2024

[BKPS24] Christopher Battarbee, Delaram Kahrobaei, Ludovic Perret, and Siamak F. Shahandashti. "A Subexponential Quantum Algorithm for the Semdirect Discrete Logarithm Problem". PQCrypto 2024 (to appear).
 ePrint


2023

[BKS23] Christopher Battarbee, Delaram Kahrobaei, and Siamak F. Shahandashti. "Semidirect Product Key Exchange: The State of Play". Special Issue on Recent Advances in Coding Theory and Cryptography, Journal of Algebra and Its Applications (to appear).
 ePrint |  DoI

[GBSK23] Henry Gray, Christopher Battarbee, Siamak F. Shahandashti, and Delaram Kahrobaei. "A novel attack on McEliece's cryptosystem". Int'l J. of Computer Mathematics: Computer Systems Theory 8(3): 178–191, 2023.
 DoI (Open Access) |  BibTeX

[BKPS23] Christopher Battarbee, Delaram Kahrobaei, Ludovic Perret, and Siamak F. Shahandashti. "SPDH-Sign: Towards Efficient, Post-quantum Group-Based Signatures". PQCrypto 2023, LNCS 14154: 113–138, Springer, 2023.
 ePrint |  DoI |  Slides |  Video |  BibTeX

[APS23] Najla Aldaraani, Helen Petrie, and Siamak F. Shahandashti. "Online Security Attack Experience and Worries of Young Adults in the Kingdom of Saudi Arabia". HAISA 2023, IFIP AICT 674: 364–376, Springer, 2023.
 ePrint |  DoI |  BibTeX | Related to  [APS22]

[TSP23] Dan Turner, Siamak F. Shahandashti, and Helen Petrie. "The Effect of Length on Key Fingerprint Verification Security and Usability". ARES 2023: 23: 1–11.
 ePrint |  DoI |  Slides |  BibTeX


2022

[APS22] Najla Aldaraani, Helen Petrie, and Siamak F. Shahandashti. "Online Security Attack Experience and Worries of Young Adults in the United Kingdom". HAISA 2022, IFIP AICT 658: 300–309, Springer, 2022.
 ePrint |  DoI |  BibTeX | Related to  [APS23]

[IVS22a] Philokypros P. Ioulianou, Vassilios G. Vassilakis, and Siamak F. Shahandashti. "ML-Based Detection of Blackhole and Rank Attacks in RPL Networks". CSNDSP 2022: 338–343, IEEE, 2022.
 ePrint |  DoI |  BibTeX

[BKTS22] Christopher Battarbee, Delaram Kahrobaei, Dylan Tailor, and Siamak F. Shahandashti. "On the Efficiency of A General Attack against the MOBS Cryptosystem". Journal of Mathematical Cryptology 16(1): 289–297, 2022.
 ePrint |  DoI (Open Access) |  Code |  BibTeX

[BKS22] Christopher Battarbee, Delaram Kahrobaei, and Siamak F. Shahandashti. "Cryptanalysis of Semidirect Product Key Exchange Using Matrices Over Non-Commutative Rings". Mathematical Cryptology 1(2): 2–9, 2022.
 ePrint |  Open Journal Version

[IVS22] Philokypros P. Ioulianou, Vassilios G. Vassilakis, and Siamak F. Shahandashti. "A Trust-Based Intrusion Detection System for RPL Networks: Detecting a Combination of Rank and Blackhole Attacks". J. Cybersecur. Priv. 2(1): 124–153, 2022.
 DoI (Open Access)


2021

[MMTSH21] Patrick Mccorry, Maryam Mehrnezhad, Ehsan Toreini, Siamak F. Shahandashti, and Feng Hao. "On Secure E-Voting over Blockchain". Digital Threats: Research and Practice 2(4): Article 33, ACM, 2021.
 DoI (Open Access)

[LPSF21] Lee Livsey, Helen Petrie, Siamak F. Shahandashti, and Aidan Fray. "Performance and Usability of Visual and Verbal Verification of Word-based Key Fingerprints". HAISA 2021, IFIP AICT 613: 199–210, Springer, 2021.
 ePrint |  DoI |  BibTeX

[KS21] George Kampanos and Siamak F. Shahandashti. "Accept All: The Landscape of Cookie Banners in Greece and the UK". IFIP SEC 2021, IFIP Advances in Information & Communication Technology 625: 213–227, Springer, 2021.
 ePrint |  DoI |  Code |  BibTeX

