Mahdi Sajadieh

Orcid: 0000-0003-1445-1593

According to our database1, Mahdi Sajadieh authored at least 17 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Introducing a new connection between the entries of MDS matrices constructed by generalized Cauchy matrices in GF(2<sup>q)</sup>.
J. Appl. Math. Comput., October, 2023

4n × 4n Diffusion Layers Based on Multiple 4 × 4 MDS Matrices.
ISC Int. J. Inf. Secur., 2023

Reconstructing a lightweight security protocol in the radio-frequency identification systems.
IET Comput. Digit. Tech., 2023

2022
Novel lightweight RFID authentication protocols for inexpensive tags.
J. Inf. Secur. Appl., 2022

An Application of a Wearable Device with Motion-Capture and Haptic-Feedback for Human-Robot Collaboration.
Proceedings of the Product Lifecycle Management. PLM in Transition Times: The Place of Humans and Transformative Technologies, 2022

2021
Construction of MDS matrices from generalized Feistel structures.
Des. Codes Cryptogr., 2021

2020
A New Approach for the Implementation of Binary Matrices Using SLP Applications.
IACR Cryptol. ePrint Arch., 2020

2019
Sigma protocol for faster proof of simultaneous homomorphism relations.
IET Inf. Secur., 2019

2018
Using MILP in Analysis of Feistel Structures and Improving Type II GFS by Switching Mechanism.
IACR Cryptol. ePrint Arch., 2018

Construction of Lightweight MDS Matrices from Generalized Feistel Structures.
IACR Cryptol. ePrint Arch., 2018

2017
A Verifiable (k, n, m)-Threshold Multi-secret Sharing Scheme Based on NTRU Cryptosystem.
Wirel. Pers. Commun., 2017

A new counting method to bound the number of active S-boxes in Rijndael and 3D.
Des. Codes Cryptogr., 2017

2015
Efficient Recursive Diffusion Layers for Block Ciphers and Hash Functions.
J. Cryptol., 2015

2012
On construction of involutory MDS matrices from Vandermonde Matrices in GF(2 q ).
Des. Codes Cryptogr., 2012

Recursive Diffusion Layers for Block Ciphers and Hash Functions.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012

2011
Perfect involutory diffusion layers based on invertibility of some linear functions.
IET Inf. Secur., 2011

2008
A Cluster-Based Key Establishment Protocol for Wireless Mobile Ad Hoc Networks.
Proceedings of the Advances in Computer Science and Engineering, 2008


  Loading...