default search action
Sadegh Sadeghi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Sadegh Sadeghi, Nasour Bagheri:
Cryptanalysis of DBST, a lightweight block cipher. Frontiers Comput. Sci. 18(4): 184819 (2024) - [j12]Hosein Hadipour, Simon Gerhalter, Sadegh Sadeghi, Maria Eichlseder:
Improved Search for Integral, Impossible Differential and Zero-Correlation Attacks Application to Ascon, ForkSKINNY, SKINNY, MANTIS, PRESENT and QARMAv2. IACR Trans. Symmetric Cryptol. 2024(1): 234-325 (2024) - 2023
- [j11]Morteza Adeli, Nasour Bagheri, Sadegh Sadeghi, Saru Kumari:
χperbp: a cloud-based lightweight mutual authentication protocol. Peer Peer Netw. Appl. 16(4): 1785-1802 (2023) - [c1]Hosein Hadipour, Sadegh Sadeghi, Maria Eichlseder:
Finding the Impossible: Automated Search for Full Impossible-Differential, Zero-Correlation, and Integral Attacks. EUROCRYPT (4) 2023: 128-157 - [i9]Hosein Hadipour, Simon Gerhalter, Sadegh Sadeghi, Maria Eichlseder:
Improved Search for Integral, Impossible-Differential and Zero-Correlation Attacks: Application to Ascon, ForkSKINNY, SKINNY, MANTIS, PRESENT and QARMAv2. IACR Cryptol. ePrint Arch. 2023: 1701 (2023) - 2022
- [j10]Masoumeh Safkhani, Samad Rostampour, Ygal Bendavid, Sadegh Sadeghi, Nasour Bagheri:
Improving RFID/IoT-based generalized ultra-lightweight mutual authentication protocols. J. Inf. Secur. Appl. 67: 103194 (2022) - [j9]Nasour Bagheri, Sadegh Sadeghi, Prasanna Ravi, Shivam Bhasin, Hadi Soleimany:
SIPFA: Statistical Ineffective Persistent Faults Analysis on Feistel Ciphers. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(3): 367-390 (2022) - [i8]Nasour Bagheri, Sadegh Sadeghi, Prasanna Ravi, Shivam Bhasin, Hadi Soleimany:
SIPFA: Statistical Ineffective Persistent Faults Analysis on Feistel Ciphers. IACR Cryptol. ePrint Arch. 2022: 459 (2022) - [i7]Hosein Hadipour, Sadegh Sadeghi, Maria Eichlseder:
Finding the Impossible: Automated Search for Full Impossible Differential, Zero-Correlation, and Integral Attacks. IACR Cryptol. ePrint Arch. 2022: 1147 (2022) - 2021
- [j8]Sadegh Sadeghi, Mehdi Bidabadi:
Mathematical study of threshold of thermal-diffusive instability in counter-flow non-premixed biomass-fueled flames considering effective parameters. Comput. Math. Appl. 81: 602-617 (2021) - [j7]Sadegh Sadeghi, Vincent Rijmen, Nasour Bagheri:
Proposing an MILP-based method for the experimental verification of difference-based trails: application to SPECK, SIMECK. Des. Codes Cryptogr. 89(9): 2113-2155 (2021) - [i6]Morteza Adeli, Nasour Bagheri, Sadegh Sadeghi, Saru Kumari:
\(\chi\)perbp: a Cloud-based Lightweight Mutual Authentication Protocol. IACR Cryptol. ePrint Arch. 2021: 144 (2021) - 2020
- [j6]Majid M. Niknam, Sadegh Sadeghi, Mohammad Reza Aref, Nasour Bagheri:
Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants. ISC Int. J. Inf. Secur. 12(1): 13-23 (2020) - [i5]Sadegh Sadeghi, Nasour Bagheri:
An argument on the security of LRBC, a recently proposed lightweight block cipher. IACR Cryptol. ePrint Arch. 2020: 392 (2020) - [i4]Sadegh Sadeghi, Vincent Rijmen, Nasour Bagheri:
Proposing an MILP-based Method for the Experimental Verification of Difference Trails. IACR Cryptol. ePrint Arch. 2020: 632 (2020)
2010 – 2019
- 2019
- [j5]Sadegh Sadeghi, Nasour Bagheri:
Security analysis of SIMECK block cipher against related-key impossible differential. Inf. Process. Lett. 147: 14-21 (2019) - [j4]Hosein Hadipour, Sadegh Sadeghi, Majid M. Niknam, Ling Song, Nasour Bagheri:
Comprehensive security analysis of CRAFT. IACR Trans. Symmetric Cryptol. 2019(4): 290-317 (2019) - [i3]Hosein Hadipour, Sadegh Sadeghi, Majid M. Niknam, Nasour Bagheri:
Comprehensive security analysis of CRAFT. IACR Cryptol. ePrint Arch. 2019: 741 (2019) - 2018
- [j3]Sadegh Sadeghi, Nasour Bagheri:
Improved zero-correlation and impossible differential cryptanalysis of reduced-round SIMECK block cipher. IET Inf. Secur. 12(4): 314-325 (2018) - [j2]Sadegh Sadeghi, Tahereh Mohammadi, Nasour Bagheri:
Cryptanalysis of Reduced round SKINNY Block Cipher. IACR Trans. Symmetric Cryptol. 2018(3): 124-162 (2018) - [i2]Sadegh Sadeghi, Nasour Bagheri:
Cryptanalysis of SFN Block Cipher. IACR Cryptol. ePrint Arch. 2018: 594 (2018) - 2017
- [j1]Sadegh Sadeghi, Nasour Bagheri, Mohamed Ahmed Abdelraheem:
Cryptanalysis of reduced QTL block cipher. Microprocess. Microsystems 52: 34-48 (2017) - 2016
- [i1]Sadegh Sadeghi, Tahere Mohammadi, Nasour Bagheri:
Cryptanalysis of Reduced round SKINNY Block Cipher. IACR Cryptol. ePrint Arch. 2016: 1120 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint