Segui
Zahra Ahmadian
Zahra Ahmadian
Assistant Professor, Shahid Beheshti University
Email verificata su sbu.ac.ir
Titolo
Citata da
Citata da
Anno
Desynchronization attack on RAPP ultralightweight authentication protocol
Z Ahmadian, M Salmasizadeh, MR Aref
Information processing letters 113 (7), 205-209, 2013
1072013
New attacks on UMTS network access
Z Ahmadian, S Salimi, A Salahi
2009 Wireless Telecommunications Symposium, 1-6, 2009
482009
Automated dynamic cube attack on block ciphers: Cryptanalysis of SIMON and KATAN
Z Ahmadian, S Rasoolzadeh, M Salmasizadeh, MR Aref
Cryptology ePrint Archive, 2015
422015
Recursive linear and differential cryptanalysis of ultralightweight authentication protocols
Z Ahmadian, M Salmasizadeh, MR Aref
IEEE Transactions on Information Forensics and Security 8 (7), 1140-1151, 2013
412013
Low-data complexity biclique cryptanalysis of block ciphers with application to piccolo and hight
S Ahmadi, Z Ahmadian, J Mohajeri, MR Aref
IEEE Transactions on Information Forensics and Security 9 (10), 1641-1652, 2014
402014
Biclique cryptanalysis of the full‐round KLEIN block cipher
Z Ahmadian, M Salmasizadeh, MR Aref
IET Information Security 9 (5), 294-301, 2015
362015
New automatic search method for truncated-differential characteristics application to Midori, SKINNY and CRAFT
AH Ebrahimi Moghaddam, Z Ahmadian
The Computer Journal 63 (12), 1813-1825, 2020
30*2020
Linear subspace cryptanalysis of harn’s secret sharing-based group authentication scheme
Z Ahmadian, S Jamshidpour
IEEE Transactions on Information Forensics and Security 13 (2), 502-510, 2017
282017
Impossible differential cryptanalysis of Piccolo lightweight block cipher
SA Azimi, Z Ahmadian, J Mohajeri, MR Aref
2014 11th International ISC Conference on Information Security and …, 2014
262014
Total break of Zorro using linear and differential attacks
S Rasoolzadeh, Z Ahmadian, M Salmasizadeh, MR Aref
Cryptology ePrint Archive, 2014
232014
Analysis and Improvement of the securing RFID systems conforming to EPC Class 1 Generation 2 standard
A Mohammadali, Z Ahmadian, MR Aref
Cryptology ePrint Archive, 2013
172013
MILP‐based automatic differential search for LEA and HIGHT block ciphers
E Bagherzadeh, Z Ahmadian
IET Information Security 14 (5), 595-603, 2020
15*2020
Security enhancements against UMTS–GSM interworking attacks
Z Ahmadian, S Salimi, A Salahi
Computer Networks 54 (13), 2256-2270, 2010
152010
Security analysis of a dynamic threshold secret sharing scheme using linear subspace method
S Jamshidpour, Z Ahmadian
Information Processing Letters 163, 105994, 2020
132020
IoT-friendly, pre-computed and outsourced attribute based encryption
M Mahdavi, MH Tadayon, MS Haghighi, Z Ahmadian
Future Generation Computer Systems 150, 115-126, 2024
122024
Cube and dynamic cube attacks on SIMON32/64
R Rabbaninejad, Z Ahmadian, M Salmasizadeh, MR Aref
2014 11th International ISC Conference on Information Security and …, 2014
122014
An improved truncated differential cryptanalysis of KLEIN
S Rasoolzadeh, Z Ahmadian, M Salmasizadeh, MR Aref
Tatra Mountains Mathematical Publications 67 (1), 135-147, 2016
112016
Improved impossible differential and biclique cryptanalysis of HIGHT
SA Azimi, S Ahmadi, Z Ahmadian, J Mohajeri, MR Aref
International Journal of Communication Systems 31 (1), e3382, 2018
92018
A practical distinguisher for the Shannon cipher
Z Ahmadian, J Mohajeri, M Salmasizadeh, RM Hakala, K Nyberg
Journal of Systems and Software 83 (4), 543-547, 2010
92010
A web-based remote laboratory for performing experiments in basic electrical engineering courses
M Mir, T Sharif, Z Ahmadian, A Hassanpour
2006 IEEE GCC Conference (GCC), 1-5, 2006
72006
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20