default search action
Aria Shahverdi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2022
- [b1]Aria Shahverdi:
Algorithms for Reconstructing Databases and Cryptographic Secret Keys in Entropic Settings. University of Maryland, College Park, MD, USA, 2022
Journal Articles
- 2021
- [j4]Dana Dachman-Soled, Huijing Gong, Mukul Kulkarni, Aria Shahverdi:
(In)Security of Ring-LWE Under Partial Key Exposure. J. Math. Cryptol. 15(1): 72-86 (2021) - [j3]Dana Dachman-Soled, Huijing Gong, Mukul Kulkarni, Aria Shahverdi:
Towards a Ring Analogue of the Leftover Hash Lemma. J. Math. Cryptol. 15(1): 87-110 (2021) - 2019
- [j2]Dana Dachman-Soled, Mukul Kulkarni, Aria Shahverdi:
Tight upper and lower bounds for leakage-resilient, locally decodable and updatable non-malleable codes. Inf. Comput. 268 (2019) - 2017
- [j1]Aria Shahverdi, Mostafa Taha, Thomas Eisenbarth:
Lightweight Side Channel Resistance: Threshold Implementations of Simon. IEEE Trans. Computers 66(4): 661-671 (2017)
Conference and Workshop Papers
- 2021
- [c7]Dana Dachman-Soled, Huijing Gong, Hunter Kippen, Aria Shahverdi:
BKW Meets Fourier New Algorithms for LPN with Sparse Parities. TCC (2) 2021: 658-688 - [c6]Aria Shahverdi, Mahammad Shirinov, Dana Dachman-Soled:
Database Reconstruction from Noisy Volumes: A Cache Side-Channel Attack on SQLite. USENIX Security Symposium 2021: 1019-1035 - 2018
- [c5]Dana Dachman-Soled, Mukul Kulkarni, Aria Shahverdi:
Local Non-malleable Codes in the Bounded Retrieval Model. Public Key Cryptography (2) 2018: 281-311 - 2017
- [c4]Dana Dachman-Soled, Mukul Kulkarni, Aria Shahverdi:
Tight Upper and Lower Bounds for Leakage-Resilient, Locally Decodable and Updatable Non-malleable Codes. Public Key Cryptography (1) 2017: 310-332 - 2015
- [c3]Aria Shahverdi, Mostafa Taha, Thomas Eisenbarth:
Silent Simon: A threshold implementation under 100 slices. HOST 2015: 1-6 - 2014
- [c2]Cong Chen, Thomas Eisenbarth, Aria Shahverdi, Xin Ye:
Balanced Encoding to Mitigate Power Analysis: A Case Study. CARDIS 2014: 49-63 - [c1]Yarkin Doröz, Aria Shahverdi, Thomas Eisenbarth, Berk Sunar:
Toward Practical Homomorphic Evaluation of Block Ciphers Using Prince. Financial Cryptography Workshops 2014: 208-220
Informal and Other Publications
- 2021
- [i10]Dana Dachman-Soled, Huijing Gong, Hunter Kippen, Aria Shahverdi:
BKW Meets Fourier: New Algorithms for LPN with Sparse Parities. IACR Cryptol. ePrint Arch. 2021: 994 (2021) - 2020
- [i9]Aria Shahverdi, Mahammad Shirinov, Dana Dachman-Soled:
Database Reconstruction from Noisy Volumes: A Cache Side-Channel Attack on SQLite. CoRR abs/2006.15007 (2020) - [i8]Mingliang Chen, Aria Shahverdi, Sarah Anderson, Se Yong Park, Justin Zhang, Dana Dachman-Soled, Kristin E. Lauter, Min Wu:
Transparency Tools for Fairness in AI (Luskin). CoRR abs/2007.04484 (2020) - 2018
- [i7]Dana Dachman-Soled, Huijing Gong, Mukul Kulkarni, Aria Shahverdi:
Partial Key Exposure in Ring-LWE-Based Cryptosystems: Attacks and Resilience. IACR Cryptol. ePrint Arch. 2018: 1068 (2018) - 2017
- [i6]Dana Dachman-Soled, Mukul Kulkarni, Aria Shahverdi:
Tight Upper and Lower Bounds for Leakage-Resilient, Locally Decodable and Updatable Non-Malleable Codes. IACR Cryptol. ePrint Arch. 2017: 15 (2017) - [i5]Dana Dachman-Soled, Mukul Kulkarni, Aria Shahverdi:
Locally Decodable and Updatable Non-Malleable Codes in the Bounded Retrieval Model. IACR Cryptol. ePrint Arch. 2017: 303 (2017) - [i4]Dana Dachman-Soled, Huijing Gong, Mukul Kulkarni, Aria Shahverdi:
On the Leakage Resilience of Ideal-Lattice Based Public Key Encryption. IACR Cryptol. ePrint Arch. 2017: 1127 (2017) - 2015
- [i3]Aria Shahverdi, Mostafa Taha, Thomas Eisenbarth:
Silent Simon: A Threshold Implementation under 100 Slices. IACR Cryptol. ePrint Arch. 2015: 172 (2015) - 2014
- [i2]Yarkin Doröz, Aria Shahverdi, Thomas Eisenbarth, Berk Sunar:
Toward Practical Homomorphic Evaluation of Block Ciphers Using Prince. IACR Cryptol. ePrint Arch. 2014: 233 (2014) - [i1]Cong Chen, Thomas Eisenbarth, Aria Shahverdi, Xin Ye:
Balanced Encoding to Mitigate Power Analysis: A Case Study. IACR Cryptol. ePrint Arch. 2014: 952 (2014)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-11 18:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint