Follow
siavash ahmadi
Title
Cited by
Cited by
Year
Low-data complexity biclique cryptanalysis of block ciphers with application to piccolo and hight
S Ahmadi, Z Ahmadian, J Mohajeri, MR Aref
IEEE Transactions on Information Forensics and Security 9 (10), 1641-1652, 2014
392014
Ciphertext-only attack on d× d Hill in O (d13d)
S Khazaei, S Ahmadi
Information Processing Letters 118, 25-29, 2017
142017
Generalized meet in the middle cryptanalysis of block ciphers with an automated search algorithm
S Ahmadi, MR Aref
IEEE Access 8, 2284-2301, 2019
102019
Improved impossible differential and biclique cryptanalysis of HIGHT
SA Azimi, S Ahmadi, Z Ahmadian, J Mohajeri, MR Aref
International Journal of Communication Systems 31 (1), e3382, 2018
92018
Zero correlation linear attack on reduced round Piccolo-80
MZ Ahangarkolaei, SRH Najarkolaei, S Ahmadi, MR Aref
2016 13th International Iranian Society of Cryptology Conference on …, 2016
42016
Integral cryptanalysis of round-reduced shadow-32 for iot nodes
A Mirzaie, S Ahmadi, MR Aref
IEEE Internet of Things Journal, 2023
32023
Biclique cryptanalysis of Twine-128
SRH Najarkolaei, MZ Ahangarkolaei, S Ahmadi, MR Aref
2016 13th International Iranian Society of Cryptology Conference on …, 2016
32016
Biclique cryptanalysis of LBlock with modified key schedule
S Ahmadi, Z Ahmadian, J Mohajeri, MR Aref
2015 12th International Iranian Society of Cryptology Conference on …, 2015
32015
Security analysis of CLEFIA-128
S Ahmadi, M Delavar, J Mohajeri, MR Aref
2014 11th International ISC Conference on Information Security and …, 2014
32014
Assessment of relationship between body mass index I and serum levels of prostate specific antigen in 40-79 year old men referred to Rasoul Akram hospital.
AZ Mirzaie, SJ Ahmadi, N Shayanfar, B Kazeminejad
22015
Biclique cryptanalysis of block ciphers LBlock and TWINE-80 with practical data complexity
S Ahmadi, Z Ahmadian, J Mohajeri, MR Aref
THE ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY 11 (1), 57-74, 2019
12019
A Semi-Supervised IDS for Cyber-Physical Systems Using a Deep Learning Approach.
A Salehi, S Ahmadi, MR Aref
ISeCure 15 (3), 2023
2023
Private Federated Learning: An Adversarial Sanitizing Perspective.
M Shirinjani, S Ahmadi, T Eghlidos, MR Aref
ISeCure 15 (3), 2023
2023
New Fixed PointAttacks on GOST2 Block Cipher with Memory Complexity Improvements
S Ahmadi, MR Aref
THE ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY 11 (2), 145-158, 2019
2019
Improved Fixed Point Attack on Gost2
S Ahmadi, MR Aref
2017 14th International ISC (Iranian Society of Cryptology) Conference on …, 2017
2017
A New Approach to Key Schedule Designing
SRH Najarkolaei, S Ahmadi, MR Aref
2017 14th International ISC (Iranian Society of Cryptology) Conference on …, 2017
2017
2014 Index IEEE Transactions on Information Forensics and Security Vol. 9
I Aad, AE Abdel-Hakim, M Abdelhakim, A Abrardo, M Agrawal, S Ahmadi, ...
IEEE Transactions on Information Forensics and Security 9 (12), 2367, 2014
2014
RGB-D Face Recognition With Texture and Attribute Features.................. G. Goswami, M. Vatsa, and R. Singh 1629 A Novel Serial Multimodal Biometrics Framework Based on …
S Ahmadi, Z Ahmadian, J Mohajeri, MR Aref, K Liang, MH Au, JK Liu, ...
ISeCure
S Ahmadi, Z Ahmadian, J Mohajeri, MR Aref
The system can't perform the operation now. Try again later.
Articles 1–19