On the Security of Permutation Based Authentication Protocols for Internet of Things Applications: The Case of Huang et al.'s Protocol
1. On the Security of Permutation Based Authentication Protocols for Internet of Things Applications: The Case of Huang et al.'s Protocol

Samad Rostampour; Nasour Bagheri; Mehdi Hosseinzadeh; Ahmad Khademzadeh

Volume 3, Issue 4 , Summer and Autumn 2016, , Pages 201-209

Abstract
  The Internet of Things (IoT) is a new technology, which enables objects to exchange data via the Internet. Authentication process is a method to prevent an unauthorized access to the ...  Read More
Multicollision Attack on a recently proposed hash function vMDC-2
2. Multicollision Attack on a recently proposed hash function vMDC-2

Zahra Zolfaghari; Hamid Asadollahi; Nasour Bagheri

Volume 3, Issue 4 , Summer and Autumn 2016, , Pages 211-215

Abstract
  In this paper, we describe an attack on a new double block length hash function which was proposed as a variant of MDC-2 and MDC-4. The vMDC-2 compression function is based on two calls ...  Read More
JHAE: A Novel Permutation-Based Authenticated Encryption Mode Based on the Hash Mode JH
3. JHAE: A Novel Permutation-Based Authenticated Encryption Mode Based on the Hash Mode JH

Javad Alizadeh; Mohammad Reza Aref; Nasour Bagheri; Alireza Rahimi

Volume 2, Issue 1 , Winter and Spring 2015, , Pages 3-20

Abstract
  Authenticated encryption (AE) schemes provide both privacy and integrity ofdata. CAESAR is a competition to design and analysis of the AE schemes. AnAE scheme has two components: a ...  Read More