Multiple classifier system for EEG signal classification with application to brain–computer interfaces A Ahangi, M Karamnejad, N Mohammadi, R Ebrahimpour, N Bagheri Neural Computing and Applications 23 (5), 1319-1327, 2013 | 107 | 2013 |
Cryptanalysis of reduced round SKINNY block cipher S Sadeghi, T Mohammadi, N Bagheri IACR Transactions on Symmetric Cryptology, 124-162, 2018 | 65 | 2018 |
New differential fault analysis on PRESENT N Bagheri, R Ebrahimpour, N Ghaedi EURASIP Journal on Advances in Signal Processing 2013, 1-10, 2013 | 65 | 2013 |
ECCbAP: A secure ECC-based authentication protocol for IoT edge devices S Rostampour, M Safkhani, Y Bendavid, N Bagheri Pervasive and Mobile Computing 67, 101194, 2020 | 63 | 2020 |
Passive secret disclosure attack on an ultralightweight authentication protocol for internet of things M Safkhani, N Bagheri The Journal of Supercomputing 73 (8), 3579-3585, 2017 | 57 | 2017 |
Linear cryptanalysis of reduced-round SIMECK variants N Bagheri Progress in Cryptology--INDOCRYPT 2015: 16th International Conference on …, 2015 | 52 | 2015 |
IoT in medical & pharmaceutical: Designing lightweight RFID security protocols for ensuring supply chain integrity M Safkhani, S Rostampour, Y Bendavid, N Bagheri Computer Networks 181, 107558, 2020 | 51 | 2020 |
Cryptanalysis of the Cho et al. protocol: A hash-based RFID tag mutual authentication protocol M Safkhani, P Peris-Lopez, JC Hernandez-Castro, N Bagheri Journal of Computational and Applied Mathematics 259, 571-577, 2014 | 50 | 2014 |
Cryptanalysis of SIMON variants with connections J Alizadeh, HA Alkhzaimi, MR Aref, N Bagheri, P Gauravaram, A Kumar, ... International Workshop on Radio Frequency Identification: Security and …, 2014 | 49 | 2014 |
Improved linear cryptanalysis of reduced-round SIMON-32 and SIMON-48 MA Abdelraheem, J Alizadeh, HA Alkhzaimi, MR Aref, N Bagheri, ... Progress in Cryptology--INDOCRYPT 2015: 16th International Conference on …, 2015 | 47 | 2015 |
Generalized Desynchronization Attack on UMAP: Application to RCIA, KMAP, SLAP and SASI protocols M Safkhani, N Bagheri Cryptology ePrint Archive, 2016 | 46 | 2016 |
Improved rectangle attacks on SKINNY and CRAFT H Hadipour, N Bagheri, L Song IACR Transactions on Symmetric Cryptology, 140-198, 2021 | 45 | 2021 |
Iot device security: Challenging “a lightweight rfid mutual authentication protocol based on physical unclonable function” Y Bendavid, N Bagheri, M Safkhani, S Rostampour Sensors 18 (12), 4444, 2018 | 45 | 2018 |
Linear cryptanalysis of round reduced SIMON J Alizadeh, N Bagheri, P Gauravaram, A Kumar, SK Sanadhya Cryptology ePrint Archive, 2013 | 42 | 2013 |
Differential fault analysis of SHA-3 N Bagheri, N Ghaedi, SK Sanadhya Progress in Cryptology--INDOCRYPT 2015: 16th International Conference on …, 2015 | 41 | 2015 |
Security analysis of LMAP++, an RFID authentication protocol M Safkhani, N Bagheri, M Naderi, SK Sanadhya Internet Technology and Secured Transactions (ICITST), 2011 International …, 2011 | 41 | 2011 |
Invariant object recognition is a personalized selection of invariant features in humans, not simply explained by hierarchical feed-forward vision models H Karimi-Rouzbahani, N Bagheri, R Ebrahimpour Scientific reports 7 (1), 14402, 2017 | 38 | 2017 |
Weaknesses in a new ultralightweight RFID authentication protocol with permutation—RAPP N Bagheri, M Safkhani, P Peris‐Lopez, JE Tapiador Security and Communication Networks 7 (6), 945-949, 2014 | 38* | 2014 |
Improved linear cryptanalysis of reduced-round SIMON MA Abdelraheem, J Alizadeh, HA Alkhzaimi, MR Aref, N Bagheri, ... Cryptology ePrint Archive, 2014 | 38* | 2014 |
RSEAP2: An enhanced version of RSEAP, an RFID based authentication protocol for vehicular cloud computing M Safkhani, C Camara, P Peris-Lopez, N Bagheri Vehicular Communications 28, 100311, 2021 | 35 | 2021 |