BibTeX records: Kooshiar Azimian

download as .bib file

@article{DBLP:journals/ijnsec/AzimianMSW10,
  author       = {Kooshiar Azimian and
                  Javad Mohajeri and
                  Mahmoud Salmasizadeh and
                  Samuel S. Wagstaff Jr.},
  title        = {Provable Partial Key Escrow},
  journal      = {Int. J. Netw. Secur.},
  volume       = {10},
  number       = {2},
  pages        = {121--124},
  year         = {2010},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n2/ijns-2010-v10-n2-p121-124.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/AzimianMSW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/AzimianMS08,
  author       = {Kooshiar Azimian and
                  Javad Mohajeri and
                  Mahmoud Salmasizadeh},
  title        = {Weak Composite Diffie-Hellman},
  journal      = {Int. J. Netw. Secur.},
  volume       = {7},
  number       = {3},
  pages        = {383--387},
  year         = {2008},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v7-n3/ijns-2008-v7-n3-p383-387.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/AzimianMS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latin/AzimianS08,
  author       = {Kooshiar Azimian and
                  Mario Szegedy},
  editor       = {Eduardo Sany Laber and
                  Claudson F. Bornstein and
                  Loana Tito Nogueira and
                  Lu{\'{e}}rbio Faria},
  title        = {Parallel Repetition of the Odd Cycle Game},
  booktitle    = {{LATIN} 2008: Theoretical Informatics, 8th Latin American Symposium,
                  B{\'{u}}zios, Brazil, April 7-11, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4957},
  pages        = {676--686},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78773-0\_58},
  doi          = {10.1007/978-3-540-78773-0\_58},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/latin/AzimianS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/AzimianMS07,
  author       = {Kooshiar Azimian and
                  Javad Mohajeri and
                  Mahmoud Salmasizadeh},
  editor       = {Selim Aissi and
                  Hamid R. Arabnia},
  title        = {A New Public Key Encryption Scheme Equivalent to Factoring},
  booktitle    = {Proceedings of the 2007 International Conference on Security {\&}
                  Management, {SAM} 2007, Las Vegas, Nevada, USA, June 25-28, 2007},
  pages        = {546--552},
  publisher    = {{CSREA} Press},
  year         = {2007},
  timestamp    = {Wed, 12 Dec 2007 16:45:17 +0100},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/AzimianMS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-cs-0505055,
  author       = {Kooshiar Azimian and
                  Javad Mohajeri and
                  Mahmoud Salmasizadeh and
                  Siamak Fayyaz Shahandashti},
  title        = {A Verifiable Partial Key Escrow, Based on McCurley Encryption Scheme},
  journal      = {CoRR},
  volume       = {abs/cs/0505055},
  year         = {2005},
  url          = {http://arxiv.org/abs/cs/0505055},
  eprinttype    = {arXiv},
  eprint       = {cs/0505055},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-cs-0505055.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-cs-0508110,
  author       = {Ali Bagherzandi and
                  Kooshiar Azimian and
                  Javad Mohajeri and
                  Mahmoud Salmasizadeh},
  title        = {Relations between semantic security and indistinguishability against
                  cpa, non-adaptive cca and adaptive cca in comparison based framework},
  journal      = {CoRR},
  volume       = {abs/cs/0508110},
  year         = {2005},
  url          = {http://arxiv.org/abs/cs/0508110},
  eprinttype    = {arXiv},
  eprint       = {cs/0508110},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-cs-0508110.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/ECCC-TR05-047,
  author       = {Kooshiar Azimian and
                  Mahmoud Salmasizadeh and
                  Javad Mohajeri},
  title        = {Weak Composite Diffie-Hellman is not Weaker than Factoring},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR05-047}},
  year         = {2005},
  url          = {https://eccc.weizmann.ac.il/eccc-reports/2005/TR05-047/index.html},
  eprinttype    = {ECCC},
  eprint       = {TR05-047},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/ECCC-TR05-047.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/ECCC-TR05-078,
  author       = {Kooshiar Azimian and
                  Javad Mohajeri and
                  Mahmoud Salmasizadeh and
                  Siamak Fayyaz Shahandashti},
  title        = {A Verifiable Partial Key Escrow, Based on McCurley Encryption Scheme},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR05-078}},
  year         = {2005},
  url          = {https://eccc.weizmann.ac.il/eccc-reports/2005/TR05-078/index.html},
  eprinttype    = {ECCC},
  eprint       = {TR05-078},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/ECCC-TR05-078.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/ECCC-TR05-124,
  author       = {Kooshiar Azimian},
  title        = {Breaking Diffie-Hellman is no Easier than Root Finding},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR05-124}},
  year         = {2005},
  url          = {https://eccc.weizmann.ac.il/eccc-reports/2005/TR05-124/index.html},
  eprinttype    = {ECCC},
  eprint       = {TR05-124},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/ECCC-TR05-124.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AzimianMS05,
  author       = {Kooshiar Azimian and
                  Javad Mohajeri and
                  Mahmoud Salmasizadeh},
  title        = {Weak Composite Diffie-Hellman is not Weaker than Factoring},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {111},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/111},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AzimianMS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics