Follow
Azam Soleimanian
Azam Soleimanian
Unknown affiliation
No verified email
Title
Cited by
Cited by
Year
Publicly verifiable searchable symmetric encryption based on efficient cryptographic components
A Soleimanian, S Khazaei
Designs, Codes and Cryptography 87 (1), 123-147, 2019
402019
Multi-client inner-product functional encryption in the random-oracle model
M Abdalla, F Bourse, H Marival, D Pointcheval, A Soleimanian, H Waldner
Security and Cryptography for Networks: 12th International Conference, SCN …, 2020
262020
Efficient lattice-based inner-product functional encryption
JMB Mera, A Karmakar, T Marc, A Soleimanian
IACR International Conference on Public-Key Cryptography, 163-193, 2022
252022
Efficient function-hiding functional encryption: From inner-products to orthogonality
M Barbosa, D Catalano, A Soleimanian, B Warinschi
Cryptographers’ Track at the RSA Conference, 127-148, 2019
172019
Recursion over public-coin interactive proof systems; faster hash verification
A Belling, A Soleimanian, O Bégassat
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
62023
Vortex: Building a lattice-based snark scheme with transparent setup
A Belling, A Soleimanian
Cryptology ePrint Archive, 2022
42022
2-step multi-client quadratic functional encryption from decentralized function-hiding inner-product
M Abdalla, D Pointcheval, A Soleimanian
Cryptology ePrint Archive, 2021
32021
Double-authentication-preventing signatures in the standard model
D Catalano, G Fuchsbauer, A Soleimanian
Journal of Computer Security 30 (1), 3-38, 2022
22022
Vortex: A List Polynomial Commitment and its Application to Arguments of Knowledge
A Belling, A Soleimanian, B Ursu
Cryptology ePrint Archive, 2024
2024
Anonymous Random Allocation and Its Applications
A Soleimanian
International Conference on Cryptology and Network Security, 292-313, 2022
2022
The system can't perform the operation now. Try again later.
Articles 1–10