Volgen
hamid mala
hamid mala
Associate Professor of Computer Engineering, University of Isfahan
Geverifieerd e-mailadres voor eng.ui.ac.ir - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Improved impossible differential cryptanalysis of 7-round AES-128
H Mala, M Dakhilalian, V Rijmen, M Modarres-Hashemi
Progress in Cryptology-INDOCRYPT 2010: 11th International Conference on …, 2010
1612010
LACO: Lightweight three-factor authentication, access control and ownership transfer scheme for e-health systems in IoT
SF Aghili, H Mala, M Shojafar, P Peris-Lopez
future generation computer systems 96, 410-424, 2019
1522019
On construction of involutory MDS matrices from Vandermonde Matrices in GF(2 q )
M Sajadieh, M Dakhilalian, H Mala, B Omoomi
Designs, Codes and Cryptography 64, 287-308, 2012
1042012
Recursive diffusion layers for block ciphers and hash functions
M Sajadieh, M Dakhilalian, H Mala, P Sepehrdad
Fast Software Encryption: 19th International Workshop, FSE 2012, Washington …, 2012
1022012
SecLAP: Secure and lightweight RFID authentication protocol for Medical IoT
SF Aghili, H Mala, P Kaliyar, M Conti
Future Generation Computer Systems 101, 621-634, 2019
1002019
DoS, impersonation and de-synchronization attacks against an ultra-lightweight RFID mutual authentication protocol for IoT
SF Aghili, M Ashouri-Talouki, H Mala
The Journal of Supercomputing 74, 509-525, 2018
542018
A new lightweight authentication and key agreement protocol for Internet of Things
S Arasteh, SF Aghili, H Mala
2016 13th International Iranian society of cryptology conference on …, 2016
412016
New results on impossible differential cryptanalysis of reduced–round Camellia–128
H Mala, M Shakiba, M Dakhilalian, G Bagherikaram
Selected Areas in Cryptography: 16th Annual International Workshop, SAC 2009 …, 2009
412009
Cryptanalysis of mCrypton—A lightweight block cipher for security of RFID tags and sensors
H Mala, M Dakhilalian, M Shakiba
International Journal of Communication Systems 25 (4), 415-426, 2012
392012
Security analysis of an ultra‐lightweight RFID authentication protocol for m‐commerce
SF Aghili, H Mala
International Journal of Communication Systems 32 (3), e3837, 2019
302019
Impossible differential attacks on 13-round CLEFIA-128
H Mala, M Dakhilalian, M Shakiba
Journal of Computer Science and Technology 26, 744-750, 2011
302011
Efficient recursive diffusion layers for block ciphers and hash functions
M Sajadieh, M Dakhilalian, H Mala, P Sepehrdad
Journal of Cryptology 28, 240-256, 2015
262015
Multi-keyword ranked searchable encryption scheme with access control for cloud storage
M Zarezadeh, H Mala, M Ashouri-Talouki
Peer-to-Peer Networking and Applications 13 (1), 207-218, 2020
252020
Closed-loop and open-loop authentication protocols for blockchain-based IoT systems
SF Aghili, H Mala, C Schindelhauer, M Shojafar, R Tafazolli
Information processing & management 58 (4), 102568, 2021
212021
Biclique cryptanalysis of the block cipher SQUARE
H Mala
Cryptology ePrint Archive, 2011
182011
Non-isomorphic biclique cryptanalysis and its application to full-round mCrypton
M Shakiba, M Dakhilalian, H Mala
Cryptology ePrint Archive, 2013
172013
A new counting method to bound the number of active S-boxes in Rijndael and 3D
M Sajadieh, A Mirzaei, H Mala, V Rijmen
Designs, Codes and Cryptography 83, 327-343, 2017
152017
New impossible differential attacks on reduced-round Crypton
H Mala, M Shakiba, M Dakhilalian
Computer Standards & Interfaces 32 (4), 222-227, 2010
152010
Biclique‐based cryptanalysis of the block cipher SQUARE
H Mala
IET Information Security 8 (3), 207-212, 2014
122014
Pakit: Proactive authentication and key agreement protocol for internet of things
SF Aghili, H Mala, M Shojafar, M Conti
IEEE INFOCOM 2019-IEEE Conference on Computer Communications Workshops …, 2019
112019
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20