Sadegh Sadeghi

Orcid: 0000-0002-1125-6867

According to our database1, Sadegh Sadeghi authored at least 23 papers between 2016 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Differential Fault Analysis of the BipBip Block Cipher.
ISC Int. J. Inf. Secur., July, 2025

Evaluating security pitfalls of ultra-lightweight IoT authentication: A critical analysis of permutation functions.
J. Inf. Secur. Appl., 2025

Secure and Efficient Lightweight Authentication Protocol (SELAP) for multi-sector IoT applications.
Internet Things, 2025

Securing Industrial IoT: A Novel Approach with MQTT Authentication.
Proceedings of the IEEE International Conference on Communications, 2025

2024
Cryptanalysis of DBST, a lightweight block cipher.
Frontiers Comput. Sci., August, 2024

2023
χperbp: a cloud-based lightweight mutual authentication protocol.
Peer Peer Netw. Appl., August, 2023

Improved Search for Integral, Impossible-Differential and Zero-Correlation Attacks: Application to Ascon, ForkSKINNY, SKINNY, MANTIS, PRESENT and QARMAv2.
IACR Cryptol. ePrint Arch., 2023

Finding the Impossible: Automated Search for Full Impossible-Differential, Zero-Correlation, and Integral Attacks.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

2022
Improving RFID/IoT-based generalized ultra-lightweight mutual authentication protocols.
J. Inf. Secur. Appl., 2022

SIPFA: Statistical Ineffective Persistent Faults Analysis on Feistel Ciphers.
IACR Cryptol. ePrint Arch., 2022

2021
\(\chi\)perbp: a Cloud-based Lightweight Mutual Authentication Protocol.
IACR Cryptol. ePrint Arch., 2021

Proposing an MILP-based method for the experimental verification of difference-based trails: application to SPECK, SIMECK.
Des. Codes Cryptogr., 2021

Mathematical study of threshold of thermal-diffusive instability in counter-flow non-premixed biomass-fueled flames considering effective parameters.
Comput. Math. Appl., 2021

2020
Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants.
ISC Int. J. Inf. Secur., 2020

Proposing an MILP-based Method for the Experimental Verification of Difference Trails.
IACR Cryptol. ePrint Arch., 2020

An argument on the security of LRBC, a recently proposed lightweight block cipher.
IACR Cryptol. ePrint Arch., 2020

2019
Comprehensive security analysis of CRAFT.
IACR Trans. Symmetric Cryptol., 2019

Security analysis of SIMECK block cipher against related-key impossible differential.
Inf. Process. Lett., 2019

Comprehensive security analysis of CRAFT.
IACR Cryptol. ePrint Arch., 2019

2018
Improved zero-correlation and impossible differential cryptanalysis of reduced-round SIMECK block cipher.
IET Inf. Secur., 2018

Cryptanalysis of SFN Block Cipher.
IACR Cryptol. ePrint Arch., 2018

2017
Cryptanalysis of reduced QTL block cipher.
Microprocess. Microsystems, 2017

2016
Cryptanalysis of Reduced round SKINNY Block Cipher.
IACR Cryptol. ePrint Arch., 2016


  Loading...