Reza Reyhanitabar
According to our database1,
Reza Reyhanitabar
authored at least 24 papers
between 2007 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
2008
2010
2012
2014
2016
2018
2020
0
1
2
3
4
5
1
1
2
1
3
1
2
1
3
1
1
3
1
1
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2021
IACR Trans. Symmetric Cryptol., 2021
2019
IACR Cryptol. ePrint Arch., 2019
2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
2016
2015
IACR Cryptol. ePrint Arch., 2015
Security of Full-State Keyed and Duplex Sponge: Applications to Authenticated Encryption.
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Security of Full-State Keyed Sponge and Duplex: Applications to Authenticated Encryption.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015
2014
Proceedings of the Selected Areas in Cryptography - SAC 2014, 2014
Proceedings of the Provable Security - 8th International Conference, 2014
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014
2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Provable Security - 6th International Conference, 2012
2011
Extended cubes: enhancing the cube attack by extracting low-degree non-linear equations.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
2010
Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships.
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Information Security, 2010
2009
An Investigation of the Enhanced Target Collision Resistance Property for Hash Functions.
IACR Cryptol. ePrint Arch., 2009
Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders.
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007