scispace - formally typeset
M

Mahmoud Salmasizadeh

Researcher at Sharif University of Technology

Publications -  134
Citations -  1415

Mahmoud Salmasizadeh is an academic researcher from Sharif University of Technology. The author has contributed to research in topics: Cryptography & Key (cryptography). The author has an hindex of 16, co-authored 131 publications receiving 1237 citations. Previous affiliations of Mahmoud Salmasizadeh include Queensland University of Technology.

Papers
More filters
Book ChapterDOI

On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme

TL;DR: This work presents the first successful differential power analysis attacks on numerous commercially available products employing KeeLoq code hopping, and demonstrates how to recover the secret key of a remote control and replicate it from a distance, just by eavesdropping on at most two messages.
Book ChapterDOI

A generalized method of differential fault attack against AES cryptosystem

TL;DR: Two differential fault attack techniques against Advanced Encryption Standard (AES) could find all 128 bits of key using one of them and only 6 faulty ciphertexts, establishing a novel technique to cryptanalysis AES without side channel information.
Journal ArticleDOI

Desynchronization attack on RAPP ultralightweight authentication protocol

TL;DR: In this paper, the authors show that RAPP is vulnerable to desynchronization attack. But they do not specify whether Hamming weight-based or modular-based rotations are used by the protocol.
Journal ArticleDOI

A Secure and Efficient Authentication Technique for Vehicular Ad-Hoc Networks

TL;DR: Analysis shows that the required time to verify 3000 messages in ID-MAP is reduced by 76% compared to that of PBAS, and existential unforgeability of underlying signature against adaptively chosen-message and identity attack is proved under elliptic curve discrete logarithm problem in the random oracle model.
Journal ArticleDOI

A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Cloud Storage

TL;DR: A new cryptographic primitive called key-policy attribute-based temporary keyword search (KP-ABTKS) which achieves the keyword secrecy property and is secure against selectively chosen keyword attack both in the random oracle model and under the hardness of Decisional Bilinear Diffie-Hellman (DBDH).