B.Sc , Computer Engineering , Sharif University of Technology , 1992 → 1996
MS , Computer Engineering , University of Tehran , 1996 → 1999
PhD , Computer Science , sherbrooke , 2004 → 2010


Creating Research Database under Network

Amin Rahati, - 2002

Vice Chancellor for Information Technology and Chief Information Officer

2020/01/21 - Continues

1 - , Amin Rahati, An improved artificial bee colony algorithm and its application to reliability optimization problems, APPLIED SOFT COMPUTING. (2018) 62 736-767
2 - Hojat Rakhshani, Amin Rahati, Snap-drift cuckoo search: A novel cuckoo search optimization algorithm, APPLIED SOFT COMPUTING. (2017) 52 771-794
3 - Hojat Rakhshani, Amin Rahati, Intelligent Multiple Search Strategy Cuckoo Algorithm for Numerical and Engineering Optimization Problems, ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING. (2017) 42 567-593
4 - Hojat Rakhshani, Effat Dehghanian, Amin Rahati, Hierarchy cuckoo search algorithm for parameter estimation in biological systems, CHEMOMETRICS AND INTELLIGENT LABORATORY SYSTEMS. (2016) 159 97-107
5 - , , Amin Rahati, روشي جديد براي بهبود هوشمند يادگيري الكترونيكي, فناوري آموزش. (2015) 9 181-192
6 - , Amin Rahati, كاربرد درس الكترونيكي سازگار با سبكهاي يادگيري دانش آموزان با الگوي ممتيك, فناوري آموزش. (2014) 9 91-104

Introducing a panel for early detection of lung adenocarcinoma by integration of genomics, epigenomics, transcriptomics and proteomics

Haghjoo Niloofar، Moeini Ali، Masoudi-nejad Ali (2019)., EXPERIMENTAL AND MOLECULAR PATHOLOGY, 1(1).

Duplicated Replay Buffer for Asynchronous Deep Deterministic Policy Gradient

Seyed Motehayeri Seyed Mohammad، Baghi Vahid، Maani Miyandoab Ehsan، Moeini Ali (2021)., 2021 26th International Computer Conference, Computer Society of Iran (CSICC), Tehran, Iran, 3-4 March, Tehran, Iran.

On the optimization of Hadoop MapReduce default job scheduling through dynamic job prioritization
Lattices in Cryptography

Integer lattices have found many applications in cryptography: in proofs of security, in attacks, and in constructing cryptosystems.


Can multi-user services operate without sending all user data to the cloud in the clear? Some examples include private location-based services, private computation of aggregate statistics, private recommendation systems, private queries to a database, and anonymous messaging.

Crypto currencies and blockchains

We are developing cryptographic tools with applications to crypto currencies and blockchains. We are also teaching a course on the topic, CS251.

Pairings-Based Cryptography

Cryptographic pairings have numerous applications to cryptography, including everything from identity-based encryption and short digital signatures to broadcast encryption and search-friendly encryption.

Computer and Web Security

Computer security research explores architectures that improve software security and enhances our understanding of attack strategies. Our research covers SSL and TLS, Web security, and areas of operating systems security.

Bulletproofs: Short Proofs for Confidential Transactions and More
Show more
Prio: Private, Robust, and Scalable Computation of Aggregate Statistics
Show more
Order-Revealing Encryption
Show more
Balloon Hashing: Memory-Hard Password Hashing
Show more
PowerSpy: Location Tracking using Mobile Device Power Analysis
Show more
Riposte: An Anonymous Messaging System Handling Millions of Users
Show more
Gyrophone: Recognizing Speech from Gyroscope Signals
Show more
PORTIA: Managing sensitive information in a wired world
Show more
Location privacy
Show more
Identity Based Encryption email system (IBE secure email)

Show more. email system (IBE secure email)

The ITTC project: Intrusion tolerance via threshold cryptography
Show more: Intrusion tolerance via threshold cryptography