Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Kooshiar Azimian
@article{DBLP:journals/ijnsec/AzimianMSW10, author = {Kooshiar Azimian and Javad Mohajeri and Mahmoud Salmasizadeh and Samuel S. Wagstaff Jr.}, title = {Provable Partial Key Escrow}, journal = {Int. J. Netw. Secur.}, volume = {10}, number = {2}, pages = {121--124}, year = {2010}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n2/ijns-2010-v10-n2-p121-124.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/AzimianMSW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/AzimianMS08, author = {Kooshiar Azimian and Javad Mohajeri and Mahmoud Salmasizadeh}, title = {Weak Composite Diffie-Hellman}, journal = {Int. J. Netw. Secur.}, volume = {7}, number = {3}, pages = {383--387}, year = {2008}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v7-n3/ijns-2008-v7-n3-p383-387.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/AzimianMS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latin/AzimianS08, author = {Kooshiar Azimian and Mario Szegedy}, editor = {Eduardo Sany Laber and Claudson F. Bornstein and Loana Tito Nogueira and Lu{\'{e}}rbio Faria}, title = {Parallel Repetition of the Odd Cycle Game}, booktitle = {{LATIN} 2008: Theoretical Informatics, 8th Latin American Symposium, B{\'{u}}zios, Brazil, April 7-11, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4957}, pages = {676--686}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78773-0\_58}, doi = {10.1007/978-3-540-78773-0\_58}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/latin/AzimianS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/AzimianMS07, author = {Kooshiar Azimian and Javad Mohajeri and Mahmoud Salmasizadeh}, editor = {Selim Aissi and Hamid R. Arabnia}, title = {A New Public Key Encryption Scheme Equivalent to Factoring}, booktitle = {Proceedings of the 2007 International Conference on Security {\&} Management, {SAM} 2007, Las Vegas, Nevada, USA, June 25-28, 2007}, pages = {546--552}, publisher = {{CSREA} Press}, year = {2007}, timestamp = {Wed, 12 Dec 2007 16:45:17 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/AzimianMS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-cs-0505055, author = {Kooshiar Azimian and Javad Mohajeri and Mahmoud Salmasizadeh and Siamak Fayyaz Shahandashti}, title = {A Verifiable Partial Key Escrow, Based on McCurley Encryption Scheme}, journal = {CoRR}, volume = {abs/cs/0505055}, year = {2005}, url = {http://arxiv.org/abs/cs/0505055}, eprinttype = {arXiv}, eprint = {cs/0505055}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-cs-0505055.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-cs-0508110, author = {Ali Bagherzandi and Kooshiar Azimian and Javad Mohajeri and Mahmoud Salmasizadeh}, title = {Relations between semantic security and indistinguishability against cpa, non-adaptive cca and adaptive cca in comparison based framework}, journal = {CoRR}, volume = {abs/cs/0508110}, year = {2005}, url = {http://arxiv.org/abs/cs/0508110}, eprinttype = {arXiv}, eprint = {cs/0508110}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-cs-0508110.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/ECCC-TR05-047, author = {Kooshiar Azimian and Mahmoud Salmasizadeh and Javad Mohajeri}, title = {Weak Composite Diffie-Hellman is not Weaker than Factoring}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR05-047}}, year = {2005}, url = {https://eccc.weizmann.ac.il/eccc-reports/2005/TR05-047/index.html}, eprinttype = {ECCC}, eprint = {TR05-047}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/ECCC-TR05-047.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/ECCC-TR05-078, author = {Kooshiar Azimian and Javad Mohajeri and Mahmoud Salmasizadeh and Siamak Fayyaz Shahandashti}, title = {A Verifiable Partial Key Escrow, Based on McCurley Encryption Scheme}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR05-078}}, year = {2005}, url = {https://eccc.weizmann.ac.il/eccc-reports/2005/TR05-078/index.html}, eprinttype = {ECCC}, eprint = {TR05-078}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/ECCC-TR05-078.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/ECCC-TR05-124, author = {Kooshiar Azimian}, title = {Breaking Diffie-Hellman is no Easier than Root Finding}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR05-124}}, year = {2005}, url = {https://eccc.weizmann.ac.il/eccc-reports/2005/TR05-124/index.html}, eprinttype = {ECCC}, eprint = {TR05-124}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/ECCC-TR05-124.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AzimianMS05, author = {Kooshiar Azimian and Javad Mohajeri and Mahmoud Salmasizadeh}, title = {Weak Composite Diffie-Hellman is not Weaker than Factoring}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {111}, year = {2005}, url = {http://eprint.iacr.org/2005/111}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AzimianMS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.