Desynchronization attack on RAPP ultralightweight authentication protocol Z Ahmadian, M Salmasizadeh, MR Aref Information processing letters 113 (7), 205-209, 2013 | 107 | 2013 |
New attacks on UMTS network access Z Ahmadian, S Salimi, A Salahi 2009 Wireless Telecommunications Symposium, 1-6, 2009 | 48 | 2009 |
Automated dynamic cube attack on block ciphers: Cryptanalysis of SIMON and KATAN Z Ahmadian, S Rasoolzadeh, M Salmasizadeh, MR Aref Cryptology ePrint Archive, 2015 | 42 | 2015 |
Recursive linear and differential cryptanalysis of ultralightweight authentication protocols Z Ahmadian, M Salmasizadeh, MR Aref IEEE Transactions on Information Forensics and Security 8 (7), 1140-1151, 2013 | 41 | 2013 |
Low-data complexity biclique cryptanalysis of block ciphers with application to piccolo and hight S Ahmadi, Z Ahmadian, J Mohajeri, MR Aref IEEE Transactions on Information Forensics and Security 9 (10), 1641-1652, 2014 | 40 | 2014 |
Biclique cryptanalysis of the full‐round KLEIN block cipher Z Ahmadian, M Salmasizadeh, MR Aref IET Information Security 9 (5), 294-301, 2015 | 36 | 2015 |
New automatic search method for truncated-differential characteristics application to Midori, SKINNY and CRAFT AH Ebrahimi Moghaddam, Z Ahmadian The Computer Journal 63 (12), 1813-1825, 2020 | 30* | 2020 |
Linear subspace cryptanalysis of harn’s secret sharing-based group authentication scheme Z Ahmadian, S Jamshidpour IEEE Transactions on Information Forensics and Security 13 (2), 502-510, 2017 | 28 | 2017 |
Impossible differential cryptanalysis of Piccolo lightweight block cipher SA Azimi, Z Ahmadian, J Mohajeri, MR Aref 2014 11th International ISC Conference on Information Security and …, 2014 | 26 | 2014 |
Total break of Zorro using linear and differential attacks S Rasoolzadeh, Z Ahmadian, M Salmasizadeh, MR Aref Cryptology ePrint Archive, 2014 | 23 | 2014 |
Analysis and Improvement of the securing RFID systems conforming to EPC Class 1 Generation 2 standard A Mohammadali, Z Ahmadian, MR Aref Cryptology ePrint Archive, 2013 | 17 | 2013 |
MILP‐based automatic differential search for LEA and HIGHT block ciphers E Bagherzadeh, Z Ahmadian IET Information Security 14 (5), 595-603, 2020 | 15* | 2020 |
Security enhancements against UMTS–GSM interworking attacks Z Ahmadian, S Salimi, A Salahi Computer Networks 54 (13), 2256-2270, 2010 | 15 | 2010 |
Security analysis of a dynamic threshold secret sharing scheme using linear subspace method S Jamshidpour, Z Ahmadian Information Processing Letters 163, 105994, 2020 | 13 | 2020 |
IoT-friendly, pre-computed and outsourced attribute based encryption M Mahdavi, MH Tadayon, MS Haghighi, Z Ahmadian Future Generation Computer Systems 150, 115-126, 2024 | 12 | 2024 |
Cube and dynamic cube attacks on SIMON32/64 R Rabbaninejad, Z Ahmadian, M Salmasizadeh, MR Aref 2014 11th International ISC Conference on Information Security and …, 2014 | 12 | 2014 |
An improved truncated differential cryptanalysis of KLEIN S Rasoolzadeh, Z Ahmadian, M Salmasizadeh, MR Aref Tatra Mountains Mathematical Publications 67 (1), 135-147, 2016 | 11 | 2016 |
Improved impossible differential and biclique cryptanalysis of HIGHT SA Azimi, S Ahmadi, Z Ahmadian, J Mohajeri, MR Aref International Journal of Communication Systems 31 (1), e3382, 2018 | 9 | 2018 |
A practical distinguisher for the Shannon cipher Z Ahmadian, J Mohajeri, M Salmasizadeh, RM Hakala, K Nyberg Journal of Systems and Software 83 (4), 543-547, 2010 | 9 | 2010 |
A web-based remote laboratory for performing experiments in basic electrical engineering courses M Mir, T Sharif, Z Ahmadian, A Hassanpour 2006 IEEE GCC Conference (GCC), 1-5, 2006 | 7 | 2006 |