|
Ziba
Eslami
Associate
Professor, Shahid Beheshti University
|
I received my Ph.D. in Applied Mathematics from Tehran University in 2000. During the academic years 2000-2003, I was a postdoctoral fellow in the Institute for Research in Fundamental Sciences (IPM). I served as a non-resident researcher at IPM during 2003-2005. Currently, I am an associate professor in the Department of Data and Computer Science at Shahid Beheshti University (SBU) in Iran. My research is primarily centered around cryptography and security of cryptographic protocols. |
Jump to: |
Books ^ |
1. Eslami Z.
Introduction to Coding Theory (in Persian)
Shahid Beheshti University Publishing Center, 2008.
Journal papers ^ |
1.
D Shiraly, N Pakniat,
M Noroozi, Z Eslami
Pairing-free
certificateless authenticated encryption with keyword search
Journal of Systems Architecture 124, (2022) 102390
2.
S
Esmaeilzade, N Pakniat, Z Eslami |
2022 |
3.
S
Sheidani, Z Eslami
Blind Multipurpose
Image Watermarking with Perfect Security
The
ISC International Journal of Information Security 13 (2), (2021) 145-156
4.
Z
Eslami, M Noroozi, K Amirizirtol
Public key encryption
with distributed keyword search
Journal
of Discrete Mathematical Sciences and Cryptography, (2021) 1-25
5.
S
Sheidani, A Mahmoudi-Aznaveh, Z Eslami
CPA-Secure
privacy-preserving reversible data hiding for JPEG images
IEEE
Transactions on Information Forensics and Security 16, (2021) 3647-3661
6.
S
Sheidani, Z Eslami
IET
Image Processing 14 (17), (2020) 4766-4773
7.
Pakniat N., Shiraly D. and Eslami Z.
Certificateless authenticated
encryption with keyword search: Enhanced security model and a concrete
construction for industrial IoT.
Journal of Information Security and Applications, vol. 53, pp 102525, 2020.
8. Pakniat N. and Eslami Z.
Cryptanalysis and improvement
of a group RFID authentication protocol.
Wireless Networks, vol. 26, no. 5, pp 3363–3372, 2020.
9. Noroozi M. and Eslami Z.
Public key authenticated
encryption with keyword search: revisited.
IET Information Security, vol. 13, no. 4, pp 336-342, 2019.
10.
Eslami Z.,
Noroozi M. and Baek J.
On the Security of a
Privacy-Preserving Ranked Multi-Keyword Search Scheme..
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable
Applications, vol. 10, no. 1, pp 75-85, 2019.
11.
Noroozi M. and Eslami Z.
Public-key encryption with
keyword search: a generic construction secure against online and offline
keyword guessing attacks.
Journal of Ambient Intelligence and Humanized Computing, vol. 11, no. 2, pp.
879-890.
12.
Kabirirad Fazlali M. and Eslami Z.
High-speed GPU implementation
of a secret sharing scheme based on cellular automata.
The Journal of Supercomputing, vol. 75, no. 11, pp 7314-7336, 2019.
13.
Kabirirad S. and Eslami Z.
Improvement of (n, n)-multi secret image sharing schemes
based on Boolean operations.
Journal of Information Security and Applications, vol. 47, pp. 16-27, 2019.
14.
Noroozi M., Karoubi I. and Eslami Z.
Designing a secure designated
server identity-based encryption with keyword search scheme: still unsolved.
Annals of Telecommunications, vol. 73, no. 11-12, pp. 769-776, 2018.
15.
Noroozi M., Eslami Z. and Pakniat N.
Comments on a chaos-based public
key encryption with keyword search scheme.
Nonlinear Dynamics, vol. 94, no. 2, pp. 1127-1132, 2018.
16.
Kabirirad S. and Eslami Z.
A (t, n)-multi secret image
sharing scheme based on Boolean operations.
Journal of Visual Communication and Image Representation, vol. 57, pp. 39-47,
2018.
17.
Rajabi B. and Eslami Z.
A verifiable threshold secret
sharing scheme based on lattices.
Information Sciences, vol. 501, pp. 655-661, 2019.
18.
Pakniat N. and Eslami Z.
Verifiable Social Multi-Secret Sharing Secure in
Active Adversarial Model.
Journal of Computing and Security, vol. 4, no. 1, pp. 3-12, 2017.
19.
Eslami Z.
and Mohajer R.
Cryptanalysis of a multiparty
quantum key agreement protocol based on commutative encryption.
Quantum Information Processing , vol. 16, no. 8, pp. 197:1-9, 2017.
20.
Rajabi B. and Eslami Z.
A CCA2-Secure Incomparable
Public Key Encryption Scheme.
Journal of Computing and Security , vol. 3, no. 1, pp. 197:1-9, 2017.
21.
Pakniat N., Noroozi M. and Eslami Z.
Reducing Multi-Secret Sharing
Problem to Sharing a Single Secret Based on Cellular Automata.
