Siavash Ahmadi

Orcid: 0000-0002-8801-337X

According to our database1, Siavash Ahmadi authored at least 13 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Integral Cryptanalysis of Round-Reduced Shadow-32 for IoT Nodes.
IEEE Internet Things J., March, 2024

2023
A Semi-Supervised IDS for Cyber-Physical Systems Using a Deep Learning Approach.
ISC Int. J. Inf. Secur., October, 2023

2020
Generalized Meet in the Middle Cryptanalysis of Block Ciphers With an Automated Search Algorithm.
IEEE Access, 2020

2019
Biclique Cryptanalysis of Block Ciphers LBlock and TWINE-80 with Practical Data Complexity.
ISC Int. J. Inf. Secur., 2019

New Fixed Point Attacks on GOST2 Block Cipher.
ISC Int. J. Inf. Secur., 2019

2018
Improved impossible differential and biclique cryptanalysis of HIGHT.
Int. J. Commun. Syst., 2018

2017
Ciphertext-only attack on d × d Hill in O(d13<sup>d</sup>).
Inf. Process. Lett., 2017

A New Approach to Key Schedule Designing.
Proceedings of the 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2017

Improved Fixed Point Attack on Gost2.
Proceedings of the 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2017

2016
Biclique cryptanalysis of Twine-128.
Proceedings of the 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology, 2016

Zero correlation linear attack on reduced round Piccolo-80.
Proceedings of the 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology, 2016

2014
Low-Data Complexity Biclique Cryptanalysis of Block Ciphers With Application to Piccolo and HIGHT.
IEEE Trans. Inf. Forensics Secur., 2014

Security analysis of CLEFIA-128.
Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014


  Loading...