Follow
Javad Alizadeh
Javad Alizadeh
Unknown affiliation
No verified email
Title
Cited by
Cited by
Year
Cryptanalysis of SIMON variants with connections
J Alizadeh, HA Alkhzaimi, MR Aref, N Bagheri, P Gauravaram, A Kumar, ...
International Workshop on Radio Frequency Identification: Security and …, 2014
492014
Improved linear cryptanalysis of reduced-round SIMON-32 and SIMON-48
MA Abdelraheem, J Alizadeh, HA Alkhzaimi, MR Aref, N Bagheri, ...
Progress in Cryptology--INDOCRYPT 2015: 16th International Conference on …, 2015
462015
Linear cryptanalysis of round reduced SIMON
J Alizadeh, N Bagheri, P Gauravaram, A Kumar, SK Sanadhya
Cryptology ePrint Archive, 2013
442013
Improved linear cryptanalysis of reduced-round SIMON
MA Abdelraheem, J Alizadeh, HA Alkhzaimi, MR Aref, N Bagheri, ...
Cryptology ePrint Archive, 2014
242014
Improved Linear Cryptanalysis of Round Reduced SIMON.
J Alizadeh, H AlKhzaimi, MR Aref, N Bagheri, P Gauravaram, ...
IACR Cryptol. ePrint Arch. 2014 (681), 2014
172014
JHAE: An Authenticated Encryption Mode Based on JH.
J Alizadeh, MR Aref, N Bagheri
IACR Cryptol. ePrint Arch. 2014, 193, 2014
112014
Prediction of the subsurface crack growth lifetime in railroad wheel of the Iranian railway system
R Ghajar, KJ ALIZADEH
INTERNATIONAL JOURNAL OF ADVANCED DESIGN AND MANUFACTURING TECHNOLOGY 4 (113 …, 2010
112010
JHAE: A novel permutation-based authenticated encryption mode based on the hash mode JH
J Alizadeh, MR Aref, N Bagheri, A Rahimi
Journal of Computing and Security 2 (1), 3-20, 2015
102015
Artemia v1
J Alizadeh, MR Aref, N Bagheri
Submission to CAESAR, 2014
62014
A single query forgery on avalanchev1
N Bagheri, J Alizadeh, MR Aref
Cryptographic Competitions Mailing List, 2014
62014
Coupling of the fracture modes for the subsurface elliptical cracks under uniform shear loading
J Alizadeh, R Ghajar
Modares Mechanical Engineering 14 (15), 1-10, 2015
52015
A distinguishing attack on AES-CMCC v1 by only two queries
N Bagheri, J Alizadeh, MR Aref
Cryptographic Competitions Mailing List, 2014
52014
A new distinguisher for CubeHash-8/b and CubeHash-15/b compression functions
J Alizadeh, A Mirghadri
Cryptology ePrint Archive, 2011
52011
Isaka: improved secure authentication and key agreement protocol for wban
J Alizadeh, M Safkhani, A Allahdadi
Wireless Personal Communications 126 (4), 2911-2935, 2022
42022
Artemia: A Family of Provably Secure Authenticated Encryption Schemes.
J Alizadeh, MR Aref, N Bagheri
ISeCure 6 (2), 2014
32014
The Loop-Mediated Isothermal Amplification Method Instead of PCR in Detection Goals
PA Majelan, MF Bafghi, J Alizadeh, N Pourramezan, D Afshar
Zahedan Journal of Research in Medical Sciences 18 (6), 2016
12016
Cryptanalysis of Some First Round CAESAR Candidates.
J Alizadeh, MR Aref, N Bagheri, H Sadeghi
ISeCure 7 (2), 2015
12015
A forgery attack on AES-OTR
H Sadeghi, J Alizadeh
12014
Practical key recovery attack on authentication and key agreement protocol SecAuthUAV in a network of drones and provide an improved protocol
J Alizadeh, SH Noorani Asl
Biannual Journal Monadi for Cyberspace Security (AFTA) 12 (2), 51-59, 2024
2024
Some observations on a lightweight authentication scheme with capabilities of anonymity and trust in Internet of Things (IoT)
J Alizadeh, N Bagheri
Signal and Data Processing 19 (4), 85-94, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–20