THE CSI JOURNAL ON COMPUTER SCIENCE AND ENGINEERING , vol. 14, no. 1, pp.
38-43, 2016.
22.
Eslami Z.,
Pakniat N. and Nojoumian M.
Ideal social secret sharing
using Birkhoff interpolation method.
Security and Communication Networks , vol. 9, no. 18, pp. 4973-4982, 2016.
23.
Eslami Z.,
Noroozi M. and Kabiri Rad S.
Provably Secure Group Key
Exchange Protocol in the Presence of Dishonest Insiders.
International journal of network security , vol. 18, no. 1, pp.33-42 2016.
24.
Eslami Z.
Algorithmic Aspects of Trades.
ARS COMBINATORIA , vol. 120, no. 3, pp. 245-253, 2015.
25.
Pakniat N., Noroozi M. and Eslami Z.
A Distributed Key Generation
Protocol with Hierarchical Threshold Access Structure.
IET Information Security , vol. 9, no. 4, pp. 248-255, 2015.
26.
Eslami Z.,
Kazemnasab Haji M. and Mirehi N.
Proxy signatures and
buyer-seller watermarking protocols for the protection of multimedia content.
Multimedia Tools and Applications , vol. 72, no. 3, pp. 2723-2740, 2014.
27.
Eslami Z.
and Pakniat N.
Certificateless aggregate
signcryption: Security model and a concrete construction secure in the random
oracle model.
Journal of King Saud University-Computer and Information Sciences , vol. 9, no.
4, pp. 248-255, 2015.
28.
Pakniat N., Eslami Z., Miri A.
A note on "Selling
multiple secrets to a single buyer".
Information Sciences , vol. 279, pp. 889-892, 2014.
29.
Pakniat N., Noroozi M. and Eslami Z.
Secret image sharing scheme
with hierarchical threshold access structure.
Journal of Visual Communication and Image Representation , vol. 25, no. 5, pp.
1093-1101, 2014.
30.
Eslami Z.,
Pakniat N. and Noroozi M.
Cryptanalysis of an
Attribute-based Key Agreement Protocol.
International Journal of Computer and Information Technologies , vol. 2, no. 1,
pp. 351-358, 2014.
31.
Bakhshandeh A. and Eslami Z.
An authenticated image
encryption scheme based on chaotic maps and memory cellular automata.
Optics and Lasers in Engineering , vol. 51, no. 6, pp. 665-673, 2013.
32.
Eslami Z.
and Bakhshandeh A.
An improvement over an image
encryption method based on total shuffling.
Optics Communications , vol. 286, pp. 51-55, 2013.
33.
Babamir F. and Eslami Z.
Data Security in Unattended
Wireless Sensor Networks through Aggregate Signcryption.
KSII Transactions on Internet and Information Systems , vol. 6, no. 11, pp.
2940-2955, 2012.
34.
Eslami Z.
and Kabiri Rad S.
A new verifiable multi-secret
sharing scheme based on bilinear maps.
Wireless Personal Communications , vol. 63, no. 2, pp. 459-467, 2012.
35.
Pakniat N. and Eslami Z.
A Proxy E-Raffle Protocol
Based on Proxy Signatures.
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable
Applications , vol. 2, no. 3, pp. 74-84, 2011.
36.
Eslami Z.
and Zarepour Ahmadabadi J.
Secret image sharing with
authentication-chaining and dynamic embedding.
Journal of Systems and Software , vol. 84, no. 5, pp. 803-809, 2011.
37.
Eslami Z.
and Talebi M.
A new untraceable off-line
electronic cash system.
Electronic Commerce Research and Applications , vol. 10, no. 1, pp. 59-66,
2011.
38.
Eslami Z.
and Zarepour Ahmadabadi J.
A verifiable multi-secret
sharing scheme based on cellular automata.
Information Sciences , vol. 180, no. 15, pp. 2889-2894, 2010.
39.
Eslami Z.
and Kabiri Rad S.
Another Security Weakness in
an Authenticated Group Key Agreement.
Journal of Internet Technology , vol. 11, no. 4, pp. 573-576, 2010.
40.
Eslami Z.,
Razzaghi H. and Zarepour Ahmadabadi J.
Secret image sharing based on
cellular automata and steganography.
Pattern Recognition , vol. 43, no. 1, pp. 397-404, 2010.
41.
Eslami Z.
On the possible automorphisms of a 3-(16, 7, 5) design.
ARS COMBINATORIA , vol. 95, no. 2, pp. 217-224, 2010.
42.
Eslami Z.
Classification Of Large Sets By Trades.
ARS COMBINATORIA , vol. 82, no. 1, pp. 237-242, 2007.
43.
Eslami Z.
Classification of designs with
nontrivial automorphism groups.
Journal of Combinatorial Designs , vol. 14, no. 6, pp. 479-489, 2006.
44.
Eslami Z.,
Khosrovshahi G.B. and Mohammad-Noori M.
Enumeration of t-Designs
Through Intersection Matrices.
