On constrained implementation of lattice-based cryptographic primitives and schemes on smart cards A Boorghany, SB Sarmadi, R Jalili ACM Transactions on Embedded Computing Systems (TECS) 14 (3), 1-25, 2015 | 68 | 2015 |
Implementation and comparison of lattice-based identification protocols on smart cards and microcontrollers A Boorghany, R Jalili Cryptology ePrint Archive, 2014 | 44 | 2014 |
Random Data and Key Generation Evaluation of Some Commercial Tokens and Smart Cards A Boorghany, SB Sarmadi, P Yousefi, P Gorji, R Jalili 11th International ISC Conference on Information Security and Cryptology, 2014 | 10 | 2014 |
Efficient lattice-based authenticated encryption: A practice-oriented provable security approach A Boorghany, S Bayat-Sarmadi, R Jalili Cryptology ePrint Archive, 2016 | 5 | 2016 |
Practical provably-secure authenticated encryption schemes using lattice-based pseudorandom function SPRING A Boorghany, S Bayat-Sarmadi, R Jalili Scientia Iranica 25 (6), 3442-3460, 2018 | | 2018 |