Arash Afshar
Title
Cited by
Cited by
Year
Non-interactive secure computation based on cut-and-choose
A Afshar, P Mohassel, B Pinkas, B Riva
Annual International Conference on the Theory and Applications of …, 2014
762014
How to efficiently evaluate RAM programs with malicious security
A Afshar, Z Hu, P Mohassel, M Rosulek
Annual International Conference on the Theory and Applications of …, 2015
332015
Efficient Maliciously Secure Two Party Computation for Mixed Programs.
A Afshar, P Mohassel, M Rosulek
IACR Cryptol. ePrint Arch. 2017, 62, 2017
32017
Modeling sequential and concurrent programs with Reo and constraint automata
B Pourvatan, A Afshar, N Rouhy
Technical report, 2007
12007
Design and Implementation of Maliciously Secure Two-Party Computation Based on Garbled Circuits
A Afshar
Graduate Studies, 2017
2017
Reconstructing security types for automated policy enforcement in FABLE
A Afshar, MS Fallah
2011 5th International Conference on Network and System Security, 358-363, 2011
2011
The system can't perform the operation now. Try again later.
Articles 1–6