Zahra Ahmadian

Orcid: 0000-0001-9356-4064

According to our database1, Zahra Ahmadian authored at least 44 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
IoT-friendly, pre-computed and outsourced attribute based encryption.
Future Gener. Comput. Syst., January, 2024

Provably minimum data complexity integral distinguisher based on conventional division property.
J. Comput. Virol. Hacking Tech., 2024

Trustworthy Approaches to RSA: Efficient Exploitation Strategies Based on Common Modulus.
IACR Cryptol. ePrint Arch., 2024

Improved Differential Meet-In-The-Middle Cryptanalysis.
IACR Cryptol. ePrint Arch., 2024

Corrigendum to "IoT-friendly, pre-computed and outsourced attribute based encryption" [Future Generation Computer Systems (FGCS) volume 150 (2024) 115-126/ FGCS-D-23-00424].
Future Gener. Comput. Syst., 2024

2023
Fine-grained flexible access control: ciphertext policy attribute based encryption for arithmetic circuits.
J. Comput. Virol. Hacking Tech., November, 2023

Cryptanalysis and Improvement of a Flexible and Lightweight Group Authentication Scheme.
IACR Cryptol. ePrint Arch., 2023

IGD-ScoreChain: A Lightweight and Scalable Blockchain Based on Node Sharding for the Internet of Things.
IACR Cryptol. ePrint Arch., 2023

Beyond-Full-Round Integral Distinguisher of NIST Lightweight Cryptography Competition Finalist TinyJAMBU.
IACR Cryptol. ePrint Arch., 2023

Truncated Differential Attacks: New Insights and 10-round Attacks on QARMA.
IACR Cryptol. ePrint Arch., 2023

2022
Revisiting the Security and Efficiency of SP2DAS, 3PDA, and EPPA Smart Grid Security Protocols.
ISC Int. J. Inf. Secur., 2022

2021
Ciphertext Policy Attribute Based Encryption for Arithmetic circuits.
IACR Cryptol. ePrint Arch., 2021

Integral Analysis of Saturnin Using Bit-Based Division Property.
Proceedings of the 18th International ISC Conference on Information Security and Cryptology, 2021

2020
Security analysis of a dynamic threshold secret sharing scheme using linear subspace method.
Inf. Process. Lett., 2020

MILP-based automatic differential search for LEA and HIGHT block ciphers.
IET Inf. Secur., 2020

New Automatic Search Method for Truncated-Differential Characteristics Application to Midori, SKINNY and CRAFT.
Comput. J., 2020

2019
Biclique Cryptanalysis of Block Ciphers LBlock and TWINE-80 with Practical Data Complexity.
ISC Int. J. Inf. Secur., 2019

New Automatic search method for Truncated-differential characteristics: Application to Midori and SKINNY.
IACR Cryptol. ePrint Arch., 2019

Cryptanalysis of SP<sup>2</sup>DAS and 3PDA, Two Data Aggregation Schemes for Smart Grid.
Proceedings of the 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2019

2018
Linear Subspace Cryptanalysis of Harn's Secret Sharing-Based Group Authentication Scheme.
IEEE Trans. Inf. Forensics Secur., 2018

Improved impossible differential and biclique cryptanalysis of HIGHT.
Int. J. Commun. Syst., 2018

MILP-Based Automatic Differential Searches for LEA and HIGHT.
IACR Cryptol. ePrint Arch., 2018

2015
Biclique cryptanalysis of the full-round KLEIN block cipher.
IET Inf. Secur., 2015

Analysis and Enhancement of Desynchronization Attack on an Ultralightweight RFID Authentication Protocol.
IACR Cryptol. ePrint Arch., 2015

Automated Dynamic Cube Attack on Block Ciphers: Cryptanalysis of SIMON and KATAN.
IACR Cryptol. ePrint Arch., 2015

2014
Multiuser Two-Way Relaying Schemes for UWB Communication.
IEEE Trans. Wirel. Commun., 2014

Low-Data Complexity Biclique Cryptanalysis of Block Ciphers With Application to Piccolo and HIGHT.
IEEE Trans. Inf. Forensics Secur., 2014

Total break of Zorro using linear and differential attacks.
ISC Int. J. Inf. Secur., 2014

An Improved Truncated Di fferential Cryptanalysis of KLEIN.
IACR Cryptol. ePrint Arch., 2014

Multiuser Two-Way Filter-and-Forward Relaying for Ultra-Wideband Communications.
Proceedings of the IEEE 80th Vehicular Technology Conference, 2014

Cube and dynamic cube attacks on SIMON32/64.
Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014

Impossible differential cryptanalysis of Piccolo lightweight block cipher.
Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014

2013
Recursive Linear and Differential Cryptanalysis of Ultralightweight Authentication Protocols.
IEEE Trans. Inf. Forensics Secur., 2013

Robust Design of Widely Linear Pre-Equalization Filters for Pre-Rake UWB Systems.
IEEE Trans. Commun., 2013

Desynchronization attack on RAPP ultralightweight authentication protocol.
Inf. Process. Lett., 2013

Analysis and Improvement of the securing RFID systems conforming to EPC Class 1 Generation 2 standard.
IACR Cryptol. ePrint Arch., 2013

2012
Design of Pre-Rake DS-UWB Downlink with Pre-Equalization.
IEEE Trans. Commun., 2012

Robust pre-equalization for pre-rake UWB systems with spectral mask constraints.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2010
A practical distinguisher for the Shannon cipher.
J. Syst. Softw., 2010

Security enhancements against UMTS-GSM interworking attacks.
Comput. Networks, 2010

Design of Multiuser Pre-Rake Systems for Reliable Ultra-Wideband Communications.
Proceedings of IEEE International Conference on Communications, 2010

2009
Performance Analysis of the IEEE 802.15.4a UWB System.
IEEE Trans. Commun., 2009

New attacks on UMTS network access.
Proceedings of the 2009 Wireless Telecommunications Symposium, 2009

2008
Performance of concatenated coded IR-UWB in the presence of multiple-access interference.
Proceedings of the 42nd Asilomar Conference on Signals, Systems and Computers, 2008


  Loading...