[go: up one dir, main page]

Follow
Khodakhast Bibak
Khodakhast Bibak
Staff Engineer (Post-Quantum Cryptography), Walmart Global Tech
Verified email at walmart.com
Title
Cited by
Cited by
Year
Content delivery networks: State of the art, trends, and future roadmap
B Zolfaghari, G Srivastava, S Roy, HR Nemati, F Afghah, T Koshiba, ...
ACM Computing Surveys (CSUR) 53 (2), 1-34, 2020
1442020
The odyssey of entropy: Cryptography
B Zolfaghari, K Bibak, T Koshiba
Entropy 24 (2), 266, 2022
452022
The dichotomy of cloud and iot: Cloud-assisted iot from a security perspective
B Zolfaghari, A Yazdinejad, A Dehghantanha, J Krzciok, K Bibak
arXiv preprint arXiv:2207.01590, 2022
402022
Recursive relations for the number of spanning trees
MHS Haghighi, K Bibak
Applied Mathematical Sciences 3 (46), 2263-2269, 2009
342009
Cancer Prognosis and Diagnosis Methods Based on Ensemble Learning
B Zolfaghari, L Mirsadeghi, K Bibak, K Kavousi
ACM Computing Surveys 55, 262:1-262:34, 2023
332023
Restricted linear congruences
K Bibak, BM Kapron, V Srinivasan, R Tauraso, L Tóth
Journal of Number Theory 171, 128-144, 2017
302017
On an almost-universal hash function family with applications to authentication and secrecy codes
K Bibak, BM Kapron, V Srinivasan, L Tóth
International Journal of Foundations of Computer Science 29 (03), 357-375, 2018
222018
Quantum key distribution with PRF (Hash, Nonce) achieves everlasting security
K Bibak, R Ritchie
Quantum Information Processing 20 (7), 228, 2021
202021
Everlasting security of quantum key distribution with 1K-DWCDM and quadratic hash.
K Bibak, R Ritchie, B Zolfaghari
Quantum Inf. Comput. 21 (3&4), 181-202, 2021
202021
MMH* with arbitrary modulus is always almost-universal
K Bibak, BM Kapron, V Srinivasan
Information Processing Letters 116 (7), 481–483, 2016
202016
Additive combinatorics with a view towards computer science and cryptography—An Exposition
K Bibak
Number Theory and Related Fields: In Memory of Alf van der Poorten 43, 99-128, 2013
192013
The Cayley graphs associated with some quasi-perfect Lee codes are Ramanujan graphs
K Bibak, BM Kapron, V Srinivasan
IEEE Transactions on Information Theory, 2016
172016
Secure UAV (Drone) and the Great Promise of AI
B Zolfaghari, M Abbasmollaei, F Hajizadeh, N Yanai, K Bibak
ACM Computing Surveys 56 (11), 286:1-286:37, 2024
162024
Cryptography in hierarchical coded caching: system model and cost analysis
B Zolfaghari, V Singh, BK Rai, K Bibak, T Koshiba
Entropy 23 (11), 1459, 2021
162021
Statistical trend analysis of physically unclonable functions: An approach via text mining
B Zolfaghari, K Bibak, T Koshiba, HR Nemati, P Mitra
CRC Press, 2021
152021
Explicit formulas for the weight enumerators of some classes of deletion correcting codes
K Bibak, O Milenkovic
IEEE Transactions on Communications 67 (3), 1809-1816, 2019
152019
Unweighted linear congruences with distinct coordinates and the Varshamov–Tenengolts codes
K Bibak, BM Kapron, V Srinivasan
Designs, Codes and Cryptography 86, 1893–1904, 2018
152018
Authentication of variable length messages in quantum key distribution
K Bibak, BM Kapron, V Srinivasan
EPJ Quantum Technology 9 (1), 1-20, 2022
142022
Some trigonometric identities involving Fibonacci and Lucas numbers
K Bibak, MHS Haghighi
Journal of Integer Sequences 12 (2), 3, 2009
142009
The number of spanning trees in some classes of graphs
MHS Haghighi, KH Bibak
The Rocky Mountain Journal of Mathematics, 1183-1195, 2012
132012
The system can't perform the operation now. Try again later.
Articles 1–20