Publications:
O. Mirzamohammadi, J. Bobolz, S. Sedaghat, E. Heydari Beni, A. Abidin, D. Singelée and B. Preneel, "Keyed-Verification Anonymous Credentials with Highly Efficient Partial Disclosure", IACR Cryptology ePrint Archive 2025(41), 24 pages, 2025.
P. Schwarz, E. Pohle, A. Abidin and B. Preneel, "Evaluating Ascon in Secure Multi-Party Computation using Reverse Multiplication-Friendly Embeddings" InProceedings of the 24 annual ACM workshop on Privacy in the electronic society, Association for Computing Machinery (ACM), ACM, 12 pages, 2025.
X. Limani, A. Troch, M. Van Kenhove, A. Papageorgiou, F. De Turck, E. Pohle, L. Schild, M. Zbudila, A. Abidin, B. Volckaert, M. Camelo Botero, J. Marquez-Barja and N. Slamnik-Kriještorac, "End-to-End Network Slicing: Securing Sensitive Data Across the Network" In COMMUNICATIONS IN CHINA. IEEE/CIC INTERNATIONAL CONFERENCE. 2025, IEEE Computer Society, IEEE, , 2025.
M. Zbudila, A. Abidin and B. Preneel, "Exploring Adversarial Attacks on the MaSTer Truncation Protocol" In IH&MMSEC 2025: ACM Workshop on Information Hiding and Multimedia Security Proceedings, Association for Computing Machinery (ACM), ACM, pp. 86-97, 2025.
V. Mishra, A. Abidin and B. Preneel, "The Accountability Strikes Back: Decentralizing the Key Generation in CL-PKC with Traceable Ring Signatures" InAdvancing Edge Artificial Intelligence 2024, 21 pages, 2025.
K. Bogner, A. Abidin and D. Singelée, "Continuous Variable Quantum Distance Bounding" In IEEE INFOCOM 2025 Workshop, IEEE, 6 pages, 2025.
Abidin, A., Eldefrawy, K., Singelée, D. Entanglement-Based Mutual Quantum Distance Bounding. In: Dolev, S., Elhadad, M., Kutyłowski, M., Persiano, G. (eds) Cyber Security, Cryptology, and Machine Learning. CSCML 2024. Lecture Notes in Computer Science, vol 15349. Springer, Cham. https://doi.org/10.1007/978-3-031-76934-4_14
M. Zbudila, E. Pohle, A. Abidin, B. Preneel. “MaSTer: Maliciously Secure Truncation for Replicated Secret Sharing without Pre-Processing,” In: Kohlweiss, M., Di Pietro, R., Beresford, A. (eds) Cryptology and Network Security. CANS 2024. Lecture Notes in Computer Science, vol 14905. Springer, Singapore. DOI: 10.1007/978-981-97-8013-6_3.
L. Schield, A. Abidin, and B. Preneel. “Fast Transciphering via Batched and Reconfigurable
LUT Evaluation.” ACR Transactions on Cryptographic Hardware and Embedded Systems, 2024(4), 205-230. DOI: 10.46586/tches.v2024.i4.205-230.Bogner, K., Singelée, D. and Abidin, A., 2024, June. Entangled States and Bell’s Inequality: A New Approach to Quantum Distance Bounding. In 2024 IEEE Symposium on Computers and Communications (ISCC) (pp. 1-6). IEEE.
K. Bogner, D. Singelée and A. Abidin, "Entangled States and Bell's Inequality: A New Approach to Quantum Distance Bounding" In Workshop on Quantum-Secure Networks and Systems, Lecture Notes in Computer Science, Springer-Verlag, 6 pages, 2024.
E. Pohle, A. Abidin and B. Preneel, "Fast Evaluation of S-boxes with Garbled Circuits", IEEE Transactions on Information Forensics and Security 19, pp. 5530-5544, 2024.
