems. Zbl 1407.94137
Lin, Fuchun; Safavi-Naini, Reihaneh; Wang, Pengwei
1
2016
Automated proofs of block cipher modes of operation. Zbl 1356.68188
Gagné, Martin; Lafourcade, Pascal; Lakhnech, Yassine; Safavi-Naini, Reihaneh
1
2016
Batch verifiable computation of outsourced functions. Zbl 1357.68052
Zhang, Liang Feng; Safavi-Naini, Reihaneh
2
2015
Limited view adversary codes: bounds, constructions and applications. Zbl 1375.94162
Wang, Pengwei; Safavi-Naini, Reihaneh
1
2015
Detection of algebraic manipulation in the presence of leakage. Zbl 1395.94265
Ahmadi, Hadi; Safavi-Naini, Reihaneh
6
2014
Short pairing-efficient threshold-attribute-based signature. Zbl 1305.94087
Gagné, Martin; Narayan, Shivaramakrishnan; Safavi-Naini, Reihaneh
2
2013
Automated verification of block cipher modes of operation, an improved method. Zbl 1303.68051
Gagné, Martin; Lafourcade, Pascal; Lakhnech, Yassine; Safavi-Naini, Reihaneh
3
2012
Attribute-based encryption without key cloning. Zbl 1276.94014
Hinek, M. Jason; Jiang, Shaoquan; Safavi-Naini, Reihaneh; Shahandashti, Siamak F.
2
2012
Advances in cryptology – CRYPTO 2012. 32nd annual cryptology conference, Santa Barbara, CA, USA, August 19–23, 2012. Proceedings. Zbl 1246.94010
Safavi-Naini, Reihaneh (ed.); Canetti, Ran (ed.)
2
2012
Private fingerprint matching. Zbl 1308.94088
Shahandashti, Siamak F.; Safavi-Naini, Reihaneh; Ogunbona, Philip
1
2012
On optimal secure message transmission by public discussion. Zbl 1366.94533
Shi, Hongsong; Jiang, Shaoquan; Safavi-Naini, Reihaneh; Tuhin, Mohammed Ashraful
2
2011
Secret keys from channel noise. Zbl 1281.94010
Ahmadi, Hadi; Safavi-Naini, Reihaneh
1
2011
Threshold attribute-based signcryption. Zbl 1291.94086
Gagné, Martin; Narayan, Shivaramakrishnan; Safavi-Naini, Reihaneh
3
2010
Threshold attribute-based signatures and their application to anonymous credential systems. Zbl 1246.94048
Shahandashti, Siamak F.; Safavi-Naini, Reihaneh
16
2009
Automated security proof for symmetric encryption modes. Zbl 1273.68109
Gagné, Martin; Lafourcade, Pascal; Lakhnech, Yassine; Safavi-Naini, Reihaneh
3
2009
New results on unconditionally secure multi-receiver manual authentication. Zbl 1263.94035
Wang, Shuhong; Safavi-Naini, Reihaneh
1
2009
Selected areas in cryptography. 16th annual international workshop, SAC 2009, Calgary, Alberta, Canada, August 13–14, 2009. Revised selected papers. Zbl 1177.94012
Jacobson, Michael J. jun. (ed.); Rijmen, Vincent (ed.); Safavi-Naini, Reihaneh (ed.)
1
2009
Construction of universal designated-verifier signatures and identity-based signatures from standard signatures. Zbl 1162.94401
Shahandashti, Siamak F.; Safavi-Naini, Reihaneh
4
2008
An efficient deniable key exchange protocol (extended abstract). Zbl 1175.94083
Jiang, Shaoquan; Safavi-Naini, Reihaneh
2
2008
Information theoretic bounds on authentication systems in query model. Zbl 1308.94100
Safavi-Naini, Reihaneh; Wild, Peter R.
