انتشارات:

     مقالات چاپ شده در مجلات بين‌المللي

Publications (from 1997 to 2013) Journal papers

  1. Z. Ahmadian, M. Salmasizadeh, M. R. Aref . Recursive Linear and Differential Cryptanalysis of Ultralightweight Authentication Protocols, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, vol8, no7, pages 1140-1152, 2013.
  2. Z. Ahmadian, M. Salmasizadeh, M. R. Aref . Desynchronization Attack on RAPP Ultralight- weight Authentication Protocol,INFORMATION PROCESSING LETTERS, vol 113, no7, pages 205-210,2013.
  3. A . Vardasbi, M. Salmasizadeh, J . M .iohajer On the multi-Chi-square Tests and their Data Complexity, ISeCure, vol4, no1, pages 15-24, 2012.
  4. S. Salimi, M. Salmasizadeh, M. R. Aref, J Golic. Key agreement over multiple access channel, IEEE Transactions on Information Forensics and Security, vol 6, no3, pages 775-791, 2011.
  5. S. Salimi, M. Salmasizadeh, M. R. Aref. Rate Regions of Secret Key Sharing in a New Source Model, IET Communications, vol 5, no4, pages 443-456, 2011.
  6. S. Salimi, M. Salmasizadeh, M. R. Aref. Generalized Secure Distributed Source Coding with Side Information, IET Communications, vol 4, no18 , pages 2262-2272, 2010.
  7. Z. Ahmadian, J. Mohajeri, M. Salmasizadeh, A. R. Nyberg and M. Hakala. A practical distinguisher for the Shannon cipher, The Journal of Systems and Software, no83, pages 543-547, Esevier Ltd, 2010.
  8. K. Azimian, J. Mohajeri and M. Salmasizadeh. Provable partial key escrow, Internation Journal of Network Security, volume 10, no2, pages 124-128, 2010.
  9. A. Moradi, M. Salmasizadeh, M. T. Manzuri and T. Eisenbarth . Vulunerability modeling of cryptographic hardware to power analysis attacks, Integration, The VLSI Journal, volume 42, no2, pages 468-478,Esevier Ltd, 2009.
  10. A. Moradi, M. T. Manzuri and M. Salmasizadeh . Dual-rail transition logic: a logi style for counteracting power analysis attacks . Special issue: Circuits and Systems for Real-Time security and copyright protoction of Multimedia, International Journal of Computers and Electrical Engineering, Elsevier Ltd, No 35 pp. 359-369, 2009.
  11. A. Bagherzandi, M. Salmasizadeh and J. Mohajeri. A related key attack on the Feistel type block ciphers, International Journal of Network Secuirty, Volume 8, no2, 2009.
  12. K. Azimian, J. Mohjajeri and M. Salmasizadeh, Weak composite Diffie-Hellman, International Journal of Network Security, Volume 7, no3, pp. 383-387, 2009.
  13. A. Bagherzandi, M. Salmasizadeh and J. Mohajeri . Comparison based semantic security is probabilistic polynomial time equivalent to indistinguishability, International Journal of Network Secuirty, Volume 6, no3, pp.354-360, 2008.
  14. M. Rajabzadeh Assar, J. Mohajeri and M. Salmasizadeh. Another security improvement over the Lin et al,'s E_voting scheme ,Int. J. Electronic Security and Digital Forensics ,Inderscience Enterptise Ltd, No 4, pp.413-422, 2008.
  15. A. Moradi, M. Salmasizadeh, and M. T. Manzuri. From fault tolerance to fault attack tolerance in the implementation of Advanced Encryption Standard, CSI Journal on Computer Science and Engineering, volume 4, no 2, pages 32-38, 2006.
  16. J. Dj. Golic, M. Salmasizadeh, and E. Dawson. Statistical weakness of multiplexed sequences, Finite Fields and Their Applications, no 8, pages 420-433, Elsevier science, 2002.
  17. J. Dj. Golic, M. Salmasizadeh, and E. Dawson. Fast correlation attacks on the summation generator. Journal of Cryptology, volume 13, no 2, pages 245-262, Springer, 2000.
  18. L. Simpson, J. Dj. Golic, M. Salmasizadeh and E. Dawson. A fast correlation attack on the multiplexer generators, Information Processing Letters, volume 70, pages 89-93, Elsevier, 1999.
  19. J. Dj. Golic, M. Salmasizadeh, L. Simpson, and E. Dawson. Fast correlation attacks on nonlinear filter generators. Information Processing Letters, volume 64, Pages 37-42, Elsevier, 1997.

