Sigma protocol for faster proof of simultaneous homomorphism relations
Bagherpour, Bagher, Zaghian, Ali, Sajadieh, Mahdi
Published in IET information security (01.09.2019)
Published in IET information security (01.09.2019)
Get full text
Journal Article
A new counting method to bound the number of active S-boxes in Rijndael and 3D
Sajadieh, Mahdi, Mirzaei, Arash, Mala, Hamid, Rijmen, Vincent
Published in Designs, codes, and cryptography (01.05.2017)
Published in Designs, codes, and cryptography (01.05.2017)
Get full text
Journal Article
A Verifiable (k,n,m)-Threshold Multi-secret Sharing Scheme Based on NTRU Cryptosystem
Amroudi, Ali Nakhaei, Zaghain, Ali, Sajadieh, Mahdi
Published in Wireless personal communications (01.09.2017)
Published in Wireless personal communications (01.09.2017)
Get full text
Journal Article
On construction of involutory MDS matrices from Vandermonde Matrices in GF(2q)
Sajadieh, Mahdi, Dakhilalian, Mohammad, Mala, Hamid, Omoomi, Behnaz
Published in Designs, codes, and cryptography (01.09.2012)
Published in Designs, codes, and cryptography (01.09.2012)
Get full text
Journal Article
A new secret sharing scheme using rational interpolation
Amroudi, Ali Nakhaei, Zaghian, Ali, Sajadieh, Mahdi
Published in International journal of computer science and information security (01.06.2016)
Get full text
Published in International journal of computer science and information security (01.06.2016)
Journal Article