Improved impossible differential cryptanalysis of 7-round AES-128 H Mala, M Dakhilalian, V Rijmen, M Modarres-Hashemi Progress in Cryptology-INDOCRYPT 2010: 11th International Conference on …, 2010 | 161 | 2010 |
LACO: Lightweight three-factor authentication, access control and ownership transfer scheme for e-health systems in IoT SF Aghili, H Mala, M Shojafar, P Peris-Lopez future generation computer systems 96, 410-424, 2019 | 152 | 2019 |
On construction of involutory MDS matrices from Vandermonde Matrices in GF(2 q ) M Sajadieh, M Dakhilalian, H Mala, B Omoomi Designs, Codes and Cryptography 64, 287-308, 2012 | 103 | 2012 |
Recursive diffusion layers for block ciphers and hash functions M Sajadieh, M Dakhilalian, H Mala, P Sepehrdad Fast Software Encryption: 19th International Workshop, FSE 2012, Washington …, 2012 | 102 | 2012 |
SecLAP: Secure and lightweight RFID authentication protocol for Medical IoT SF Aghili, H Mala, P Kaliyar, M Conti Future Generation Computer Systems 101, 621-634, 2019 | 100 | 2019 |
DoS, impersonation and de-synchronization attacks against an ultra-lightweight RFID mutual authentication protocol for IoT SF Aghili, M Ashouri-Talouki, H Mala The Journal of Supercomputing 74, 509-525, 2018 | 54 | 2018 |
A new lightweight authentication and key agreement protocol for Internet of Things S Arasteh, SF Aghili, H Mala 2016 13th International Iranian society of cryptology conference on …, 2016 | 41 | 2016 |
New results on impossible differential cryptanalysis of reduced–round Camellia–128 H Mala, M Shakiba, M Dakhilalian, G Bagherikaram Selected Areas in Cryptography: 16th Annual International Workshop, SAC 2009 …, 2009 | 41 | 2009 |
Cryptanalysis of mCrypton—A lightweight block cipher for security of RFID tags and sensors H Mala, M Dakhilalian, M Shakiba International Journal of Communication Systems 25 (4), 415-426, 2012 | 39 | 2012 |
Security analysis of an ultra‐lightweight RFID authentication protocol for m‐commerce SF Aghili, H Mala International Journal of Communication Systems 32 (3), e3837, 2019 | 30 | 2019 |
Impossible differential attacks on 13-round CLEFIA-128 H Mala, M Dakhilalian, M Shakiba Journal of Computer Science and Technology 26, 744-750, 2011 | 30 | 2011 |
Efficient recursive diffusion layers for block ciphers and hash functions M Sajadieh, M Dakhilalian, H Mala, P Sepehrdad Journal of Cryptology 28, 240-256, 2015 | 26 | 2015 |
Multi-keyword ranked searchable encryption scheme with access control for cloud storage M Zarezadeh, H Mala, M Ashouri-Talouki Peer-to-Peer Networking and Applications 13 (1), 207-218, 2020 | 25 | 2020 |
Closed-loop and open-loop authentication protocols for blockchain-based IoT systems SF Aghili, H Mala, C Schindelhauer, M Shojafar, R Tafazolli Information processing & management 58 (4), 102568, 2021 | 21 | 2021 |
Biclique cryptanalysis of the block cipher SQUARE H Mala Cryptology ePrint Archive, 2011 | 18 | 2011 |
Non-isomorphic biclique cryptanalysis and its application to full-round mCrypton M Shakiba, M Dakhilalian, H Mala Cryptology ePrint Archive, 2013 | 17 | 2013 |
A new counting method to bound the number of active S-boxes in Rijndael and 3D M Sajadieh, A Mirzaei, H Mala, V Rijmen Designs, Codes and Cryptography 83, 327-343, 2017 | 15 | 2017 |
New impossible differential attacks on reduced-round Crypton H Mala, M Shakiba, M Dakhilalian Computer Standards & Interfaces 32 (4), 222-227, 2010 | 15 | 2010 |
Biclique‐based cryptanalysis of the block cipher SQUARE H Mala IET Information Security 8 (3), 207-212, 2014 | 12 | 2014 |
Pakit: Proactive authentication and key agreement protocol for internet of things SF Aghili, H Mala, M Shojafar, M Conti IEEE INFOCOM 2019-IEEE Conference on Computer Communications Workshops …, 2019 | 11 | 2019 |