Papers in Conferences

#Paper TitleAuthorsConference TitleHolding Date of Conference
 
1Discrete logarithm ProblemMojtaba Bahramian24th Iranian Algebra Seminar2014-11-12
2RSA Scheme over the Ring of Gaussian IntegersMojtaba Bahramian48th Annual Iranian Mathematics Conference2017-08-22
3An Identity-Based Encryption Based on Pairings over Elliptic CurvesKhadijeh Eslami, Mojtaba Bahramian48th Annual Iranian Mathematics Conference2017-08-22
4انتقال بی‌اطلاع با استفاده از ژاکوبین تعمیم‌یافته خم‌های بیضویMaryam Rezaei Kashi-Mojtaba Bahramian51st Annual Iranian Mathematics Conference2021-02-16
5رمزنگاری شناسه کاربری با استفاده از ژاکوبین تعمیم یافته خم‌های بیضویMojtaba Bahramian- Elham HajiRezaei51st Annual Iranian Mathematics Conference2021-02-16
6Secret Sharing SchemeMojtaba Bahramian, Khadijeh Eslami9th Iranian Group Theory Conferenc2017-02-01
7Secret Sharing SchemeMojtaba Bahramian, Khadijeh Eslami9th Iranian Group Theory Conferenc2017-02-01
8نظریه گروهها در رمزنگاریMojtaba Bahramian9th Iranian Group Theory Conferenc2017-02-01
9GENERALIZED JACOBIAN CRYPTOSYSTEMSKhadijeh Eslami, Mojtaba BahramianFirst International Conference on Combinatorics, Cryptography and Computation2016-09-01
10Certificate-Based Encryption SchemeMojtaba BahramianFirst International Conference on Combinatorics, Cryptography and Computation2016-09-01
11Computing the Tate Pairing using Generalized JacobiansMojtaba BahramianThe 45th Annual Iranian Mathematics Conference2014-08-26
12Calculus on Elliptic CurvesMojtaba Bahramian, Hassan Daghigh, Somayyeh DidariThe First Conference on Computational Group Theory, Computational Number Theory and Applications2014-12-17
13گاهی به برخی مسائل ریاضی در رمزنگاریHassan Daghigh, Mojtaba Bahramian, Somayyeh DidariThe First Conference on Computational Group Theory, Computational Number Theory and Applications2014-12-17
14Constructing Elliptic Curves for CryptographyMojtaba Bahramian, Hassan Daghigh, Somayyeh DidariThe First Conference on Computational Group Theory, Computational Number Theory and Applications2014-12-17
15An identity-based encryption schemeMojtaba Bahramian, Maryam SheikhiThe Second Conference on Computational Group Theory, Computational Number Theory and Applications2015-10-13
16Jacobian group of Cocktail PartyMojtaba BahramianThe Second Conference on Computational Group Theory, Computational Number Theory and Applications2015-10-13
17رمزنگاری امن با خم‌های بیضویMojtaba Bahramianاولین کنفرانس بین المللی فناوریهای نوین در علوم07-09-2017
18A Threshold Multi-Secret Sharing Scheme Based on Shamir’s SchemeKhadijeh Eslami, Mojtaba Bahramianاولین کنفرانس بین المللی فناوریهای نوین در علوم2017-09-07
19Secret Sharing Based on Elliptic CurvesMojtaba Bahramian, Maryam Sheikhi, Fatemeh Seyfiهمایش The First Conference on Computational Group Theory, Computational Number Theory and Applications2014-12-17
Showing 1-19 of 19 items.