Publications and
Presentations
Journal Papers
Pilaram Hossein, Eghlidos Taraneh, Toluee Rahim, An Efficient Lattice based Threshold Signature Scheme using Multi-stage Secret Sharing, IET Information Security, accepted for publication, Nov. 2020.
Bagheri Khadijeh, Eghlidos Taraneh, Sadeghi Mohammad-Reza, Panario Daniel, Khodaiemehr Hassan, A Joint Encryption, Channel Coding and Modulation Scheme Using QC-LDPC Lattice-Codes, IEEE Transactions on Communications, Vol. 68, No. 8, pp. 4673-4693, Aug. 2020.
Karimani Saba, Naghdabadi Zahra, Eghlidos Taraneh, Aref Mohammad Reza, An LWE-based verifiable threshold secret sharing scheme, Mathematical Aspects of Cryptography, Vol. 10, No. 2, pp. 97–106, 2019.
Yousefipour Vahid, Ameri Mohammad Hassan, Mohajeri Javad, Eghlidos Taraneh, A Secure Attribute-based Keyword Search Scheme against Keyword Guessing and Chosen Keyword Attacks, International Journal of Information and Communication Technology Research (IJICTR), Vol. 10, No. 1, pp. 48-55, Winter 2018.
Bagheri Khadijeh, Sadeghi Mohammad-Reza, Eghlidos Taraneh, An Efficient Public Key Encryption Scheme based on QC-MDPC Lattices, accepted for publication in IEEE Access, Oct. 2017.
Mafakheri Behnam, Eghlidos Taraneh, Pilaram Hossein, An Efficient Secure Channel Coding Scheme based on Polar Codes, ISeCure Journal, Vol. 9, No. 2, pp. 13-20, July 2017.
Pilaram Hossein, Eghlidos Taraneh, A lattice based changeable threshold multi-secret sharing scheme and its application to threshold cryptography, Scientia Iranica, Transaction D: Computer Science and Electrical Engineering, accepted Oct. 29, 2016, published in Vol. 24, No. 3, 2017.Amini Khorasgani Hamidreza, Asaad Saba, Pilaram Hossein, Eghlidos Taraneh, Aref Mohammad Reza, On the Design and Security of a Lattice-Based Threshold Secret Sharing Scheme, ISeCure Journal, Vol. 8, No. 1, pp. 25-38, Jan. 2016.
Pilaram Hossein, Eghlidos Taraneh, An Efficient Lattice based Multi-Stage Secret Sharing Scheme, IEEE Transactions on Dependable and Secure Computing, date of Publication: May 20, 2015, date of Current Version: Vol. 14, No. 1, Jan. 2017.
Nematinia Mohammad Sadegh, Eghlidos Taraneh, Payandeh Ali, Improving Heuristic Guess-and-Determine Attack on TIPSY and SNOW 1 Stream Ciphers, Signal and Data Processing, Vol. 26, No. 4, 2015 (in Persian).
Hooshmand Reza, Aref Mohammadreza, Eghlidos Taraneh, Physical Layer Encryption Scheme Using Finite-Lenght Polar codes, IET Communicetions Journal, Vol. 9,No. 15, pp. 1857-1866, 2015.
Hooshmand Reza, Aref Mohammadreza, Eghlidos Taraneh, Secret Key Cryptosystem based on Non-Systematic Polar Codes, Wireless Personal Communications, Vol. 84, No. 2, pp. 1345-1373, 2015.
Fatemi Mitra, Ghasemi Reza, Eghlidos Taraneh, Aref Mohammad Reza, Efficient Multistage Secret Sharing Scheme Using Bilinear Map, IET Information Security, Vol. 8, No. 4, pp. 224-229, 2014.
Hooshmand Reza, Eghlidos Taraneh, Aref Mohammadreza, Improving the Rao-Nam Secret Key Cryptosystem Using Regular EDF-QC-LDPC Codes, ISeCure Journal, Vol. 4, No. 1, pp. 3-14, Jan. 2012.
Khosravirad Saeed Reza, Eghlidos Taraneh, Ghaemmaghami Shahrokh, Closure of Sets: A Statistically Hypersensitive System for Steganalysis of LSB Embedding, IET Signal Processing, Vol. 5, issue 4, pp. 379-389, 2011.
