default search action
Nasour Bagheri
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j85]Sadegh Sadeghi, Nasour Bagheri:
Cryptanalysis of DBST, a lightweight block cipher. Frontiers Comput. Sci. 18(4): 184819 (2024) - [j84]Nasour Bagheri, Ygal Bendavid, Masoumeh Safkhani, Samad Rostampour:
Smart Grid Security: A PUF-Based Authentication and Key Agreement Protocol. Future Internet 16(1): 9 (2024) - [j83]Nasser Zarbi, Ali Zaeembashi, Nasour Bagheri, Morteza Adeli:
Toward designing a lightweight RFID authentication protocol for constrained environments. IET Commun. 18(14): 846-859 (2024) - [j82]Morteza Adeli, Nasour Bagheri, Hamid Reza Maimani, Saru Kumari, Joel J. P. C. Rodrigues:
A Post-Quantum Compliant Authentication Scheme for IoT Healthcare Systems. IEEE Internet Things J. 11(4): 6111-6118 (2024) - [j81]Ygal Bendavid, Samad Rostampour, Yacine Berrabah, Nasour Bagheri, Masoumeh Safkhani:
The Rise of Passive RFID RTLS Solutions in Industry 5.0. Sensors 24(5): 1711 (2024) - [j80]Samad Rostampour, Nasour Bagheri, Behnam Ghavami, Ygal Bendavid, Saru Kumari, Honorio Martín, Carmen Camara:
Using a privacy-enhanced authentication process to secure IoT-based smart grid infrastructures. J. Supercomput. 80(2): 1668-1693 (2024) - [j79]Samad Rostampour, Nasour Bagheri, Behnam Ghavami, Ygal Bendavid, Saru Kumari, Honorio Martín, Carmen Camara:
Correction to: Using a privacy‑enhanced authentication process to secure IoT‑based smart grid infrastructures. J. Supercomput. 80(2): 2914-2915 (2024) - 2023
- [j78]Navid Vafaei, Hadi Soleimany, Nasour Bagheri:
Exploiting statistical effective fault attack in a blind setting. IET Inf. Secur. 17(4): 639-646 (2023) - [j77]Morteza Adeli, Nasour Bagheri, Sadegh Sadeghi, Saru Kumari:
χperbp: a cloud-based lightweight mutual authentication protocol. Peer Peer Netw. Appl. 16(4): 1785-1802 (2023) - [j76]Carmen Camara, Pedro Peris-Lopez, Masoumeh Safkhani, Nasour Bagheri:
ECG Identification Based on the Gramian Angular Field and Tested with Individuals in Resting and Activity States. Sensors 23(2): 937 (2023) - 2022
- [j75]Carmen Camara, Pedro Peris-Lopez, Masoumeh Safkhani, Nasour Bagheri:
ECGsound for human identification. Biomed. Signal Process. Control. 72(Part): 103335 (2022) - [j74]Samad Rostampour, Nasour Bagheri, Ygal Bendavid, Masoumeh Safkhani, Saru Kumari, Joel J. P. C. Rodrigues:
An Authentication Protocol for Next Generation of Constrained IoT Systems. IEEE Internet Things J. 9(21): 21493-21504 (2022) - [j73]Navid Vafaei, Maryam Porkar, Hamed Ramzanipour, Nasour Bagheri:
Practical Differential Fault Analysis on SKINNY. ISC Int. J. Inf. Secur. 14(3): 9-19 (2022) - [j72]Hamed Ramzanipour, Navid Vafaei, Nasour Bagheri:
Practical Differential Fault Analysis on CRAFT, a Lightweight Block Cipher. ISC Int. J. Inf. Secur. 14(3): 21-31 (2022) - [j71]Masoumeh Safkhani, Samad Rostampour, Ygal Bendavid, Sadegh Sadeghi, Nasour Bagheri:
Improving RFID/IoT-based generalized ultra-lightweight mutual authentication protocols. J. Inf. Secur. Appl. 67: 103194 (2022) - [j70]Morteza Adeli, Nasour Bagheri, Honorio Martín, Pedro Peris-Lopez:
Challenging the security of "A PUF-based hardware mutual authentication protocol". J. Parallel Distributed Comput. 169: 199-210 (2022) - [j69]Nasour Bagheri, Saru Kumari, Carmen Camara, Pedro Peris-Lopez:
Defending Industry 4.0: An Enhanced Authentication Scheme for IoT Devices. IEEE Syst. J. 16(3): 4501-4512 (2022) - [j68]Hadi Soleimany, Nasour Bagheri, Hosein Hadipour, Prasanna Ravi, Shivam Bhasin, Sara Mansouri:
Practical Multiple Persistent Faults Analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(1): 367-390 (2022) - [j67]Nasour Bagheri, Sadegh Sadeghi, Prasanna Ravi, Shivam Bhasin, Hadi Soleimany:
SIPFA: Statistical Ineffective Persistent Faults Analysis on Feistel Ciphers. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(3): 367-390 (2022) - [j66]Navid Vafaei, Sara Zarei, Nasour Bagheri, Maria Eichlseder, Robert Primas, Hadi Soleimany:
Statistical Effective Fault Attacks: The Other Side of the Coin. IEEE Trans. Inf. Forensics Secur. 17: 1855-1867 (2022) - [i39]Nasour Bagheri, Sadegh Sadeghi, Prasanna Ravi, Shivam Bhasin, Hadi Soleimany:
SIPFA: Statistical Ineffective Persistent Faults Analysis on Feistel Ciphers. IACR Cryptol. ePrint Arch. 2022: 459 (2022) - [i38]Navid Vafaei, Sara Zarei, Nasour Bagheri, Maria Eichlseder, Robert Primas, Hadi Soleimany:
Statistical Effective Fault Attacks: The other Side of the Coin. IACR Cryptol. ePrint Arch. 2022: 642 (2022) - 2021
- [j65]Mohammad Hossein Karimi, Reza Ebrahimpour, Nasour Bagheri:
Object Categorization at the Higher Levels Do With More Neurons Than Finer Levels and Takes Faster. IEEE Access 9: 32873-32881 (2021) - [j64]Akbar Mahmoodi Rishakani, Seyed Mojtaba Dehnavi, Mohammad Reza Mirzaee Shamsabad, Nasour Bagheri:
Cryptographic properties of cyclic binary matrices. Adv. Math. Commun. 15(2): 311-327 (2021) - [j63]Mohammad Hossein Karimi, Reza Ebrahimpour, Nasour Bagheri:
A Recurrent Temporal Model for Semantic Levels Categorization Based on Human Visual System. Comput. Intell. Neurosci. 2021: 8895579:1-8895579:20 (2021) - [j62]Sadegh Sadeghi, Vincent Rijmen, Nasour Bagheri:
Proposing an MILP-based method for the experimental verification of difference-based trails: application to SPECK, SIMECK. Des. Codes Cryptogr. 89(9): 2113-2155 (2021) - [j61]Morteza Adeli, Nasour Bagheri, Hamid Reza Meimani:
On the designing a secure biometric-based remote patient authentication scheme for mobile healthcare environments. J. Ambient Intell. Humaniz. Comput. 12(2): 3075-3089 (2021) - [j60]Saeide Sheikhpour, Ali Mahani, Nasour Bagheri:
Reliable advanced encryption standard hardware implementation: 32- bit and 64-bit data-paths. Microprocess. Microsystems 81: 103740 (2021) - [j59]Morteza Adeli, Nasour Bagheri:
MDSbSP: a search protocol based on MDS codes for RFID-based Internet of vehicle. J. Supercomput. 77(2): 1094-1113 (2021) - [j58]Hosein Hadipour, Nasour Bagheri, Ling Song:
Improved Rectangle Attacks on SKINNY and CRAFT. IACR Trans. Symmetric Cryptol. 2021(2): 140-198 (2021) - [j57]Masoumeh Safkhani, Carmen Camara, Pedro Peris-Lopez, Nasour Bagheri:
RSEAP2: An enhanced version of RSEAP, an RFID based authentication protocol for vehicular cloud computing. Veh. Commun. 28: 100311 (2021) - [i37]Morteza Adeli, Nasour Bagheri, Sadegh Sadeghi, Saru Kumari:
\(\chi\)perbp: a Cloud-based Lightweight Mutual Authentication Protocol. IACR Cryptol. ePrint Arch. 2021: 144 (2021) - [i36]Hadi Soleimany, Nasour Bagheri, Hosein Hadipour, Prasanna Ravi, Shivam Bhasin, Sara Mansouri:
Practical Multiple Persistent Faults Analysis. IACR Cryptol. ePrint Arch. 2021: 1362 (2021) - 2020
- [j56]Mehdi Hosseinzadeh, Jan Lansky, Amir Masoud Rahmani, Cuong Trinh, Masoumeh Safkhani, Nasour Bagheri, Bao Huynh:
A New Strong Adversary Model for RFID Authentication Protocols. IEEE Access 8: 125029-125045 (2020) - [j55]Mehdi Hosseinzadeh, Omed Hassan Ahmed, Sarkar Hasan Ahmed, Cuong Trinh, Nasour Bagheri, Saru Kumari, Jan Lansky, Bao Huynh:
An Enhanced Authentication Protocol for RFID Systems. IEEE Access 8: 126977-126987 (2020) - [j54]Cuong Trinh, Bao Huynh, Jan Lansky, Stanislava Mildeová, Masoumeh Safkhani, Nasour Bagheri, Saru Kumari, Mehdi Hosseinzadeh:
A Novel Lightweight Block Cipher-Based Mutual Authentication Protocol for Constrained Environments. IEEE Access 8: 165536-165550 (2020) - [j53]Masoumeh Safkhani, Nasour Bagheri, Saru Kumari, Hamidreza Tavakoli, Sachin Kumar, Jiahui Chen:
RESEAP: An ECC-Based Authentication and Key Agreement Scheme for IoT Applications. IEEE Access 8: 200851-200862 (2020) - [j52]Masoumeh Safkhani, Samad Rostampour, Ygal Bendavid, Nasour Bagheri:
IoT in medical & pharmaceutical: Designing lightweight RFID security protocols for ensuring supply chain integrity. Comput. Networks 181: 107558 (2020) - [j51]Alireza Mohammadi Anbaran, Pooya Torkzadeh, Reza Ebrahimpour, Nasour Bagheri:
Modification and hardware implementation of cortex-like object recognition model. IET Image Process. 14(14): 3490-3498 (2020) - [j50]Majid M. Niknam, Sadegh Sadeghi, Mohammad Reza Aref, Nasour Bagheri:
Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants. ISC Int. J. Inf. Secur. 12(1): 13-23 (2020) - [j49]Mohsen Jahanbani, Nasour Bagheri, Zynolabedin Norouzi:
CPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking. ISC Int. J. Inf. Secur. 12(2): 67-80 (2020) - [j48]Navid Vafaei, Sayandeep Saha, Nasour Bagheri, Debdeep Mukhopadhyay:
Fault Attack on SKINNY Cipher. J. Hardw. Syst. Secur. 4(4): 277-296 (2020) - [j47]Mohsen Jahanbani, Nasour Bagheri, Zeinolabedin Norouzi:
Lightweight implementation of SILC, CLOC, AES-JAMBU and COLM authenticated ciphers. Microprocess. Microsystems 72 (2020) - [j46]Samad Rostampour, Masoumeh Safkhani, Ygal Bendavid, Nasour Bagheri:
ECCbAP: A secure ECC-based authentication protocol for IoT edge devices. Pervasive Mob. Comput. 67: 101194 (2020) - [i35]Sadegh Sadeghi, Nasour Bagheri:
An argument on the security of LRBC, a recently proposed lightweight block cipher. IACR Cryptol. ePrint Arch. 2020: 392 (2020) - [i34]Sadegh Sadeghi, Vincent Rijmen, Nasour Bagheri:
Proposing an MILP-based Method for the Experimental Verification of Difference Trails. IACR Cryptol. ePrint Arch. 2020: 632 (2020) - [i33]Hosein Hadipour, Nasour Bagheri, Ling Song:
Improved Rectangle Attacks on SKINNY and CRAFT. IACR Cryptol. ePrint Arch. 2020: 1317 (2020)
2010 – 2019
- 2019
- [j45]Mohsen Jahanbani, Zeinolabedin Norouzi, Nasour Bagheri:
DPA Protected Implementation of OCB and COLM Authenticated Ciphers. IEEE Access 7: 139815-139826 (2019) - [j44]Saeide Sheikhpour, Ali Mahani, Nasour Bagheri:
Practical fault resilient hardware implementations of AES. IET Circuits Devices Syst. 13(5): 596-606 (2019) - [j43]Saeide Sheikhpour, Ali Mahani, Nasour Bagheri:
High throughput fault-resilient AES architecture. IET Comput. Digit. Tech. 13(4): 312-323 (2019) - [j42]Akbar Mahmoodi Rishakani, Yousef Fekri Dabanloo, Seyed Mojtaba Dehnavi, Mohammad Reza Mirzaee Shamsabad, Nasour Bagheri:
A Note on the Construction of Lightweight Cyclic MDS Matrices. Int. J. Netw. Secur. 21(2): 269-274 (2019) - [j41]Sadegh Sadeghi, Nasour Bagheri:
