Peer-Reviewed Papers:
M. Zbudila, E. Pohle, A. Abidin, B. Preneel. “MaSTer: Maliciously Secure Truncation for Replicated Secret Sharing without Pre-Processing,” CANS 2024. (To appear)
L. Schield, A. Abidin, and B. Preneel. “Fast Transciphering via Batched and Reconfigurable LUT Evaluation.” The Transactions on Cryptographic Hardware and Embedded Systems 2024
Issue 4 (To appear).K. Bogner, D. Singelée and A. Abidin, "Entangled States and Bell's Inequality: A New Approach to Quantum Distance Bounding" In Workshop on Quantum-Secure Networks and Systems, Lecture Notes in Computer Science, Springer-Verlag, 6 pages, 2024.
E. Pohle, A. Abidin and B. Preneel, "Fast Evaluation of S-boxes with Garbled Circuits", IEEE Transactions on Information Forensics and Security 19, pp. 5530-5544, 2024.
A. S. Bhati, E. Pohle, A. Abidin, E. Andreeva, and B. Preneel, "Let’s Go Eevee! A Friendly and Suitable Family of AEAD Modes for IoT-to-Cloud Secure Computation," In ACM Conference on Computer and Communications Security - CCS 2023, ACM, 20 pages, 2023.
A. Abidin, E. Pohle, and B. Preneel, "Arithmetic Circuit Implementations of S-boxes for SKINNY and PHOTON in MPC," In the 28th European Symposium on Research in Computer Security - ESORICS, 20 pages, 2023.
O. Mirzamohammadi, K. Jannes, L. Sion, D. Van Landuyt, A. Abidin, and D. Singelée, "Security and Privacy Threat Analysis for Solid," In IEEE Secure Development Conference - SecDev, 2023.
E. Pohle, M. Zbudila, A. Abidin, and B. Preneel, "Poster: MaSTer: (Practically) Maliciously Secure Truncation for Replicated Secret Sharing," In 8th IEEE European Symposium on Security and Privacy (Euro S&P 2023), IEEE, 4 pages, 2023. ,
E. Marquet, J. Moeyersons, E. Pohle, M. Van Kenhove, A. Abidin, and B. Volckaert, "Secure Key Management for Multi-Party Computation in MOZAIK," In Proceedings of IEEE Security and Privacy Workshops (SPW), IEEE, 8 pages, 2023. ,
A. Abidin, X. Limani, E. Marquet, J. Moeyersons, E. Pohle, M. Van Kenhove, J. M. Marquez-Barja, N. Slamnik-Kriještorac, and B. Volckaert, "MOZAIK: An End-to-End Secure Data Sharing Platform," In Proceedings of the 2nd International Workshop on Data Economy, ACM, 7 pages, 2023. ,
E. Pohle, A. Abidin, and B. Preneel, "Poster: Fast Evaluation of S-boxes in MPC," In Network and Distributed System Security Symposium (NDSS 2022), Internet Society, 2 pages, 2022.
G. Garofalo, T. Van hamme, D. Preuveneers, W. Joosen, A. Abidin, and M. A. Mustafa, "PIVOT: PrIVate and effective cOntact Tracing," IEEE Internet of Things Journal, 22 pages, 2021.
A. Abidin, M. El Soussi, J. Romme, P. Boer, D. Singelée, and C. Bachmann, "Secure, Accurate, and Practical Narrow-Band Ranging System," Transactions on Cryptographic Hardware and Embedded Systems 2021 (2), 30 pages, 2021.
A. Abidin, "On detecting relay attacks on RFID systems using qubits," Cryptography 4(2), 14, 2020.
A. Abidin, R. Callaerts, G. Deconinck, S. Van der Graaf, A. Madhusudan, M. Montakhabi, M. A. Mustafa, S. Nikova, D. Orlando, J. Schroers, S. Vanhove, and F. Zobiri, "Poster: SNIPPET - Secure and Privacy-Friendly Peer-to-Peer Electricity Trading," In Network and Distributed System Security Symposium (NDSS 2020), Internet Society, 2 pages, 2020.
M. Montakhabi, A. Madhusudan, S. Van der Graaf, A. Abidin, and M. A. Mustafa, "Sharing Economy in FutureElectricity Markets: Security and Privacy Analysis," In Workshop on Decentralized IoT Systems and Security (DISS) 2020, co-located with NDSS 2020 , Internet Society, 6 pages, 2020.
