LACO: Lightweight three-factor authentication, access control and ownership transfer scheme for e-health systems in IoT SF Aghili, H Mala, M Shojafar, P Peris-Lopez future generation computer systems 96, 410-424, 2019 | 161 | 2019 |
Improved impossible differential cryptanalysis of 7-round AES-128 H Mala, M Dakhilalian, V Rijmen, M Modarres-Hashemi Progress in Cryptology-INDOCRYPT 2010: 11th International Conference on …, 2010 | 161 | 2010 |
On construction of involutory MDS matrices from Vandermonde Matrices in GF(2 q ) M Sajadieh, M Dakhilalian, H Mala, B Omoomi Designs, Codes and Cryptography 64, 287-308, 2012 | 118 | 2012 |
SecLAP: Secure and lightweight RFID authentication protocol for Medical IoT SF Aghili, H Mala, P Kaliyar, M Conti Future Generation Computer Systems 101, 621-634, 2019 | 108 | 2019 |
Recursive diffusion layers for block ciphers and hash functions M Sajadieh, M Dakhilalian, H Mala, P Sepehrdad Fast Software Encryption: 19th International Workshop, FSE 2012, Washington …, 2012 | 105 | 2012 |
DoS, impersonation and de-synchronization attacks against an ultra-lightweight RFID mutual authentication protocol for IoT SF Aghili, M Ashouri-Talouki, H Mala The Journal of Supercomputing 74, 509-525, 2018 | 54 | 2018 |
New results on impossible differential cryptanalysis of reduced–round Camellia–128 H Mala, M Shakiba, M Dakhilalian, G Bagherikaram Selected Areas in Cryptography: 16th Annual International Workshop, SAC 2009 …, 2009 | 42 | 2009 |
A new lightweight authentication and key agreement protocol for Internet of Things S Arasteh, SF Aghili, H Mala 2016 13th International Iranian society of cryptology conference on …, 2016 | 41 | 2016 |
Cryptanalysis of mCrypton—a lightweight block cipher for security of RFID tags and sensors H Mala, M Dakhilalian, M Shakiba International Journal of Communication Systems 25 (4), 415-426, 2012 | 41 | 2012 |
Security analysis of an ultra‐lightweight RFID authentication protocol for m‐commerce SF Aghili, H Mala International Journal of Communication Systems 32 (3), e3837, 2019 | 31 | 2019 |
Impossible differential attacks on 13-round CLEFIA-128 H Mala, M Dakhilalian, M Shakiba Journal of Computer Science and Technology 26, 744-750, 2011 | 31 | 2011 |
Efficient recursive diffusion layers for block ciphers and hash functions M Sajadieh, M Dakhilalian, H Mala, P Sepehrdad Journal of Cryptology 28, 240-256, 2015 | 29 | 2015 |
Multi-keyword ranked searchable encryption scheme with access control for cloud storage M Zarezadeh, H Mala, M Ashouri-Talouki Peer-to-Peer Networking and Applications 13 (1), 207-218, 2020 | 24 | 2020 |
Closed-loop and open-loop authentication protocols for blockchain-based IoT systems SF Aghili, H Mala, C Schindelhauer, M Shojafar, R Tafazolli Information processing & management 58 (4), 102568, 2021 | 21 | 2021 |
Biclique cryptanalysis of the block cipher SQUARE H Mala Cryptology ePrint Archive, 2011 | 18 | 2011 |
Non-isomorphic biclique cryptanalysis and its application to full-round mCrypton M Shakiba, M Dakhilalian, H Mala Cryptology ePrint Archive, 2013 | 17 | 2013 |
A new counting method to bound the number of active S-boxes in Rijndael and 3D M Sajadieh, A Mirzaei, H Mala, V Rijmen Designs, Codes and Cryptography 83, 327-343, 2017 | 16 | 2017 |
New impossible differential attacks on reduced-round Crypton H Mala, M Shakiba, M Dakhilalian Computer Standards & Interfaces 32 (4), 222-227, 2010 | 16 | 2010 |
Security analysis and strengthening of an RFID lightweight authentication protocol suitable for VANETs F Moradi, H Mala, BT Ladani Wireless Personal Communications 83, 2607-2621, 2015 | 13 | 2015 |
Securing heterogeneous wireless sensor networks: Breaking and fixing a three-factor authentication protocol SF Aghili, H Mala, P Peris-Lopez Sensors 18 (11), 3663, 2018 | 12 | 2018 |