Security analysis of SIMECK block cipher against related-key impossible differential. Inf. Process. Lett. 147: 14-21 (2019) - [j40]Akbar Mahmoodi Rishakani, Mohammad Reza Mirzaee Shamsabad, Seyed Mojtaba Dehnavi, Mohammad Amin Amiri, Hamidreza Maimani, Nasour Bagheri:
Lightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives. ISC Int. J. Inf. Secur. 11(1): 35-46 (2019) - [j39]S. Ehsan Hosiny Nezhad, Masoumeh Safkhani, Nasour Bagheri:
Relaxed Differential Fault Analysis of SHA-3. ISC Int. J. Inf. Secur. 11(2): 129-143 (2019) - [j38]Hosein Hadipour, Sadegh Sadeghi, Majid M. Niknam, Ling Song, Nasour Bagheri:
Comprehensive security analysis of CRAFT. IACR Trans. Symmetric Cryptol. 2019(4): 290-317 (2019) - [i32]Masoumeh Safkhani, Nasour Bagheri:
Cryptanalysis of two recently proposed ultralightweight authentication protocol for IoT. CoRR abs/1907.11322 (2019) - [i31]Hosein Hadipour, Sadegh Sadeghi, Majid M. Niknam, Nasour Bagheri:
Comprehensive security analysis of CRAFT. IACR Cryptol. ePrint Arch. 2019: 741 (2019) - [i30]Morteza Adeli, Nasour Bagheri:
Cryptanalysis of an Ultra lightweight Authentication Scheme based on Permutation Matrix Encryption for Internet of Vehicles. IACR Cryptol. ePrint Arch. 2019: 850 (2019) - [i29]Masoumeh Safkhani, Ygal Bendavid, Samad Rostampour, Nasour Bagheri:
On Designing Lightweight RFID Security Protocols for Medical IoT. IACR Cryptol. ePrint Arch. 2019: 851 (2019) - [i28]Mohsen Jahanbani, Zeinolabedin Norouzi, Nasour Bagheri:
CPA on Hardware Implementation of COLM Authenticated Cipher and Protect it with DOM Masking Scheme. IACR Cryptol. ePrint Arch. 2019: 954 (2019) - [i27]Morteza Adeli, Nasour Bagheri:
Cryptanalysis of two recently proposed PUF based authentication protocols for IoT: PHEMAP and Salted PHEMAP. IACR Cryptol. ePrint Arch. 2019: 1461 (2019) - 2018
- [j37]Masoumeh Safkhani, Nasour Bagheri, Mahyar Shariat:
On the Security of Rotation Operation Based Ultra-Lightweight Authentication Protocols for RFID Systems. Future Internet 10(9): 82 (2018) - [j36]Nasour Bagheri, Seyed Farhad Aghili, Masoumeh Safkhani:
On the security of two ownership transfer protocols and their improvements. Int. Arab J. Inf. Technol. 15(1): 87-93 (2018) - [j35]Sadegh Sadeghi, Nasour Bagheri:
Improved zero-correlation and impossible differential cryptanalysis of reduced-round SIMECK block cipher. IET Inf. Secur. 12(4): 314-325 (2018) - [j34]Ygal Bendavid, Nasour Bagheri, Masoumeh Safkhani, Samad Rostampour:
IoT Device Security: Challenging "A Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function". Sensors 18(12): 4444 (2018) - [j33]Mojtaba Eslamnezhad Namin, Mehdi Hosseinzadeh, Nasour Bagheri, Ahmad Khademzadeh:
A secure search protocol for lightweight and low-cost RFID systems. Telecommun. Syst. 67(4): 539-552 (2018) - [j32]Samad Rostampour, Nasour Bagheri, Mehdi Hosseinzadeh, Ahmad Khademzadeh:
A Scalable and Lightweight Grouping Proof Protocol for Internet of Things Applications. J. Supercomput. 74(1): 71-86 (2018) - [j31]Nasour Bagheri, Masoumeh Safkhani, Mojtaba Eslamnezhad Namin, Samad Rostampour:
An improved low-cost yoking proof protocol based on Kazahaya's flaws. J. Supercomput. 74(5): 1934-1948 (2018) - [j30]Sadegh Sadeghi, Tahereh Mohammadi, Nasour Bagheri:
Cryptanalysis of Reduced round SKINNY Block Cipher. IACR Trans. Symmetric Cryptol. 2018(3): 124-162 (2018) - [c22]Navid Vafaei, Nasour Bagheri, Sayandeep Saha, Debdeep Mukhopadhyay:
Differential Fault Attack on SKINNY Block Cipher. SPACE 2018: 177-197 - [i26]Sadegh Sadeghi, Nasour Bagheri:
