Publicly verifiable searchable symmetric encryption based on efficient cryptographic components A Soleimanian, S Khazaei Designs, Codes and Cryptography 87 (1), 123-147, 2019 | 40 | 2019 |
Multi-client inner-product functional encryption in the random-oracle model M Abdalla, F Bourse, H Marival, D Pointcheval, A Soleimanian, H Waldner Security and Cryptography for Networks: 12th International Conference, SCN …, 2020 | 26 | 2020 |
Efficient lattice-based inner-product functional encryption JMB Mera, A Karmakar, T Marc, A Soleimanian IACR International Conference on Public-Key Cryptography, 163-193, 2022 | 25 | 2022 |
Efficient function-hiding functional encryption: From inner-products to orthogonality M Barbosa, D Catalano, A Soleimanian, B Warinschi Cryptographers’ Track at the RSA Conference, 127-148, 2019 | 17 | 2019 |
Recursion over public-coin interactive proof systems; faster hash verification A Belling, A Soleimanian, O Bégassat Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 6 | 2023 |
Vortex: Building a lattice-based snark scheme with transparent setup A Belling, A Soleimanian Cryptology ePrint Archive, 2022 | 4 | 2022 |
2-step multi-client quadratic functional encryption from decentralized function-hiding inner-product M Abdalla, D Pointcheval, A Soleimanian Cryptology ePrint Archive, 2021 | 3 | 2021 |
Double-authentication-preventing signatures in the standard model D Catalano, G Fuchsbauer, A Soleimanian Journal of Computer Security 30 (1), 3-38, 2022 | 2 | 2022 |
Vortex: A List Polynomial Commitment and its Application to Arguments of Knowledge A Belling, A Soleimanian, B Ursu Cryptology ePrint Archive, 2024 | | 2024 |
Anonymous Random Allocation and Its Applications A Soleimanian International Conference on Cryptology and Network Security, 292-313, 2022 | | 2022 |