[MSMH21] Paolo Modesti, Siamak F. Shahandashti, Patrick McCorry, and Feng Hao. "Formal Modelling and Security Analysis of Bitcoin's Payment Protocol". Computers & Security 107: 102279, Elsevier, 2021.
 ePrint |  DoI |  BibTeX | Extension of  [MSH16]


2020

[YFA+20] Poonam Yadav, Angelo Feraudo, Budi Arief, Siamak F. Shahandashti, and Vassilios G. Vassilakis. "Position paper: A systematic framework for categorising IoT device fingerprinting mechanisms". Workshop on Challenges in Artificial Intelligence and Machine Learning (AIChallengeIoT 2020): 62–68, ACM, 2020.
 ePrint |  DoI |  BibTeX

[HWB+20] Feng Hao, Shen Wang, Samiran Bag, Rob Procter, Siamak F. Shahandashti, Maryam Mehrnezhad, Ehsan Toreini, Roberto Metere, and Lana Liu. "End-to-End Verifiable E-Voting Trial for Polling Station Voting". IEEE Security & Privacy 18(6): 6–13, IEEE, 2020.
 ePrint |  DoI |  BibTeX | Trial of  [SH16]

[CS20] Michael Carr and Siamak F. Shahandashti. "Revisiting Security Vulnerabilities in Commercial Password Managers". IFIP SEC 2020, IFIP Advances in Information & Communication Technology 580: 265–279, Springer, 2020.
 ePrint |  DoI |  Abstract & Media Coverage |  BibTeX

[SPI+20] Ryan Smith, Daniel Palin, Philokypros P. Ioulianou, Vassilios G. Vassilakis, and Siamak F. Shahandashti. "Battery Draining Attacks against Edge Computing Nodes in IoT Networks". Cyber-Physical Systems, 6(2): 96–116, 2020.
 ePrint |  DoI |  BibTeX

[BHSR20] Samiran Bag, Feng Hao, Siamak F. Shahandashti, and Indranil G. Ray. "SEAL: Sealed-Bid Auction without Auctioneers". IEEE Transactions on Information Forensics & Security 15: 2042–2052, 2020.
 ePrint |  DoI |  BibTeX


2019

[TMSH19] Ehsan Toreini, Maryam Mehrnezhad, Siamak F. Shahandashti, and Feng Hao. "DOMtegrity: Ensuring Web Page Integrity against Malicious Browser Extensions". International Journal of Information Security, 18(6): 801–814, Springer, 2019.
 ePrint |  DoI (Open Access) |  Code |  BibTeX


2018

[HMSD18] Feng Hao, Roberto Metere, Siamak F. Shahandashti, and Changyu Dong. "Analysing and Patching SPEKE in ISO/IEC". IEEE Transactions on Information Forensics & Security 13(11): 2844–2855, IEEE, 2018.
 ePrint |  DoI |  Code |  BibTeX

[ASS18] Sepideh Avizheh, Reihaneh Safavi-Naini, and Siamak F. Shahandashti. "A New Look at the Refund Mechanism in the Bitcoin Payment Protocol". FC 2018, LNCS 10957, pp. 369–387, Springer, 2018.
 ePrint |  DoI |  BibTeX

[MTSH18] Maryam Mehrnezhad, Ehsan Toreini, Siamak F. Shahandashti, and Feng Hao. "Stealing PINs via Mobile Sensors: Actual Risk versus User Perception". International Journal of Information Security, 17(3): 291–313, Springer, 2018.
 ePrint |  DoI (Open Access) |  Code |  BibTeX | Journal version of  [MTSH16b]

[HCRS18] Feng Hao, Dylan Clarke, Brian Randell, and Siamak F. Shahandashti. "Verifiable Classroom Voting in Practice". IEEE Security & Privacy, 16(1): 72–81, IEEE, 2018.
 ePrint |  DoI |  BibTeX


2017

[TSH17] Ehsan Toreini, Siamak F. Shahandashti, and Feng Hao. "Texture to the Rescue: Practical Paper Fingerprinting based on Texture Patterns". ACM Transactions on Privacy and Security (TOPS): 20(3), Article No. 9, ACM, 2017.
 ePrint |  Open Journal Version |  DoI |  Abstract & Media Coverage |  BibTeX

