scispace - formally typeset
M

Mohsen Shakiba

Researcher at Jundi-shapur University of Technology

Publications -  16
Citations -  162

Mohsen Shakiba is an academic researcher from Jundi-shapur University of Technology. The author has contributed to research in topics: Block cipher & Differential cryptanalysis. The author has an hindex of 7, co-authored 15 publications receiving 149 citations. Previous affiliations of Mohsen Shakiba include Isfahan University of Technology.

Papers
More filters
Book ChapterDOI

New Results on Impossible Differential Cryptanalysis of Reduced---Round Camellia---128

TL;DR: This paper presents a new impossible differential attack to reduced---round Camellia, a 128---bit block cipher which has been accepted by ISO/IEC as an international standard and is increasingly being used in many cryptographic applications.
Journal ArticleDOI

Cryptanalysis of mCrypton—A lightweight block cipher for security of RFID tags and sensors

TL;DR: The strength of this cipher against related‐key impossible differential cryptanalysis is investigated, and two 6‐round related‐ key impossible differentials for mCrypton‐96 and m Crypton‐128 are constructed.
Journal ArticleDOI

Impossible Differential Attacks on 13-Round CLEFIA-128

TL;DR: Two new impossible differential attacks on 13 rounds of CLEFIA-128 are presented, utilizing a variety of previously known techniques, in particular the hash table technique and redundancy in the key schedule of this block cipher.
Journal ArticleDOI

Biclique cryptanalysis of MIBS-80 and PRESENT-80 block ciphers

TL;DR: In this paper, the first biclique cryptanalysis of MIBS block cipher and the first BIClique attack on PRESENT block cipher was performed by using matching without matrix technique in the attack on MIBS and choosing a sub-key space of an internal round for key division.
Journal ArticleDOI

Impossible differential cryptanalysis of reduced-round Camellia-256

TL;DR: This study presents a new impossible differential attack on a reduced version of Camellia-256 without FL / FL -1 functions and whitening, and introduces a new extension of the hash table technique and exploits it to attack 16 rounds of Camella-256.