Aysajan Abidin

Orcid: 0000-0002-5128-3608

According to our database1, Aysajan Abidin authored at least 44 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Fast Evaluation of S-Boxes With Garbled Circuits.
IEEE Trans. Inf. Forensics Secur., 2024

Fast Transciphering Via Batched And Reconfigurable LUT Evaluation.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024

MaSTer: Maliciously Secure Truncation for Replicated Secret Sharing without Pre-Processing.
IACR Cryptol. ePrint Arch., 2024

Entangled States and Bell's Inequality: A New Approach to Quantum Distance Bounding.
Proceedings of the IEEE Symposium on Computers and Communications, 2024

2023
Let's Go Eevee! A Friendly and Suitable Family of AEAD Modes for IoT-to-Cloud Secure Computation.
IACR Cryptol. ePrint Arch., 2023

Arithmetic Circuit Implementations of S-boxes for SKINNY and PHOTON in MPC.
IACR Cryptol. ePrint Arch., 2023

Entanglement-based Mutual Quantum Distance Bounding.
CoRR, 2023

Security and Privacy Threat Analysis for Solid.
Proceedings of the IEEE Secure Development Conference, 2023

Secure Key Management for Multi-Party Computation in MOZAIK.
Proceedings of the IEEE European Symposium on Security and Privacy, 2023

MOZAIK: An End-to-End Secure Data Sharing Platform.
Proceedings of the Second ACM Data Economy Workshop, 2023

2022
PIVOT: Private and Effective Contact Tracing.
IEEE Internet Things J., 2022

2021
Secure, Accurate, and Practical Narrow-Band Ranging System.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

2020
Striking the Balance: Effective yet Privacy Friendly Contact Tracing.
IACR Cryptol. ePrint Arch., 2020

SAKE+: Strengthened Symmetric-Key Authenticated Key Exchange with Perfect Forward Secrecy for IoT.
IACR Cryptol. ePrint Arch., 2020

Decentralized Privacy-Preserving Proximity Tracing.
IEEE Data Eng. Bull., 2020

On Detecting Relay Attacks on RFID Systems Using Qubits.
Cryptogr., 2020

Decentralized Privacy-Preserving Proximity Tracing.
CoRR, 2020

2019
Efficient and Privacy-Preserving Cryptographic Key Derivation From Continuous Sources.
IEEE Trans. Inf. Forensics Secur., 2019

Practically Efficient Secure Distributed Exponentiation without Bit-Decomposition.
IACR Cryptol. ePrint Arch., 2019

Quantum distance bounding.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Collaborative Authentication Using Threshold Cryptography.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2019

2018
A Secure and Privacy-preserving Protocol for Smart Metering Operational Data Collection.
IACR Cryptol. ePrint Arch., 2018

Frictionless Authentication Systems: Emerging Trends, Research Challenges and Opportunities.
CoRR, 2018

Frictionless Authentication System: Security & Privacy Analysis and Potential Solutions.
CoRR, 2018

Secure and Privacy-Friendly Local Electricity Trading and Billing in Smart Grid.
CoRR, 2018

Efficient Unconditionally Secure Signatures Using Universal Hashing.
Proceedings of the Applied Cryptography and Network Security, 2018

2017
Attacks on Karlsson and Mitrokotsa's Grouping-Proof-Distance-Bounding Protocol.
IACR Cryptol. ePrint Arch., 2017

Uncoupling Biometrics from Templates for Secure and Privacy-Preserving Authentication.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017

An MPC-based protocol for secure and privacy-preserving smart metering.
Proceedings of the 2017 IEEE PES Innovative Smart Grid Technologies Conference Europe, 2017

2016
Attacks on quantum key distribution protocols that employ non-ITS authentication.
Quantum Inf. Process., 2016

Unconditionally Secure Signatures.
IACR Cryptol. ePrint Arch., 2016

An MPC-based Privacy-Preserving Protocol for a Local Electricity Trading Market.
IACR Cryptol. ePrint Arch., 2016

Towards Quantum Distance Bounding Protocols.
Proceedings of the Radio Frequency Identification and IoT Security, 2016

A local electricity trading market: Security analysis.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference Europe, 2016

On Privacy-Preserving Biometric Authentication.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

Efficient Verifiable Computation of XOR for Biometric Authentication.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

An Efficient Entity Authentication Protocol with Enhanced Security and Privacy Properties.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

2014
Direct proof of security of Wegman-Carter authentication with partially known key.
Quantum Inf. Process., 2014

Security aspects of privacy-preserving biometric authentication based on ideal lattices and ring-LWE.
Proceedings of the 2014 IEEE International Workshop on Information Forensics and Security, 2014

On the Leakage of Information in Biometric Authentication.
Proceedings of the Progress in Cryptology - INDOCRYPT 2014, 2014

Security of a Privacy-Preserving Biometric Authentication Protocol Revisited.
Proceedings of the Cryptology and Network Security - 13th International Conference, 2014

2013
Authentication in Quantum Key Distribution : Security Proof and Universal Hash Functions.
PhD thesis, 2013

2012
On Security of Universal Hash Function Based Multiple Authentication.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

2011
New Universal Hash Functions.
Proceedings of the Research in Cryptology - 4th Western European Workshop, 2011


  Loading...