A. Abidin, A. Aly, and M. A. Mustafa, "Collaborative Authentication Using Threshold Cryptography," In Proceedings of ETAA 2019, LNCS 11967, 2020.
E. Argones-Rúa, A. Abidin, R. Peeters, and J. Romme, "Efficient and Privacy-Preserving Cryptographic Key Derivation from Continuous Sources," IEEE Transactions on Information Forensics and Security, 2019.
M. A. Mustafa, S. Cleemput, A. Aly, and A. Abidin, "A Secure and Privacy-preserving Protocol for Smart Metering Operational Data Collection," IEEE Transactions on Smart Grid, 2019.
A. Abidin, "Quantum Distance Bounding," In Proceedings of ACM WiSec, 2019.
R. Amiri, A. Abidin, P. Wallden, and E. Andersson, "Efficient unconditionally secure signatures using universal hashing," In Proceedings of ACNS 2018, LNCS 10892, pp. 1-20, 2018. Featured on The Register here.
A. Aly, A. Abidin, and S. Nikova, "Practically Efficient Secure Distributed Exponentiation without Bit-Decomposition," In Financial Cryptography and Data Security - 22nd International Conference, FC 2018. [PDF]
T. Van hamme, V. Rimmer, D. Preuveneers, W. Joosen, M. A. Mustafa, A. Abidin, and E. Argones Rúa, "Frictionless Authentication Systems: Emerging Trends, Research Challenges and Opportunities," In 11th International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2017), IARIA, 6 pages, 2017. [PDF]
M. A. Mustafa, A. Abidin, and E. Argones Rúa, "Frictionless Authentication System: Security & Privacy Analysis and Potential Solutions," In 11th International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2017), IARIA, 6 pages, 2017. [PDF]
M. A. Mustafa, S. Cleemput, A. Aly, and A. Abidin, "An MPC-based Protocol for Secure and Privacy-Preserving Smart Metering," IEEE PES Innovative Smart Grid Technologies Conference, IEEE, 6 pages, 2017. [PDF]
A. Abidin, E. Argones Rúa, and R. Peeters, "Uncoupling Biometrics from Templates for Secure and Privacy-Preserving Authentication," In Proceedings of the ACM Symposium on Access Control Models and Technologies (SACMAT) 2017.[PDF]
A. Abidin, E. Marín, D. Singelée, and B. Preneel, "Towards quantum distance bounding protocols," In Proceedings of RFIDSEC 2016, LNCS 10155, pp. 151-612, Springer, 2017. [PDF]
A. Abidin, "On privacy-preserving biometric authentication," In Proceedings of INSCRYPT 2016, LNCS 10143, pp. 169-286, Springer, 2016. [PDF]
A. Abidin, E. Argones Rúa, and B. Preneel, "An efficient entity authentication protocol with enhanced security and privacy properties," In Proceedings of CANS 2016, LNCS 10052, pp. 335-349, Springer, 2016. [PDF]
A. Abidin, A. Aly, E. Argones Rúa, and A. Mitrokotsa, "Efficient Verifiable Computation of XOR for Biometric Authentication," In Proceedings of CANS 2016, LNCS 10052, pp. 284-298, Springer, 2016. [PDF]
A. Abidin, A. Aly, S. Cleemput, and M. A. Mustafa, "An MPC-based Privacy-Preserving Protocol for a Local Electricity Trading Market," In Proceedings of CANS 2016, LNCS 10052, pp. 615-625, Springer, 2016. [PDF]
M. A. Mustafa, S. Cleemput, and A. Abidin, "A Local Electricity Trading Market: Security Analysis," IEEE PES Innovative Smart Grid Technologies Conference, IEEE, pp. 1-6, 2016. [PDF]
C. Pacher, A. Abidin, T. Lorünser, M. Peev, R. Ursin, A. Zeilinger, and J.-Å. Larsson, "Attacks on quantum key distribution protocols that employ non-ITS authentication," Quantum Information Processing, 15(1): 327-362, Springer, 2016. [PDF]
J. Hermans, A. Abidin, J. Bringer, E. Martiri, and R. Peeters, "Privacy Preserving Biometrics and Duplicate Enrolment Check," In European Conference on ePassports (FIDELITY event), 2015. [PDF]
J. Hermans, A. Abidin, N. Buchmann, and R. Peeters, "ePassport Protocols and Certificate Architecture," In European Conference on ePassports (FIDELITY event), 2015. [PDF]
E. Pagnin, C. Dimitrakakis, A. Abidin, and A. Mitrokotsa, "On the Leakage of Information in Biometric Authentication," In Proceedings of INDOCRYPT 2014, LNCS 8885, pp. 265-280, Springer, 2014. [PDF]
A. Abidin and A. Mitrokotsa, "Security aspects of privacy-preserving biometric authentication based on ideal lattices and ring-LWE," In Proceedings of IEEE WIFS, pp. 1653-1658, 2014. [PDF]
A. Abidin, K. Matsuura, and A. Mitrokotsa, "Security of a Privacy-Preserving Biometric Authentication Protocol Revisited," In Proceedings of CANS 2014, LNCS 8813, pp. 290-304, Springer, 2014. [PDF]
A. Abidin, E. Pagnin, and A. Mitrokotsa, "Attacks on Privacy-Preserving Biometric Authentication," In Proceedings of NordSec 2014, LNCS 8788, pp. 293–294, Springer, 2014.
