Follow
Mohammad Dakhilalian
Mohammad Dakhilalian
Other namesSeyedMohammad Dakhilalian, SM Dakhilalian, Mohammad Dakhlalian
Isfahan University of Technology, Electrical and Computer Engineering (ECE)
Verified email at iut.ac.ir - Homepage
Title
Cited by
Cited by
Year
Improved impossible differential cryptanalysis of 7-round AES-128
H Mala, M Dakhilalian, V Rijmen, M Modarres-Hashemi
Progress in Cryptology-INDOCRYPT 2010: 11th International Conference on …, 2010
1662010
On construction of involutory MDS matrices from Vandermonde Matrices in GF(2 q )
M Sajadieh, M Dakhilalian, H Mala, B Omoomi
Designs, Codes and Cryptography 64, 287-308, 2012
1192012
Recursive diffusion layers for block ciphers and hash functions
M Sajadieh, M Dakhilalian, H Mala, P Sepehrdad
Fast Software Encryption: 19th International Workshop, FSE 2012, Washington …, 2012
1082012
Efficient chameleon hash functions in the enhanced collision resistant model
M Khalili, M Dakhilalian, W Susilo
Information Sciences 510, 155-164, 2020
492020
New results on impossible differential cryptanalysis of reduced–round Camellia–128
H Mala, M Shakiba, M Dakhilalian, G Bagherikaram
Selected Areas in Cryptography: 16th Annual International Workshop, SAC 2009 …, 2009
422009
Cryptanalysis of mCrypton—a lightweight block cipher for security of RFID tags and sensors
H Mala, M Dakhilalian, M Shakiba
International Journal of Communication Systems 25 (4), 415-426, 2012
412012
Feasibility analysis for sybil attacks in shard-based permissionless blockchains
T Rajabi, AA Khalil, MH Manshaei, MA Rahman, M Dakhilalian, ...
Distributed Ledger Technologies: Research and Practice 2 (4), 1-21, 2023
392023
Biclique cryptanalysis of MIBS‐80 and PRESENT‐80 block ciphers
MH Faghihi Sereshgi, M Dakhilalian, M Shakiba
Security and Communication Networks 9 (1), 27-33, 2016
332016
Impossible differential attacks on 13-round CLEFIA-128
H Mala, M Dakhilalian, M Shakiba
Journal of Computer Science and Technology 26, 744-750, 2011
312011
New secure channel coding scheme based on randomly punctured quasi‐cyclic‐low density parity check codes
M Esmaeili, M Dakhilalian, TA Gulliver
IET Communications 8 (14), 2556-2562, 2014
302014
Efficient recursive diffusion layers for block ciphers and hash functions
M Sajadieh, M Dakhilalian, H Mala, P Sepehrdad
Journal of Cryptology 28, 240-256, 2015
292015
Universal designated verifier signature scheme with non-delegatability in the standard model
P Rastegari, M Berenjkoub, M Dakhilalian, W Susilo
Information Sciences 479, 321-334, 2019
282019
Efficient Certificateless Signcryption in the standard model: Revisiting Luo and Wan’s scheme from wireless personal communications (2018)
MD Parvin Rastegari, Willy Susilo
The Computer Journal 62 (8), 1178-1193, 2019
262019
Certificateless designated verifier signature revisited: achieving a concrete scheme in the standard model
P Rastegari, W Susilo, M Dakhilalian
International Journal of Information Security 18, 619-635, 2019
252019
Structure-preserving signatures on equivalence classes from standard assumptions
M Khalili, D Slamanig, M Dakhilalian
Advances in Cryptology–ASIACRYPT 2019: 25th International Conference on the …, 2019
202019
Non-isomorphic biclique cryptanalysis and its application to full-round mCrypton
M Shakiba, M Dakhilalian, H Mala
Cryptology ePrint Archive, 2013
172013
New impossible differential attacks on reduced-round Crypton
H Mala, M Shakiba, M Dakhilalian
Computer Standards & Interfaces 32 (4), 222-227, 2010
162010
ECCPWS: An ECC-based protocol for WBAN systems
F Pirmoradian, M Safkhani, SM Dakhilalian
Computer Networks 224, 109598, 2023
122023
Impossible differential cryptanalysis of reduced–round Camellia–256
H Mala, M Dakhilalian, M Shakiba
IET information security 5 (3), 129-134, 2011
112011
A new code‐based digital signature based on the McEliece cryptosystem
F Haidary Makoui, TA Gulliver, M Dakhilalian
IET Communications 17 (10), 1199-1207, 2023
102023
The system can't perform the operation now. Try again later.
Articles 1–20