Hamid Mala

Orcid: 0000-0002-7789-452X

According to our database1, Hamid Mala authored at least 51 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Privacy-preserving multi-party PCA computation on horizontally and vertically partitioned data based on outsourced QR decomposition.
J. Supercomput., September, 2023

Secure Outsourcing of Two Standard Identity-Based Cryptosystems.
ISC Int. J. Inf. Secur., July, 2023

2022
Efficient Secure Pattern Matching With Malicious Adversaries.
IEEE Trans. Dependable Secur. Comput., 2022

EO-PSI-CA: Efficient outsourced private set intersection cardinality.
J. Inf. Secur. Appl., 2022

2021
Closed-loop and open-loop authentication protocols for blockchain-based IoT systems.
Inf. Process. Manag., 2021

A Polynomial-Time Algorithm for Special Cases of the Unbounded Subset-Sum Problem.
CoRR, 2021

Secure Parameterized Multi-Pattern Matching in Multi-Text Owner Setting.
Proceedings of the 18th International ISC Conference on Information Security and Cryptology, 2021

Secure Outsourcing of Boneh-Franklin Identity-Based Encryption Scheme.
Proceedings of the 18th International ISC Conference on Information Security and Cryptology, 2021

Secure Determining of the k-th Greatest Element Among Distributed Private Values.
Proceedings of the 26th International Computer Conference, Computer Society of Iran, 2021

2020
Multi-keyword ranked searchable encryption scheme with access control for cloud storage.
Peer-to-Peer Netw. Appl., 2020

Tracking and impersonating tags in a CRC-based ultralightweight RFID authentication protocol.
Peer-to-Peer Netw. Appl., 2020

Preserving Privacy of Software-Defined Networking Policies by Secure Multi-Party Computation.
J. Comput. Sci. Technol., 2020

Secure parameterized pattern matching.
Inf. Sci., 2020

Secure and efficient publicly verifiable outsourcing of matrix multiplication in online mode.
Clust. Comput., 2020

Full-Resilient Memory-Optimum Multi-Party Non-Interactive Key Exchange.
IEEE Access, 2020

2019
Efficient privacy-preserving group-nearest-neighbor queries with the presence of active adversaries.
Wirel. Networks, 2019

Determining Honesty of Accuser Nodes in Key Revocation Procedure for MANETs.
Mob. Networks Appl., 2019

New authentication/ownership transfer protocol for RFID objects.
J. Inf. Secur. Appl., 2019

Security analysis of an ultra-lightweight RFID authentication protocol for m-commerce.
Int. J. Commun. Syst., 2019

LACO: Lightweight Three-Factor Authentication, Access Control and Ownership Transfer Scheme for E-Health Systems in IoT.
Future Gener. Comput. Syst., 2019

SecLAP: Secure and lightweight RFID authentication protocol for Medical IoT.
Future Gener. Comput. Syst., 2019

PAKIT: Proactive Authentication and Key Agreement Protocol for Internet of Things.
Proceedings of the IEEE INFOCOM 2019, 2019

2018
DoS, impersonation and de-synchronization attacks against an ultra-lightweight RFID mutual authentication protocol for IoT.
J. Supercomput., 2018

Securing Heterogeneous Wireless Sensor Networks: Breaking and Fixing a Three-Factor Authentication Protocol.
Sensors, 2018

Breaking a Lightweight M2M Authentication Protocol for Communications in IIoT Environment.
IACR Cryptol. ePrint Arch., 2018

Security Analysis of Fan et al. Lightweight RFID Authentication Protocol for Privacy Protection in IoT.
IACR Cryptol. ePrint Arch., 2018

2017
On the security of another CRC based ultralightweight RFID authentication protocol.
IACR Cryptol. ePrint Arch., 2017

A new counting method to bound the number of active S-boxes in Rijndael and 3D.
Des. Codes Cryptogr., 2017

Cryptanalysis of an Asymmetric Searchable Encryption Scheme.
Proceedings of the 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2017

2016
Protocols for Authenticated Oblivious Transfer.
IACR Cryptol. ePrint Arch., 2016

A new lightweight authentication and key agreement protocol for Internet of Things.
Proceedings of the 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology, 2016

2015
Security Analysis and Strengthening of an RFID Lightweight Authentication Protocol Suitable for VANETs.
Wirel. Pers. Commun., 2015

Efficient Recursive Diffusion Layers for Block Ciphers and Hash Functions.
J. Cryptol., 2015

Cryptanalysis of mCrypton-64.
Int. J. Commun. Syst., 2015

Non-isomorphic biclique cryptanalysis of full-round Crypton.
Comput. Stand. Interfaces, 2015

2014
Improving Radio Resource Utilization and User Level Fairness in OFDMA Femtocell Networks.
Wirel. Pers. Commun., 2014

On computational complexity of impossible differential cryptanalysis.
Inf. Process. Lett., 2014

Biclique-based cryptanalysis of the block cipher SQUARE.
IET Inf. Secur., 2014

2013
Non-isomorphic Biclique Cryptanalysis and Its Application to Full-Round mCrypton.
IACR Cryptol. ePrint Arch., 2013

2012
Cryptanalysis of mCrypton - A lightweight block cipher for security of RFID tags and sensors.
Int. J. Commun. Syst., 2012

On construction of involutory MDS matrices from Vandermonde Matrices in GF(2 q ).
Des. Codes Cryptogr., 2012

Recursive Diffusion Layers for Block Ciphers and Hash Functions.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012

2011
Impossible Differential Attacks on 13-Round CLEFIA-128.
J. Comput. Sci. Technol., 2011

Perfect involutory diffusion layers based on invertibility of some linear functions.
IET Inf. Secur., 2011

Impossible differential cryptanalysis of reduced-round Camellia-256.
IET Inf. Secur., 2011

Biclique Cryptanalysis of the Block Cipher SQUARE.
IACR Cryptol. ePrint Arch., 2011

2010
An improved impossible differential cryptanalysis of Zodiac.
J. Syst. Softw., 2010

Cryptanalysis of Block Ciphers Using Almost-Impossible Differentials.
IACR Cryptol. ePrint Arch., 2010

New impossible differential attacks on reduced-round Crypton.
Comput. Stand. Interfaces, 2010

Improved Impossible Differential Cryptanalysis of 7-Round AES-128.
Proceedings of the Progress in Cryptology - INDOCRYPT 2010, 2010

2009
New Results on Impossible Differential Cryptanalysis of Reduced-Round Camellia-128.
Proceedings of the Selected Areas in Cryptography, 16th Annual International Workshop, 2009


  Loading...