Author = Mohammad Reza Aref
Number of Articles: 19
1. Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants

Volume 12, Issue 1, Winter and Spring 2020, Pages 13-23

10.22042/isecure.2020.199099.480

Majid Mahmoudzadeh Niknam; Sadegh Sadeghi; Mohammad Reza Aref; Nasour Bagheri


2. Editorial

Volume 11, Issue 3, Summer and Autumn 2019

10.22042/isecure.2019.11.3.1

Mohammad Reza Aref


3. Editorial

Volume 11, Issue 2, Summer and Autumn 2019, Pages 93-94

10.22042/isecure.2019.11.2.1

Mohammad Reza Aref


4. New Fixed Point Attacks on GOST2 Block Cipher

Volume 11, Issue 2, Summer and Autumn 2019, Pages 145-158

10.22042/isecure.2019.140663.424

Siavash Ahmadi; Mohammad Reza Aref


5. Biclique Cryptanalysis of Block Ciphers LBlock and TWINE-80 with Practical Data Complexity

Volume 11, Issue 1, Winter and Spring 2019, Pages 57-74

10.22042/isecure.2018.138036.420

Siavash Ahmadi; Zahra Ahmadian; Javad Mohajeri; Mohammad Reza Aref


6. Editorial

Volume 11, Issue 1, Winter and Spring 2019, Pages 1-2

Mohammad Reza Aref


7. Editorial

Volume 10, Issue 2, Summer and Autumn 2018, Pages 77-78

10.22042/isecure.2018.10.2.1

M.R. Aref


8. Impossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher (Extended Version)

Volume 10, Issue 1, Winter and Spring 2018, Pages 3-13

10.22042/isecure.2018.110672.399

A. Rezaei Shahmirzdi; A. Azimi; M. Salmasizadeh; J. Mohajeri; M. R. Aref


9. Editorial

Volume 9, Issue 2, Summer and Autumn 2017, Pages 99-100

10.22042/isecure.2017.9.2.1

M. R. Aref


10. Editorial

Volume 8, Issue 1, Winter and Spring 2016, Pages 1-2

10.22042/isecure.2016.8.1.1

M. R. Aref


11. On the design and security of a lattice-based threshold secret sharing scheme

Volume 8, Issue 1, Winter and Spring 2016, Pages 25-38

10.22042/isecure.2016.8.1.2

H. R. Amini Khorasgani; S. Asaad; H. Pilaram; T. Eghlidos; M. R. Aref


12. Enhancing privacy of recent authentication schemes for low-cost RFID systems

Volume 7, Issue 2, Summer and Autumn 2015, Pages 135-149

10.22042/isecure.2016.7.2.6

K. Baghery; B. Abdolmaleki; B. Akhbari; M. R. Aref


13. Cryptanalysis of some first round CAESAR candidates

Volume 7, Issue 2, Summer and Autumn 2015, Pages 127-134

10.22042/isecure.2016.7.2.5

J. Alizadeh; M. R. Aref; N. Bagheri; H. Sadeghi


14. Artemia: a family of provably secure authenticated encryption schemes

Volume 6, Issue 2, Summer and Autumn 2014, Pages 125-139

10.22042/isecure.2015.6.2.3

J. Alizadeh; M. R. Aref; N. Bagheri


15. Toward an energy efficient PKC-based key management system for wireless sensor networks

Volume 6, Issue 1, Winter and Spring 2014, Pages 53-66

10.22042/isecure.2014.6.1.5

H. Ghasemzadeh; A. Payandeh; M. R. Aref


16. Total break of Zorro using linear and differential attacks

Volume 6, Issue 1, Winter and Spring 2014, Pages 23-34

10.22042/isecure.2014.6.1.3

Sh. Rasoolzadeh; Z. Ahmadian; M. Salmasizadeh; M. R. Aref


17. Eigenvalues-based LSB steganalysis

Volume 4, Issue 2, Summer and Autumn 2012, Pages 97-106

10.22042/isecure.2013.4.2.1

F. Farhat; A. Diyanat; Sh. Ghaemmaghami; M. R. Aref


18. Improving the Rao-Nam secret key cryptosystem using regular EDF-QC-LDPC codes

Volume 4, Issue 1, Winter and Spring 2012, Pages 3-14

10.22042/isecure.2015.4.1.2

R. Hooshmand; T. Eghlidos; M. R. Aref


19. Editorial

Volume 1, Issue 1, Winter and Spring 2009, Pages 1-2

10.22042/isecure.2009.1.1.1

M. R. Aref; R. Jalili