Zahra Ahmadian
Orcid: 0000-0001-9356-4064
According to our database1,
Zahra Ahmadian
authored at least 44 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Future Gener. Comput. Syst., January, 2024
Provably minimum data complexity integral distinguisher based on conventional division property.
J. Comput. Virol. Hacking Tech., 2024
Trustworthy Approaches to RSA: Efficient Exploitation Strategies Based on Common Modulus.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Corrigendum to "IoT-friendly, pre-computed and outsourced attribute based encryption" [Future Generation Computer Systems (FGCS) volume 150 (2024) 115-126/ FGCS-D-23-00424].
Future Gener. Comput. Syst., 2024
2023
Fine-grained flexible access control: ciphertext policy attribute based encryption for arithmetic circuits.
J. Comput. Virol. Hacking Tech., November, 2023
Cryptanalysis and Improvement of a Flexible and Lightweight Group Authentication Scheme.
IACR Cryptol. ePrint Arch., 2023
IGD-ScoreChain: A Lightweight and Scalable Blockchain Based on Node Sharding for the Internet of Things.
IACR Cryptol. ePrint Arch., 2023
Beyond-Full-Round Integral Distinguisher of NIST Lightweight Cryptography Competition Finalist TinyJAMBU.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
2022
Revisiting the Security and Efficiency of SP2DAS, 3PDA, and EPPA Smart Grid Security Protocols.
ISC Int. J. Inf. Secur., 2022
2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the 18th International ISC Conference on Information Security and Cryptology, 2021
2020
Security analysis of a dynamic threshold secret sharing scheme using linear subspace method.
Inf. Process. Lett., 2020
IET Inf. Secur., 2020
New Automatic Search Method for Truncated-Differential Characteristics Application to Midori, SKINNY and CRAFT.
Comput. J., 2020
2019
Biclique Cryptanalysis of Block Ciphers LBlock and TWINE-80 with Practical Data Complexity.
ISC Int. J. Inf. Secur., 2019
New Automatic search method for Truncated-differential characteristics: Application to Midori and SKINNY.
IACR Cryptol. ePrint Arch., 2019
Cryptanalysis of SP<sup>2</sup>DAS and 3PDA, Two Data Aggregation Schemes for Smart Grid.
Proceedings of the 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2019
2018
Linear Subspace Cryptanalysis of Harn's Secret Sharing-Based Group Authentication Scheme.
IEEE Trans. Inf. Forensics Secur., 2018
Int. J. Commun. Syst., 2018
IACR Cryptol. ePrint Arch., 2018
2015
Analysis and Enhancement of Desynchronization Attack on an Ultralightweight RFID Authentication Protocol.
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
2014
IEEE Trans. Wirel. Commun., 2014
Low-Data Complexity Biclique Cryptanalysis of Block Ciphers With Application to Piccolo and HIGHT.
IEEE Trans. Inf. Forensics Secur., 2014
ISC Int. J. Inf. Secur., 2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the IEEE 80th Vehicular Technology Conference, 2014
Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014
Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014
2013
Recursive Linear and Differential Cryptanalysis of Ultralightweight Authentication Protocols.
IEEE Trans. Inf. Forensics Secur., 2013
IEEE Trans. Commun., 2013
Inf. Process. Lett., 2013
Analysis and Improvement of the securing RFID systems conforming to EPC Class 1 Generation 2 standard.
IACR Cryptol. ePrint Arch., 2013
2012
Proceedings of the 2012 IEEE Global Communications Conference, 2012
2010
Proceedings of IEEE International Conference on Communications, 2010
2009
Proceedings of the 2009 Wireless Telecommunications Symposium, 2009
2008
Performance of concatenated coded IR-UWB in the presence of multiple-access interference.
Proceedings of the 42nd Asilomar Conference on Signals, Systems and Computers, 2008