Sharifi Alireza, Mehrabi Esmaeil, Eghlidos Taraneh, Aref Mohammadreza, Algebraic Attacks from a Groebner Basis Perspective, International Journal of Algebra, Vol. 4, No. 10, pp. 447-459, 2010.
Ahmadi Hadi, Eghlidos Taraneh, Heuristic Guess-and-Determine Attacks on Stream Ciphers, Journal of IET-Information Security, Vol.3, No.2, pp. 66-73, 2009.
Sobhi Afshar Ali Akbar, Eghlidos Taraneh, Aref Mohammad Reza, Efficient Secure Channel Coding based on Quasi-cyclic Low-density Parity-check Codes, Journal of IET-Communications, Vol.3, No. 2, pp. 279-292, 2009.
Lavasani Ahmad, Eghlidos Taraneh, Practical Next Bit Test for Evaluating Pseudorandom Sequences, Journal of Science and Technology, Scientia Iranica, Transaction ِD on Computer Science and Engineering and Electrical Engineering, Vol. 16, No. 1, pp. 19-33, June 2009.
Behnad Aydin, Eghlidos Taraneh, A New Publicly Verifiable Secret Sharing Scheme, Journal of Science and Technology, Scientia Iranica, Transaction on Computer Science and Electrical Engineering, Vol. 15, No. 2, pp. 246-251, April 2008.
Eghlidos Taraneh, Beutelspacher Albrecht, Sadeghiyan Babak, Strengthening DES and DES-like Cryptosystems against Differential Cryptanalysis Using Linear Codes, The mathematical Journal „Ratio Mathematica“, Italy, Vol.15, pp. 1-17, 2002.
Eghlidos Taraneh, Beutelspacher Albrecht, Sadeghiyan Babak, Improving the Resistance of DES and DES-like Cryptosystems against Differential Cryptanalysis, Mathematical Journal „Atti del Seminario Mathematico e Fisico dell’Universita di Modena“, Italy, pp. 147-169, 2001.
Eghlidos Taraneh, Vehicle System Dynamics, Journal of Science, University of Tehran, Vol. 1, Nr. 1, pp. 51-68, Spring 1996, International edition.
Conference Papers
Rahnama Abbas, Beheshti-Atashgah Mohammad, Eghlidos Taraneh, Aref Mohammad Reza, A Lightweight Anonymous Authentication Protocol For IoT Wireless Sensor Networks, 16th International ISC Conference on Information Security and Cryptology (ISCISC 2019), Aug. 28-29, 2019.Rahnama Abbas, Beheshti-Atashgah Mohammad, Eghlidos Taraneh, Aref Mohammad Reza, An Ultra-Lightweight RFID Mutual Authentication Protocol, 16th International ISC Conference on Information Security and Cryptology (ISCISC 2019), Aug. 28-29, 2019.
Khodaiemehr Hassan, Eghlidos Taraneh, A Practical and Secure Lattice-based Scheme for Full-Duplex Gaussian One-Way Relay Channels, Proceedings of the 15th Int'l ISC Conf. on Information Security and Cryptology (ISCISC 2018), Aug. 28-29, 2018.
Karimani Saba, Naghdabadi Zahra, Eghlidos Taraneh, Aref Mohammad Reza, A New LWE-based Verifiable Threshold Secret Sharing Scheme, Proceedings of the 7th Workshop on Current Trends in Cryptology (CTCrypt), May 28-30, 2018, Suzdal, Russia.
Bagheri Khadijeh, Sadeghi Mohammad-Reza, Eghlidos Taraneh, Panario Daniel, On the Design of Joint Encryption-Coded Mudulation Scheme based on QC-LDPC Lattice-Codes, Invited talk at Iran Workshop on Communications and Information Theory (IWCIT), Apr. 25-26, 2018.
Bagheri Khadijeh, Sadeghi Mohammad-Reza, Eghlidos Taraneh, Panario Daniel, A Secret Key Encryption Scheme Based on 1-Level QC-LDPC Lattices, Proceedings of the 13th Int'l ISC Conf. on Information Security and Cryptology (ISCISC), 2016.
Yousefipour Vahid, Ameri Mohammad Hassan, Mohajeri Javad, Eghlidos Taraneh, A Secure Attribute-Based Keyword Search Scheme Against Keyword Guessing Attack, Proceedings of the 8th Int'l Symposium on Telecommunications (IST), 2016.
Yousefipour Vahid, Ameri Mohammad Hassan, Mohajeri Javad, Eghlidos Taraneh, Sieving Search Results for Attribute-Based Keyword Search in Cloud, Proceedings of the 3rd Int'l Conf. on Applied Research in Computer and Information Technology, 2016.
Babvey Pouria, Yajam Hossein, Eghlidos Taraneh, Security Analysis of SKI Protokol, Proceedings of the 11th ISCISC, 2014.
Asaad Saba, Amini Khorasgani Hamid Reza, Eghlidos Taraneh, Aref Mohammad Reza, Sharing Secret Using Lattice Construction, Proceedings of the Int'l Symp. on Telecommunications, 2014.
Amini Khorasgani Hamid Reza, Asaad Saba, Eghlidos Taraneh, Aref Mohammad Reza, A Lattice based Threshold Secret Sharing Scheme, Proceedings of the 11th ISCISC, 2014.
Nematinia Mohammad Sadegh, Eghlidos Taraneh, Improved Heuristic Guess and Determine Attack on SNOW 3G Stream Cipher, Proceedings of the Int'l Symp. on Telecommunications, 2014.
Hooshmand Reza, Kootchak Shooshtari Masoumeh, Eghlidos Taraneh, Aref Mohammad Reza, Reducing the Key length of McEliece Cryptosystem, Proceedings of the 11th ISCISC, 2014.
Hooshmand Reza, Eghlidos Taraneh, Aref Mohammad Reza, Joint Symmetric Key Encryption-Channel Coding Scheme based on Regular LDPC Codes, Proceedings of the 8th ISCISC, pp. 39-44, 2011 (in Persian).
Kazemi Ehsan, Fahimnia Behnam, Eghlidos Taraneh, Aref Mohammad Reza, Cryptanalysis of Hash Functions Using Coding Theoretic Approach, Proceedings of the 7th ISCISC, pp. 51-56, 2010.
Fahimnia Behnam, Kazemi Ehsan, Eghlidos Taraneh, Improvement of Heuristic Guess and Determine Attacks on Stream Ciphers, Proceedings of the 7th ISCISC, pp. 281-288, 2010 (in Persian).
Fatemi Mitra, Eghlidos Taraneh, Aref Mohammad Reza, A Multi-Stage Secret Sharing Scheme Using All-or-Nothing Transform Approach, Proceedings of the 7th Int’l Conf. on Information, Communications and Signal Processing (ICICS 2009), pp. 449-458, 2009.
Khosravirad Saeed R., Eghlidos Taraneh, Ghaemmaghami Shahrokh, Higher-Order Statistical Steganalysis of Random LSB Steganography, Proceedings of the 7th IEEE Int’l Conf. on Computer Systems and Applications (AICCSA’09), Morocco, pp. 629-632, May 2009.
Sobhi Afshar Ali Akbar, Sharifi Alireza, Eghlidos Taraneh, On the Security and Efficiency of Secure Channel Coding Schemes based on Punctured Codes, Int’l Conf. on Security and Management- Special Track on Applied Cryptography and Network Security (SAM-STACNS’09), USA, accepted as a regular research paper.
Ehdaie Mohammad, Eghlidos Taraneh, Aref Mohammad Reza, A Novel Secret Sharing Scheme from Audio Perspective, Int’l. Symp. On Telecommunications (IST2008), pp. Aug. 27-28, 2008, Tehran, Iran, accepted as a regular research paper.
Bahrak Behnam, Eghlidos Taraneh, Aref Mohammad Reza, Impossible Differential Cryptanalysis of Safer++, WORLDCOMP 2008, Workshop on Security and Management (SAM’08), pp. July 14-17, Las Vegas, USA.
Ehdaie Mohammad, Eghlidos Taraneh, Aref Mohammad Reza, Some New Issues on Secret Sharing Schemes, Int’l Conference on Telecommunications (ICT’ 08), pp. June 16-19, 2008, St. Petersburg, Russia.
Sharifi Alireza, Eghlidos Taraneh, Aref Mohammad Reza, An Improved Method of Computing Gröbner Bases from Algebraic Cryptanalytic Perspective, Proc. of the 5rd Iranian Society of Cryptology Conference (ISCC 2008), pp. 22-28, Oct. 7-8, 2008, Tehran, Iran.
Bahrak Behnam, Eghlidos Taraneh, Aref Mohammad Reza, An Improved Impossible Differential Attack on Crypto-Algorithm Crypton, Proc. of the 5rd Iranian Society of Cryptology Conference (ISCC 2008), pp. 89-95, Oct. 7-9, 2008, (in Persian),Tehran, Iran.
Sobhi Afshar Ali Akbar, Eghlidos Taraneh, Aref Mohammad Reza, A McEliece-like Symmetric Key Cryptosystem based on Quasi-Cyclic Low-Density Parity-Check Codes, Western European Workshop on Research in Cryptography (WEWoRC2007), Conference Record, pp.55-60, Ruhr Universität, Bochum, Germany, July 4-6, 2007.
Ehdaie Mohammad, Eghlidos Taraneh, Aref Mohammad Reza, A New Threshold Audio Secret Sharing Scheme, WEWoRC2007, Conference Record, pp.119-123, Ruhr Universität, Bochum, Germany, July 4-6, 2007.
Tayarani Najaran Mahdi, Eghlidos Taraneh, Aref Mohammad Reza, Design Criteria for Key Mixture Functions of Block Ciphers, WEWoRC 2007, Conference Record, pp.157-162, Ruhr Universität, Bochum, Germany, July 4-6, 2007.
Tayarani Najaran Mahdi, Eghlidos Taraneh, Aref Mohammad Reza, New Key Schedule Prototype with Provable Security, WEWoRC 2007, Conference Record, pp.163-165, Ruhr Universität, Bochum, Germany, July 4-6, 2007.
Behnad Aydin and Eghlidos Taraneh, Cheating Tolerant Threshold Secret Sharing Using List Decoding Method, Proc. of the 15th ICEE 2007, Iran Telecommunication Research Center, Tehran, Iran, (in Persian).
Tayarani Najaran Mahdi, Eghlidos Taraneh, Aref Mohammad Reza, On the Design of One-Way Key Schedule Algorithms for Block Ciphers, Proc. of the 15th ICEE2007, Iran Telecommunication Research Center, Tehran, Iran.
Esmaeili Yaser, Eghlidos Taraneh, Algebraic Cryptanalysis of Kahkeshan Block Cipher, 11th Int’l CSI Computer Conference (CSICC’2006), IPM, Jan. 24-26, 2006, School of Computer Science, Tehran, Iran.
Ahmadi Hadi, Eghlidos Taraneh, Khazaei Shahram, Guess and Determine Attacks against SOSEMANUK Stream Cipher, SASC 2006- Stream Cipher Revisited, Special Workshop hosted by the ECRYPT Network of Excellence, Leuven, Belgium, Feb. 2-3, 2006.
Sunoo Y.,Saito T.,Shigeri M., Suzaki T., Ahmadi H. Eghlidos T., Khazaei S., Evaluation of SOSEMANUK with regard to Guess and Determine Attack, SASC 2006- Stream Cipher Revisited, Special Workshop hosted by the ECRYPT Network of Excellence, Leuven, Belgium, Feb. 2-3, 2006.
Ahmadi Hadi, Eghlidos Taraneh, Advanced Guess and Determine Attacks on Stream Ciphers, International Symposium on Telecommunications (IST 2005), pp. 87-91, Sept. 10-12, 2005, Shiraz, Iran.
Esmaeili Yaser, Eghlidos Taraneh, An Improvement in Algebraic Cryptanalysis of Serpent, Proc. of the 3rd Iranian Society of Cryptology Conference (ISCC 2005), Sept. 7-8, 2005, pp. 55-64, (in Persian), Tehran Iran.
Ahmadi Hadi, Eghlidos Taraneh, A New Scheme for Guess and Determine Attack on TIPSY, Proc. of the 3rd Iranian Society of Cryptology Conference (ISCC 2005), Sept. 7-8, 2005, pp. 1-8, (in Persian), Tehran Iran.
Hosseini Lavasani Seyyed Ahmad, Eghlidos Taraneh, Modification of Practical Next Bit Test for Evaluation of Pseudo-random Strings, Proc. of the 9th Annual CSI Computer Conference (CSICC’2004), Sharif Univ. of Technology, Tehran, Iran, pp. 595-605, Feb. 17-19, 2004, (in Persian).
Abadi Mehdi, Ghaemi Bafghi Abbas, Sadeghiyan Babak, Eghlidos Taraneh, Differential Characteristic for Cryptanalysis of Serpent Using Genetic Algorithms, Proc. of the 9th Annual CSI Computer Conference (CSICC’2004), Sharif Univ. of Technology, Feb. 17-19, 2004, pp. 328-336, (in Persian), Tehran, Iran.
Sadeghiyan Babak, Eghlidos Taraneh, Mohajeri Javad, Differential Cryptanalysis of a DES-like Cryptosystem, Proc. of the 2nd Annual CSI Computer Conference (CSICC’1996), Amir-Kabir University of Technology, Dec. 24-26, 1996, pp. 81-90, (in Persian),Tehran, Iran.
Eghlidos T. Chikowa P., Phillip D., Static Balance Optimization for Axial Flow Fans, Proc. of the 25th Annual Iranian Mathematics Conference, Sharif University of Technology, Tehran, Iran,1994.
Technical Reports
Eghlidos Taraneh, Yousefipour Vahid, Karimani Saba, Private Information Retrieval in cloud computing based on post-quantum cryptography, Technical Report, Electronics Research Institute, Sharif University of Technology, Tehran, Iran, 2019.Eghlidos Taraneh, Mafakheri Behnam, Yousefipour Vahid, Toluee Rahim, Evaluation of the Post-quantum PKE/KEM Schemes proposed to NIST for Standardization Process, Technical Report, Electronics Research Institute, Sharif University of Technology, Tehran, Iran, 2018.
Eghlidos Taraneh, Toluee Rahim, Mafakheri Behnam, Yousefipour Vahid, Lattice-based Functional Encryption for Cloud Computing, Technical Report, Electronics Research Institute, Sharif University of Technology, Tehran, Iran, 2017.
Eghlidos Taraneh, Pilaram Hossein, Toluee Rahim, On the Design of a Lattice based Verifiable Multi-Secret Sharing Scheme, Technical Report, Electronics Research Institute, Sharif University of Technology, Tehran, Iran, 2016.
Eghlidos Taraneh, Pilaram Hossein, Toluee Rahim, Efficient Lattice based Public Key Encryption Schemes, Technical Report, Electronics Research Institute, Sharif University of Technology, Tehran, Iran, 2015.
Eghlidos Taraneh, Pilaram Hossein, Toluee Rahim, Lattice based Fully Homomorphic Encryption in Cloud Computing, Technical Report, Electronics Research Institute, Sharif University of Technology, Tehran, Iran, 2014.
Eghlidos Taraneh, Ass'ad Saba, Amini Khorasgani Hamid Reza, Lattice-based Threshold Secret Sharing Scheme, Technical Report, Electronics Research Institute, Sharif University of Technology, Tehran, Iran, 2013.
Eghlidos Taraneh, Rezaei Arezou, A comparative Study of Lattice based Cryptography, Technical Report, Electronics Research Institute, Sharif University of Technology, Tehran, Iran, 2012.
Eghlidos Taraneh, Rezaei Arezou, Optimum Information rate for General Access Structures in Secret Sharing Schemes Using Geometric Methods, Technical Report, Research Proceedings, Electronics Research Institute, Sharif University of Technology, Tehran, Iran, 2011.
Eghlidos Taraneh, Daruki Akram, On the Security of the Reduced Round Salsa20 Stream Cipher from Viewpoints of Differential and Guess-and-Determine Attacks, Technical Report, Research Proceedings, Electronics Research Institute, Sharif University of Technology, Tehran, Iran, 2010.
Eghlidos Taraneh, Daruki Akram, An Inside to the Design Methods of the eSTREAM Candidates, Technical Report, Research Proceedings, Electronics Research Institute, Sharif Univ. of Technology, Tehran, Iran, 2009.
Eghlidos Taraneh, Sobhi Afshar Ali Akbar, A Survey on the Security and Efficiency of Joint Encryption-Channel Coding Schemes based on Capacity-Approaching Punctured Codes, Technical Report, Research Proceedings, Electronics Research Center, Sharif Univ. of Technology, Tehran, Iran, 2008.
Eghlidos Taraneh, Ghadermarzi Amir, Hosseini Lavasani Seyyed Ahmad, , Evaluating the Security of Elliptic Curves Based on Efficient Composite Binary Fields against Weil Descent Attack, Technical Report, Research Proceedings, Electronics Research Center, Sharif Univ. of Technology, Tehran, Iran, 2007.
