Hamidreza Amini Khorasgani

According to our database1, Hamidreza Amini Khorasgani authored at least 14 papers between 2014 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Randomized Functions with High Round Complexity.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023

2022
Secure Non-interactive Simulation from Arbitrary Joint Distributions.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

Geometry of Secure Two-party Computation.
Proceedings of the 63rd IEEE Annual Symposium on Foundations of Computer Science, 2022

Secure Non-interactive Simulation: Feasibility and Rate.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

2021
Decidability of Secure Non-interactive Simulation of Doubly Symmetric Binary Source.
IACR Cryptol. ePrint Arch., 2021

Optimally-secure Coin-tossing against a Byzantine Adversary.
Proceedings of the IEEE International Symposium on Information Theory, 2021

Efficient Distributed Coin-tossing Protocols.
Proceedings of the IEEE International Symposium on Information Theory, 2021

2020
Design & Analysis of Optimal Coin-tossing: New Techniques.
IACR Cryptol. ePrint Arch., 2020

Coin Tossing with Lazy Defense: Hardness of Computation Results.
IACR Cryptol. ePrint Arch., 2020

Secure Non-interactive Simulation: Hardness & Feasibility.
IACR Cryptol. ePrint Arch., 2020

2019
Estimating Gaps in Martingales and Applications to Coin-Tossing: Constructions and Hardness.
IACR Cryptol. ePrint Arch., 2019

2016
Performance Analysis of Large Multi-Interface Wireless Mesh Networks with Multi-Different Bandwidth Channel.
IEEE Trans. Mob. Comput., 2016

On the design and security of a lattice-based threshold secret sharing scheme.
ISC Int. J. Inf. Secur., 2016

2014
A lattice-based threshold secret sharing scheme.
Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014


  Loading...