M
Mohsen Shakiba
Researcher at Jundi-shapur University of Technology
Publications - 16
Citations - 162
Mohsen Shakiba is an academic researcher from Jundi-shapur University of Technology. The author has contributed to research in topics: Block cipher & Differential cryptanalysis. The author has an hindex of 7, co-authored 15 publications receiving 149 citations. Previous affiliations of Mohsen Shakiba include Isfahan University of Technology.
Papers
More filters
Book ChapterDOI
New Results on Impossible Differential Cryptanalysis of Reduced---Round Camellia---128
TL;DR: This paper presents a new impossible differential attack to reduced---round Camellia, a 128---bit block cipher which has been accepted by ISO/IEC as an international standard and is increasingly being used in many cryptographic applications.
Journal ArticleDOI
Cryptanalysis of mCrypton—A lightweight block cipher for security of RFID tags and sensors
TL;DR: The strength of this cipher against related‐key impossible differential cryptanalysis is investigated, and two 6‐round related‐ key impossible differentials for mCrypton‐96 and m Crypton‐128 are constructed.
Journal ArticleDOI
Impossible Differential Attacks on 13-Round CLEFIA-128
TL;DR: Two new impossible differential attacks on 13 rounds of CLEFIA-128 are presented, utilizing a variety of previously known techniques, in particular the hash table technique and redundancy in the key schedule of this block cipher.
Journal ArticleDOI
Biclique cryptanalysis of MIBS-80 and PRESENT-80 block ciphers
TL;DR: In this paper, the first biclique cryptanalysis of MIBS block cipher and the first BIClique attack on PRESENT block cipher was performed by using matching without matrix technique in the attack on MIBS and choosing a sub-key space of an internal round for key division.
Journal ArticleDOI
Impossible differential cryptanalysis of reduced-round Camellia-256
TL;DR: This study presents a new impossible differential attack on a reduced version of Camellia-256 without FL / FL -1 functions and whitening, and introduces a new extension of the hash table technique and exploits it to attack 16 rounds of Camella-256.