1
2008
Non-interactive manual channel message authentication based on eTCR hash functions. Zbl 1213.94162
Reyhanitabar, Mohammad Reza; Wang, Shuhong; Safavi-Naini, Reihaneh
1
2007
Construction of deletion correcting codes using generalized Reed-Solomon codes and their subcodes. Zbl 1148.94015
Tonien, Dongvu; Safavi-Naini, Reihaneh
1
2007
On the integration of public key data encryption and public key encryption with keyword search. Zbl 1156.94331
Baek, Joonsang; Safavi-Naini, Reihaneh; Susilo, Willy
12
2006
Recursive constructions of secure codes and hash families using difference function families. Zbl 1140.94014
Tonien, Dongvu; Safavi-Naini, Reihaneh
5
2006
Multi-party concurrent signatures. Zbl 1156.94423
Tonien, Dongvu; Susilo, Willy; Safavi-Naini, Reihaneh
4
2006
Generic construction of hybrid public key traitor tracing with full-public-traceability. Zbl 1133.94333
Phan, Duong Hieu; Safavi-Naini, Reihaneh; Tonien, Dongvu
4
2006
An efficient single-key pirates tracing scheme using cover-free families. Zbl 1151.94576
Tonien, Dongvu; Safavi-Naini, Reihaneh
2
2006
Verifiable shuffles: a formal model and a Paillier-based three-round construction with provable security. Zbl 1209.94046
Nguyen, Lan; Safavi-Naini, Rei; Kurosawa, Kaoru
1
2006
Certificateless public key encryption without pairing. Zbl 1127.94358
Baek, Joonsang; Safavi-Naini, Reihaneh; Susilo, Willy
17
2005
Efficient multi-receiver identity-based encryption and its application to broadcast encryption. Zbl 1081.94516
Baek, Joonsang; Safavi-Naini, Reihaneh; Susilo, Willy
10
2005
Distributing the encryption and decryption of a block cipher. Zbl 1136.94322
Martin, Keith M.; Safavi-Naini, Rei; Wang, Huaxiong; Wild, Peter R.
6
2005
Universal designated verifier signature proof (or how to efficiently prove knowledge of a signature). Zbl 1154.94447
Baek, Joonsang; Safavi-Naini, Reihaneh; Susilo, Willy
4
2005
Dynamic \(k\)-times anonymous authentication. Zbl 1126.68409
Nguyen, Lan; Safavi-Naini, Rei
1
2005
Cancelable key-based fingerprint templates. Zbl 1127.94357
Ang, Russell; Safavi-Naini, Rei; McAven, Luke
1
2005
Radio networks with reliable communication. Zbl 1128.68300
Desmedt, Yvo; Wang, Yongge; Safavi-Naini, Rei; Wang, Huaxiong
1
2005
Token-controlled public key encryption. Zbl 1118.68473
Baek, Joonsang; Safavi-Naini, Reihaneh; Susilo, Willy
1
2005
An efficient signature scheme from bilinear pairings and its applications. Zbl 1198.94169
Zhang, Fangguo; Safavi-Naini, Reihaneh; Susilo, Willy
32
2004
Some new proxy signature schemes from pairings. Zbl 1084.94521
Zhang, Fangguo; Safavi-Naini, Reihaneh; Lin, Chih-Yin
9
2004
Efficient and provably secure trapdoor-free group signature schemes from bilinear pairings. Zbl 1094.94530
Nguyen, Lan; Safavi-Naini, Rei
8
2004
On the maximal codes of length 3 with the 2-identifiable parent property. Zbl 1101.68070
Tô, Vu Dong; Safavi-Naini, Reihaneh
2
2004
Deletion correcting using generalized Reed-Solomon codes. Zbl 1059.94041
Wang, Yejing; McAven, Luke; Safavi-Naini, Reihaneh
2
2004
General group authentication codes and their relation to “unconditionally-secure signatures”. Zbl 1198.94161
Safavi-Naini, Reihaneh; McAven, Luke; Yung, Moti
1
2004
Symmetric authentication codes with secrecy and unconditionally secure authenticated encryption. Zbl 1113.94314
McAven, Luke; Safavi-Naini, Reihaneh; Yung, Moti
1
2004
Verifiable shuffles: a formal model and a Paillier-based efficient construction with provable security. Zbl 1103.68533
Nguyen, Lan; Safavi-Naini, Rei; Kurosawa, Kaoru
1
2004
Linear authentication codes: bounds and constructions. Zbl 1063.94087
Wang, Huaxiong; Xing, Chaoping; Safavi-Naini, Rei
20
2003
Efficient verifiably encrypted signature and partially blind signature from bilinear pairings. Zbl 1123.94369
Zhang, Fangguo; Safavi-Naini, Reihaneh; Susilo, Willy
11
2003
Traitor tracing for shortened and corrupted fingerprints. Zbl 1327.94072
Safavi-Naini, Reihaneh; Wang, Yejing
3
2003
Sequential traitor tracing. Zbl 1063.94085
Safavi-Naini, Reihaneh; Wang, Yejing
2
2003
Threshold MACs. Zbl 1031.94522
Martin, Keith M.; Pieprzyk, Josef; Safavi-Naini, Rei; Wang, Huaxiong; Wild, Peter R.
