Javad Mohajeri
Javad Mohajeri
Verified email at sharif.edu
TitleCited byYear
A provably secure short transitive signature scheme from bilinear group pairs
SF Shahandashti, M Salmasizadeh, J Mohajeri
International Conference on Security in Communication Networks, 60-76, 2004
262004
Secure untraceable off-line electronic cash system
Y Baseri, B Takhtaei, J Mohajeri
Scientia Iranica 20 (3), 637-646, 2013
232013
Low-data complexity biclique cryptanalysis of block ciphers with application to Piccolo and HIGHT
S Ahmadi, Z Ahmadian, J Mohajeri, MR Aref
IEEE Transactions on Information Forensics and Security 9 (10), 1641-1652, 2014
192014
Immunological and histopathological changes in Penaeus semisulcatus challenged with Vibrio harveyi
J Mohajeri, M Afsharnasab, B Jalali, S Kakoolaki, M Sharifrohani, ...
Iranian Journal of Fisheries Sciences 10 (2), 254-265, 2011
172011
PUF‐based solutions for secure communications in Advanced Metering Infrastructure (AMI)
M Delavar, S Mirzakuchaki, MH Ameri, J Mohajeri
International Journal of Communication Systems 30 (9), e3195, 2017
162017
Impossible differential cryptanalysis of Piccolo lightweight block cipher
SA Azimi, Z Ahmadian, J Mohajeri, MR Aref
2014 11th International ISC Conference on Information Security and …, 2014
152014
A key-policy attribute-based temporary keyword search scheme for secure cloud storage
MH Ameri, M Delavar, J Mohajeri, M Salmasizadeh
IEEE Transactions on Cloud Computing, 2018
92018
On the security of an ECC based RFID authentication protocol
P Babaheidarian, M Delavar, J Mohajeri
2012 9th International ISC Conference on Information Security and Cryptology …, 2012
92012
On the security of an ECC based RFID authentication protocol
P Babaheidarian, M Delavar, J Mohajeri
9*
Guess and determine attack on trivium family
N Rohani, Z Noferesti, J Mohajeri, MR Aref
2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing …, 2010
82010
A practical distinguisher for the Shannon cipher
Z Ahmadian, J Mohajeri, M Salmasizadeh, RM Hakala, K Nyberg
Journal of Systems and Software 83 (4), 543-547, 2010
82010
A ring oscillator-based PUF with enhanced challenge-response pairs
M Delavar, S Mirzakuchaki, J Mohajeri
Canadian Journal of Electrical and Computer Engineering 39 (2), 174-180, 2016
72016
Superpoly algebraic normal form monomial test on Trivium
A Vardasbi, M Salmasizadeh, J Mohajeri
IET Information Security 7 (3), 230-238, 2013
72013
A secure attribute based keyword search scheme against keyword guessing attack
V Yousefipoor, MH Ameri, J Mohajeri, T Eghlidos
2016 8th International Symposium on Telecommunications (IST), 124-128, 2016
62016
An efficient and secure data sharing in Smart Grid: Ciphertext-policy attribute-based signcryption
SM Sedaghat, MH Ameri, J Mohajeri, MR Aref
2017 Iranian Conference on Electrical Engineering (ICEE), 2003-2008, 2017
52017
Improved impossible differential and biclique cryptanalysis of HIGHT
SA Azimi, S Ahmadi, Z Ahmadian, J Mohajeri, MR Aref
International Journal of Communication Systems 31 (1), e3382, 2018
42018
A verifiable delegated set intersection without pairing
MM Oliaiy, MH Ameri, J Mohajeri, MR Aref
2017 Iranian Conference on Electrical Engineering (ICEE), 2047-2051, 2017
42017
Multiple-chi-square tests and their application on distinguishing attacks
A Vardasbi, M Salmasizadeh, J Mohajeri
2011 8th International ISC Conference on Information Security and Cryptology …, 2011
42011
A Related Key Attack on the Feistel Type Block Ciphers.
A Bagherzandi, M Salmasizadeh, J Mohajeri
IJ Network Security 8 (3), 221-226, 2009
42009
Double Voter Perceptible Blind Signature Based Electronic Voting Protocol.
Y Baseri, AS Mortazavi, MR Asaar, M Pourpouneh, J Mohajeri
IACR Cryptology ePrint Archive 2009, 424, 2009
42009
The system can't perform the operation now. Try again later.
Articles 1–20