A. S. Bhati, E. Pohle, A. Abidin, E. Andreeva, and B. Preneel, "Let’s Go Eevee! A Friendly and Suitable Family of AEAD Modes for IoT-to-Cloud Secure Computation," In ACM Conference on Computer and Communications Security - CCS 2023, ACM, 20 pages, 2023.
A. Abidin, E. Pohle, and B. Preneel, "Arithmetic Circuit Implementations of S-boxes for SKINNY and PHOTON in MPC," In the 28th European Symposium on Research in Computer Security - ESORICS, 20 pages, 2023.
Mirzamohammadi, O., Jannes, K., Sion, L., Van Landuyt, D., Abidin, A. and Singelée, D., 2023, October. Security and Privacy Threat Analysis for Solid. In 2023 IEEE Secure Development Conference (SecDev) (pp. 196-206). IEEE.
E. Pohle, M. Zbudila, A. Abidin, and B. Preneel, "Poster: MaSTer: (Practically) Maliciously Secure Truncation for Replicated Secret Sharing," In 8th IEEE European Symposium on Security and Privacy (Euro S&P 2023), IEEE, 4 pages, 2023. ,
E. Marquet, J. Moeyersons, E. Pohle, M. Van Kenhove, A. Abidin, and B. Volckaert, "Secure Key Management for Multi-Party Computation in MOZAIK," In Proceedings of IEEE Security and Privacy Workshops (SPW), IEEE, 8 pages, 2023. ,
A. Abidin, X. Limani, E. Marquet, J. Moeyersons, E. Pohle, M. Van Kenhove, J. M. Marquez-Barja, N. Slamnik-Kriještorac, and B. Volckaert, "MOZAIK: An End-to-End Secure Data Sharing Platform," In Proceedings of the 2nd International Workshop on Data Economy, ACM, 7 pages, 2023. ,
E. Pohle, A. Abidin, and B. Preneel, "Poster: Fast Evaluation of S-boxes in MPC," In Network and Distributed System Security Symposium (NDSS 2022), Internet Society, 2 pages, 2022.
G. Garofalo, T. Van hamme, D. Preuveneers, W. Joosen, A. Abidin, and M. A. Mustafa, "PIVOT: PrIVate and effective cOntact Tracing," IEEE Internet of Things Journal, 22 pages, 2021.
A. Abidin, M. El Soussi, J. Romme, P. Boer, D. Singelée, and C. Bachmann, "Secure, Accurate, and Practical Narrow-Band Ranging System," Transactions on Cryptographic Hardware and Embedded Systems 2021 (2), 30 pages, 2021.
A. Abidin, "On detecting relay attacks on RFID systems using qubits," Cryptography 4(2), 14, 2020.
A. Abidin, R. Callaerts, G. Deconinck, S. Van der Graaf, A. Madhusudan, M. Montakhabi, M. A. Mustafa, S. Nikova, D. Orlando, J. Schroers, S. Vanhove, and F. Zobiri, "Poster: SNIPPET - Secure and Privacy-Friendly Peer-to-Peer Electricity Trading," In Network and Distributed System Security Symposium (NDSS 2020), Internet Society, 2 pages, 2020.
M. Montakhabi, A. Madhusudan, S. Van der Graaf, A. Abidin, and M. A. Mustafa, "Sharing Economy in FutureElectricity Markets: Security and Privacy Analysis," In Workshop on Decentralized IoT Systems and Security (DISS) 2020, co-located with NDSS 2020 , Internet Society, 6 pages, 2020.
A. Abidin, A. Aly, and M. A. Mustafa, "Collaborative Authentication Using Threshold Cryptography," In Proceedings of ETAA 2019, LNCS 11967, 2020.
E. Argones-Rúa, A. Abidin, R. Peeters, and J. Romme, "Efficient and Privacy-Preserving Cryptographic Key Derivation from Continuous Sources," IEEE Transactions on Information Forensics and Security, 2019.
