Secret key agreement using a virtual wiretap channel S Sharifian, F Lin, R Safavi-Naini IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017 | 14 | 2017 |
Fuzzy Nash equilibrium in fuzzy games using ranking fuzzy numbers A Chakeri, N Sadati, S Sharifian International Conference on Fuzzy Systems, 1-5, 2010 | 13 | 2010 |
A capacity-achieving one-way key agreement with improved finite blocklength analysis S Sharifian, A Poostindouz, R Safavi-Naini 2020 International Symposium on Information Theory and Its Applications …, 2020 | 11 | 2020 |
Linguisitc representation of Nash equilibriums in fuzzy games S Sharifian, A Chakeri, F Sheikholeslam 2010 Annual Meeting of the North American Fuzzy Information Processing …, 2010 | 11 | 2010 |
Hash-then-encode: A modular semantically secure wiretap code S Sharifian, F Lin, R Safavi-Naini Proceedings of the 2nd Workshop on Communication Security: Cryptography and …, 2018 | 10 | 2018 |
A true random generator using human gameplay M Alimomeni, R Safavi-Naini, S Sharifian Decision and Game Theory for Security: 4th International Conference, GameSec …, 2013 | 10 | 2013 |
Identifiable cheating entity flexible round-optimized schnorr threshold (ICE FROST) signature protocol A González, H Ratoanina, R Salen, S Sharifian, V Soukharev Cryptology ePrint Archive, 2021 | 5 | 2021 |
Random number generation using human gameplay S Sharifian University of Calgary, 2016 | 5 | 2016 |
A modular semantically secure wiretap code with shared key for weakly symmetric channels S Sharifian, R Safavi-Naini 2019 IEEE Information Theory Workshop (ITW), 1-5, 2019 | 3 | 2019 |
Post-quantum security using channel noise S Sharifian, R Safavi-Naini, F Lin Proceedings of the 2018 ACM SIGSAC Conference on computer and communications …, 2018 | 3 | 2018 |
Information-theoretic key encapsulation and its application to secure communication S Sharifian, R Safavi-Naini 2021 IEEE International Symposium on Information Theory (ISIT), 2393-2398, 2021 | 2 | 2021 |
Information-theoretic Key Encapsulation and its Applications S Sharifian, R Safavi-Naini arXiv preprint arXiv:2102.02243, 2021 | 2 | 2021 |
Privacy-Preserving Resource Sharing Using Permissioned Blockchains: (The Case of Smart Neighbourhood) S Avizheh, M Nabi, S Rahman, S Sharifian, R Safavi-Naini Financial Cryptography and Data Security. FC 2021 International Workshops …, 2021 | 2 | 2021 |
A capacity-achieving one-message key agreement with finite blocklength analysis S Sharifian, A Poostindouz, R Safavi-Naini arXiv preprint arXiv:1905.04280, 2019 | 2 | 2019 |
A One-Round Key Agreement Protocol with Information-Theoretic Security. S Sharifian, A Poostindouz, R Safavi-Naini arXiv preprint arXiv:1905.04280, 2019 | 1 | 2019 |
A virtual wiretap channel for secure message transmission S Sharifian, R Safavi-Naini, F Lin Paradigms in Cryptology–Mycrypt 2016. Malicious and Exploratory Cryptology …, 2017 | 1 | 2017 |
CCA-Secure Hybrid Encryption in Correlated Randomness Model and KEM Combiners S Panja, S Sharifian, S Jiang, R Safavi-Naini arXiv preprint arXiv:2401.00983, 2024 | | 2024 |
Encryption/decryption using key encapsulation/decapsulation S Sharifian, R Safavi-Naeini US Patent 11,601,260, 2023 | | 2023 |
Hybrid Encryption in Correlated Randomness Model R Safavi-Naini, S Sharifian 2021 IEEE Information Theory Workshop (ITW), 1-5, 2021 | | 2021 |
Contributions to Information Theoretically Secure Communication S Sharifian Science, 2020 | | 2020 |