Karim Baghery

Orcid: 0000-0001-7213-8496

According to our database1, Karim Baghery authored at least 31 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Simulation extractable versions of Groth's zk-SNARK revisited.
Int. J. Inf. Sec., February, 2024

Verifiable FHE via Lattice-based SNARKs.
IACR Commun. Cryptol., 2024

2023
Benchmarking the Setup of Updatable zk-SNARKs.
IACR Cryptol. ePrint Arch., 2023

Π: A Unified Framework for Verifiable Secret Sharing.
IACR Cryptol. ePrint Arch., 2023

VSS from Distributed ZK Proofs and Applications.
IACR Cryptol. ePrint Arch., 2023

Practical Robust DKG Protocols for CSIDH.
IACR Cryptol. ePrint Arch., 2023

2022
Signatures of knowledge for Boolean circuits under standard assumptions.
Theor. Comput. Sci., 2022

Updatable NIZKs from Non-Interactive Zaps.
IACR Cryptol. ePrint Arch., 2022

CSI-SharK: CSI-FiSh with Sharing-friendly Keys.
IACR Cryptol. ePrint Arch., 2022

2021
Compilation of Function Representations for Secure Computing Paradigms.
IACR Cryptol. ePrint Arch., 2021

An Isogeny-Based ID Protocol Using Structured Public Keys.
IACR Cryptol. ePrint Arch., 2021

Another Look at Extraction and Randomization of Groth's zk-SNARK.
Proceedings of the Financial Cryptography and Data Security, 2021

2020
Tiramisu: Black-Box Simulation Extractable NIZKs in the Updatable CRS Model.
IACR Cryptol. ePrint Arch., 2020

Simulation Extractable Versions of Groth's zk-SNARK Revisited.
IACR Cryptol. ePrint Arch., 2020

Signatures of Knowledge for Boolean Circuits under Standard Assumptions (Full version).
IACR Cryptol. ePrint Arch., 2020

2019
Breaking anonymity of some recent lightweight RFID authentication protocols.
Wirel. Networks, 2019

Subversion-Resistant Simulation (Knowledge) Sound NIZKs.
IACR Cryptol. ePrint Arch., 2019

Subversion-Resistant Commitment Schemes: Definitions and Constructions.
IACR Cryptol. ePrint Arch., 2019

On the Efficiency of Privacy-Preserving Smart Contract Systems.
IACR Cryptol. ePrint Arch., 2019

Simulation Extractability in Groth's zk-SNARK.
IACR Cryptol. ePrint Arch., 2019

UC-Secure CRS Generation for SNARKs.
IACR Cryptol. ePrint Arch., 2019

DL-Extractable UC-Commitment Schemes.
IACR Cryptol. ePrint Arch., 2019

2017
Game-Based Privacy Analysis of RFID Security Schemes for Confident Authentication in IoT.
Wirel. Pers. Commun., 2017

A Subversion-Resistant SNARK.
IACR Cryptol. ePrint Arch., 2017

2016
Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags.
IACR Cryptol. ePrint Arch., 2016

Game-Based Privacy Analysis of RFID Security Schemes for Confident Au-thentication in IoT.
IACR Cryptol. ePrint Arch., 2016

Analysis of Xiao et al.'s authentication protocol conforming to EPC C1 G2 standard.
Proceedings of the 8th International Symposium on Telecommunications, 2016

2015
Traceability Analysis of Recent RFID Authentication Protocols.
Wirel. Pers. Commun., 2015

Enhancing privacy of recent authentication schemes for low-cost RFID systems.
ISC Int. J. Inf. Secur., 2015

Analysis of an RFID Authentication Protocol in Accordance with EPC Standards.
IACR Cryptol. ePrint Arch., 2015

2014
Privacy analysis and improvements of two recent RFID authentication protocols.
Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014


  Loading...