Amin Sakzad

Orcid: 0000-0003-4569-3384

According to our database1, Amin Sakzad authored at least 110 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
High Throughput Lattice-Based Signatures on GPUs: Comparing Falcon and Mitaka.
IEEE Trans. Parallel Distributed Syst., April, 2024

Quantum-Safe HIBE: Does It Cost a Latte?
IEEE Trans. Inf. Forensics Secur., 2024

Lattice-Based Vulnerabilities in Lee Metric Post-Quantum Cryptosystems.
IACR Cryptol. ePrint Arch., 2024

Plover: Masking-Friendly Hash-and-Sign Lattice Signatures.
IACR Cryptol. ePrint Arch., 2024

Semi-Compressed CRYSTALS-Kyber.
CoRR, 2024

Diverging assessments: What, Why, and Experiences.
Proceedings of the 55th ACM Technical Symposium on Computer Science Education, 2024

ALAN: Assessment-as-Learning Authentic Tasks for Networking.
Proceedings of the 55th ACM Technical Symposium on Computer Science Education, 2024

CRYSTALS-Kyber With Lattice Quantizer.
Proceedings of the IEEE International Symposium on Information Theory, 2024

2023
Access Control, Key Management, and Trust for Emerging Wireless Body Area Networks.
Sensors, December, 2023

A Survey on Exotic Signatures for Post-quantum Blockchain: Challenges and Research Directions.
ACM Comput. Surv., December, 2023

Incremental symmetric puncturable encryption with support for unbounded number of punctures.
Des. Codes Cryptogr., April, 2023

Energy Consumption Evaluation of Post-Quantum TLS 1.3 for Resource-Constrained Embedded Devices.
IACR Cryptol. ePrint Arch., 2023

Lattice Codes for CRYSTALS-Kyber.
CoRR, 2023

ACE: A Consent-Embedded privacy-preserving search on genomic database.
CoRR, 2023

SePEnTra: A secure and privacy-preserving energy trading mechanisms in transactive energy market.
CoRR, 2023

Automatic Problem Generation for CTF-Style Assessments in IT Forensics Courses.
Proceedings of the 2023 Conference on Innovation and Technology in Computer Science Education V. 1, 2023

FDIAs on Hybrid Trading Transactive Energy Markets: Attacks, Impacts, and Prevention.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Europe, 2023

Smart Parking Dapp: A Trust Minimised Smart Parking Solution.
Proceedings of the IEEE International Conference on Blockchain, 2023

A New Look at Blockchain Leader Election: Simple, Efficient, Sustainable and Post-Quantum.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
Non-Interactive Multi-Client Searchable Encryption: Realization and Implementation.
IEEE Trans. Dependable Secur. Comput., 2022

Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes.
IEEE Trans. Dependable Secur. Comput., 2022

Range search on encrypted spatial data with dynamic updates.
J. Comput. Secur., 2022

Private Re-Randomization for Module LWE and Applications to Quasi-Optimal ZK-SNARKs.
IACR Cryptol. ePrint Arch., 2022

BlindHub: Bitcoin-Compatible Privacy-Preserving Payment Channel Hubs Supporting Variable Amounts.
IACR Cryptol. ePrint Arch., 2022

Garrison: A Novel Watchtower Scheme for Bitcoin.
IACR Cryptol. ePrint Arch., 2022

Daric: A Storage Efficient Payment Channel With Penalization Mechanism.
IACR Cryptol. ePrint Arch., 2022

A New Look at Blockchain Leader Election: Simple, Efficient, Sustainable and Post-Quantum.
IACR Cryptol. ePrint Arch., 2022

An Injectivity Analysis of CRYSTALS-Kyber and Implications on Quantum Security.
IACR Cryptol. ePrint Arch., 2022

Post-Quantum ID-based Ring Signatures from Symmetric-key Primitives.
IACR Cryptol. ePrint Arch., 2022

A Survey on Exotic Signatures for Post-Quantum Blockchain: Challenges & Research Directions.
IACR Cryptol. ePrint Arch., 2022

Vandermonde meets Regev: public key encryption schemes based on partial Vandermonde problems.
Des. Codes Cryptogr., 2022

A Proof of Concept Implementation of Explainable Artificial Intelligence (XAI) in Digital Forensics.
Proceedings of the Network and System Security - 16th International Conference, 2022

Daric: A Storage Efficient Payment Channel with Punishment Mechanism.
Proceedings of the Information Security - 25th International Conference, 2022

Performance Evaluation of Post-Quantum TLS 1.3 on Resource-Constrained Embedded Systems.
Proceedings of the Information Security Practice and Experience, 2022

PRESSGenDB: PRivacy-prEserving Substring Search on Encrypted Genomic DataBase.
Proceedings of the IEEE INFOCOM 2022, 2022

