Taraneh Eghlidos

Orcid: 0000-0002-3182-0277

According to our database1, Taraneh Eghlidos authored at least 39 papers between 2000 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Efficient Pairing-Free Adaptable k-out-of-N Oblivious Transfer Protocols.
IACR Cryptol. ePrint Arch., 2024

A Forgery Attack on a Code-based Signature Scheme.
IACR Cryptol. ePrint Arch., 2024

2023
An efficient, secure and verifiable conjunctive keyword search scheme based on rank metric codes over encrypted outsourced cloud data.
Comput. Electr. Eng., January, 2023

Quantum Cryptanalysis of Symmetric Primitives by Improving Relaxed Variants of Simon's Algorithm.
ISC Int. J. Inf. Secur., 2023

An Efficient Post-Quantum Attribute-Based Encryption Scheme Based on Rank Metric Codes for Cloud Computing.
IEEE Access, 2023

2021
Secure one-way relaying scheme based on random difference family (RDF) lattice codes.
Wirel. Networks, 2021

An efficient lattice-based threshold signature scheme using multi-stage secret sharing.
IET Inf. Secur., 2021

On Relaxation of Simon's Algorithm.
Proceedings of the 18th International ISC Conference on Information Security and Cryptology, 2021

2020
A Joint Encryption, Channel Coding and Modulation Scheme Using QC-LDPC Lattice-Codes.
IEEE Trans. Commun., 2020

2019
An efficient and secure ID-based multi-proxy multi-signature scheme based on lattice.
IACR Cryptol. ePrint Arch., 2019

A Lattice Based Joint Encryption, Encoding and Modulation Scheme.
CoRR, 2019

A Lightweight Anonymous Authentication Protocol For IoT Wireless Sensor Networks.
Proceedings of the 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2019

An Ultra-Lightweight RFID Mutual Authentication Protocol.
Proceedings of the 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2019

2018
A Practical and Secure Lattice-based Scheme for Full-Duplex Gaussian One-Way Relay Channels.
Proceedings of the 15th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2018

2017
An Efficient Lattice Based Multi-Stage Secret Sharing Scheme.
IEEE Trans. Dependable Secur. Comput., 2017

An efficient secure channel coding scheme based on polar codes.
ISC Int. J. Inf. Secur., 2017

A Joint Encryption-Encoding Scheme Using QC-LDPC Codes Based on Finite Geometry.
CoRR, 2017

An Efficient Public Key Encryption Scheme Based on QC-MDPC Lattices.
IEEE Access, 2017

2016
On the design and security of a lattice-based threshold secret sharing scheme.
ISC Int. J. Inf. Secur., 2016

A secure attribute based keyword search scheme against keyword guessing attack.
Proceedings of the 8th International Symposium on Telecommunications, 2016

A secret key encryption scheme based on 1-level QC-LDPC lattices.
Proceedings of the 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology, 2016

2015
Secret Key Cryptosystem Based on Non-systematic Polar Codes.
Wirel. Pers. Commun., 2015

Physical layer encryption scheme using finite-length polar codes.
IET Commun., 2015

Improving GGH Public Key Scheme Using Low Density Lattice Codes.
IACR Cryptol. ePrint Arch., 2015

2014
Efficient multistage secret sharing scheme using bilinear map.
IET Inf. Secur., 2014

A lattice-based threshold secret sharing scheme.
Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014

Reducing the key length of mceliece cryptosystem using polar codes.
Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014

Security analysis of SKI protocol.
Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014

2013
Secure Channel Coding Schemes based on Polar Codes.
IACR Cryptol. ePrint Arch., 2013

2012
Improving the Rao-Nam secret key cryptosystem using regular EDF-QC-LDPC codes.
ISC Int. J. Inf. Secur., 2012

An Efficient Multistage Secret Sharing Scheme Using Linear One-way Functions and Bilinear Maps.
IACR Cryptol. ePrint Arch., 2012

2009
Heuristic guess-and-determine attacks on stream ciphers.
IET Inf. Secur., 2009

Efficient secure channel coding based on quasi-cyclic low-density parity-check codes.
IET Commun., 2009

A Multi-stage Secret Sharing Scheme Using All-or-Nothing Transform Approach.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

On the Security and Efficiency of Secure Channel Coding Schemes Based on Punctured Codes.
Proceedings of the 2009 International Conference on Security & Management, 2009

Higher-order statistical steganalysis of random LSB steganography.
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009

2008
Some new issues on secret sharing schemes.
Proceedings of the 2008 International Conference on Telecommunications, 2008

Impossible Differential Cryptanalysis of Safer++.
Proceedings of the 2008 International Conference on Security & Management, 2008

2000
On the security of DES and DES-like block ciphers against differential cryptanalysis.
PhD thesis, 2000


  Loading...