2
2003
An efficient fail-stop signature scheme based on factorization. Zbl 1031.94540
Susilo, Willy; Safavi-Naini, Rei
2
2003
Redistribution of mechanical secret shares. Zbl 1275.94038
Desmedt, Yvo; Safavi-Naini, Rei; Wang, Huaxiong
1
2003
Explicit construction of secure frameproof codes. Zbl 1091.94504
Tô, Vu Dong D.; Safavi-Naini, R.
1
2003
Collusion secure \(q\)-ary fingerprinting for perceptual content. Zbl 1048.68898
Safavi-Naini, Reihaneh; Wang, Yejing
1
2002
Optimal parallel I/O for range queries through replication. Zbl 1017.68681
Frikken, Keith; Atallah, Mikhail; Prabhakar, Sunil; Safavi-Naini, Rei
1
2002
New results on frame-proof codes and traceability schemes. Zbl 1018.94019
Safavi-Naini, Reihaneh; Wang, Yejing
4
2001
Combinatorial characterisation of \(\ell\)-optimal authentication codes with arbitration. Zbl 0987.94037
Wang, Yejing; Safavi-Naini, Reihaneh; Pei, Dingyi
3
2001
Broadcast authentication for group communication. Zbl 0983.68069
Safavi-Naini, Rei; Wang, Huaxiong
1
2001
Robust additive secret sharing schemes over \(\mathbb{Z}_m\). Zbl 0997.94550
Safavi-Naini, Rei; Wang, Huaxiong
1
2001
A general construction for fail-stop signature using authentication codes. Zbl 0997.94551
Safavi-Naini, Rei; Susilo, Willy
1
2001
Sequential traitor tracing. Zbl 0995.94536
Safavi-Naini, Reihaneh; Wang, Yejing
4
2000
Threshold fail-stop signature schemes based on discrete logarithm and factorization. Zbl 1044.68615
Safavi-Naini, Rei; Susilo, Willy
2
2000
Characterization of optimal authentication codes with arbitration. Zbl 1031.94014
Pei, Dingyi; Li, Yuqiang; Wang, Yejing; Safavi-Naini, Rei
12
1999
Multireceiver authentication codes: Models, bounds, constructions, and extensions. Zbl 1011.94018
Safavi-Naini, R.; Wang, H.
9
1999
Bounds and techniques for efficient redistribution of secret shares to new access structures. Zbl 0955.68045
Martin, Keith M.; Safavi-Naini, Rei; Wang, Huaxiong
8
1999
Changing thresholds in the absence of secure channels. Zbl 0919.94041
Martin, Keith M.; Pieprzyk, Josef; Safavi-Naini, Rei; Wang, Huaxiong
7
1999
Changing thresholds in the absence of secure channels. Zbl 0945.68055
Martin, Keith M.; Pieprzyk, Josef; Safavi-Naini, Rei; Wang, Huaxiong
6
1999
Fail-stop threshold signature schemes based on elliptic curves. Zbl 0919.94045
Susilo, Willy; Safavi-Naini, Rei; Pieprzyk, Josef
4
1999
A new approach to robust threshold RSA signature schemes. Zbl 1032.94524
Safavi-Naini, Rei; Wang, Huaxiong; Lam, Kwok-Yan
1
1999
\(A^3\)-codes under collusion attacks. Zbl 0977.94049
Wang, Yejing; Safavi-Naini, Rei
1
1999
New results on multi-receiver authentication codes. Zbl 0934.94016
Safavi-Naini, R.; Wang, H.
7
1998
Secret sharing in multilevel and compartmented groups. Zbl 0931.94022
Ghodosi, Hossein; Pieprzyk, Josef; Safavi-Naini, Rei
6
1998
Bounds and constructions for multireceiver authentication codes. Zbl 0930.94040
Safavi-Naini, R.; Wang, H.
2
1998
On the security of Girault’s identification scheme. Zbl 1067.94559
Saeednia, Shahrokh; Safavi-Naini, Rei
2
1998
On construction of cumulative secret sharing schemes. Zbl 0931.94023
Ghodosi, Hossein; Pieprzyk, Josef; Safavi-Naini, Rei; Wang, Huaxiong
1
1998
Efficient identity-based conference key distribution protocols. Zbl 1097.94517
Saeednia, Shahrokh; Safavi-Naini, Rei
1
1998
On the weaknesses of Gong’s collisionful hash function. Zbl 0960.68042
Bakhtiari, S.; Safavi-Naini, R.; Pieprzyk, J.
6
1997
Multisender authentication systems with unconditional security. Zbl 0888.94019
Martin, K. M.; Safavi-Naini, R.
2
1997
Remarks on the multiple assignment secret sharing scheme. Zbl 0957.94026
Ghodosi, Hossein; Pieprzyk, Josef; Safavi-Naini, Rei
2
1997
A message authentication code based on Latin squares. Zbl 0989.94520
Bakhtiari, S.; Safavi-Naini, R.; Pieprzyk, J.
1
1997
Authentication codes in plaintext and chosen-content attacks. Zbl 0853.94018
Safavi-Naini, R.; Tombak, L.
1
1996
Comments on Soviet encryption algorithm. Zbl 0879.94033
Charnes, C.; O’Connor, L.; Pieprzyk, J.; Safavi-Naini, R.; Zheng, Y.
1
1995
Authentication codes in plaintext and chosen-content attacks. Zbl 0885.94026
Safavi-Naini, R.; Tombak, L.
1
1995
Combinatorial structure of \(A\)-codes with \(r\)-fold security. Zbl 0872.94037
Safavi-Naini, R.; Tombak, L.
1
1995
Optimal authentication systems. Zbl 0951.94533
Safavi-Naini, R.; Tombak, L.
1
1994
Automated cryptanalysis of substitution ciphers. Zbl 0833.94013
Forsyth, W. S.; Safavi-Naini, R.
1
1993
all top 5

Cited by 527 Authors