Cryptanalysis of SFN Block Cipher. IACR Cryptol. ePrint Arch. 2018: 594 (2018) - 2017
- [j29]Nasour Bagheri, Parvin Alenaby, Masoumeh Safkhani:
A new anti-collision protocol based on information of collided tags in RFID systems. Int. J. Commun. Syst. 30(3) (2017) - [j28]Masoumeh Safkhani, Nasour Bagheri, Mehdi Hosseinzadeh, Mojtaba Eslamnezhad Namin, Samad Rostampour:
On the security of an RFID-based parking lot management system. Int. J. Commun. Syst. 30(15) (2017) - [j27]Sadegh Sadeghi, Nasour Bagheri, Mohamed Ahmed Abdelraheem:
Cryptanalysis of reduced QTL block cipher. Microprocess. Microsystems 52: 34-48 (2017) - [j26]Masoumeh Safkhani, Nasour Bagheri:
Passive secret disclosure attack on an ultralightweight authentication protocol for Internet of Things. J. Supercomput. 73(8): 3579-3585 (2017) - [j25]Masoumeh Safkhani, Mehdi Hosseinzadeh, Mojtaba Eslamnezhad Namin, Samad Rostampour, Nasour Bagheri:
On the (Im)Possibility of Receiving Security Beyond 2 l Using an l-Bit PRNG. Wirel. Pers. Commun. 92(4): 1591-1597 (2017) - [c21]Hoda Jannati, Nasour Bagheri, Masoumeh Safkhani:
Analysis of a Distance Bounding Protocol for Verifying the Proximity of Two-Hop Neighbors. ISCISC 2017: 31-36 - 2016
- [j24]Praveen Gauravaram, Nasour Bagheri, Lars R. Knudsen:
Building indifferentiable compression functions from the PGV compression functions. Des. Codes Cryptogr. 78(2): 547-581 (2016) - [j23]Masoumeh Safkhani, Nasour Bagheri:
A note on the security of two improved RFID protocols. ISC Int. J. Inf. Secur. 8(2): 155-160 (2016) - [j22]Samad Rostampour, Nasour Bagheri, Mehdi Hosseinzadeh, Ahmad Khademzadeh:
An authenticated encryption based grouping proof protocol for RFID systems. Secur. Commun. Networks 9(18): 5581-5590 (2016) - [c20]Nasour Bagheri, Florian Mendel, Yu Sasaki:
Improved Rebound Attacks on AESQ: Core Permutation of CAESAR Candidate PAEQ. ACISP (2) 2016: 301-316 - [c19]Nasour Bagheri, Tao Huang, Keting Jia, Florian Mendel, Yu Sasaki:
Cryptanalysis of Reduced NORX. FSE 2016: 554-574 - [c18]Masoumeh Safkhani, Hoda Jannati, Nasour Bagheri:
Security Analysis of Niu et al. Authentication and Ownership Management Protocol. RFIDSec 2016: 3-16 - [i25]Nasour Bagheri, Tao Huang, Keting Jia, Florian Mendel, Yu Sasaki:
Cryptanalysis of Reduced NORX. IACR Cryptol. ePrint Arch. 2016: 436 (2016) - [i24]Masoumeh Safkhani, Nasour Bagheri:
Passive Secret Disclosure Attack on an Ultralightweight Authentication Protocol for Internet of Things. IACR Cryptol. ePrint Arch. 2016: 838 (2016) - [i23]Masoumeh Safkhani, Nasour Bagheri:
Generalized Desynchronization Attack on UMAP: Application to RCIA, KMAP, SLAP and SASI+ protocols. IACR Cryptol. ePrint Arch. 2016: 905 (2016) - [i22]Sadegh Sadeghi, Tahere Mohammadi, Nasour Bagheri:
Cryptanalysis of Reduced round SKINNY Block Cipher. IACR Cryptol. ePrint Arch. 2016: 1120 (2016) - 2015
- [j21]Javad Alizadeh, Mohammad Reza Aref, Nasour Bagheri, Hassan Sadeghi:
Cryptanalysis of some first round CAESAR candidates. ISC Int. J. Inf. Secur. 7(2): 127-134 (2015) - [j20]Nasour Bagheri, Fatemeh Baghernejhad, Masoumeh Safkhani:
On the Designing of EPC C1 G2 Authentication protocol using AKARI-1 and AKARI-2 PRNGs. Inf. Technol. Control. 44(1): 41-53 (2015) - [j19]Pablo Picazo-Sanchez, Lara Ortiz-Martin, Pedro Peris-Lopez, Nasour Bagheri:
Weaknesses of fingerprint-based mutual authentication protocol. Secur. Commun. Networks 8(12): 2124-2134 (2015) - [c17]Nasour Bagheri:
