Javad Mohajeri
Javad Mohajeri
Verified email at sharif.edu
Title
Cited by
Cited by
Year
Secure untraceable off-line electronic cash system
Y Baseri, B Takhtaei, J Mohajeri
Scientia Iranica 20 (3), 637-646, 2013
282013
A provably secure short transitive signature scheme from bilinear group pairs
SF Shahandashti, M Salmasizadeh, J Mohajeri
International Conference on Security in Communication Networks, 60-76, 2004
282004
Low-data complexity biclique cryptanalysis of block ciphers with application to piccolo and hight
S Ahmadi, Z Ahmadian, J Mohajeri, MR Aref
IEEE Transactions on Information Forensics and Security 9 (10), 1641-1652, 2014
262014
A key-policy attribute-based temporary keyword search scheme for secure cloud storage
MH Ameri, M Delavar, J Mohajeri, M Salmasizadeh
IEEE Transactions on Cloud Computing, 2018
212018
PUF‐based solutions for secure communications in Advanced Metering Infrastructure (AMI)
M Delavar, S Mirzakuchaki, MH Ameri, J Mohajeri
International Journal of Communication Systems 30 (9), e3195, 2017
202017
Immunological and histopathological changes in Penaeus semisulcatus challenged with Vibrio harveyi
J Mohajeri, M Afsharnasab, B Jalali, S Kakoolaki, M Sharifrohani, ...
Iranian Journal of Fisheries Sciences 10 (2), 254-265, 2011
202011
Impossible differential cryptanalysis of Piccolo lightweight block cipher
SA Azimi, Z Ahmadian, J Mohajeri, MR Aref
2014 11th International ISC Conference on Information Security and …, 2014
182014
A ring oscillator-based PUF with enhanced challenge-response pairs
M Delavar, S Mirzakuchaki, J Mohajeri
Canadian Journal of Electrical and Computer Engineering 39 (2), 174-180, 2016
112016
On the security of an ECC based RFID authentication protocol
P Babaheidarian, M Delavar, J Mohajeri
2012 9th International ISC Conference on Information Security and Cryptology …, 2012
102012
Guess and determine attack on trivium family
N Rohani, Z Noferesti, J Mohajeri, MR Aref
2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing …, 2010
102010
On the security of an ECC based RFID authentication protocol
P Babaheidarian, M Delavar, J Mohajeri
10*
Improved impossible differential and biclique cryptanalysis of hight
SA Azimi, S Ahmadi, Z Ahmadian, J Mohajeri, MR Aref
International Journal of Communication Systems 31 (1), e3382, 2018
92018
A practical distinguisher for the Shannon cipher
Z Ahmadian, J Mohajeri, M Salmasizadeh, RM Hakala, K Nyberg
Journal of Systems and Software 83 (4), 543-547, 2010
92010
An efficient and secure data sharing in Smart Grid: Ciphertext-policy attribute-based signcryption
SM Sedaghat, MH Ameri, J Mohajeri, MR Aref
2017 Iranian Conference on Electrical Engineering (ICEE), 2003-2008, 2017
72017
Superpoly algebraic normal form monomial test on Trivium
A Vardasbi, M Salmasizadeh, J Mohajeri
IET Information Security 7 (3), 230-238, 2013
72013
Impossible differential cryptanalysis of reduced-round midori64 block cipher
AR Shahmirzadi, SA Azimi, M Salmasizadeh, J Mohajeri, MR Aref
2017 14th International ISC (Iranian Society of Cryptology) Conference on …, 2017
62017
A secure attribute based keyword search scheme against keyword guessing attack
V Yousefipoor, MH Ameri, J Mohajeri, T Eghlidos
2016 8th International Symposium on Telecommunications (IST), 124-128, 2016
62016
GSL-AKA: Group-based Secure Lightweight Authentication and Key Agreement Protocol for M2M Communication
MM Modiri, J Mohajeri, M Salmasizadeh
2018 9th International Symposium on Telecommunications (IST), 275-280, 2018
52018
A verifiable delegated set intersection without pairing
MM Oliaiy, MH Ameri, J Mohajeri, MR Aref
2017 Iranian Conference on Electrical Engineering (ICEE), 2047-2051, 2017
52017
Biclique cryptanalysis of LBlock with modified key schedule
S Ahmadi, Z Ahmadian, J Mohajeri, MR Aref
2015 12th International Iranian Society of Cryptology Conference on …, 2015
52015
The system can't perform the operation now. Try again later.
Articles 1–20