Volume 9 (2022)
Volume 8 (2021)
Volume 7 (2020)
Volume 6 (2019)
Volume 5 (2018)
Volume 4 (2017)
Volume 3 (2016)
Volume 2 (2015)
Volume 1 (2014)
Author = Bagheri, Nasour
Number of Articles: 3
On the Security of Permutation Based Authentication Protocols for Internet of Things Applications: The Case of Huang et al.'s Protocol
Volume 3, Issue 4 , October 2016, , Pages 201-209
Abstract
The Internet of Things (IoT) is a new technology, which enables objects to exchange data via the Internet. Authentication process is a method to prevent an unauthorized access to the ... Read MoreMulticollision Attack on a recently proposed hash function vMDC-2
Volume 3, Issue 4 , October 2016, , Pages 211-215
Abstract
In this paper, we describe an attack on a new double block length hash function which was proposed as a variant of MDC-2 and MDC-4. The vMDC-2 compression function is based on two calls ... Read MoreJHAE: A Novel Permutation-Based Authenticated Encryption Mode Based on the Hash Mode JH
Volume 2, Issue 1 , January 2015, , Pages 3-20