Eghlidos Taraneh, A Study on Secure Distributed Computation and its Applications, Technical Report, Research Proceedings, Electronics Research Center, Sharif Univ. of Technology, Tehran, Iran, 2006.
Eghlidos Taraneh, Hosseini Lavasani Seyyed Ahmad, Searching for the Best Linear Approximation Using Heuristic Algorithms, Technical Report, Research Proceedings, Electronics Research Center, Sharif Univ. of Technology, Tehran, Iran, 2006.
Eghlidos Taraneh, Samarbakhsh Laleh, Hosseini Lavasani Seyyed Ahmad, Study on the Methods of Finding Secure and Efficient Elliptic Curves for Cryptographic Applications, Technical report, Research Proceedings, Electronics Research Center, Sharif Univ. of Technology, Tehran, Iran, 2005.
Eghlidos Taraneh, Hosseini Lavasani Seyyed Ahmad, A Supplementary NIST Statistical Software Development Tool for Evaluation of Pseudorandom Number Generators, Technical report, Research Proceedings, Electronics Research Center, Sharif Univ. of Technology, Tehran, Iran, 2005.
Eghlidos Taraneh, Khakparaghi Mehrdad, A Study on Secure Schemes for Secret Sharing and Key Distribution, Technical Report, Research Proceeding, Electronics Research Center, Sharif Univ. of Technology, Tehran, Iran, 2004.
Eghlidos Taraneh, Hosseini Lavasani Seyyed Ahmad, An Extension of the Next-Bit Test for Non-uniform Distribution, Technical Report, Research Proceeding, Electronics Research Center, Sharif Univ. of Technology, Tehran, Iran, 2004.
Presentations
Keynote Speaker at the 16th International ISC Conference on Information Security and Cryptology (ISCISC 2019), Aug. 28-29, 2019., Topic:"Cryptography in Quantum Era", Ferdowsi University of Mashhad, Mashhad, Iran, Aug. 28-29, 2019.Invited Talk under the topic “Design of a Joint Encryption-Error Correction Scheme based on Low- Density Parity- Check Codes”, on the occasion of the Year of Mathematics, University of Giessen, Giessen, Germany, Sept. 8, 2008.
Invited Talks under the topic “Selected Area in Cryptology” on the occasion of the so-called Mathematics week, University of Zanjan, Iran, Oct. 30, 2007.
Invited Talk under the topic “A Practical Test for Distinguishing Pseudorandom Sequences from Non-random Ones” Int'l Conference on Current Trends in Industrial and Applied Mathematics (ICCTIAM’07), Jan.16-18, 2007, M. S. University of Baroda, Vadodara, India.
Invited Speaker at the Workshop on “Application of Number Theory in Cryptology”, Isfahan Mathematics House, Isfahan, Iran, Feb. 2004.
Invited Talk under the Topic “Evaluating Pseudorandom Sequences” at the Summer School Cryptology, University of Giessen, Giessen, Germany, Oct. 4-8, 2004.
Giving a talk on “Cryptology from Art to Science” for high school students, Isfahan Mathematics House, Isfahan, Iran, Sept. 2003.
Invited Talk under the topic “What are the bases of cryptology?”, Combinatorics Seminar, Institute for Advanced Studies in Basic Sciences (IASBS), Zanjan, Iran, March 7-8, 2003.
Giving a talk in the frame of Dialogue of the Cultures, under the topic “Influence of Cultures and Religions on Science”, organized by the Faculty of Mathematics, Univ. of Kaiserslautern, Germany; Sponsored by the German Academic Exchange Service (DAAD), Oct. 27-31, 2002.
Invited Speaker for the high school students on the occasion of the so-called Mathematics week, “Some applications of Mathematics in daily life”, Tehran.
Invited Talk on “Differential Cryptanalysis of DES-like Cryptosystems”, Deutsche Telekom, Darmstadt, Germany. 1999.
Giving a talk in the area of Mathematical Modeling, titled “Static Balance Optimization for Axial Flow Fans”, 25th Annual Iranian Mathematics Conference (AIMC25), Sharif University of Technology, Tehran, Iran, March 28-31, 1994.
Last update: December 15, 2020