M. A. Mustafa, S. Cleemput, A. Aly, and A. Abidin, "A Secure and Privacy-preserving Protocol for Smart Metering Operational Data Collection," IEEE Transactions on Smart Grid, 2019.
A. Abidin, "Quantum Distance Bounding," In Proceedings of ACM WiSec, 2019.
R. Amiri, A. Abidin, P. Wallden, and E. Andersson, "Efficient unconditionally secure signatures using universal hashing," In Proceedings of ACNS 2018, LNCS 10892, pp. 1-20, 2018. Featured on The Register here.
A. Aly, A. Abidin, and S. Nikova, "Practically Efficient Secure Distributed Exponentiation without Bit-Decomposition," In Financial Cryptography and Data Security - 22nd International Conference, FC 2018. [PDF]
T. Van hamme, V. Rimmer, D. Preuveneers, W. Joosen, M. A. Mustafa, A. Abidin, and E. Argones Rúa, "Frictionless Authentication Systems: Emerging Trends, Research Challenges and Opportunities," In 11th International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2017), IARIA, 6 pages, 2017. [PDF]
M. A. Mustafa, A. Abidin, and E. Argones Rúa, "Frictionless Authentication System: Security & Privacy Analysis and Potential Solutions," In 11th International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2017), IARIA, 6 pages, 2017. [PDF]
M. A. Mustafa, S. Cleemput, A. Aly, and A. Abidin, "An MPC-based Protocol for Secure and Privacy-Preserving Smart Metering," IEEE PES Innovative Smart Grid Technologies Conference, IEEE, 6 pages, 2017. [PDF]
A. Abidin, E. Argones Rúa, and R. Peeters, "Uncoupling Biometrics from Templates for Secure and Privacy-Preserving Authentication," In Proceedings of the ACM Symposium on Access Control Models and Technologies (SACMAT) 2017.[PDF]
A. Abidin, E. Marín, D. Singelée, and B. Preneel, "Towards quantum distance bounding protocols," In Proceedings of RFIDSEC 2016, LNCS 10155, pp. 151-612, Springer, 2017. [PDF]
A. Abidin, "On privacy-preserving biometric authentication," In Proceedings of INSCRYPT 2016, LNCS 10143, pp. 169-286, Springer, 2016. [PDF]
A. Abidin, E. Argones Rúa, and B. Preneel, "An efficient entity authentication protocol with enhanced security and privacy properties," In Proceedings of CANS 2016, LNCS 10052, pp. 335-349, Springer, 2016. [PDF]
A. Abidin, A. Aly, E. Argones Rúa, and A. Mitrokotsa, "Efficient Verifiable Computation of XOR for Biometric Authentication," In Proceedings of CANS 2016, LNCS 10052, pp. 284-298, Springer, 2016. [PDF]
A. Abidin, A. Aly, S. Cleemput, and M. A. Mustafa, "An MPC-based Privacy-Preserving Protocol for a Local Electricity Trading Market," In Proceedings of CANS 2016, LNCS 10052, pp. 615-625, Springer, 2016. [PDF]
M. A. Mustafa, S. Cleemput, and A. Abidin, "A Local Electricity Trading Market: Security Analysis," IEEE PES Innovative Smart Grid Technologies Conference, IEEE, pp. 1-6, 2016. [PDF]
C. Pacher, A. Abidin, T. Lorünser, M. Peev, R. Ursin, A. Zeilinger, and J.-Å. Larsson, "Attacks on quantum key distribution protocols that employ non-ITS authentication," Quantum Information Processing, 15(1): 327-362, Springer, 2016. [PDF]
J. Hermans, A. Abidin, J. Bringer, E. Martiri, and R. Peeters, "Privacy Preserving Biometrics and Duplicate Enrolment Check," In European Conference on ePassports (FIDELITY event), 2015. [PDF]
J. Hermans, A. Abidin, N. Buchmann, and R. Peeters, "ePassport Protocols and Certificate Architecture," In European Conference on ePassports (FIDELITY event), 2015. [PDF]
E. Pagnin, C. Dimitrakakis, A. Abidin, and A. Mitrokotsa, "On the Leakage of Information in Biometric Authentication," In Proceedings of INDOCRYPT 2014, LNCS 8885, pp. 265-280, Springer, 2014. [PDF]
A. Abidin and A. Mitrokotsa, "Security aspects of privacy-preserving biometric authentication based on ideal lattices and ring-LWE," In Proceedings of IEEE WIFS, pp. 1653-1658, 2014. [PDF]
A. Abidin, K. Matsuura, and A. Mitrokotsa, "Security of a Privacy-Preserving Biometric Authentication Protocol Revisited," In Proceedings of CANS 2014, LNCS 8813, pp. 290-304, Springer, 2014. [PDF]
A. Abidin, E. Pagnin, and A. Mitrokotsa, "Attacks on Privacy-Preserving Biometric Authentication," In Proceedings of NordSec 2014, LNCS 8788, pp. 293–294, Springer, 2014.
