Delaram Kahrobaei

Orcid: 0000-0001-5467-7832

Affiliations:
  • City University of New York, Queens College, NY, USA


According to our database1, Delaram Kahrobaei authored at least 72 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Contracting Self-similar Groups in Group-Based Cryptography.
CoRR, 2024

Single-Server Delegation of NTT with Application to Crystals-Kyber.
Proceedings of the 2024 on Cloud Computing Security Workshop, 2024

2023
A novel attack on McEliece's cryptosystem.
Int. J. Comput. Math. Comput. Syst. Theory, July, 2023

Applications of Finite non-Abelian Simple Groups to Cryptography in the Quantum Era.
IACR Cryptol. ePrint Arch., 2023

Biscuit: New MPCitH Signature Scheme from Structured Multivariate Polynomials.
IACR Cryptol. ePrint Arch., 2023

Semidirect Product Key Exchange: the State of Play.
IACR Cryptol. ePrint Arch., 2023

SPDH-Sign: towards Efficient, Post-quantum Group-based Signatures.
IACR Cryptol. ePrint Arch., 2023

Cryptanalysis of protocols using (Simultaneous) Conjugacy Search Problem in certain Metabelian Platform Groups.
CoRR, 2023

Cryptographic multilinear maps using pro-<i>p</i> groups.
Adv. Math. Commun., 2023

2022
On the efficiency of a general attack against the MOBS cryptosystem.
J. Math. Cryptol., 2022

A closer look at the multilinear cryptography using nilpotent groups.
Int. J. Comput. Math. Comput. Syst. Theory, 2022

Cryptographic multilinear maps using pro-p groups.
IACR Cryptol. ePrint Arch., 2022

Group-based Cryptography in the Quantum Era.
IACR Cryptol. ePrint Arch., 2022

Post-quantum hash functions using SL<sub>n</sub>𝔽<sub>p</sub>.
IACR Cryptol. ePrint Arch., 2022

A Subexponential Quantum Algorithm for the Semidirect Discrete Logarithm Problem.
IACR Cryptol. ePrint Arch., 2022

The root extraction problem in braid group-based cryptography.
CoRR, 2022

On Single-Server Delegation of RSA.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2022

A Survey on Delegated Computation.
Proceedings of the Developments in Language Theory - 26th International Conference, 2022

2021
A note on fully homomorphic encryption of real-life data.
Int. J. Comput. Math. Comput. Syst. Theory, 2021

A closer look at the tropical cryptography.
Int. J. Comput. Math. Comput. Syst. Theory, 2021

Cryptanalysis of Semidirect Product Key Exchange Using Matrices Over Non-Commutative Rings.
IACR Cryptol. ePrint Arch., 2021

Homomorphic Encryption for Machine Learning in Medicine and Bioinformatics.
ACM Comput. Surv., 2021

Single-Server Delegation of Ring Multiplications from Quasilinear-time Clients.
Proceedings of the 14th International Conference on Security of Information and Networks, 2021

2020
Efficient and Secure Delegation of Exponentiation in General Groups to a Single Malicious Server.
Math. Comput. Sci., 2020

Delegating a Product of Group Exponentiations with Application to Signature Schemes (Submission to Special NutMiC 2019 Issue of JMC).
J. Math. Cryptol., 2020

A cryptographic application of the Thurston norm.
Int. J. Comput. Math. Comput. Syst. Theory, 2020

Solving the Conjugacy Decision Problem via Machine Learning.
Exp. Math., 2020

Towards model-based development of decentralised peer-to-peer data vaults.
Proceedings of the MODELS '20: ACM/IEEE 23rd International Conference on Model Driven Engineering Languages and Systems, 2020

Secure and Efficient Delegation of Pairings with Online Inputs.
Proceedings of the Smart Card Research and Advanced Applications, 2020

Secure and Efficient Delegation of Elliptic-Curve Pairing.
Proceedings of the Applied Cryptography and Network Security, 2020

2019
Introduction.
Int. J. Comput. Math. Comput. Syst. Theory, 2019

Some applications of arithmetic groups in cryptography.
Groups Complex. Cryptol., 2019

Multilinear Cryptography using Nilpotent Groups.
CoRR, 2019

Private naive bayes classification of personal biomedical data: Application in cancer data analysis.
Comput. Biol. Medicine, 2019