A. Abidin and A. Mitrokotsa, "A Privacy-preserving Biometric Authentication Protocol Revisited," In Proceedings of YACC 2014, 2014. [PDF]
A. Abidin and J.-Å. Larsson, "Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key," Quantum Information Processing, 13(10): 2155-2170, Springer, 2014. [PDF]
A. Abidin, "On security of universal hash function based multiple authentication," In Proceedings of ICICS 2012, LNCS 7618, pp. 303-310, Springer, 2012. [PDF]
A. Abidin and J.-Å. Larsson, "New Universal Hash Functions," In Proceedings of WEWoRC 2011, LNCS 7242, pp. 99-108, Springer, 2012. [PDF]
A. Abidin, C. Pacher, T. Lorünser, J.-Å. Larsson, and M. Peev, "Quantum Cryptography and Authentication with Low Key-Consumption," In Proceedings of SPIE Vol. 8189, 2011.
A. Abidin and J.-Å. Larsson, "Vulnerability of "A novel protocol-authentication algorithm ruling out a man-in-the-middle attack in Quantum Cryptography," International Journal of Quantum Information, 7(5): 1047-1052, 2009. [PDF]
A. Abidin and J.-Å. Larsson, "Special properties of Strongly Universal-2 hash functions important in Quantum Cryptography," AIP Conf. Proc., Vol. 1101, pp. 289-293, 2009.
Preprints:
Secure and Privacy-Friendly Local Electricity Trading and Billing in Smart Grid, by A. Abidin, A. Aly, S. Cleemput, M. A. Mustafa. arXiv:1801.08354. [PDF]
Attacks on Karlsson and Mitrokotsa’s Grouping-Proof-Distance-Bounding Protocol, by R. Peeters, J. Hermans, A. Abidin. IACR Cryptology ePrint Archive, 2017. [PDF]
Towards a Local Electricity Trading Market based on Secure Multiparty Computation, by A. Abidin, A. Aly, S. Cleemput, and M. A. Mustafa. COSIC internal report, 14 pages, 2016. [PDF]
Security of Authentication with a Fixed Key in Quantum Key Distribution, by Aysajan Abidin and Jan-Åke Larsson. arxiv.org/abs/1109.5168
Patents:
SYSTEM AND METHOD FOR PERFORMING SECURE KEY EXCHANGE, by Aysajan Abidin and Mohieddine El Soussi.
PASSWORD MANAGEMENT SYSTEM AND METHOD, by Aysajan Abidin and Philip Lundin. Granted
AN ELECTRONIC CONTROL UNIT COMPRISING A PHYSICAL UNCLONABLE FUNCTION (PUF), by Aysajan Abidin and Philip Lundin.
Authentication Method and System, by Aysajan Abidin and Enrique Argones Rúa. Granted
Method and System for Secure Password Storage, by Aysajan Abidin and Philip Lundin.Granted
Method and System for Assurance of Message Integrity, by Aysajan Abidin, Ryan Amiri, Erika Andersson, and Petros Wallden. Granted
Method and System for Secure Storage of Information, Aysajan Abidin and Philip Lundin.
Method and System for User Authentication, by Aysajan Abidin. Granted
Method and Server for Handling Personal Information, by Aysajan Abidin, Hani Glaidos, and Philip Lundin.
Theses:
(Department of Electrical Engineering, Linköping University, Sweden, 2013) [PDF]
(Department of Mathematics, Linköping University, Sweden, 2010) [PDF]
(Department of Mathematical Sciences, Chalmers University of Technology, Sweden, 2007)