#### Filter Results:

- Full text PDF available (10)

#### Publication Year

2000

2017

- This year (1)
- Last 5 years (11)
- Last 10 years (20)

#### Publication Type

#### Co-author

#### Journals and Conferences

#### Key Phrases

Learn More

- Hadi Ahmadi, Taraneh Eghlidos
- IET Information Security
- 2009

- Behnam Bahrak, Taraneh Eghlidos, Mohammad Reza Aref
- Security and Management
- 2008

- Reza Hooshmand, Taraneh Eghlidos, Mohammad Reza Aref
- IACR Cryptology ePrint Archive
- 2015

Goldreich-Goldwasser-Halevi (GGH) public key cryptosystem is an instance of lattice-based cryptosystems whose security is based on the hardness of lattice problems. In fact, GGH cryptosystem is the lattice version of the first code-based cryptosystem, proposed by McEliece. However, it has a number of drawbacks such as; large public key length and low… (More)

- Ali Akbar Sobhi Afshar, Taraneh Eghlidos, Mohammad Reza Aref
- IET Communications
- 2009

- Yukiyasu Tsunoo, Teruo Saito, +4 authors Shahram Khazaei

This paper describes the attack on SOSEMANUK, one of the stream ciphers proposed at eSTREAM (the ECRYPT Stream Cipher Project) in 2005. The cipher features the variable secret key length from 128-bit up to 256-bit and 128-bit initial vector. The basic operation of the cipher is performed in a unit of 32 bits i.e. “word”, and each word generates keystream.… (More)

- Mitra Fatemi, R. Ghasemi, Taraneh Eghlidos, Mohammad Reza Aref
- IET Information Security
- 2014

- Saeed Reza Khosravirad, Taraneh Eghlidos, Shahrokh Ghaemmaghami
- 2009 IEEE/ACS International Conference on…
- 2009

This paper presents a new scheme for steganalysis of random LSB embedding, capable of applying to any kind of digital signal in both spatial and transform domains. The proposed scheme is based on defining a space whose elements relate to higher-order statistical properties of the signal and looking for special subsets, which we call Closure of Sets (CoS) in… (More)

- Hamidreza Amini Khorasgani, Saba Asaad, Taraneh Eghlidos, Mohammadreza Aref
- 2014 11th International ISC Conference on…
- 2014

In this paper, we introduce a method of threshold secret sharing scheme in which secret reconstruction is based on celebrated Babai lattice algorithm. In order to supply secure public channels for transmitting shares to parties, we need to ensure that there is no quantum threats to these channels. One solution for this problem can be utilization of lattice… (More)

- Mitra Fatemi, Taraneh Eghlidos, Mohammad Reza Aref
- ICICS
- 2009

A multi-stage secret sharing (MSS) scheme is a method of sharing a number of secrets among a set of participants, such that any authorized subset of participants could recover one secret in every stage. The first MSS scheme was proposed by He and Dawson in 1994, based on Shamir’s well-known secret sharing scheme and one-way functions. Several other schemes… (More)

In this paper we propose a new algorithm for computing Groebner basis for a system of multivariate polynomial equations describing a cryptosystem. The objective for designing this algorithm is to reduce the degree and number of polynomials resulting in a Groebner basis, which appears in the output of the algorithm. To attain this goal, a new division… (More)