[MSH17] Patrick McCorry, Siamak F. Shahandashti, and Feng Hao. "A Smart Contract for Boardroom Voting with Maximum Voter Privacy". FC 2017, LNCS 10322, pp. 357–375, Springer, 2017.
 ePrint |  DoI |  Code |  Abstract & Media Coverage |  BibTeX


2016

[SH16] Siamak F. Shahandashti and Feng Hao. "DRE-ip: A Verifiable E-Voting Scheme without Tallying Authorities". ESORICS 2016, LNCS 9879, pp. 223–240, Springer, 2016.
 ePrint |  DoI |  BibTeX | Trial:  [HWB+20]

[MTSH16b] Maryam Mehrnezhad, Ehsan Toreini, Siamak F. Shahandashti, and Feng Hao. "Stealing PINs via Mobile Sensors: Actual Risk versus User Perception". EuroUSEC 2016.
 ePrint |  Slides | Journal version:  [MTSH18]

[MMSH16] Patrick McCorry, Malte Möser, Siamak F. Shahandashti, and Feng Hao. "Towards Bitcoin Payment Networks". ACISP 2016, LNCS 9722, pp. 57–76, Springer, 2016.
 ePrint |  DoI |  BibTeX

[Sha16] Siamak F. Shahandashti. "Electoral Systems Used around the World". Real-World Electronic Voting: Design, Analysis and Deployment. Hao and Ryan (eds), Series in Security, Privacy and Trust, pp. 77–102, CRC Press, 2016.
 ePrint |  DoI (book)

[LS16] Peter Hyun-Jeen Lee and Siamak F. Shahandashti. "Theoretical Attacks on E2E Voting Systems". Real-World Electronic Voting: Design, Analysis and Deployment. Hao and Ryan (eds), Series in Security, Privacy and Trust, pp. 219–236, CRC Press, 2016.
 ePrint |  DoI (book)

[MSH16] Patrick McCorry, Siamak F. Shahandashti, and Feng Hao. "Refund Attacks on Bitcoin's Payment Protocol". FC 2016, LNCS 9603, pp. 581–599, Springer, 2016.
 ePrint |  DoI |  BibTeX | Extension:  [MSMH21]

[MTSH16a] Maryam Mehrnezhad, Ehsan Toreini, Siamak F. Shahandashti, and Feng Hao. "TouchSignatures: Identification of User Touch Actions and PINs Based on Mobile Sensor Data via JavaScript". Journal of Information Security and Applications, 26: 23–38, Elsevier, 2016.
 ePrint |  DoI |  Abstract, Industry Impact & Media Coverage |  BibTeX | Journal version of  [MTSH15]


2015

[MSCH15] Patrick McCorry, Siamak F. Shahandashti, Dylan Clarke, and Feng Hao. "Authenticated Key Exchange over Bitcoin". SSR 2015, LNCS 9497, pp. 3–20, Springer, 2015.
 ePrint |  DoI |  BibTeX

[MHS15] Maryam Mehrnezhad, Feng Hao, and Siamak F. Shahandashti. "Tap-Tap and Pay (TTP): Preventing The Mafia Attack in NFC Payment". SSR 2015, LNCS 9497, pp. 21–39, Springer, 2015.
 ePrint |  DoI |  BibTeX

[SSS15] Siamak F. Shahandashti, Reihaneh Safavi-Naini, and Nashad Ahmed Safa. "Reconciling User Privacy and Implicit Authentication for Mobile Devices". Computers & Security 53: 215–233, Elsevier, 2015.
 ePrint |  DoI |  BibTeX | Journal version of  [SSS14]

[HCS15] Feng Hao, Xun Yi, Liqun Chen, and Siamak F. Shahandashti. "The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group". In ACM Workshop on IoT Privacy, Trust, and Security (IoTPTS '15), pp. 27–34, ACM, 2015.
 ePrint |  DoI |  BibTeX

[MTSH15] Maryam Mehrnezhad, Ehsan Toreini, Siamak F. Shahandashti, and Feng Hao. "TouchSignatures: Identification of User Touch Actions Based on Mobile Sensors via JavaScript". ASIACCS 2015, p. 673, ACM, 2015.
 DoI |  BibTeX | Journal version:  [MTSH16a]