2021
FPPW: A Fair and Privacy Preserving Watchtower For Bitcoin.
IACR Cryptol. ePrint Arch., 2021

Measure-Rewind-Measure: Tighter Quantum Random Oracle Model Proofs for One-Way to Hiding and CCA Security.
IACR Cryptol. ePrint Arch., 2021

Performance Evaluation of Post-Quantum TLS 1.3 on Embedded Systems.
IACR Cryptol. ePrint Arch., 2021

On the Integer Polynomial Learning with Errors Problem.
IACR Cryptol. ePrint Arch., 2021

Lattice-based zero-knowledge arguments for additive and multiplicative relations.
Des. Codes Cryptogr., 2021

PrivGenDB: Efficient and privacy-preserving query executions over encrypted SNP-Phenotype database.
CoRR, 2021

Practical Non-Interactive Searchable Encryption with Forward and Backward Privacy.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

A Non-interactive Multi-user Protocol for Private Authorised Query Processing on Genomic Data.
Proceedings of the Information Security - 24th International Conference, 2021

Privacy-Preserving Contact Tracing Protocol for Mobile Devices: A Zero-Knowledge Proof Approach.
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021

Impact analysis of false data injection attacks in transactive energy market-based micro-grid systems.
Proceedings of the 2021 IEEE PES Innovative Smart Grid Technologies, 2021

Massive MIMO Physical Layer Cryptosystem: Bob cannot decrypt uniquely!
Proceedings of the IEEE Globecom 2021 Workshops, Madrid, Spain, December 7-11, 2021, 2021

Geo-DRS: Geometric Dynamic Range Search on Spatial Data with Backward and Content Privacy.
Proceedings of the Computer Security - ESORICS 2021, 2021

Collaborative analysis of genomic data: vision and challenges.
Proceedings of the 7th IEEE International Conference on Collaboration and Internet Computing, 2021

2020
Steepest Gradient-Based Orthogonal Precoder for Integer-Forcing MIMO.
IEEE Trans. Wirel. Commun., 2020

FACCT: FAst, Compact, and Constant-Time Discrete Gaussian Sampler over Integers.
IEEE Trans. Computers, 2020

Secrecy capacity against adaptive eavesdroppers in a random wireless network using friendly jammers and protected zone.
J. Netw. Comput. Appl., 2020

Enabling Efficient Privacy-Assured Outlier Detection Over Encrypted Incremental Data Sets.
IEEE Internet Things J., 2020

Post-Quantum Linkable Ring Signature Enabling Distributed Authorised Ring Confidential Transactions in Blockchain.
IACR Cryptol. ePrint Arch., 2020

Public-Key Puncturable Encryption: Modular and Compact Constructions.
IACR Cryptol. ePrint Arch., 2020

Privacy-Preserving COVID-19 Contact Tracing App: A Zero-Knowledge Proof Approach.
IACR Cryptol. ePrint Arch., 2020

Towards Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes.
IACR Cryptol. ePrint Arch., 2020

Practical Post-Quantum Few-Time Verifiable Random Function with Applications to Algorand.
IACR Cryptol. ePrint Arch., 2020

MPSign: A Signature from Small-Secret Middle-Product Learning with Errors.
IACR Cryptol. ePrint Arch., 2020

Comments on "Physical-layer cryptography through massive MIMO".
CoRR, 2020

Efficient Lattice-Based Polynomial Evaluation and Batch ZK Arguments.
Proceedings of the Selected Areas in Cryptography - SAC 2020, 2020

COSAC: COmpact and Scalable Arbitrary-Centered Discrete Gaussian Sampling over Integers.
Proceedings of the Post-Quantum Cryptography - 11th International Conference, 2020

Friendly Jammer against an Adaptive Eavesdropper in a Relay-aided Network.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020

2019
Compact and Scalable Arbitrary-centered Discrete Gaussian Sampling over Integers.
IACR Cryptol. ePrint Arch., 2019

Lattice RingCT v2.0 with Multiple Input and Output Wallets.
IACR Cryptol. ePrint Arch., 2019

Practical MP-LWE-based encryption balancing security-risk vs. efficiency.
IACR Cryptol. ePrint Arch., 2019

Practical $$\mathsf {MP} \text{- }\mathsf {LWE} $$ -based encryption balancing security-risk versus efficiency.
Des. Codes Cryptogr., 2019

Enabling Efficient Privacy-Assured Outlier Detection over Encrypted Incremental Datasets.
CoRR, 2019

A Logic for Secure Stratified Systems and its Application to Containerized Systems.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Chameleon Hash Time-Lock Contract for Privacy Preserving Payment Channel Networks.
Proceedings of the Provable Security, 2019

Orthogonal Precoder for Integer-Forcing MIMO.
Proceedings of the IEEE International Symposium on Information Theory, 2019

DGM: A Dynamic and Revocable Group Merkle Signature.
Proceedings of the Computer Security - ESORICS 2019, 2019

Bootstrapping Trust in a "Trusted" Virtualized Platform.
Proceedings of the 1st ACM Workshop on Workshop on Cyber-Security Arms Race, 2019

Lattice RingCT V2.0 with Multiple Input and Multiple Output Wallets.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

2018
Performance of Möbius Interleavers for Turbo Codes.
Wirel. Pers. Commun., 2018

Improved Security Proofs in Lattice-Based Cryptography: Using the Rényi Divergence Rather than the Statistical Distance.
J. Cryptol., 2018

Platform-independent Secure Blockchain-Based Voting System.
IACR Cryptol. ePrint Arch., 2018

Post-Quantum One-Time Linkable Ring Signature and Application to Ring Confidential Transactions in Blockchain (Lattice RingCT v1.0).
IACR Cryptol. ePrint Arch., 2018

Result Pattern Hiding Searchable Encryption for Conjunctive Queries.
IACR Cryptol. ePrint Arch., 2018

Short Lattice-based One-out-of-Many Proofs and Applications to Ring Signatures.
IACR Cryptol. ePrint Arch., 2018

A Neural Network Lattice Decoding Algorithm.
Proceedings of the IEEE Information Theory Workshop, 2018

Practical Backward-Secure Searchable Encryption from Symmetric Puncturable Encryption.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Practical Encoder and Decoder for Power Constrained QC LDPC-Lattice Codes.
IEEE Trans. Commun., 2017

Middle-Product Learning With Errors.
IACR Cryptol. ePrint Arch., 2017

All-But-Many Lossy Trapdoor Functions and Selective Opening Chosen-Ciphertext Security from LWE.
IACR Cryptol. ePrint Arch., 2017

Integer-Forcing Linear Receivers: A Design Criterion for Full-Diversity STBCs.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

2016
An Efficient Non-Interactive Multi-client Searchable Encryption with Support for Boolean Queries.
IACR Cryptol. ePrint Arch., 2016

Implementation of a two-way relay network with compute-and-forward in GNU Radio.
Trans. Emerg. Telecommun. Technol., 2016

Practical Encoder and Decoder for Power Constrained QC-LDPC lattices.
CoRR, 2016

2015
Full Diversity Unitary Precoded Integer-Forcing.
IEEE Trans. Wirel. Commun., 2015

Minimum free distance of CCSDS turbo encoders under (Truncated) Möbius interleavers.
Proceedings of the Iran Workshop on Communication and Information Theory, 2015

On massive MIMO physical layer cryptosystem.
Proceedings of the 2015 IEEE Information Theory Workshop, 2015

Cross-packing lattices for the Rician fading channel.
Proceedings of the 2015 IEEE Information Theory Workshop, 2015

2014
Phase Precoding for the Compute-and-Forward Protocol.
CoRR, 2014

Unitary precoding for integer-forcing MIMO linear receivers.
Proceedings of the 2014 IEEE Information Theory Workshop, 2014

Phase precoded compute-and-forward with partial feedback.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

2013
Integer-Forcing MIMO Linear Receivers Based on Lattice Reduction.
IEEE Trans. Wirel. Commun., 2013

Ambiguity and Deficiency of Permutations Over Finite Fields With Linearized Difference Map.
IEEE Trans. Inf. Theory, 2013

On the performance of 1-level LDPC lattices.
Proceedings of the Iran Workshop on Communication and Information Theory, 2013

On complex LLL algorithm for integer forcing linear receivers.
Proceedings of the Australian Communications Theory Workshop, AusCTW 2013, Adelaide, 2013

2012
Integer-Forcing Linear Receivers Based on Lattice Reduction Algorithms
CoRR, 2012

Cycle structure of permutation functions over finite fields and their applications.
Adv. Math. Commun., 2012

On the ergodic rate for compute-and-forward.
Proceedings of the International Symposium on Network Coding, 2012

2011
Two New Measures for Permutations: Ambiguity and Deficiency.
IEEE Trans. Inf. Theory, 2011

Turbo Lattices: Construction and Performance Analysis
CoRR, 2011

Ambiguity and deficiency of permutations from finite fields.
Proceedings of the 2011 IEEE Information Theory Workshop, 2011

2010
Codes with girth 8 Tanner graph representation.
Des. Codes Cryptogr., 2010

Self-Inverse Interleavers for Turbo Codes
CoRR, 2010

On cycle-free lattices with high rate label codes.
Adv. Math. Commun., 2010

Construction of turbo lattices.
Proceedings of the 48th Annual Allerton Conference on Communication, 2010

Self-inverse interleavers based on permutation functions for turbo codes.
Proceedings of the 48th Annual Allerton Conference on Communication, 2010


  Loading...