Secure Delegation to a Single Malicious Server: Exponentiation in RSA-type Groups.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

Medical Diagnostics Based on Encrypted Medical Data.
Proceedings of the Bio-inspired Information and Communication Technologies, 2019

2018
Practical private-key fully homomorphic encryption in rings.
Groups Complex. Cryptol., 2018

Private-Key Fully Homomorphic Encryption for Private Classification.
Proceedings of the Mathematical Software - ICMS 2018, 2018

The Hidden Subgroup Problem and Post-quantum Group-Based Cryptography.
Proceedings of the Mathematical Software - ICMS 2018, 2018

Efficient and Secure Delegation to a Single Malicious Server: Exponentiation over Non-abelian Groups.
Proceedings of the Mathematical Software - ICMS 2018, 2018

Quadratic Time Algorithm for Inversion of Binary Permutation Polynomials.
Proceedings of the Mathematical Software - ICMS 2018, 2018

Fully Automated Spleen Localization And Segmentation Using Machine Learning And 3D Active Contours.
Proceedings of the 40th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2018

2017
Erratum: A family of polycyclic groups over which the uniform conjugacy problem is NP-complete.
Int. J. Algebra Comput., 2017

Fast Quantum Algorithm for Solving Multivariate Quadratic Equations.
IACR Cryptol. ePrint Arch., 2017

Deep Convolutional Neural Networks for left ventricle segmentation.
Proceedings of the 2017 39th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), 2017

Computing multiple exponentiations in discrete log and RSA groups: From batch verification to batch delegation.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

Practical and Secure Outsourcing of Discrete Log Group Exponentiation to a Single Malicious Server.
Proceedings of the 9th Cloud Computing Security Workshop, 2017

2016
Using semidirect product of (semi)groups in public key cryptography.
IACR Cryptol. ePrint Arch., 2016

The status of polycyclic group-based cryptography: A survey and open problems.
Groups Complex. Cryptol., 2016

On the Conjugacy Problem in Certain Metabelian Groups.
CoRR, 2016

Cryptography with right-angled Artin groups.
CoRR, 2016

Cryptosystems using subgroup distortion.
CoRR, 2016

2015
Length-based attacks in polycyclic groups.
J. Math. Cryptol., 2015

Efficient and Secure Delegation of Group Exponentiation to a Single Server.
IACR Cryptol. ePrint Arch., 2015

2014
A family of polycyclic groups over which the uniform conjugacy problem is NP-complete.
Int. J. Algebra Comput., 2014

Publicly Verifiable Secret Sharing Using Non-Abelian Groups.
CoRR, 2014

A CCA secure cryptosystem using matrices over group rings.
CoRR, 2014

A Polynomial Time Algorithm For The Conjugacy Decision and Search Problems in Free Abelian-by-Infinite Cyclic Groups.
CoRR, 2014

A family of polycyclic groups over which the conjugacy problem is NP-complete.
CoRR, 2014

Heisenberg Groups as Platform for the AAG Key-Exchange Protocol.
Proceedings of the 22nd IEEE International Conference on Network Protocols, 2014

2013
Public key exchange using semidirect product of (semi)groups.
IACR Cryptol. ePrint Arch., 2013

Public key exchange using matrices over group rings.
Groups Complex. Cryptol., 2013

On the dimension of matrix representations of finitely generated torsion free nilpotent groups.
Groups Complex. Cryptol., 2013

Analyzing the Length-Based Attack on Polycyclic Groups
CoRR, 2013

Secret Sharing using Non-Commutative Groups and the Shortlex Order.
CoRR, 2013

2012
A Secret Sharing Scheme Based on Group Presentations and the Word Problem.
IACR Cryptol. ePrint Arch., 2012

Non-commutative digital signatures.
Groups Complex. Cryptol., 2012

2011
Growth rate of an endomorphism of a group.
Groups Complex. Cryptol., 2011

On the residual solvability of generalized free products of solvable groups.
Discret. Math. Theor. Comput. Sci., 2011

Aspects of Nonabelian Group Based Cryptography: A Survey and Open Problems
CoRR, 2011

2009
Decision and Search in Non-Abelian Cramer-Shoup Public Key Cryptosystem.
Groups Complex. Cryptol., 2009

2006
A Non-Commutative Generalization of ElGamal Key Exchange using Polycyclic Groups.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006


  Loading...