2014

[HS14] Feng Hao and Siamak F. Shahandashti. "The SPEKE Protocol Revisited". SSR 2014, LNCS 8893, pp. 26–38, Springer, 2014.
 ePrint |  DoI |  BibTeX

[HKR+14] Feng Hao, Matthew N. Kreeger, Brian Randell, Dylan Clarke, Siamak F. Shahandashti, and Peter Hyun-Jeen Lee. "Every Vote Counts: Ensuring Integrity in Large-Scale Electronic Voting". USENIX Journal of Election Technology and Systems (JETS) 2(3): 1–25, USENIX Association, 2014.
 Journal Paper (Open Access) |  BibTeX

[SSS14] Nashad Ahmed Safa, Reihaneh Safavi-Naini and Siamak F. Shahandashti. "Privacy-Preserving Implicit Authentication". SEC 2014, IFIP AICT 428, pp. 471–484, Springer, 2014.
 ePrint |  DoI |  Slides |  BibTeX | Journal version:  [SSS15]


2013

[PPSS13] Duong-Hieu Phan, David Pointcheval, Siamak F. Shahandashti, and Mario Strefler. "Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts". International Journal of Information Security 12(4): 251–265, Springer, 2013.
 ePrint |  DoI |  BibTeX | Journal version of  [PPSS12]


2012

[SPSS12] Reza Sepahi, Josef Pieprzyk, Siamak F. Shahandashti, and Berry Schoenmakers. "New Security Notions and Relations for Public-Key Encryption". Journal of Mathematical Cryptology 6(3-4): 183–227, De Gruyter, 2012.
 DoI |  BibTeX

[PPSS12] Duong-Hieu Phan, David Pointcheval, Siamak F. Shahandashti, and Mario Strefler. "Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts". ACISP 2012, LNCS 7372, pp. 308–321, Springer, 2012.
 ePrint |  DoI |  BibTeX | Journal version:  [PPSS13]

[SSO12] Siamak F. Shahandashti, Reihaneh Safavi-Naini, and Philip Ogunbona. "Private Fingerprint Matching". ACISP 2012, LNCS 7372, pp. 426–433, Springer, 2012.
 ePrint |  DoI |  Slides |  BibTeX

[HJSS12] M. Jason Hinek, Shaoquan Jiang, Reihaneh Safavi-Naini, and Siamak F. Shahandashti. "Attribute-Based Encryption without Key Cloning". Int'l Journal of Applied Cryptography 2(3): 250–270, InderScience, 2012.
 ePrint |  DoI |  BibTeX


2009

[SS09b] Siamak F. Shahandashti and Reihaneh Safavi-Naini. "Generic Constructions for Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures". IET Information Security 3(4): 152–176, IET, 2009.
 ePrint |  DoI |  BibTeX

[Sha09] Siamak F. Shahandashti. "Contributions to Secure and Privacy-Preserving Use of Electronic Credentials". PhD Thesis. University of Wollongong, Australia. 2009.
 Soft copy |  Hard copy

[SS09a] Siamak F. Shahandashti and Reihaneh Safavi-Naini. "Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems". AfricaCrypt 2009, LNCS 5580, pp. 198–216, Springer, 2009.
 ePrint |  DoI |  BibTeX


2008

[SS08] Siamak F. Shahandashti and Reihaneh Safavi-Naini. "Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures". PKC 2008, LNCS 4939, pp. 121–140, Springer, 2008.
 ePrint |  DoI |  Slides |  BibTeX


2007

[SSB07] Siamak F. Shahandashti, Reihaneh Safavi-Naini, and Joonsang Baek. "Concurrently-Secure Credential Ownership Proofs". ASIACCS 2007, pp. 161–172, ACM, 2007.
 ePrint |  DoI |  BibTeX


2005

[Sha05] Siamak F. Shahandashti. "Provably-Secure Homomorphic Digital Signatures". MSc Thesis. Sharif University of Technology, Tehran, Iran. 2005.
 Hard copy | Main results published in  [SSM05]

[SSM05] Siamak F. Shahandashti, Mahmoud Salmasizadeh, and Javad Mohajeri. "A Provably Secure Short Transitive Signature Scheme from Bilinear Group Pairs". SCN 2004. LNCS 3352, pp. 60–76, Springer, 2005.
 ePrint |  DoI |  BibTeX | Published results of  [Sha05]