Linear Cryptanalysis of Reduced-Round SIMECK Variants. INDOCRYPT 2015: 140-152 - [c16]Mohamed Ahmed Abdelraheem, Javad Alizadeh, Hoda A. Alkhzaimi, Mohammad Reza Aref, Nasour Bagheri, Praveen Gauravaram:
Improved Linear Cryptanalysis of Reduced-Round SIMON-32 and SIMON-48. INDOCRYPT 2015: 153-179 - [c15]Nasour Bagheri, Navid Ghaedi, Somitra Kumar Sanadhya:
Differential Fault Analysis of SHA-3. INDOCRYPT 2015: 253-269 - [i21]Masoumeh Safkhani, Nasour Bagheri, Mehdi Hosseinzadeh, Mojtaba Eslamnezhad Namin, Samad Rostampour:
On the (im)possibility of receiving security beyond 2l using an l-bit PRNG: the case of Wang et. al. protocol. IACR Cryptol. ePrint Arch. 2015: 365 (2015) - [i20]Nasour Bagheri, Masoumeh Safkhani, Hoda Jannati:
Security Analysis of Niu et al. Authentication and Ownership Management Protocol. IACR Cryptol. ePrint Arch. 2015: 615 (2015) - [i19]Nasour Bagheri:
Linear Cryptanalysis of Reduced-Round SIMECK Variants. IACR Cryptol. ePrint Arch. 2015: 716 (2015) - [i18]Mohamed Ahmed Abdelraheem, Javad Alizadeh, Hoda Alkhzaimi, Mohammad Reza Aref, Nasour Bagheri, Praveen Gauravaram:
Improved Linear Cryptanalysis of reduced-round SIMON-32 and SIMON-48. IACR Cryptol. ePrint Arch. 2015: 988 (2015) - 2014
- [j18]Masoumeh Safkhani, Nasour Bagheri, Majid Naderi:
A note on the security of IS-RFID, an inpatient medication safety. Int. J. Medical Informatics 83(1): 82-85 (2014) - [j17]Javad Alizadeh, Mohammad Reza Aref, Nasour Bagheri:
Artemia: a family of provably secure authenticated encryption schemes. ISC Int. J. Inf. Secur. 6(2): 125-139 (2014) - [j16]Masoumeh Safkhani, Nasour Bagheri, Ali Mahani:
On the security of RFID anti-counting security protocol (ACSP). J. Comput. Appl. Math. 259: 512-521 (2014) - [j15]Masoumeh Safkhani, Pedro Peris-Lopez, Julio César Hernández Castro, Nasour Bagheri:
Cryptanalysis of the Cho et al. protocol: A hash-based RFID tag mutual authentication protocol. J. Comput. Appl. Math. 259: 571-577 (2014) - [j14]Nasour Bagheri, Masoumeh Safkhani, Majid Naderi:
Cryptanalysis of a new EPC class-1 generation-2 standard compliant RFID protocol. Neural Comput. Appl. 24(3-4): 799-805 (2014) - [j13]Nasour Bagheri, Masoumeh Safkhani, Pedro Peris-Lopez, Juan E. Tapiador:
Weaknesses in a new ultralightweight RFID authentication protocol with permutation - RAPP. Secur. Commun. Networks 7(6): 945-949 (2014) - [c14]Javad Alizadeh, Hoda Alkhzaimi, Mohammad Reza Aref, Nasour Bagheri, Praveen Gauravaram, Abhishek Kumar, Martin M. Lauridsen, Somitra Kumar Sanadhya:
Cryptanalysis of SIMON Variants with Connections. RFIDSec 2014: 90-107 - [i17]Javad Alizadeh, Mohammad Reza Aref, Nasour Bagheri:
JHAE: An Authenticated Encryption Mode Based on JH. IACR Cryptol. ePrint Arch. 2014: 193 (2014) - [i16]Javad Alizadeh, Hoda Alkhzaimi, Mohammad Reza Aref, Nasour Bagheri, Praveen Gauravaram, Martin M. Lauridsen:
Improved Linear Cryptanalysis of Round Reduced SIMON. IACR Cryptol. ePrint Arch. 2014: 681 (2014) - 2013
- [j12]Nasour Bagheri, Reza Ebrahimpour, Navid Ghaedi:
New differential fault analysis on PRESENT. EURASIP J. Adv. Signal Process. 2013: 145 (2013) - [j11]Nasour Bagheri, Masoumeh Safkhani, Pedro Peris-Lopez, Juan E. Tapiador:
Comments on "Security Improvement of an RFID Security Protocol of ISO/IEC WD 29167-6". IEEE Commun. Lett. 17(4): 805-807 (2013) - [j10]Nasour Bagheri, Reza Ebrahimpour, Navid Ghaedi:
