Mahmoud Salmasizadeh
According to our database1,
Mahmoud Salmasizadeh
authored at least 103 papers
between 1995 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Two protocols for improving security during the authentication and key agreement procedure in the 3GPP networks.
Comput. Commun., November, 2023
ISC Int. J. Inf. Secur., 2023
2022
A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis.
Des. Codes Cryptogr., 2022
An Efficient and Physically Secure Privacy-Preserving Authentication Scheme for Vehicular Ad-hoc NETworks (VANETs).
IEEE Access, 2022
2021
Inf. Sci., 2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the 18th International ISC Conference on Information Security and Cryptology, 2021
2020
A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Cloud Storage.
IEEE Trans. Cloud Comput., 2020
GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication.
ISC Int. J. Inf. Secur., 2020
IACR Cryptol. ePrint Arch., 2020
CoRR, 2020
2018
IEEE Trans. Veh. Technol., 2018
Impossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher (Extended Version).
ISC Int. J. Inf. Secur., 2018
Inf. Sci., 2018
Int. J. Commun. Syst., 2018
Proceedings of the 9th International Symposium on Telecommunications, 2018
GSL-AKA: Group-based Secure Lightweight Authentication and Key Agreement Protocol for M2M Communication.
Proceedings of the 9th International Symposium on Telecommunications, 2018
2017
A new CPA resistant software implementation for symmetric ciphers with smoothed power consumption: SIMON case study.
ISC Int. J. Inf. Secur., 2017
ISC Int. J. Inf. Secur., 2017
Proceedings of the 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2017
Proceedings of the 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2017
Proceedings of the 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2017
2016
Secur. Commun. Networks, 2016
IACR Cryptol. ePrint Arch., 2016
Proxy-based Authentication Scheme for Vehicular Ad Hoc Networks: Security Analysis and an Efficient Scheme.
IACR Cryptol. ePrint Arch., 2016
Code-based Strong Designated Verifier Signatures: Security Analysis and a New Construction.
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Efficient and Provable Secure Anonymous Hierarchical Identity-based Broadcast Encryption (HIBBE) Scheme without Random Oracle.
IACR Cryptol. ePrint Arch., 2016
A new CPA resistant software implementation for symmetric ciphers with smoothed power consumption.
Proceedings of the 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology, 2016
2015
Secur. Commun. Networks, 2015
Identity-based proxy signatures: a generic construction and a concrete scheme from RSA.
Secur. Commun. Networks, 2015
ISC Int. J. Inf. Secur., 2015
Analysis and Enhancement of Desynchronization Attack on an Ultralightweight RFID Authentication Protocol.
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Comput. Stand. Interfaces, 2015
An Identity-Based Multi-Proxy Multi-Signature Scheme Without Bilinear Pairings and its Variants.
Comput. J., 2015
2014
ISC Int. J. Inf. Secur., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014
Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014
2013
Recursive Linear and Differential Cryptanalysis of Ultralightweight Authentication Protocols.
IEEE Trans. Inf. Forensics Secur., 2013
Introducing proxy zero-knowledge proof and utilization in anonymous credential systems.
Secur. Commun. Networks, 2013
Key Agreement over a Generalized Multiple Access Channel Using Noiseless and Noisy Feedback.
IEEE J. Sel. Areas Commun., 2013
ISC Int. J. Inf. Secur., 2013
Inf. Process. Lett., 2013
Proceedings of the 10th International ISC Conference on Information Security and Cryptology, 2013
Proceedings of the 10th International ISC Conference on Information Security and Cryptology, 2013
Proceedings of the 10th International ISC Conference on Information Security and Cryptology, 2013
Proceedings of the 10th International ISC Conference on Information Security and Cryptology, 2013
Non-Delegatable Strong Designated Verifier Signature Using a Trusted Third Party without Pairings.
Proceedings of the Eleventh Australasian Information Security Conference, 2013
2012
ISC Int. J. Inf. Secur., 2012
A Non-delegatable Identity-based Designated Verifier Signature Scheme without Bilinear Pairings.
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the 2012 International Symposium on Wireless Communication Systems (ISWCS), 2012
2011
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011
2010
IET Commun., 2010
Proceedings of the Information Security, 2010
Proceedings of the International Symposium on Information Theory and its Applications, 2010
Proceedings of the International Symposium on Information Theory and its Applications, 2010
2009
Integr., 2009
Comput. Electr. Eng., 2009
Proceedings of the Information Security Applications, 10th International Workshop, 2009
Proceedings of the 10th International Symposium on Quality of Electronic Design (ISQED 2009), 2009
2008
Comparison Based Semantic Security is Probabilistic Polynomial Time Equivalent to Indistinguishability.
Int. J. Netw. Secur., 2008
Int. J. Electron. Secur. Digit. Forensics, 2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the 2008 International Symposium on Low Power Electronics and Design, 2008
New Proxy Signature, Proxy Blind Signature and Blind Proxy Signature Based on the Okamoto Signature.
Proceedings of the 2008 International Conference on Security & Management, 2008
Security Modification for the Hwang-Wen-Hwang's E-voting Scheme.
Proceedings of the 2008 International Conference on Security & Management, 2008
On the Importance of the Number of Fanouts to Prevent the Glitches in DPA-Resistant Devices.
Proceedings of the Advances in Computer Science and Engineering, 2008
On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoqCode Hopping Scheme.
Proceedings of the Advances in Cryptology, 2008
2007
Proceedings of the Information Security and Cryptology, 2007
Proceedings of the Information and Communications Security, 9th International Conference, 2007
A New Public Key Encryption Scheme Equivalent to Factoring.
Proceedings of the 2007 International Conference on Security & Management, 2007
2006
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006
2005
On the Statistically Optimal Divide and Conquer Correlation Attack on the Shrinking Generator.
IACR Cryptol. ePrint Arch., 2005
Electron. Colloquium Comput. Complex., 2005
Electron. Colloquium Comput. Complex., 2005
Relations between semantic security and indistinguishability against cpa, non-adaptive cca and adaptive cca in comparison based framework
CoRR, 2005
2004
Proceedings of the Security in Communication Networks, 4th International Conference, 2004
2000
1999
1997
1995
Proceedings of the Cryptography: Policy and Algorithms, 1995