Cryptanalysis of SIMON variants with connections J Alizadeh, HA Alkhzaimi, MR Aref, N Bagheri, P Gauravaram, A Kumar, ... International Workshop on Radio Frequency Identification: Security and …, 2014 | 49 | 2014 |
Improved linear cryptanalysis of reduced-round SIMON-32 and SIMON-48 MA Abdelraheem, J Alizadeh, HA Alkhzaimi, MR Aref, N Bagheri, ... Progress in Cryptology--INDOCRYPT 2015: 16th International Conference on …, 2015 | 46 | 2015 |
Linear cryptanalysis of round reduced SIMON J Alizadeh, N Bagheri, P Gauravaram, A Kumar, SK Sanadhya Cryptology ePrint Archive, 2013 | 44 | 2013 |
Improved linear cryptanalysis of reduced-round SIMON MA Abdelraheem, J Alizadeh, HA Alkhzaimi, MR Aref, N Bagheri, ... Cryptology ePrint Archive, 2014 | 24 | 2014 |
Improved Linear Cryptanalysis of Round Reduced SIMON. J Alizadeh, H AlKhzaimi, MR Aref, N Bagheri, P Gauravaram, ... IACR Cryptol. ePrint Arch. 2014 (681), 2014 | 17 | 2014 |
JHAE: An Authenticated Encryption Mode Based on JH. J Alizadeh, MR Aref, N Bagheri IACR Cryptol. ePrint Arch. 2014, 193, 2014 | 11 | 2014 |
Prediction of the subsurface crack growth lifetime in railroad wheel of the Iranian railway system R Ghajar, KJ ALIZADEH INTERNATIONAL JOURNAL OF ADVANCED DESIGN AND MANUFACTURING TECHNOLOGY 4 (113 …, 2010 | 11 | 2010 |
JHAE: A novel permutation-based authenticated encryption mode based on the hash mode JH J Alizadeh, MR Aref, N Bagheri, A Rahimi Journal of Computing and Security 2 (1), 3-20, 2015 | 10 | 2015 |
Artemia v1 J Alizadeh, MR Aref, N Bagheri Submission to CAESAR, 2014 | 6 | 2014 |
A single query forgery on avalanchev1 N Bagheri, J Alizadeh, MR Aref Cryptographic Competitions Mailing List, 2014 | 6 | 2014 |
Isaka: improved secure authentication and key agreement protocol for wban J Alizadeh, M Safkhani, A Allahdadi Wireless Personal Communications 126 (4), 2911-2935, 2022 | 5 | 2022 |
Coupling of the fracture modes for the subsurface elliptical cracks under uniform shear loading J Alizadeh, R Ghajar Modares Mechanical Engineering 14 (15), 1-10, 2015 | 5 | 2015 |
A distinguishing attack on AES-CMCC v1 by only two queries N Bagheri, J Alizadeh, MR Aref Cryptographic Competitions Mailing List, 2014 | 5 | 2014 |
A new distinguisher for CubeHash-8/b and CubeHash-15/b compression functions J Alizadeh, A Mirghadri Cryptology ePrint Archive, 2011 | 5 | 2011 |
Artemia: A Family of Provably Secure Authenticated Encryption Schemes. J Alizadeh, MR Aref, N Bagheri ISeCure 6 (2), 2014 | 3 | 2014 |
The Loop-Mediated Isothermal Amplification Method Instead of PCR in Detection Goals PA Majelan, MF Bafghi, J Alizadeh, N Pourramezan, D Afshar Zahedan Journal of Research in Medical Sciences 18 (6), 2016 | 1 | 2016 |
Cryptanalysis of Some First Round CAESAR Candidates. J Alizadeh, MR Aref, N Bagheri, H Sadeghi ISeCure 7 (2), 2015 | 1 | 2015 |
A forgery attack on AES-OTR H Sadeghi, J Alizadeh | 1 | 2014 |
Practical key recovery attack on authentication and key agreement protocol SecAuthUAV in a network of drones and provide an improved protocol J Alizadeh, SH Noorani Asl Biannual Journal Monadi for Cyberspace Security (AFTA) 12 (2), 51-59, 2024 | | 2024 |
Some observations on a lightweight authentication scheme with capabilities of anonymity and trust in Internet of Things (IoT) J Alizadeh, N Bagheri Signal and Data Processing 19 (4), 85-94, 2023 | | 2023 |