| year | title | booktitle | pages | |
|---|---|---|---|---|
| 1 | 2011 | Polly Cracker, Revisited | asiacrypt | 179-196 |
| 2 | 2011 | On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model | fse | 128 |
| 3 | 2008 | Generic Constructions of Identity-Based and Certificateless KEMs | jofc | 178-199 |
| 4 | 2008 | Certificateless Signcryption | eprint | online |
| 5 | 2006 | Secure Cryptographic Workflow in the Standard Model | eprint | online |
| 6 | 2005 | Efficient Identity-Based Key Encapsulation to Multiple Parties | eprint | online |
| 7 | 2005 | Generic Constructions of Identity-Based and Certificateless KEMs | eprint | online |
Coauthors of Pooya Farshim |