Follow
Mohammad Dakhilalian
Mohammad Dakhilalian
Other namesSeyedMohammad Dakhilalian, SM Dakhilalian, Mohammad Dakhlalian
Isfahan University of Technology, Electrical and Computer Engineering (ECE)
Verified email at iut.ac.ir - Homepage
Title
Cited by
Cited by
Year
Improved impossible differential cryptanalysis of 7-round AES-128
H Mala, M Dakhilalian, V Rijmen, M Modarres-Hashemi
Progress in Cryptology-INDOCRYPT 2010: 11th International Conference on …, 2010
1622010
On construction of involutory MDS matrices from Vandermonde Matrices in GF(2 q )
M Sajadieh, M Dakhilalian, H Mala, B Omoomi
Designs, Codes and Cryptography 64, 287-308, 2012
1042012
Recursive diffusion layers for block ciphers and hash functions
M Sajadieh, M Dakhilalian, H Mala, P Sepehrdad
Fast Software Encryption: 19th International Workshop, FSE 2012, Washington …, 2012
1022012
New results on impossible differential cryptanalysis of reduced–round Camellia–128
H Mala, M Shakiba, M Dakhilalian, G Bagherikaram
Selected Areas in Cryptography: 16th Annual International Workshop, SAC 2009 …, 2009
412009
Efficient chameleon hash functions in the enhanced collision resistant model
M Khalili, M Dakhilalian, W Susilo
Information Sciences 510, 155-164, 2020
402020
Cryptanalysis of mCrypton—A lightweight block cipher for security of RFID tags and sensors
H Mala, M Dakhilalian, M Shakiba
International Journal of Communication Systems 25 (4), 415-426, 2012
392012
Biclique cryptanalysis of MIBS‐80 and PRESENT‐80 block ciphers
MH Faghihi Sereshgi, M Dakhilalian, M Shakiba
Security and Communication Networks 9 (1), 27-33, 2016
302016
Impossible differential attacks on 13-round CLEFIA-128
H Mala, M Dakhilalian, M Shakiba
Journal of Computer Science and Technology 26, 744-750, 2011
302011
Feasibility analysis for sybil attacks in shard-based permissionless blockchains
T Rajabi, AA Khalil, MH Manshaei, MA Rahman, M Dakhilalian, ...
Distributed Ledger Technologies: Research and Practice 2 (4), 1-21, 2023
292023
New secure channel coding scheme based on randomly punctured quasi‐cyclic‐low density parity check codes
M Esmaeili, M Dakhilalian, TA Gulliver
IET Communications 8 (14), 2556-2562, 2014
272014
Universal designated verifier signature scheme with non-delegatability in the standard model
P Rastegari, M Berenjkoub, M Dakhilalian, W Susilo
Information Sciences 479, 321-334, 2019
262019
Efficient recursive diffusion layers for block ciphers and hash functions
M Sajadieh, M Dakhilalian, H Mala, P Sepehrdad
Journal of Cryptology 28, 240-256, 2015
262015
Efficient Certificateless Signcryption in the standard model: Revisiting Luo and Wan’s scheme from wireless personal communications (2018)
MD Parvin Rastegari, Willy Susilo
The Computer Journal 62 (8), 1178-1193, 2019
252019
Certificateless designated verifier signature revisited: achieving a concrete scheme in the standard model
P Rastegari, W Susilo, M Dakhilalian
International Journal of Information Security 18, 619-635, 2019
242019
Structure-preserving signatures on equivalence classes from standard assumptions
M Khalili, D Slamanig, M Dakhilalian
Advances in Cryptology–ASIACRYPT 2019: 25th International Conference on the …, 2019
192019
Non-isomorphic biclique cryptanalysis and its application to full-round mCrypton
M Shakiba, M Dakhilalian, H Mala
Cryptology ePrint Archive, 2013
172013
New impossible differential attacks on reduced-round Crypton
H Mala, M Shakiba, M Dakhilalian
Computer Standards & Interfaces 32 (4), 222-227, 2010
152010
Impossible differential cryptanalysis of reduced–round Camellia–256
H Mala, M Dakhilalian, M Shakiba
IET information security 5 (3), 129-134, 2011
112011
Non-isomorphic biclique cryptanalysis of full-round Crypton
M Shakiba, M Dakhilalian, H Mala
Computer Standards & Interfaces 41, 72-78, 2015
92015
Multi‐designated verifiers signature schemes with threshold verifiability: generic pattern and a concrete scheme in the standard model
P Rastegari, M Dakhilalian, M Berenjkoub, W Susilo
IET Information Security 13 (5), 459-468, 2019
72019
The system can't perform the operation now. Try again later.
Articles 1–20