Cryptographers' World
 

Reihaneh Safavi-Naini


Author's Web Page Link

39 papers in database with 857 citations StarStar

Editor of 1 conference proceedings book

H-number: 13

Conference Proceedings

 
1. Josef PieprzykReihaneh Safavi-Naini, editors, Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28 - December 1, 1994, Proceedings. Springer, 1995. ISBN 3-540-59339-X.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Reihaneh Safavi-Naini,  Huaxiong Wang,  Secret sharing schemes with partial broadcast channels, Designs, Codes and Cryptography, Volume 41(1), pp. 5 - 22, Springer, 2006.

[Electronic Edition][No citation]

2. Reihaneh Safavi-Naini,  Chris Charnes,  MRD Hashing, Designs, Codes and Cryptography, Volume 37(2), pp. 229 - 242, Springer, 2005.

[Electronic Edition][Cited 2 times ]

3. Keith M. Martin,  Reihaneh Safavi-Naini,  Huaxiong Wang,  Peter R. Wild,  Distributing the Encryption and Decryption of a Block Cipher, Designs, Codes and Cryptography, Volume 36(3), pp. 263 - 287, Springer, 2005.

[Electronic Edition][Cited 12 times ]

4. Reihaneh Safavi-Naini,  Three Systems for Threshold Generation of Authenticators, Designs, Codes and Cryptography, Volume 13(3), pp. 299 - 312, Springer, 1998.

[Electronic Edition][No citation]

5. Reihaneh Safavi-Naini,  L. Tombak,  Authentication Codes in Plaintext and Chosen-Content Attacks, Designs, Codes and Cryptography, Volume 7(1), pp. 83 - 99, Springer, 1996.

[Electronic Edition][Cited 3 times ]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Siamak Fayyaz Shahandashti,  Reihaneh Safavi-Naini,  Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures, pp. 121 - 140, PKC 2008.

[Electronic Edition][Cited 9 times ]

2. Liang Lu,  Reihaneh Safavi-Naini,  Jeffrey Horton,  Willy Susilo,  An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme, pp. 65 - 86, ACNS 2007.

[Electronic Edition][Cited 1 times ]

3. Dongvu Tonien,  Reihaneh Safavi-Naini,  An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families, pp. 82 - 97, ACNS 2006.

[Electronic Edition][Cited 4 times ]

4. Joonsang Baek,  Reihaneh Safavi-Naini,  Willy Susilo,  Universal Designated Verifier Signature Proof (or How to Efficiently Prove Knowledge of a Signature), pp. 644 - 661, ASIACRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 30 times ]

5. Lan Nguyen,  Reihaneh Safavi-Naini,  Dynamic k-Times Anonymous Authentication, pp. 318 - 333, ACNS 2005.

[Electronic Edition][Cited 57 times Red Star]

6. Joonsang Baek,  Reihaneh Safavi-Naini,  Willy Susilo,  Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption, pp. 380 - 397, PKC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 52 times Red Star]

7. Lan Nguyen,  Reihaneh Safavi-Naini,  Efficient and Provably Secure Trapdoor-Free Group Signature Schemes from Bilinear Pairings, pp. 372 - 386, ASIACRYPT 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 51 times Red Star]

8. Luke McAven,  Reihaneh Safavi-Naini,  Moti Yung,  Symmetric Authentication Codes with Secrecy and Unconditionally Secure Authenticated Encryption, pp. 148 - 161, INDOCRYPT 2004.

[Electronic Edition][Cited 2 times ]

9. Lan Nguyen,  Reihaneh Safavi-Naini,  Kaoru Kurosawa,  Verifiable Shuffles: A Formal Model and a Paillier-Based Efficient Construction with Provable Security, pp. 61 - 75, ACNS 2004.

[Electronic Edition][Cited 31 times ]

10. Nathan Curtis,  Reihaneh Safavi-Naini,  Willy Susilo,   X 2Rep: Enhanced Trust Semantics for the XRep Protocol, pp. 205 - 219, ACNS 2004.

[Electronic Edition][Cited 14 times ]

11. Reihaneh Safavi-Naini,  Luke McAven,  Moti Yung,  General Group Authentication Codes and Their Relation to "Unconditionally-Secure Signatures", pp. 231 - 247, PKC 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 9 times ]

12. Fangguo Zhang,  Reihaneh Safavi-Naini,  Willy Susilo,  An Efficient Signature Scheme from Bilinear Pairings and Its Applications, pp. 277 - 290, PKC 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 255 times Red StarRed StarRed Star]

13. Fangguo Zhang,  Reihaneh Safavi-Naini,  Willy Susilo,  Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings, pp. 191 - 204, INDOCRYPT 2003.

[Electronic Edition][Cited 84 times Red Star]

14. Vu Dong Tô,  Reihaneh Safavi-Naini,  Yejing Wang,  A 2-Secure Code with Efficient Tracing Algorithm, pp. 149 - 162, INDOCRYPT 2002.

[Electronic Edition][Cited 28 times ]

15. Yvo Desmedt,  Reihaneh Safavi-Naini,  Huaxiong Wang,  Redistribution of Mechanical Secret Shares, pp. 238 - 252, FC 2002.

[Electronic Edition][Cited 2 times ]

16. Reihaneh Safavi-Naini,  Huaxiong Wang,  Chaoping Xing,  Linear Authentication Codes: Bounds and Constructions, pp. 127 - 135, INDOCRYPT 2001.

[Electronic Edition][Cited 18 times ]

17. Reihaneh Safavi-Naini,  Willy Susilo,  Huaxiong Wang,  Fail-Stop Signature for Long Messages, pp. 165 - 177, INDOCRYPT 2000.

[Electronic Edition][Cited 4 times ]

18. Reihaneh Safavi-Naini,  Yejing Wang,  Anonymous Traceability Schemes with Unconditional Security, pp. 250 - 261, INDOCRYPT 2000.

[Electronic Edition][Cited 1 times ]

19. Reihaneh Safavi-Naini,  Yejing Wang,  Sequential Traitor Tracing, pp. 316 - 332, CRYPTO 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 91 times Red Star]

20. Yejing Wang,  Reihaneh Safavi-Naini,  A3-Codes under Collusion Attacks, pp. 390 - 398, ASIACRYPT 1999.

[Electronic Edition][Cited 5 times ]

21. Reihaneh Safavi-Naini,  Huaxiong Wang,  Broadcast Authentication in Group Communication, pp. 399 - 411, ASIACRYPT 1999.

[Electronic Edition][Cited 18 times ]

22. Reihaneh Safavi-Naini,  Huaxiong Wang,  Bounds and Constructions for Multireceiver Authentication Codes, pp. 242 - 256, ASIACRYPT 1998.

[Electronic Edition][Cited 4 times ]

23. Reihaneh Safavi-Naini,  Huaxiong Wang,  New Results on Multi-Receiver Authentication Codes, pp. 527 - 541, EUROCRYPT 1998.

[Electronic Edition][Cited 46 times ]

24. Reihaneh Safavi-Naini,  Shahram Bakhtiari,  Chris Charnes,  MRD Hashing, pp. 134 - 149, FSE 1998.

[Electronic Edition][Cited 2 times ]

25. Shahrokh Saeednia,  Reihaneh Safavi-Naini,  On the Security of Girault`s Identification Scheme, pp. 149 - 153, PKC 1998.

[Electronic Edition][Cited 3 times ]

26. Reihaneh Safavi-Naini,  L. Tombak,  Combinatorial Structure of A-codes with r-fold Security, pp. 211 - 223, ASIACRYPT 1994.

[Electronic Edition][Cited 1 times ]

27. Reihaneh Safavi-Naini,  L. Tombak,  Authentication Codes in Plaintext and Chosen-content Attacks, pp. 254 - 265, EUROCRYPT 1994.

[Electronic Edition][Cited 3 times ]

28. Chris Charnes,  Luke O'Connor,  Josef Pieprzyk,  Reihaneh Safavi-Naini,  Yuliang Zheng,  Comments on Soviet Encryption Algorithm, pp. 433 - 438, EUROCRYPT 1994.

[Electronic Edition][Cited 10 times ]

29. Reihaneh Safavi-Naini,  L. Tombak,  Optimal Authentication Systems, pp. 12 - 27, EUROCRYPT 1993.

[Electronic Edition][Cited 4 times ]

30. Reihaneh Safavi-Naini,  L. Tombak,  Authentication Codes under Impersonation Attack, pp. 35 - 47, ASIACRYPT 1992.

[Electronic Edition][Cited 1 times ]

31. L. Tombak,  Reihaneh Safavi-Naini,  Authentication Codes with Perfect Protection, pp. 15 - 26, ASIACRYPT 1992.

[Electronic Edition][Cited 2 times ]

32. Reihaneh Safavi-Naini,  Feistel Type Authentication Codes, pp. 170 - 178, ASIACRYPT 1991.

[Electronic Edition][Cited 1 times ]

33. Josef Pieprzyk,  Reihaneh Safavi-Naini,  Randomized Authentication Systems, pp. 472 - 481, EUROCRYPT 1991.

[Electronic Edition][Cited 2 times ]

34. Reihaneh Safavi-Naini,  Parallel Generation of Pseudo-Random Sequences, pp. 176 - 193, ASIACRYPT 1990.

[Electronic Edition][No citation]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...