Improved impossible differential cryptanalysis of 7-round AES-128 H Mala, M Dakhilalian, V Rijmen, M Modarres-Hashemi Progress in Cryptology-INDOCRYPT 2010: 11th International Conference on …, 2010 | 166 | 2010 |
On construction of involutory MDS matrices from Vandermonde Matrices in GF(2 q ) M Sajadieh, M Dakhilalian, H Mala, B Omoomi Designs, Codes and Cryptography 64, 287-308, 2012 | 119 | 2012 |
Recursive diffusion layers for block ciphers and hash functions M Sajadieh, M Dakhilalian, H Mala, P Sepehrdad Fast Software Encryption: 19th International Workshop, FSE 2012, Washington …, 2012 | 108 | 2012 |
Efficient chameleon hash functions in the enhanced collision resistant model M Khalili, M Dakhilalian, W Susilo Information Sciences 510, 155-164, 2020 | 49 | 2020 |
New results on impossible differential cryptanalysis of reduced–round Camellia–128 H Mala, M Shakiba, M Dakhilalian, G Bagherikaram Selected Areas in Cryptography: 16th Annual International Workshop, SAC 2009 …, 2009 | 42 | 2009 |
Cryptanalysis of mCrypton—a lightweight block cipher for security of RFID tags and sensors H Mala, M Dakhilalian, M Shakiba International Journal of Communication Systems 25 (4), 415-426, 2012 | 41 | 2012 |
Feasibility analysis for sybil attacks in shard-based permissionless blockchains T Rajabi, AA Khalil, MH Manshaei, MA Rahman, M Dakhilalian, ... Distributed Ledger Technologies: Research and Practice 2 (4), 1-21, 2023 | 39 | 2023 |
Biclique cryptanalysis of MIBS‐80 and PRESENT‐80 block ciphers MH Faghihi Sereshgi, M Dakhilalian, M Shakiba Security and Communication Networks 9 (1), 27-33, 2016 | 33 | 2016 |
Impossible differential attacks on 13-round CLEFIA-128 H Mala, M Dakhilalian, M Shakiba Journal of Computer Science and Technology 26, 744-750, 2011 | 31 | 2011 |
New secure channel coding scheme based on randomly punctured quasi‐cyclic‐low density parity check codes M Esmaeili, M Dakhilalian, TA Gulliver IET Communications 8 (14), 2556-2562, 2014 | 30 | 2014 |
Efficient recursive diffusion layers for block ciphers and hash functions M Sajadieh, M Dakhilalian, H Mala, P Sepehrdad Journal of Cryptology 28, 240-256, 2015 | 29 | 2015 |
Universal designated verifier signature scheme with non-delegatability in the standard model P Rastegari, M Berenjkoub, M Dakhilalian, W Susilo Information Sciences 479, 321-334, 2019 | 28 | 2019 |
Efficient Certificateless Signcryption in the standard model: Revisiting Luo and Wan’s scheme from wireless personal communications (2018) MD Parvin Rastegari, Willy Susilo The Computer Journal 62 (8), 1178-1193, 2019 | 26 | 2019 |
Certificateless designated verifier signature revisited: achieving a concrete scheme in the standard model P Rastegari, W Susilo, M Dakhilalian International Journal of Information Security 18, 619-635, 2019 | 25 | 2019 |
Structure-preserving signatures on equivalence classes from standard assumptions M Khalili, D Slamanig, M Dakhilalian Advances in Cryptology–ASIACRYPT 2019: 25th International Conference on the …, 2019 | 20 | 2019 |
Non-isomorphic biclique cryptanalysis and its application to full-round mCrypton M Shakiba, M Dakhilalian, H Mala Cryptology ePrint Archive, 2013 | 17 | 2013 |
New impossible differential attacks on reduced-round Crypton H Mala, M Shakiba, M Dakhilalian Computer Standards & Interfaces 32 (4), 222-227, 2010 | 16 | 2010 |
ECCPWS: An ECC-based protocol for WBAN systems F Pirmoradian, M Safkhani, SM Dakhilalian Computer Networks 224, 109598, 2023 | 12 | 2023 |
Impossible differential cryptanalysis of reduced–round Camellia–256 H Mala, M Dakhilalian, M Shakiba IET information security 5 (3), 129-134, 2011 | 11 | 2011 |
A new code‐based digital signature based on the McEliece cryptosystem F Haidary Makoui, TA Gulliver, M Dakhilalian IET Communications 17 (10), 1199-1207, 2023 | 10 | 2023 |