A new code‐based digital signature based on the McEliece cryptosystem
Haidary Makoui, Farshid, Gulliver, Thomas Aaron, Dakhilalian, Mohammad
Published in IET communications (01.06.2023)
Published in IET communications (01.06.2023)
Get full text
Journal Article
Impossible Differential Attacks on 13-Round CLEFIA-128
Mala, Hamid, Dakhilalian, Mohammad, Shakiba, Mohsen
Published in Journal of computer science and technology (01.07.2011)
Published in Journal of computer science and technology (01.07.2011)
Get full text
Journal Article
Efficient chameleon hash functions in the enhanced collision resistant model
Khalili, Mojtaba, Dakhilalian, Mohammad, Susilo, Willy
Published in Information sciences (01.02.2020)
Published in Information sciences (01.02.2020)
Get full text
Journal Article
Universal designated verifier signature scheme with non-delegatability in the standard model
Rastegari, Parvin, Berenjkoub, Mehdi, Dakhilalian, Mohammad, Susilo, Willy
Published in Information sciences (01.04.2019)
Published in Information sciences (01.04.2019)
Get full text
Journal Article
Short tightly secure signatures for signing a vector of group elements: A new approach
Khalili, Mojtaba, Dakhilalian, Mohammad, Ràfols, Carla
Published in Theoretical computer science (26.11.2019)
Published in Theoretical computer science (26.11.2019)
Get full text
Journal Article
Non-isomorphic biclique cryptanalysis of full-round Crypton
Shakiba, Mohsen, Dakhilalian, Mohammad, Mala, Hamid
Published in Computer standards and interfaces (01.09.2015)
Published in Computer standards and interfaces (01.09.2015)
Get full text
Journal Article
On construction of involutory MDS matrices from Vandermonde Matrices in GF(2q)
Sajadieh, Mahdi, Dakhilalian, Mohammad, Mala, Hamid, Omoomi, Behnaz
Published in Designs, codes, and cryptography (01.09.2012)
Published in Designs, codes, and cryptography (01.09.2012)
Get full text
Journal Article
On computational complexity of impossible differential cryptanalysis
Shakiba, Mohsen, Dakhilalian, Mohammad, Mala, Hamid
Published in Information processing letters (01.05.2014)
Published in Information processing letters (01.05.2014)
Get full text
Journal Article
Cryptanalysis of mCrypton-64
Shakiba, Mohsen, Dakhilalian, Mohammad, Mala, Hamid
Published in International journal of communication systems (25.05.2015)
Published in International journal of communication systems (25.05.2015)
Get full text
Journal Article
New secure channel coding scheme based on randomly punctured quasi-cyclic-low density parity check codes
Esmaeili, Mostafa, Dakhilalian, Mohammad, Gulliver, T. Aaron
Published in IET communications (01.09.2014)
Published in IET communications (01.09.2014)
Get full text
Journal Article
Biclique cryptanalysis of MIBS‐80 and PRESENT‐80 block ciphers
Faghihi Sereshgi, Mohammad Hossein, Dakhilalian, Mohammad, Shakiba, Mohsen
Published in Security and communication networks (10.01.2016)
Published in Security and communication networks (10.01.2016)
Get full text
Journal Article
ECCPWS: An ECC-based protocol for WBAN systems
Pirmoradian, Fatemeh, Safkhani, Masoumeh, Dakhilalian, Seyed Mohammad
Published in Computer networks (Amsterdam, Netherlands : 1999) (01.04.2023)
Published in Computer networks (Amsterdam, Netherlands : 1999) (01.04.2023)
Get full text
Journal Article
An improved impossible differential cryptanalysis of Zodiac
Shakiba, Mohsen, Dakhilalian, Mohammad, Mala, Hamid
Published in The Journal of systems and software (01.04.2010)
Published in The Journal of systems and software (01.04.2010)
Get full text
Journal Article
New impossible differential attacks on reduced-round Crypton
Mala, Hamid, Shakiba, Mohsen, Dakhilalian, Mohammad
Published in Computer standards and interfaces (01.06.2010)
Published in Computer standards and interfaces (01.06.2010)
Get full text
Journal Article