2009 |
18 | EE | Amir Moradi,
Mehrdad Khatir,
Mahmoud Salmasizadeh,
Mohammad T. Manzuri Shalmani:
Charge recovery logic as a side channel attack countermeasure.
ISQED 2009: 686-691 |
2008 |
17 | EE | Thomas Eisenbarth,
Timo Kasper,
Amir Moradi,
Christof Paar,
Mahmoud Salmasizadeh,
Mohammad T. Manzuri Shalmani:
On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoqCode Hopping Scheme.
CRYPTO 2008: 203-220 |
16 | EE | Mehrdad Khatir,
Amir Moradi,
Alireza Ejlali,
Mohammad T. Manzuri Shalmani,
Mahmoud Salmasizadeh:
A secure and low-energy logic style using charge recovery approach.
ISLPED 2008: 259-264 |
15 | | Hoda Jannati,
Javad Mohajeri,
Mahmoud Salmasizadeh:
New Proxy Signature, Proxy Blind Signature and Blind Proxy Signature Based on the Okamoto Signature.
Security and Management 2008: 238-242 |
14 | | Maryam Rajabzadeh Asaar,
Javad Mohajeri,
Mahmoud Salmasizadeh:
Security Modification for the Hwang-Wen-Hwang's E-voting Scheme.
Security and Management 2008: 486-490 |
2007 |
13 | EE | Babak Zakeri,
Mahmoud Salmasizadeh,
Amir Moradi,
Mahmoud Tabandeh,
Mohammad T. Manzuri Shalmani:
Compact and Secure Design of Masked AES S-Box.
ICICS 2007: 216-229 |
12 | EE | Amir Moradi,
Mahmoud Salmasizadeh,
Mohammad T. Manzuri Shalmani:
Power Analysis Attacks on MDPL and DRSL Implementations.
ICISC 2007: 259-272 |
11 | | Kooshiar Azimian,
Javad Mohajeri,
Mahmoud Salmasizadeh:
A New Public Key Encryption Scheme Equivalent to Factoring.
Security and Management 2007: 546-552 |
2006 |
10 | EE | Amir Moradi,
Mohammad T. Manzuri Shalmani,
Mahmoud Salmasizadeh:
A Generalized Method of Differential Fault Attack Against AES Cryptosystem.
CHES 2006: 91-100 |
2005 |
9 | EE | Kooshiar Azimian,
Javad Mohajeri,
Mahmoud Salmasizadeh,
Siamak Fayyaz Shahandashti:
A Verifiable Partial Key Escrow, Based on McCurley Encryption Scheme
CoRR abs/cs/0505055: (2005) |
8 | EE | Ali Bagherzandi,
Kooshiar Azimian,
Javad Mohajeri,
Mahmoud Salmasizadeh:
Relations between semantic security and indistinguishability against cpa, non-adaptive cca and adaptive cca in comparison based framework
CoRR abs/cs/0508110: (2005) |
7 | EE | Kooshiar Azimian,
Mahmoud Salmasizadeh,
Javad Mohajeri:
Weak Composite Diffie-Hellman is not Weaker than Factoring
Electronic Colloquium on Computational Complexity (ECCC)(047): (2005) |
6 | EE | Kooshiar Azimian,
Javad Mohajeri,
Mahmoud Salmasizadeh,
Siamak Fayyaz Shahandashti:
A Verifiable Partial Key Escrow, Based on McCurley Encryption Scheme
Electronic Colloquium on Computational Complexity (ECCC)(078): (2005) |
2004 |
5 | EE | Siamak Fayyaz Shahandashti,
Mahmoud Salmasizadeh,
Javad Mohajeri:
A Provably Secure Short Transitive Signature Scheme from Bilinear Group Pairs.
SCN 2004: 60-76 |
2000 |
4 | EE | Jovan Dj. Golic,
Mahmoud Salmasizadeh,
Ed Dawson:
Fast Correlation Attacks on the Summation Generator.
J. Cryptology 13(2): 245-262 (2000) |
1999 |
3 | EE | Leone Simpson,
Jovan Dj. Golic,
Mahmoud Salmasizadeh,
Ed Dawson:
A Fast Correlation Attack on Multiplexer Generators.
Inf. Process. Lett. 70(2): 89-93 (1999) |
1997 |
2 | EE | Jovan Dj. Golic,
Mahmoud Salmasizadeh,
Leone Simpson,
Ed Dawson:
Fast Correlation Attacks on Nonlinear Filter Generators.
Inf. Process. Lett. 64(1): 37-42 (1997) |
1995 |
1 | | Jovan Dj. Golic,
Mahmoud Salmasizadeh,
Andrew Clark,
Abdollah Khodkar,
Ed Dawson:
Discrete Optimisation and Fast Correlation Attacks.
Cryptography: Policy and Algorithms 1995: 186-200 |