default search action
Babak Sadeghiyan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i14]Hossein Arabnezhad Khanooki, Babak Sadeghiyan:
Parameters of Algebraic Representation vs. Efficiency of Algebraic Cryptanalysis. IACR Cryptol. ePrint Arch. 2024: 1133 (2024) - 2022
- [j25]Babak Sadeghiyan, Salman Niksefat:
Editorial. J. Comput. Virol. Hacking Tech. 18(2): 69-70 (2022) - [i13]Motahareh Dehghan, Babak Sadeghiyan, Erfan Khosravian, Alireza Sedighi Moghaddam, Farshid Nooshi:
ProAPT: Projection of APT Threats with Deep Reinforcement Learning. CoRR abs/2209.07215 (2022) - 2021
- [j24]Maryam Mousavi, Babak Sadeghiyan:
A new image encryption scheme with Feistel like structure using chaotic S-box and Rubik cube based P-box. Multim. Tools Appl. 80(9): 13157-13177 (2021) - [i12]Sara Asgari, Babak Sadeghiyan:
Reconstruction of Worm Propagation Path Using a Trace-back Approach. CoRR abs/2108.07432 (2021) - [i11]Hossein Arabnezhad Khanooki, Babak Sadeghiyan:
An Evaluation and Enhancement of Seredynski-Bouvry CA-based Encryption Scheme. CoRR abs/2112.05429 (2021) - 2020
- [j23]Mohammad Jafari Dehkordi, Babak Sadeghiyan:
An effective node-removal method against P2P botnets. Comput. Networks 182: 107488 (2020) - [j22]Amir Afianian, Salman Niksefat, Babak Sadeghiyan, David Baptiste:
Malware Dynamic Analysis Evasion Techniques: A Survey. ACM Comput. Surv. 52(6): 126:1-126:28 (2020) - [j21]Tala Tafazzoli, Babak Sadeghiyan:
A probability distribution function for investigating node infection and removal times. Trans. Emerg. Telecommun. Technol. 31(2) (2020) - [j20]Mohammad Jafari Dehkordi, Babak Sadeghiyan:
Reconstruction of C&C channel for P2P botnet. IET Commun. 14(8): 1318-1326 (2020) - [j19]Mojtaba Zaheri, Babak Sadeghiyan:
SMT-based cube attack on round-reduced Simeck32/64. IET Inf. Secur. 14(5): 604-611 (2020) - [j18]Motahareh Dehghan, Babak Sadeghiyan, Erfan Khosravian:
Secure multi-party collision resolution protocol for air traffic control. J. Intell. Fuzzy Syst. 38(4): 4205-4221 (2020) - [c21]Sara Asgari, Babak Sadeghiyan:
Towards Generating Benchmark Datasets for Worm Infection Studies. IST 2020: 1-8 - [i10]Sara Asgari, Babak Sadeghiyan:
Towards Generating Benchmark Datasets for Worm Infection Studies. CoRR abs/2006.05167 (2020) - [i9]Amirahmad Chapnevis, Babak Sadeghiyan:
A Secure Two-Party Computation Protocol for Intersection Detection between Two Convex Hulls. CoRR abs/2011.00319 (2020)
2010 – 2019
- 2019
- [j17]Motahareh Dehghan, Babak Sadeghiyan:
Privacy-preserving collision detection of moving objects. Trans. Emerg. Telecommun. Technol. 30(3) (2019) - [j16]Hossein Arabnezhad-Khanoki, Babak Sadeghiyan, Josef Pieprzyk:
S-boxes representation and efficiency of algebraic attack. IET Inf. Secur. 13(5): 448-458 (2019) - [c20]Tala Tafazzoli, Babak Sadeghiyan:
A four-step method for investigating network worm propagation. ISDFS 2019: 1-7 - [i8]Mohammad Jafari Dehkordi, Babak Sadeghiyan:
Reconstruction of C&C Channel for Structured P2P Botnet. CoRR abs/1904.05119 (2019) - [i7]Hossein Arabnezhad-Khanoki, Babak Sadeghiyan:
Toward A More Efficient Gröbner-based Algebraic Cryptanalysis. IACR Cryptol. ePrint Arch. 2019: 1415 (2019) - 2018
- [i6]Amir Afianian, Salman Niksefat, Babak Sadeghiyan, David Baptiste:
Malware Dynamic Analysis Evasion Techniques: A Survey. CoRR abs/1811.01190 (2018) - [i5]Ehsan Edalat, Babak Sadeghiyan, Fatemeh Ghassemi:
ConsiDroid: A Concolic-based Tool for Detecting SQL Injection Vulnerability in Android Apps. CoRR abs/1811.10448 (2018) - [i4]Mojtaba Zaheri, Babak Sadeghiyan:
SMT-based Cube Attack on Simeck32/64. IACR Cryptol. ePrint Arch. 2018: 130 (2018) - 2017
- [j15]Salman Niksefat, Parisa Kaghazgaran, Babak Sadeghiyan:
Privacy issues in intrusion detection systems: A taxonomy, survey and future directions. Comput. Sci. Rev. 25: 69-78 (2017) - [j14]Tala Tafazzoli, Babak Sadeghiyan:
Worm infectious probability distribution with back-to-origin model. IET Commun. 11(13): 2101-2109 (2017) - [i3]Hossein Arabnezhad-Khanoki, Babak Sadeghiyan, Josef Pieprzyk:
Algebraic Attack Efficiency versus S-box Representation. IACR Cryptol. ePrint Arch. 2017: 7 (2017) - 2016
- [j13]Maryam Mouzarani, Babak Sadeghiyan, Mohammad Zolfaghari:
Smart fuzzing method for detecting stack-based buffer overflow in binary codes. IET Softw. 10(4): 96-107 (2016) - [j12]Maryam Mouzarani, Babak Sadeghiyan:
Towards designing an extendable vulnerability detection method for executable codes. Inf. Softw. Technol. 80: 231-244 (2016) - [j11]Tala Tafazzoli, Babak Sadeghiyan:
A Stochastic Model for the Size of Worm Origin. J. Comput. 11(6): 479-487 (2016) - [j10]Tala Tafazzoli, Babak Sadeghiyan:
A stochastic model for the size of worm origin. Secur. Commun. Networks 9(10): 1103-1118 (2016) - [j9]Maryam Mouzarani, Babak Sadeghiyan, Mohammad Zolfaghari:
A smart fuzzing method for detecting heap-based vulnerabilities in executable codes. Secur. Commun. Networks 9(18): 5098-5115 (2016) - [c19]Tala Tafazzoli, Babak Sadeghiyan:
Probability of infectious nodes in backward time. IST 2016: 761-765 - 2015
- [c18]Maryam Mouzarani, Babak Sadeghiyan, Mohammad Zolfaghari:
A Smart Fuzzing Method for Detecting Heap-Based Buffer Overflow in Executable Codes. PRDC 2015: 42-49 - 2014
- [j8]Salman Niksefat, Babak Sadeghiyan, Payman Mohassel, Seyed Saeed Sadeghian:
ZIDS: A Privacy-Preserving Intrusion Detection System Using Secure Two-Party Computation Protocols. Comput. J. 57(4): 494-509 (2014) - 2013
- [j7]Salman Niksefat, Babak Sadeghiyan, Payman Mohassel:
Oblivious decision program evaluation. IET Inf. Secur. 7(2) (2013) - 2012
- [c17]Payman Mohassel, Salman Niksefat, Seyed Saeed Sadeghian, Babak Sadeghiyan:
An Efficient Protocol for Oblivious DFA Evaluation and Applications. CT-RSA 2012: 398-415 - [c16]Saeid Nourizadeh, Mojtaba Javanmardi, Babak Sadeghiyan:
Cryptanalysis of the reduced-round version of JH. IST 2012: 1050-1054 - [c15]Mohammad Zaheri, Babak Sadeghiyan:
Identity-based signatures from lattices. IST 2012: 1114-1118 - 2011
- [j6]Seyed Saeed Sadeghian, Babak Sadeghiyan:
A Study of Multiple Characteristics Differential Cryptanalysis. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(10): 2053-2058 (2011) - [j5]Kooroush Manochehri, Babak Sadeghiyan, Saadat Pourmozafari:
High Performance Montgomery Modular Multiplier with a New Recoding Method. J. Circuits Syst. Comput. 20(3): 531-548 (2011) - [i2]Payman Mohassel, Salman Niksefat, Seyed Saeed Sadeghian, Babak Sadeghiyan:
A New Protocol for Oblivious DFA Evaluation and Applications. IACR Cryptol. ePrint Arch. 2011: 434 (2011) - 2010
- [j4]Kooroush Manochehri, Saadat Pourmozafari, Babak Sadeghiyan:
Montgomery and RNS for RSA Hardware Implementation. Comput. Informatics 29(5): 849-880 (2010) - [j3]Kooroush Manochehri, Babak Sadeghiyan, Saadat Pourmozafari:
A modified radix-2 Montgomery modular multiplication with new recoding method. IEICE Electron. Express 7(8): 513-519 (2010) - [j2]Nasour Bagheri, Praveen Gauravaram, Majid Naderi, Babak Sadeghiyan:
EPC: A Provably Secure Permutation Based Compression Function. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(10): 1833-1836 (2010) - [c14]Salman Niksefat, Mohammad Mehdi Ahaniha, Babak Sadeghiyan, Mehdi Shajari:
Toward Specification-Based Intrusion Detection for Web Applications. RAID 2010: 510-511
2000 – 2009
- 2009
- [c13]Maryam Izadi, Babak Sadeghiyan, Seyed Saeed Sadeghian, Hossein Arabnezhad Khanooki:
MIBS: A New Lightweight Block Cipher. CANS 2009: 334-348 - 2008
- [j1]Abbas Ghaemi Bafghi, Reza Safabakhsh, Babak Sadeghiyan:
Finding the differential characteristics of block ciphers with neural networks. Inf. Sci. 178(15): 3118-3132 (2008) - [c12]Kooroush Manochehri, Saadat Pourmozafari, Babak Sadeghiyan:
Very Fast Multi Operand Addition Method by Bitwise Subtraction. ITNG 2008: 1240-1241 - [c11]Nasour Bagheri, Babak Sadeghiyan, Majid Naderi:
Multi-Collisions Attack in Ring Hash Structure. SECRYPT 2008: 278-284 - [i1]Nasour Bagheri, Majid Naderi, Babak Sadeghiyan:
Cryptanalysis of CRUSH hash structure. IACR Cryptol. ePrint Arch. 2008: 43 (2008) - 2007
- [c10]Bahador Bakhshi, Babak Sadeghiyan:
A Timing Attack on Blakley's Modular Multiplication Algorithm, and Applications to DSA. ACNS 2007: 129-140 - 2006
- [c9]Kooroush Manochehri, Saadat Pourmozafari, Babak Sadeghiyan:
Efficient Methods in Converting to Modulo 2^n+1 and 2^n-1. ITNG 2006: 178-185 - 2004
- [c8]Abbas Ghaemi Bafghi, Babak Sadeghiyan:
Finding suitable differential characteristics for block ciphers with Ant colony technique. ISCC 2004: 418-423 - 2000
- [c7]Masoud Bahrami, Babak Sadeghiyan:
Efficient module 2n+1 multiplication schemes for IDEA. ISCAS 2000: 653-656
1990 – 1999
- 1996
- [c6]Babak Sadeghiyan, Javad Mohajeri:
A new universal test for bit strings. ACISP 1996: 311-319 - 1993
- [b1]Josef Pieprzyk, Babak Sadeghiyan:
Design of Hashing Algorithms. Lecture Notes in Computer Science 756, Springer 1993, ISBN 3-540-57500-6 - 1992
- [c5]Babak Sadeghiyan, Josef Pieprzyk:
A Construction for Super Pseudorandom Permutations from A Single Pseudorandom Function. EUROCRYPT 1992: 267-284 - 1991
- [c4]Babak Sadeghiyan, Yuliang Zheng, Josef Pieprzyk:
How to Construct A Family of Strong One Way Permutations. ASIACRYPT 1991: 97-110 - [c3]Babak Sadeghiyan, Josef Pieprzyk:
On Necessary and Sufficient Conditions for the Construction of Super Pseudorandom Permutations. ASIACRYPT 1991: 194-209 - [c2]Josef Pieprzyk, Babak Sadeghiyan:
Optima Perfect Randomizers. ASIACRYPT 1991: 225-236 - [c1]Babak Sadeghiyan, Josef Pieprzyk:
A Construction for One Way Hash Functions and Pseudorandom Bit Generators. EUROCRYPT 1991: 431-445
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:15 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint