The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Mahmoud Salmasizadeh: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Amir Moradi, Mohammad T. Manzuri Shalmani, Mahmoud Salmasizadeh
    A Generalized Method of Differential Fault Attack Against AES Cryptosystem. [Citation Graph (0, 0)][DBLP]
    CHES, 2006, pp:91-100 [Conf]
  2. Jovan Dj. Golic, Mahmoud Salmasizadeh, Andrew Clark, Abdollah Khodkar, Ed Dawson
    Discrete Optimisation and Fast Correlation Attacks. [Citation Graph (0, 0)][DBLP]
    Cryptography: Policy and Algorithms, 1995, pp:186-200 [Conf]
  3. Siamak Fayyaz Shahandashti, Mahmoud Salmasizadeh, Javad Mohajeri
    A Provably Secure Short Transitive Signature Scheme from Bilinear Group Pairs. [Citation Graph (0, 0)][DBLP]
    SCN, 2004, pp:60-76 [Conf]
  4. Kooshiar Azimian, Mahmoud Salmasizadeh, Javad Mohajeri
    Weak Composite Diffie-Hellman is not Weaker than Factoring [Citation Graph (0, 0)][DBLP]
    Electronic Colloquium on Computational Complexity (ECCC), 2005, v:, n:047, pp:- [Journal]
  5. Kooshiar Azimian, Javad Mohajeri, Mahmoud Salmasizadeh, Siamak Fayyaz Shahandashti
    A Verifiable Partial Key Escrow, Based on McCurley Encryption Scheme [Citation Graph (0, 0)][DBLP]
    Electronic Colloquium on Computational Complexity (ECCC), 2005, v:, n:078, pp:- [Journal]
  6. Jovan Dj. Golic, Mahmoud Salmasizadeh, Leone Simpson, Ed Dawson
    Fast Correlation Attacks on Nonlinear Filter Generators. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1997, v:64, n:1, pp:37-42 [Journal]
  7. Leone Simpson, Jovan Dj. Golic, Mahmoud Salmasizadeh, Ed Dawson
    A Fast Correlation Attack on Multiplexer Generators. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1999, v:70, n:2, pp:89-93 [Journal]
  8. Jovan Dj. Golic, Mahmoud Salmasizadeh, Ed Dawson
    Fast Correlation Attacks on the Summation Generator. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2000, v:13, n:2, pp:245-262 [Journal]
  9. Babak Zakeri, Mahmoud Salmasizadeh, Amir Moradi, Mahmoud Tabandeh, Mohammad T. Manzuri Shalmani
    Compact and Secure Design of Masked AES S-Box. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:216-229 [Conf]
  10. Amir Moradi, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani
    Power Analysis Attacks on MDPL and DRSL Implementations. [Citation Graph (0, 0)][DBLP]
    ICISC, 2007, pp:259-272 [Conf]

  11. On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoqCode Hopping Scheme. [Citation Graph (, )][DBLP]


  12. A New Public Key Encryption Scheme Equivalent to Factoring. [Citation Graph (, )][DBLP]


  13. Security Modification for the Hwang-Wen-Hwang's E-voting Scheme. [Citation Graph (, )][DBLP]


  14. New Proxy Signature, Proxy Blind Signature and Blind Proxy Signature Based on the Okamoto Signature. [Citation Graph (, )][DBLP]


  15. A secure and low-energy logic style using charge recovery approach. [Citation Graph (, )][DBLP]


  16. Locally Multipath Adaptive Routing Protocol Resilient to Selfishness and Wormholes. [Citation Graph (, )][DBLP]


  17. Charge recovery logic as a side channel attack countermeasure. [Citation Graph (, )][DBLP]


  18. A Comparative Study of Mutual Information Analysis under a Gaussian Assumption. [Citation Graph (, )][DBLP]


  19. A Verifiable Partial Key Escrow, Based on McCurley Encryption Scheme [Citation Graph (, )][DBLP]


  20. Relations between semantic security and indistinguishability against cpa, non-adaptive cca and adaptive cca in comparison based framework [Citation Graph (, )][DBLP]


  21. Generalized Secure Distributed Source Coding with Side Information [Citation Graph (, )][DBLP]


  22. Rate Regions of Secret Key Sharing in a New Source Model [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.006secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002