Differential fault analysis on PRINTcipher. IET Networks 2(1) (2013) - [j9]Pablo Picazo-Sanchez, Nasour Bagheri, Pedro Peris-Lopez, Juan E. Tapiador:
Two RFID Standard-based Security Protocols for Healthcare Environments. J. Medical Syst. 37(5): 9962 (2013) - [j8]Amir Ahangi, Mehdi Karamnejad, Nima Mohammadi, Reza Ebrahimpour, Nasour Bagheri:
Multiple classifier system for EEG signal classification with application to brain-computer interfaces. Neural Comput. Appl. 23(5): 1319-1327 (2013) - [j7]Masoumeh Safkhani, Nasour Bagheri, Majid Naderi:
Strengthening the Security of EPC C-1 G-2 RFID Standard. Wirel. Pers. Commun. 72(2): 1295-1308 (2013) - [c13]Nasour Bagheri, Praveen Gauravaram, Masoumeh Safkhani, Somitra Kumar Sanadhya:
Desynchronization and Traceability Attacks on RIPTA-DA Protocol. RFIDSec 2013: 57-68 - [c12]Seyed Farhad Aghili, Nasour Bagheri, Praveen Gauravaram, Masoumeh Safkhani, Somitra Kumar Sanadhya:
On the Security of Two RFID Mutual Authentication Protocols. RFIDSec 2013: 86-99 - [i15]Nasour Bagheri, Masoumeh Safkhani:
Secret Disclosure attack on Kazahaya, a Yoking-Proof For Low-Cost RFID Tags. IACR Cryptol. ePrint Arch. 2013: 453 (2013) - [i14]Masoumeh Safkhani, Nasour Bagheri:
For an EPC-C1 G2 RFID compliant Protocol, CRC with Concatenation : No; PRNG with Concatenation : Yes. IACR Cryptol. ePrint Arch. 2013: 490 (2013) - [i13]Javad Alizadeh, Nasour Bagheri, Praveen Gauravaram, Abhishek Kumar, Somitra Kumar Sanadhya:
Linear Cryptanalysis of Round Reduced SIMON. IACR Cryptol. ePrint Arch. 2013: 663 (2013) - 2012
- [j6]Nasour Bagheri, Praveen Gauravaram, Lars R. Knudsen, Erik Zenner:
The suffix-free-prefix-free hash function construction and its indifferentiability security analysis. Int. J. Inf. Sec. 11(6): 419-434 (2012) - [j5]Masoumeh Safkhani, Nasour Bagheri, Majid Naderi:
On the Designing of a Tamper Resistant Prescription RFID Access Control System. J. Medical Syst. 36(6): 3995-4004 (2012) - [c11]Masoumeh Safkhani, Pedro Peris-Lopez, Nasour Bagheri, Majid Naderi, Julio César Hernández Castro:
On the Security of Tan et al. Serverless RFID Authentication and Search Protocols. RFIDSec 2012: 1-19 - [c10]Masoumeh Safkhani, Nasour Bagheri, Pedro Peris-Lopez, Aikaterini Mitrokotsa, Julio C. Hernandez-Castro:
Weaknesses in another Gen2-based RFID authentication protocol. RFID-TA 2012: 80-84 - [c9]Masoumeh Safkhani, Nasour Bagheri, Pedro Peris-Lopez, Aikaterini Mitrokotsa:
On the traceability of tags in SUAP RFID authentication protocols. RFID-TA 2012: 292-296 - [c8]Julio César Hernández Castro, Pedro Peris-Lopez, Masoumeh Safkhani, Nasour Bagheri, Majid Naderi:
Another Fallen Hash-Based RFID Authentication Protocol. WISTP 2012: 29-37 - [i12]Masoumeh Safkhani, Nasour Bagheri, Majid Naderi:
How a Cryptographer Can Get Rich? IACR Cryptol. ePrint Arch. 2012: 23 (2012) - [i11]Masoumeh Safkhani, Nasour Bagheri, Majid Naderi:
On the Traceability of Tags in SUAP RFID Authentication Protocols. IACR Cryptol. ePrint Arch. 2012: 334 (2012) - [i10]Nasour Bagheri, Masoumeh Safkhani, Pedro Peris-Lopez, Juan E. Tapiador:
Cryptanalysis of RAPP, an RFID Authentication Protocol. IACR Cryptol. ePrint Arch. 2012: 702 (2012) - 2011
- [c7]Masoumeh Safkhani, Nasour Bagheri, Majid Naderi, Yiyuan Luo, Qi Chai:
Tag Impersonation Attack on Two RFID Mutual Authentication Protocols. ARES 2011: 581-584 - [c6]Praveen Gauravaram, Lars R. Knudsen, Nasour Bagheri, Lei Wei:
