Low-data complexity biclique cryptanalysis of block ciphers with application to piccolo and hight S Ahmadi, Z Ahmadian, J Mohajeri, MR Aref IEEE Transactions on Information Forensics and Security 9 (10), 1641-1652, 2014 | 39 | 2014 |
Ciphertext-only attack on d× d Hill in O (d13d) S Khazaei, S Ahmadi Information Processing Letters 118, 25-29, 2017 | 14 | 2017 |
Generalized meet in the middle cryptanalysis of block ciphers with an automated search algorithm S Ahmadi, MR Aref IEEE Access 8, 2284-2301, 2019 | 10 | 2019 |
Improved impossible differential and biclique cryptanalysis of HIGHT SA Azimi, S Ahmadi, Z Ahmadian, J Mohajeri, MR Aref International Journal of Communication Systems 31 (1), e3382, 2018 | 9 | 2018 |
Zero correlation linear attack on reduced round Piccolo-80 MZ Ahangarkolaei, SRH Najarkolaei, S Ahmadi, MR Aref 2016 13th International Iranian Society of Cryptology Conference on …, 2016 | 4 | 2016 |
Integral cryptanalysis of round-reduced shadow-32 for iot nodes A Mirzaie, S Ahmadi, MR Aref IEEE Internet of Things Journal, 2023 | 3 | 2023 |
Biclique cryptanalysis of Twine-128 SRH Najarkolaei, MZ Ahangarkolaei, S Ahmadi, MR Aref 2016 13th International Iranian Society of Cryptology Conference on …, 2016 | 3 | 2016 |
Biclique cryptanalysis of LBlock with modified key schedule S Ahmadi, Z Ahmadian, J Mohajeri, MR Aref 2015 12th International Iranian Society of Cryptology Conference on …, 2015 | 3 | 2015 |
Security analysis of CLEFIA-128 S Ahmadi, M Delavar, J Mohajeri, MR Aref 2014 11th International ISC Conference on Information Security and …, 2014 | 3 | 2014 |
Assessment of relationship between body mass index I and serum levels of prostate specific antigen in 40-79 year old men referred to Rasoul Akram hospital. AZ Mirzaie, SJ Ahmadi, N Shayanfar, B Kazeminejad | 2 | 2015 |
Biclique cryptanalysis of block ciphers LBlock and TWINE-80 with practical data complexity S Ahmadi, Z Ahmadian, J Mohajeri, MR Aref THE ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY 11 (1), 57-74, 2019 | 1 | 2019 |
A Semi-Supervised IDS for Cyber-Physical Systems Using a Deep Learning Approach. A Salehi, S Ahmadi, MR Aref ISeCure 15 (3), 2023 | | 2023 |
Private Federated Learning: An Adversarial Sanitizing Perspective. M Shirinjani, S Ahmadi, T Eghlidos, MR Aref ISeCure 15 (3), 2023 | | 2023 |
New Fixed PointAttacks on GOST2 Block Cipher with Memory Complexity Improvements S Ahmadi, MR Aref THE ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY 11 (2), 145-158, 2019 | | 2019 |
Improved Fixed Point Attack on Gost2 S Ahmadi, MR Aref 2017 14th International ISC (Iranian Society of Cryptology) Conference on …, 2017 | | 2017 |
A New Approach to Key Schedule Designing SRH Najarkolaei, S Ahmadi, MR Aref 2017 14th International ISC (Iranian Society of Cryptology) Conference on …, 2017 | | 2017 |
2014 Index IEEE Transactions on Information Forensics and Security Vol. 9 I Aad, AE Abdel-Hakim, M Abdelhakim, A Abrardo, M Agrawal, S Ahmadi, ... IEEE Transactions on Information Forensics and Security 9 (12), 2367, 2014 | | 2014 |
RGB-D Face Recognition With Texture and Attribute Features.................. G. Goswami, M. Vatsa, and R. Singh 1629 A Novel Serial Multimodal Biometrics Framework Based on … S Ahmadi, Z Ahmadian, J Mohajeri, MR Aref, K Liang, MH Au, JK Liu, ... | | |
ISeCure S Ahmadi, Z Ahmadian, J Mohajeri, MR Aref | | |