Follow
hamid mala
hamid mala
Associate Professor of Computer Engineering, University of Isfahan
Verified email at eng.ui.ac.ir - Homepage
Title
Cited by
Cited by
Year
Improved impossible differential cryptanalysis of 7-round AES-128
H Mala, M Dakhilalian, V Rijmen, M Modarres-Hashemi
Progress in Cryptology-INDOCRYPT 2010: 11th International Conference on …, 2010
1612010
LACO: Lightweight three-factor authentication, access control and ownership transfer scheme for e-health systems in IoT
SF Aghili, H Mala, M Shojafar, P Peris-Lopez
future generation computer systems 96, 410-424, 2019
1592019
On construction of involutory MDS matrices from Vandermonde Matrices in GF(2 q )
M Sajadieh, M Dakhilalian, H Mala, B Omoomi
Designs, Codes and Cryptography 64, 287-308, 2012
1182012
SecLAP: Secure and lightweight RFID authentication protocol for Medical IoT
SF Aghili, H Mala, P Kaliyar, M Conti
Future Generation Computer Systems 101, 621-634, 2019
1062019
Recursive diffusion layers for block ciphers and hash functions
M Sajadieh, M Dakhilalian, H Mala, P Sepehrdad
Fast Software Encryption: 19th International Workshop, FSE 2012, Washington …, 2012
1052012
DoS, impersonation and de-synchronization attacks against an ultra-lightweight RFID mutual authentication protocol for IoT
SF Aghili, M Ashouri-Talouki, H Mala
The Journal of Supercomputing 74, 509-525, 2018
542018
New results on impossible differential cryptanalysis of reduced–round Camellia–128
H Mala, M Shakiba, M Dakhilalian, G Bagherikaram
Selected Areas in Cryptography: 16th Annual International Workshop, SAC 2009 …, 2009
422009
A new lightweight authentication and key agreement protocol for Internet of Things
S Arasteh, SF Aghili, H Mala
2016 13th International Iranian society of cryptology conference on …, 2016
412016
Cryptanalysis of mCrypton—a lightweight block cipher for security of RFID tags and sensors
H Mala, M Dakhilalian, M Shakiba
International Journal of Communication Systems 25 (4), 415-426, 2012
402012
Security analysis of an ultra‐lightweight RFID authentication protocol for m‐commerce
SF Aghili, H Mala
International Journal of Communication Systems 32 (3), e3837, 2019
312019
Impossible differential attacks on 13-round CLEFIA-128
H Mala, M Dakhilalian, M Shakiba
Journal of Computer Science and Technology 26, 744-750, 2011
312011
Efficient recursive diffusion layers for block ciphers and hash functions
M Sajadieh, M Dakhilalian, H Mala, P Sepehrdad
Journal of Cryptology 28, 240-256, 2015
282015
Multi-keyword ranked searchable encryption scheme with access control for cloud storage
M Zarezadeh, H Mala, M Ashouri-Talouki
Peer-to-Peer Networking and Applications 13 (1), 207-218, 2020
242020
Closed-loop and open-loop authentication protocols for blockchain-based IoT systems
SF Aghili, H Mala, C Schindelhauer, M Shojafar, R Tafazolli
Information processing & management 58 (4), 102568, 2021
212021
Biclique cryptanalysis of the block cipher SQUARE
H Mala
Cryptology ePrint Archive, 2011
182011
Non-isomorphic biclique cryptanalysis and its application to full-round mCrypton
M Shakiba, M Dakhilalian, H Mala
Cryptology ePrint Archive, 2013
172013
A new counting method to bound the number of active S-boxes in Rijndael and 3D
M Sajadieh, A Mirzaei, H Mala, V Rijmen
Designs, Codes and Cryptography 83, 327-343, 2017
162017
New impossible differential attacks on reduced-round Crypton
H Mala, M Shakiba, M Dakhilalian
Computer Standards & Interfaces 32 (4), 222-227, 2010
162010
Securing heterogeneous wireless sensor networks: Breaking and fixing a three-factor authentication protocol
SF Aghili, H Mala, P Peris-Lopez
Sensors 18 (11), 3663, 2018
122018
Breaking a lightweight M2M authentication protocol for communications in IIoT environment
SF Aghili, H Mala
Cryptology ePrint Archive, 2018
122018
The system can't perform the operation now. Try again later.
Articles 1–20