      مقالات پذیرفته شده در مجلات بین المللی

Accepted papers

  1. A . Vardasbi , M. Salmasizadeh, J . Mohajeri . Superpoly algebraic normal form monomial test on Trivium, IET INFORMATION SECURITY, 2013.
  2. S. Salimi, Mikael Skoglund, Jovan Dj Golic, M. Salmasizadeh, M. R. Aref. Key Agreement over a Generalized Multiple Access Channel Using Noiseless and Noisy Feedback, IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2013.
  3. S. Avizheh, M. Rajabzadeh Asaar, and M. Salmasizadeh. Convertible Limited (Multi-) Verifier Signature, New Constructions and Applications, ISeCure, 2013.
  4. H. Jannati, M. Salmasizadeh, J . Mohajeri , A. Moradi. Introducing Proxy Zero-Knowledge Proof and Utilization in Anonymuos, SECURITY AND COMMUNICATION NETWORKS, 2012.

      مقالات ارائه شده دركنفرانسهاي بين‌المللي

Refereed Conference Papers

  1. M. Rajabzadeh Assar, A. Vardasbi, M. Salmasizadeh. Lightweight non-Delegatable Identity Based Strong Designated Verifier, Australian Computer Science Week 2013, University of South Australia, 2013.
  2. H. Yajam, A. Mahmoodi, J. Mohajeri, M. Salmasizadeh. Security Analysis of An Identity-Based Mix Net, 10th International ISC Conference on Information Security and Cryptology, Yazd University, Iran, 2013.
  3. H. Yajam, A. Mahmoodi, J. Mohajeri, M.Salmasizadeh. Identity Based Universal Re-encryption for Mix nets, 10th International ISC Conference on Information Security and Cryptology, Yazd University, Iran, 2013.
  4. A. Vardasbi, M. Salmasizadeh, J. Mohajeri. Multiple-Chi-square Tests and Their Application on Distinguishing Attacks, 8 th International ISC Conference on Information Security and Cryptology, Ferdowsi University of Mashhad, Iran,155-160, 2011.
  5. S. Salimi, M. Salmasizadeh, M. R. Aref, Key Agreement over Multiple Access Channel Using Feedback Channel, IEEE-ISIT2011, Saint Petersburg, July-Aug, 1936-1940, 2011.
  6. S. Salimi, M. Salmasizadeh, M. R. Aref. Secret Key Sharing in a New Source Model: Rate Regions, 2010 Australia Communications Theory Workshop, Canberra Australia, 117-122, February 2011.
  7. A. Sonee, S. Salimi, M. Salmasizadeh. Generalized Multiple-Access Relay Channel With Confidential Messages, ISITA 2010, Taichung, Taiwan, 1024-1029, October 2010.
  8. V. Jahandideh, S. Salimi, M. Salmasizadeh. Deterministic Multiple AccessWiretap Channel, IEEE International Conference on Information Theory and Information Security, Chin, 998-1001, December 2010.
  9. A. Mortazavi, J . Mohajeri , M. Salmasizadeh. ,تحليل امنيتي شبکه مخلوط 7th International ISC Conference on Information Security and Cryptology 2010 (ISCISC'10), K. N. Toosi University of Technolog, Iran, 1-9, 2010.
  10. A. Sonee, S. Salimi, M. Salmasizadeh, A New Achievable Rate-Equivocation Region, CEE2010, Isfahan, Iran, 2010.
  11. V. Jahandideh, S. Salimi, M. Salmasizadeh. Secrecy Capacity of Wiretap Channel for a New Senario and Designing Code for Wiretap Channel, CEE2010, Isfahan, Iran 2010.
  12. A. Vardasbi , M. Salmasizadeh, J . Mohajeri. An Improved Chosen IV Attack on Stream Ciphers, 7th International ISC Conference on Information Security and Cryptology 2010, Tehran, K. N. Toosi University of Technology, Iran, 1-7, September 2010.

 

JoomShaper