Improved Security Analysis of Fugue-256 (Poster). ACISP 2011: 428-432 - [c5]Masoumeh Safkhani, Nasour Bagheri, Somitra Kumar Sanadhya, Majid Naderi, Hamid Behnam:
On the Security of Mutual Authentication Protocols for RFID Systems: The Case of Wei et al.'s Protocol. DPM/SETOP 2011: 90-103 - [c4]Masoumeh Safkhani, Nasour Bagheri, Majid Naderi:
Vulnerabilities in a new RFID access control protocol. ICITST 2011: 500-503 - [c3]Masoumeh Safkhani, Nasour Bagheri, Majid Naderi, Somitra Kumar Sanadhya:
Security analysis of LMAP++, an RFID authentication protocol. ICITST 2011: 689-694 - [i9]Masoumeh Safkhani, Majid Naderi, Nasour Bagheri, Somitra Kumar Sanadhya:
Cryptanalysis of Some Protocols for RFID Systems. IACR Cryptol. ePrint Arch. 2011: 61 (2011) - [i8]Nasour Bagheri, Masoumeh Safkhani, Majid Naderi, Somitra Kumar Sanadhya:
Security Analysis of LMAP++, an RFID Authentication Protocol. IACR Cryptol. ePrint Arch. 2011: 193 (2011) - [i7]Masoumeh Safkhani, Nasour Bagheri, Majid Naderi:
Cryptanalysis of Chen et al.'s RFID Access Control Protocol. IACR Cryptol. ePrint Arch. 2011: 194 (2011) - [i6]Masoumeh Safkhani, Pedro Peris-Lopez, Julio César Hernández Castro, Nasour Bagheri, Majid Naderi:
Cryptanalysis of Cho et al.'s Protocol, A Hash-Based Mutual Authentication Protocol for RFID Systems. IACR Cryptol. ePrint Arch. 2011: 331 (2011) - [i5]Masoumeh Safkhani, Nasour Bagheri, Majid Naderi:
Cryptanalysis of AZUMI: an EPC Class-1 Generation-2 Standard Compliant RFID Authentication Protocol. IACR Cryptol. ePrint Arch. 2011: 424 (2011) - [i4]Masoumeh Safkhani, Nasour Bagheri, Somitra Kumar Sanadhya, Majid Naderi:
Cryptanalysis of improved Yeh et al.'s authentication Protocol: An EPC Class-1 Generation-2 standard compliant protocol. IACR Cryptol. ePrint Arch. 2011: 426 (2011) - [i3]Masoumeh Safkhani, Nasour Bagheri, Majid Naderi:
On the Security of RFID Anti Cloning Security Protocol(ACSP). IACR Cryptol. ePrint Arch. 2011: 563 (2011) - [i2]Masoumeh Safkhani, Nasour Bagheri, Majid Naderi:
Security Analysis of a PUF based RFID Authentication Protocol. IACR Cryptol. ePrint Arch. 2011: 704 (2011) - 2010
- [j4]Masoumeh Safkhani, Majid Naderi, Nasour Bagheri:
Cryptanalysis of AFMAP. IEICE Electron. Express 7(17): 1240-1245 (2010) - [j3]Nasour Bagheri, Praveen Gauravaram, Majid Naderi, Babak Sadeghiyan:
EPC: A Provably Secure Permutation Based Compression Function. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(10): 1833-1836 (2010) - [c2]Nasour Bagheri, Praveen Gauravaram, Majid Naderi, Søren S. Thomsen:
On the Collision and Preimage Resistance of Certain Two-Call Hash Functions. CANS 2010: 96-105
2000 – 2009
- 2009
- [j2]Nasour Bagheri, Lars R. Knudsen, Majid Naderi, Søren S. Thomsen:
Hash Functions and Information Theoretic Security. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(12): 3401-3403 (2009) - [j1]Nasour Bagheri, Matt Henricksen, Lars R. Knudsen, Majid Naderi, B. Sadeghyian:
Cryptanalysis of an iterated halving-based hash function: CRUSH. IET Inf. Secur. 3(4): 129-138 (2009) - 2008
- [c1]Nasour Bagheri, Babak Sadeghiyan, Majid Naderi:
Multi-Collisions Attack in Ring Hash Structure. SECRYPT 2008: 278-284 - [i1]Nasour Bagheri, Majid Naderi, Babak Sadeghiyan:
Cryptanalysis of CRUSH hash structure. IACR Cryptol. ePrint Arch. 2008: 43 (2008)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 21:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint