A key-policy attribute-based temporary keyword search scheme for secure cloud storage MH Ameri, M Delavar, J Mohajeri, M Salmasizadeh IEEE Transactions on Cloud Computing 8 (3), 660-671, 2018 | 67 | 2018 |
PUF‐based solutions for secure communications in Advanced Metering Infrastructure (AMI) M Delavar, S Mirzakuchaki, MH Ameri, J Mohajeri International Journal of Communication Systems 30 (9), e3195, 2017 | 41 | 2017 |
A Fully Distributed Hierarchical Attribute-Based Encryption Scheme XL M. Ali, J. Mohajeri, M. R. Sadeghi Theoretical Computer Science 815, 25-46, 2020 | 40 | 2020 |
Low-data complexity biclique cryptanalysis of block ciphers with application to piccolo and hight S Ahmadi, Z Ahmadian, J Mohajeri, MR Aref IEEE Transactions on Information Forensics and Security 9 (10), 1641-1652, 2014 | 40 | 2014 |
A provably secure short transitive signature scheme from bilinear group pairs SF Shahandashti, M Salmasizadeh, J Mohajeri International Conference on Security in Communication Networks, 60-76, 2004 | 34 | 2004 |
Secure untraceable off-line electronic cash system Y Baseri, B Takhtaei, J Mohajeri Scientia Iranica 20 (3), 637-646, 2013 | 30 | 2013 |
A ring oscillator-based PUF with enhanced challenge-response pairs M Delavar, S Mirzakuchaki, J Mohajeri Canadian Journal of Electrical and Computer Engineering 39 (2), 174-180, 2016 | 29 | 2016 |
Attribute-based fine-grained access control for outscored private set intersection computation M Ali, J Mohajeri, MR Sadeghi, X Liu Information Sciences 536, 222-243, 2020 | 26 | 2020 |
Impossible differential cryptanalysis of Piccolo lightweight block cipher SA Azimi, Z Ahmadian, J Mohajeri, MR Aref 2014 11th International ISC Conference on Information Security and …, 2014 | 26 | 2014 |
GSL-AKA: Group-based secure lightweight authentication and key agreement protocol for M2M communication MM Modiri, J Mohajeri, M Salmasizadeh 2018 9th International Symposium on Telecommunications (IST), 275-280, 2018 | 22 | 2018 |
Efficient Scalable Multi-Party Private Set Intersection Using Oblivious PRF A Kavousi, J Mohajeri, M Salmasizadeh International Workshop on Security and Trust Management STM 2021, Roman R …, 2021 | 20 | 2021 |
Improved Secure Efficient Delegated Private Set Intersection A Kavousi, J Mohajeri, M Salmasizadeh arXiv preprint arXiv:2004.03976- 28th Iranian Conference on Electrical …, 2020 | 15 | 2020 |
Provably secure and efficient PUF‐based broadcast authentication schemes for smart grid applications JM MH Ameri, M Delavar International Journal of Communication Systems, 2019 | 15 | 2019 |
An efficient and physically secure privacy-preserving authentication scheme for Vehicular Ad-hoc NETworks (VANETs) A Aghabagherloo, M Delavar, J Mohajeri, M Salmasizadeh, B Preneel Ieee Access 10, 93831-93844, 2022 | 13 | 2022 |
An efficient and secure data sharing in Smart Grid: Ciphertext-policy attribute-based signcryption SM Sedaghat, MH Ameri, J Mohajeri, MR Aref 2017 Iranian Conference on Electrical Engineering (ICEE), 2003-2008, 2017 | 12 | 2017 |
On the security of an efficient anonymous authentication with conditional privacy-preserving scheme for vehicular ad hoc networks M Kazemi, M Delavar, J Mohajeri, M Salmasizadeh Electrical Engineering (ICEE), Iranian Conference on, 510-514, 2018 | 11 | 2018 |
Guess and determine attack on Trivium family N Rohani, Z Noferesti, J Mohajeri, MR Aref 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing …, 2010 | 11 | 2010 |
A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis VR S. A. Azimi, A. Ranea, M. Salmasizadeh, J. Mohajeri, M. R. Aref Designs, Codes and Cryptography, 2022 | 10 | 2022 |
On the security of an ECC based RFID authentication protocol P Babaheidarian, M Delavar, J Mohajeri | 10* | |
A novel group-based secure lightweight authentication and key agreement protocol for machine-type communication MM Modiri, J Mohajeri, M Salmasizadeh Scientia Iranica 29 (6), 3273-3287, 2022 | 9 | 2022 |