Designs, Codes and Cryptography , vol. 32, no. 1, pp. 185-191, 2004.
45.
Eslami Z.,
Khosrovshahi G.B., Mohammad-Noori M. and Tayfeh-Rezaie R.
Some new 4-designs.
ARS COMBINATORIA , vol. 73, no. 4, pp. 225-230, 2004.
46.
Eslami Z.
LS[7](3,5,11) Exists.
Journal of Combinatorial Designs , vol. 11, no. 5, pp. 312-316, 2003.
47.
Eslami Z.
On the indecomposable
partition problem: IPP(10,?).
Discrete Mathematics , vol. 248, no. 1-3, pp. 255-264, 2002.
48.
Eslami Z.
and Khosrovshahi G.B.
Some New 6-(14, 7, 4) Designs.
Journal of Combinatorial Theory, Series A , vol. 93, no. 1, pp. 141-152, 2001.
49.
Eslami Z.,
Khosrovshahi G.B. and Tayfeh-Rezaie R.
On classification of 2-(8, 3) and 2-(9, 3) trades.
Journal of Combinatorial Mathematics and Combinatorial Computing, vol. 38, pp.
231-242, 2001.
50.
Eslami Z.,
Khosrovshahi G.B. and Tayfeh-Rezaie R.
On halvings of the 2-(10, 3,
8) design.
Journal of Statistical Planning and Inference , vol. 86, no. 2, pp. 411-419,
2000.
51.
Eslami Z.
and Khosrovshahi G.B.
Classification of some large
sets and designs.
Journal of Geometry , vol. 67, no. 1, pp. 105-110, 2000.
52.
Eslami Z.
and Khosrovshahi G.B.
A complete classification of
3-(11, 4, 4) designs with nontrivial automorphism group.
Journal of Combinatorial Designs , vol. 8, no. 6, pp. 419-425, 2000.
Conference papers ^ |
13.
نوروزی مهناز، نصراله پاک
نیت و اسلامی زیبا
رمزگذاری کلید عمومی با قابلیت جستجوی کلیدواژه: ارائه یک
ساخت کلی امن در برابر حملات حدس کلیدواژه برخط و غیر برخط.
چهاردهمین کنفرانس بین المللی انجمن رمز ایران , صفحه: 1-6، شیراز, ایران,1396.
14.
اسلامی زیبا و
نوروزی مهناز
پروتکل توافق کلید گروهی مقاوم
در برابر تقلب با ویژگی تصحیح خطای ناشی از اختلال کانال.
هفتمین کنفرانس بین المللی فناوری اطلاعات و دانش , صفحه: 1-6، ارومیه,
ایران,1394.
15.
اسلامی زیبا و
هجرودی غلامرضا
پروتکل واترمارکینگ
فروشنده-خریدار غیرخطی بدون شخص سوم معتمد.
هفتمین کنفرانس بین المللی فناوری اطلاعات و دانش , صفحه: 1-6، ارومیه,
ایران,1394.
16.
اسلامی زیبا و
کبیری راد سعیده
پیک روش رمزنگاری تصویر بلوک-مبنا با استفاده از
اتوماتای سلولی و نگاشت آشوب.
بیستمین کنفرانس ملی سالانه انجمن کامپیوتر ایران، مشهد, ایران,1394.
17.
اسلامی زیبا و
بابامیر فائزه سادات
پایداری داده ها در شبکه های حسگر بی سیم بی ملازم.
نهمین كنفرانس بین المللی انجمن رمز ايران, تبریز، ايران,1391.
18.
اسلامی زیبا و
قوامی پور هدی
يك طرح انتخابات الكترونيك امن و كار آمد مبتني بر امضاي كور.
پانزدهمين كنفرانس انجمن كامپيوتر ايران, تهران، ايران,1388.
Teaching ^ |
·
Hot
Topics in Cryptography
·
Cryptocurrencies
and Blockchain Technologies
·
Cryptographic
Protocols
·
Foundations
of Cryptography
·
Advanced
Cryptography
·
Advanced
Coding Theory
·
Introduction
to Cryptography (undergraduate)
·
Introduction
to Coding Theory (undergraduate)
·
English
for Computer Science (undergraduate)
·
Linear
Algebra
·
Advanced
Programming
·
Foundations
of Computers
Graduate students ^ |
Ph.D. students:
·
Surur
Sheidani : graduated in 2021
·
Saeideh
Kabiri Rad: graduated in 2019.
·
Mahnaz
Noroozi: graduated in 2019.
·
Nasrollah Pakniat: graduated in 2015.
·
Bahman
Rajabi: graduated in 2017
Honors/Awards ^ |
·
2015: Top Researcher of Cyberspace Research Center at Shahid
Beheshti University.
·
2002: Young Mathematicians Prize from The Institute for Research in
Fundamental Sciences for the paper "Some New 6-(14,7,4) Designs".
·
2000 : Ranked 2nd in 13th session of Khwarizmi International
Awardfor research contributions in fundamental science.
Last update: June 6, 2020