On construction of involutory MDS matrices from Vandermonde Matrices in GF(2 q ) M Sajadieh, M Dakhilalian, H Mala, B Omoomi Designs, Codes and Cryptography 64, 287-308, 2012 | 104 | 2012 |
Recursive diffusion layers for block ciphers and hash functions M Sajadieh, M Dakhilalian, H Mala, P Sepehrdad Fast Software Encryption: 19th International Workshop, FSE 2012, Washington …, 2012 | 102 | 2012 |
Efficient recursive diffusion layers for block ciphers and hash functions M Sajadieh, M Dakhilalian, H Mala, P Sepehrdad Journal of Cryptology 28, 240-256, 2015 | 26 | 2015 |
A verifiable (k, n, m)-threshold multi-secret sharing scheme based on ntru cryptosystem AN Amroudi, A Zaghain, M Sajadieh Wireless Personal Communications 96, 1393-1405, 2017 | 15 | 2017 |
A new counting method to bound the number of active S-boxes in Rijndael and 3D M Sajadieh, A Mirzaei, H Mala, V Rijmen Designs, Codes and Cryptography 83, 327-343, 2017 | 15 | 2017 |
A distributed certificate authority and key establishment protocol for mobile ad hoc networks MS Zefreh, A Fanian, SM Sajadieh, M Berenjkoub, P Khadivi 2008 10th International conference on advanced communication technology 2 …, 2008 | 12 | 2008 |
Sigma protocol for faster proof of simultaneous homomorphism relations B Bagherpour, A Zaghian, M Sajadieh IET information security 13 (5), 508-514, 2019 | 9 | 2019 |
Construction of matrices from generalized Feistel structures M Sajadieh, M Mousavi Designs, Codes and Cryptography 89 (7), 1433-1452, 2021 | 8 | 2021 |
A cluster-based key establishment protocol for wireless mobile ad hoc networks M Sheikh Zefreh, A Fanian, SM Sajadieh, P Khadivi, M Berenjkoub Advances in Computer Science and Engineering: 13th International CSI …, 2009 | 7 | 2009 |
Novel lightweight RFID authentication protocols for inexpensive tags AA Khorasgani, M Sajadieh, MR Yazdani Journal of Information Security and Applications 67, 103191, 2022 | 6 | 2022 |
Using MILP in analysis of feistel structures and improving type II GFS by switching mechanism M Sajadieh, M Vaziri International Conference on Cryptology in India, 265-281, 2018 | 4 | 2018 |
Construction of Lightweight MDS Matrices from Generalized Feistel Structures. M Sajadieh, M Mousavi IACR Cryptol. ePrint Arch. 2018, 1072, 2018 | 4 | 2018 |
Perfect involutory diffusion layers based on invertibility of some linear functions M Sajadieh, M Dakhilalian, H Mala Information Security, IET 5 (4), 228 - 236, 2011 | 3 | 2011 |
Two new methods for designing 192-bit block ciphers based on switching structure and recursive diffusion layers A Mirghadri, M Yosefipour, B Khadem, M Sajadieh J. Passive Defence Sci. & Technol 7, 251-259, 2016 | 2 | 2016 |
Introducing a new connection between the entries of MDS matrices constructed by generalized Cauchy matrices in N Mohsenifar, M Sajadieh Journal of Applied Mathematics and Computing 69 (5), 3871-3891, 2023 | 1 | 2023 |
Reconstructing a lightweight security protocol in the radio‐frequency identification systems A Abdellahi Khorasgani, M Sajadieh, MR Yazdani IET Computers & Digital Techniques 17 (3-4), 209-223, 2023 | | 2023 |
4n × 4n Diffusion Layers Based on Multiple 4 × 4 MDS Matrices M Sajadieh, A Mirzaei The ISC International Journal of Information Security 15 (1), 111-124, 2023 | | 2023 |
LRAPM: A Lightweight RFID Authentication Protocol for MIoT Systems KA Abdellahi, M Sajadieh, MR Yazdani Technovations of Electrical Engineering in Green Energy System 1 (4), 71-89, 2022 | | 2022 |
A Lightweight Authentication Scheme for RFID with Permutation Operation on Passive Tags A Abdellahi Khorasgani, M Sadjadieh, MR Yazdani Journal of Computing and Security 8 (2), 71-86, 2021 | | 2021 |
A New Approach for the Implementation of Binary Matrices Using SLP Applications M Sajadieh, M Mousavi Cryptology ePrint Archive, 2020 | | 2020 |