Mohammad Dakhilalian

Orcid: 0000-0002-0706-4950

According to our database1, Mohammad Dakhilalian authored at least 38 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
ECKCI: An ECC-Based Authenticated Key Agreement Scheme Resistant to Key Compromise Impersonation Attack for TMIS.
ISC Int. J. Inf. Secur., July, 2024

A McEliece-type Cryptosystem using a Random Inverse Matrix and an Error Vector with Large Hamming Weight.
Proceedings of the 14th International Conference on Advanced Computer Information Technologies, 2024

2023
Feasibility Analysis for Sybil Attacks in Shard-Based Permissionless Blockchains.
Distributed Ledger Technol. Res. Pract., December, 2023

Security Analysis and Improvement of an Access Control Scheme for Wireless Body Area Networks.
ISC Int. J. Inf. Secur., October, 2023

A new code-based digital signature based on the McEliece cryptosystem.
IET Commun., June, 2023

ECCPWS: An ECC-based protocol for WBAN systems.
Comput. Networks, April, 2023

Fast and Efficient Code-Based Digital Signature with Dual Inverse Matrix.
IACR Cryptol. ePrint Arch., 2023

Efficient Code Based Cryptosystem with Dual Inverse Matrix.
IACR Cryptol. ePrint Arch., 2023

Post Quantum Code-Based Cryptosystems with Dual Inverse Matrix.
Proceedings of the 13th International Conference on Information Technology in Asia, 2023

2020
Efficient chameleon hash functions in the enhanced collision resistant model.
Inf. Sci., 2020

On the Feasibility of Sybil Attacks in Shard-Based Permissionless Blockchains.
CoRR, 2020

2019
Short tightly secure signatures for signing a vector of group elements: A new approach.
Theor. Comput. Sci., 2019

Universal designated verifier signature scheme with non-delegatability in the standard model.
Inf. Sci., 2019

Certificateless designated verifier signature revisited: achieving a concrete scheme in the standard model.
Int. J. Inf. Sec., 2019

Multi-designated verifiers signature schemes with threshold verifiability: generic pattern and a concrete scheme in the standard model.
IET Inf. Secur., 2019

Structure-Preserving Signatures on Equivalence Classes From Standard Assumptions.
IACR Cryptol. ePrint Arch., 2019

Efficient Certificateless Signcryption in the Standard Model: Revisiting Luo and Wan's Scheme from Wireless Personal Communications (2018).
Comput. J., 2019

Cryptanalysis of a Certificateless Signcryption Scheme.
Proceedings of the 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2019

2016
Biclique cryptanalysis of MIBS-80 and PRESENT-80 block ciphers.
Secur. Commun. Networks, 2016

2015
Efficient Recursive Diffusion Layers for Block Ciphers and Hash Functions.
J. Cryptol., 2015

Cryptanalysis of mCrypton-64.
Int. J. Commun. Syst., 2015

Biclique cryptanalysis of MIBS-80 and PRESENT-80.
IACR Cryptol. ePrint Arch., 2015

Non-isomorphic biclique cryptanalysis of full-round Crypton.
Comput. Stand. Interfaces, 2015

2014
On computational complexity of impossible differential cryptanalysis.
Inf. Process. Lett., 2014

New secure channel coding scheme based on randomly punctured quasi-cyclic-low density parity check codes.
IET Commun., 2014

A practical time complexity analysis of fuzzy rainbow tradeoff.
Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014

2013
Non-isomorphic Biclique Cryptanalysis and Its Application to Full-Round mCrypton.
IACR Cryptol. ePrint Arch., 2013

2012
Cryptanalysis of mCrypton - A lightweight block cipher for security of RFID tags and sensors.
Int. J. Commun. Syst., 2012

On construction of involutory MDS matrices from Vandermonde Matrices in GF(2 q ).
Des. Codes Cryptogr., 2012

Recursive Diffusion Layers for Block Ciphers and Hash Functions.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012

2011
Impossible Differential Attacks on 13-Round CLEFIA-128.
J. Comput. Sci. Technol., 2011

Perfect involutory diffusion layers based on invertibility of some linear functions.
IET Inf. Secur., 2011

Impossible differential cryptanalysis of reduced-round Camellia-256.
IET Inf. Secur., 2011

2010
An improved impossible differential cryptanalysis of Zodiac.
J. Syst. Softw., 2010

Cryptanalysis of Block Ciphers Using Almost-Impossible Differentials.
IACR Cryptol. ePrint Arch., 2010

New impossible differential attacks on reduced-round Crypton.
Comput. Stand. Interfaces, 2010

Improved Impossible Differential Cryptanalysis of 7-Round AES-128.
Proceedings of the Progress in Cryptology - INDOCRYPT 2010, 2010

2009
New Results on Impossible Differential Cryptanalysis of Reduced-Round Camellia-128.
Proceedings of the Selected Areas in Cryptography, 16th Annual International Workshop, 2009


  Loading...