A. Abidin and A. Mitrokotsa, "A Privacy-preserving Biometric Authentication Protocol Revisited," In Proceedings of YACC 2014, 2014. [PDF]
A. Abidin and J.-Å. Larsson, "Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key," Quantum Information Processing, 13(10): 2155-2170, Springer, 2014. [PDF]
A. Abidin, "On security of universal hash function based multiple authentication," In Proceedings of ICICS 2012, LNCS 7618, pp. 303-310, Springer, 2012. [PDF]
A. Abidin and J.-Å. Larsson, "New Universal Hash Functions," In Proceedings of WEWoRC 2011, LNCS 7242, pp. 99-108, Springer, 2012. [PDF]
A. Abidin, C. Pacher, T. Lorünser, J.-Å. Larsson, and M. Peev, "Quantum Cryptography and Authentication with Low Key-Consumption," In Proceedings of SPIE Vol. 8189, 2011.
A. Abidin and J.-Å. Larsson, "Vulnerability of "A novel protocol-authentication algorithm ruling out a man-in-the-middle attack in Quantum Cryptography," International Journal of Quantum Information, 7(5): 1047-1052, 2009. [PDF]
A. Abidin and J.-Å. Larsson, "Special properties of Strongly Universal-2 hash functions important in Quantum Cryptography," AIP Conf. Proc., Vol. 1101, pp. 289-293, 2009.
Patents:
SYSTEM AND METHOD FOR PERFORMING SECURE KEY EXCHANGE, by Aysajan Abidin and Mohieddine El Soussi. Granted.
PASSWORD MANAGEMENT SYSTEM AND METHOD, by Aysajan Abidin and Philip Lundin. Granted
AN ELECTRONIC CONTROL UNIT COMPRISING A PHYSICAL UNCLONABLE FUNCTION (PUF), by Aysajan Abidin and Philip Lundin.
Authentication Method and System, by Aysajan Abidin and Enrique Argones Rúa. Granted
Method and System for Secure Password Storage, by Aysajan Abidin and Philip Lundin.Granted
Method and System for Assurance of Message Integrity, by Aysajan Abidin, Ryan Amiri, Erika Andersson, and Petros Wallden. Granted
Method and System for Secure Storage of Information, Aysajan Abidin and Philip Lundin.
Method and System for User Authentication, by Aysajan Abidin. Granted
Method and Server for Handling Personal Information, by Aysajan Abidin, Hani Glaidos, and Philip Lundin.
Theses:
(Department of Electrical Engineering, Linköping University, Sweden, 2013) [PDF]
(Department of Mathematics, Linköping University, Sweden, 2010) [PDF]
(Department of Mathematical Sciences, Chalmers University of Technology, Sweden, 2007)