12 Safavi-Naini, Reihaneh
12 Wang, Huaxiong
10 Susilo, Willy
7 Du, Beiliang
7 Mu, Yi
7 Wong, Duncan S.
6 Gao, You
5 Chen, Shangdi
5 Paterson, Maura Beth
5 Stinson, Douglas Robert
5 Yang, Guomin
4 Cao, Zhenfu
4 Chen, Kefei
4 Deng, Robert Huijie
4 Ding, Cunsheng
4 Harn, Lein
4 Herranz, Javier
4 Huang, Qiong
4 Huang, Xinyi
4 Li, Jiguo
4 Li, Xiangxue
4 Liang, Miao
4 Libert, Benoît
4 Ling, San
4 Pieprzyk, Josef P.
4 Weng, Jian
4 Yu, Yong
4 Zhang, Fangguo
3 Fu, Fangwei
3 Ghadafi, Essam M.
3 Groth, Jens
3 Li, Jin
3 Lin, Fuchun
3 Miao, Ying
3 Phan Duong Hieu
3 Shao, Zuhua
3 Tonien, Dongvu
3 Waters, Brent
3 Zhang, Zhenfeng
2 Au, Man Ho
2 Boneh, Dan
2 Bootle, Jonathan
2 Buchmann, Johannes A.
2 Camenisch, Jan L.
2 Cerulli, Andrea
2 Chaidos, Pyrros
2 Chanson, Samuel T.
2 Chen, Xiaofeng
2 Chow, Sherman S. M.
2 Deng, Lunzhi
2 Desmedt, Yvo G.
2 Dong, Xiaolei
2 Emura, Keita
2 Fang, Liming
2 Gabidulin, Ernst M.
2 Ge, Chunpeng
2 Hsu, Chingfang
2 Hu, Yupu
2 Huang, Wenchao
2 Ji, Lijun
2 Jiang, Shaoquan
2 Laguillaumie, Fabien
2 Liu, Mulan
2 Lu, Rongxing
2 Lu, Yang
2 Martin, Keith M.
2 Martirosyan, Sosina S.
2 Meng, Keju
2 Miao, Fuyou
2 Nandi, Mridul
2 Neven, Gregory
2 Ng, Siaw-Lynn
2 Niu, Minyao
2 Pandit, Tapas
2 Pedersen, Michael Østergaard
2 Pei, Dingyi
2 Pilipchuk, Nina I.
2 Qian, Haifeng
2 Rangan, Chandrasekharan Pandu
2 Rosulek, Mike
2 Salomaa, Arto Kustaa
2 Selvi, S. Sharmila Deva
2 Shen, Hao
2 Shim, Kyungah
2 Steinfeld, Ron
2 Tan, Chik How
2 Tan, Xiao
2 Tang, Chunming
2 Trung, Tran Van
2 Tso, Raylin
2 Vergnaud, Damien
2 Vivek, S. Sree
2 Wali, Shah Lubna
2 Wang, Gang
2 Wang, Jiandong
2 Wang, Licheng
2 Wang, Pengwei
2 Wang, Xiuli
2 Wang, Zhiwei
2 Warinschi, Bogdan
...and 427 more Authors
all top 5

Cited in 59 Serials

30 Information Sciences
27 Designs, Codes and Cryptography
19 Theoretical Computer Science
16 Information Processing Letters
9 Journal of Cryptology
7 Journal of Mathematical Cryptology
6 Discrete Mathematics
5 Journal of Applied Mathematics
4 Applied Mathematics and Computation
4 Information and Computation
4 International Journal of Foundations of Computer Science
4 Discrete Mathematics, Algorithms and Applications
3 Computers & Mathematics with Applications
3 Discrete Applied Mathematics
3 Journal of Computer and System Sciences
3 Finite Fields and their Applications
3 Mathematical Problems in Engineering
3 Wuhan University Journal of Natural Sciences (WUJNS)
3 Science in China. Series F
2 Acta Informatica
2 Physics Letters. A
2 Problems of Information Transmission
2 Journal of Combinatorial Theory. Series A
2 SIAM Journal on Computing
2 Acta Mathematicae Applicatae Sinica. English Series
2 Algorithmica
2 Soft Computing
2 Journal of Systems Science and Complexity
2 Advances in Mathematics of Communications
2 Cryptography and Communications
2 Arabian Journal for Science and Engineering
2 Frontiers of Computer Science
2 Problemy Analiza. Issues of Analysis
1 International Journal of Theoretical Physics
1 Lithuanian Mathematical Journal
1 Journal of Pure and Applied Algebra
1 Mathematica Slovaca
1 Synthese
1 Cryptologia
1 Journal of Complexity
1 Journal of Computer Science and Technology
1 Journal of Automated Reasoning
1 Mathematical and Computer Modelling
1 International Journal of Computer Mathematics
1 Pattern Recognition
1 Applicable Algebra in Engineering, Communication and Computing
1 Applied Mathematics. Series B (English Edition)
1 Algebra Colloquium
1 Journal of Combinatorial Optimization
1 Annals of Combinatorics
1 Journal of Discrete Mathematical Sciences & Cryptography
1
1 Journal of Algebra and its Applications
1 Journal of Shanghai Jiaotong University (Science)
1 Journal of Zhejiang University. Science A
1 Frontiers of Mathematics in China
1 Asian-European Journal of Mathematics
1 Groups, Complexity, Cryptology
1 Vestnik Samarskogo Universiteta. Estestvennonauchnaya Seriya

Citations by Year