Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Mahdi Sajadieh"'
Publikováno v:
IET Computers & Digital Techniques, Vol 17, Iss 3-4, Pp 209-223 (2023)
Abstract Nowadays, the Internet of things (IoT) has extensively found its way into everyday life, raising the alarm regarding data security and user privacy. However, IoT devices have numerous limitations that inhibit the implementation of optimal co
Externí odkaz:
https://doaj.org/article/bc6be7d4cbd646c4b870c300e93aee68
Publikováno v:
Product Lifecycle Management. PLM in Transition Times: The Place of Humans and Transformative Technologies ISBN: 9783031251818
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::bc3fcaad311c1425181797b11a45dbfe
https://doi.org/10.1007/978-3-031-25182-5_36
https://doi.org/10.1007/978-3-031-25182-5_36
Autor:
Mahdi Sajadieh, Mohsen Mousavi
Publikováno v:
Designs, Codes and Cryptography. 89:1433-1452
This paper investigates the construction of $${\text {MDS}}$$ matrices with generalized Feistel structures ( $${\text {GFS}}$$ ). The approach developed by this paper consists in deriving $${\text {MDS}}$$ matrices from the product of several sparser
Publikováno v:
IET Information Security. 13:508-514
The Σ -protocols for homomorphism relations are one of the cryptographic protocols which are used to prove knowledge of homomorphism relations. The Schnorr protocol is one of the most famous Σ -protocols used for proving knowledge of discrete logar
Publikováno v:
Journal of Information Security and Applications. 67:103191
Publikováno v:
Wireless Personal Communications. 96:1393-1405
The existing secret sharing schemes suffer from resistance against quantum attacks or requirement to a secure channel. In this paper, we introduce a verifiable multi-secret sharing scheme using NTRU cryptosystem which is a post quantum cryptosystem.
Publikováno v:
Designs, Codes and Cryptography. 83:327-343
Security against differential and linear cryptanalysis is an essential requirement for modern block ciphers. This measure is usually evaluated by finding a lower bound for the minimum number of active S-boxes. The 128-bit block cipher AES which was a
Publikováno v:
دانش سیاسی, Vol 10, Iss 2, Pp 103-148 (2016)
After the Iranian revolution in 1979, the fledgling government of the Islamic Republic intended to lay the foundation of its limitations based on Islamic teachings and this has necessitated a path which can provide for a compromise between Islamic te
Autor:
Mahdi Sajadieh, Mohammad Vaziri
Publikováno v:
Progress in Cryptology – INDOCRYPT 2018 ISBN: 9783030053772
INDOCRYPT
INDOCRYPT
Some features of Feistel structures have caused them to be considered as an efficient structure for design of block ciphers. Although several structures are proposed relied on Feistel structure, the type-II generalized Feistel structures (GFS) based
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::985daee3051a0066a13e5fa188dd3ca0
https://doi.org/10.1007/978-3-030-05378-9_15
https://doi.org/10.1007/978-3-030-05378-9_15
Publikováno v:
Journal of Cryptology. 28:240-256
Many modern block ciphers use maximum distance separable (MDS) matrices as the main part of their diffusion layers. In this paper, we propose a very efficient new class of diffusion layers constructed from several rounds of Feistel-like structures wh