For Better Performance Please Use Chrome or Firefox Web Browser

publication

INVITED TALKS

T1-M. Dakhilalian, Key Management in Secure Group Communication,3rd Iranian Society of Cryptology Conference (ISCC2005), Isfahan University of Technology, Isfahan, IRAN.

 

T2-M. Dakhilalian, Block Ciphers: Past and Present,10th Iranian Society of Cryptology Conference (ISCC2013), Yazd University ,Yazd, IRAN.

 

PAPERS (from 1994 to present)

 

ISI Papers

I1- H. Mala, M. Shakiba, M. Dakhilalian, New Impossible Differential Attacks on Reduced-round Crypton, Comput. Stand. Interfaces,Volume 32 Issue 4, June, 2010,pp.222-227. 

 

I2- M.Shakiba, M.dakhilalian,h.Mala,An Improved Impossible Differential Cryptanalysis of Zodiac, Journal of Systems and Software,Volume 83 Issue 4, April, 2010 .

 

I3- H.Mala,M.Dakhilalian, M.Shakiba, Impossible Differential Cryptanalysis of Reduced Round Camellia256, IET Information Security Journal(IEE), 2011, Vol.5 Iss.3, , pp 129 - 134 .

I4- M. Sajadieh, M. Dakhilalian, H. Mala, Perfect involutory diffusion layers based on invertibility of some linear functions, IET Information Security Journal(IEE),, , 2011, Vol. 5, Iss. 4, pp. 228-236.

I5- H.Mala,M.Dakhilalian, M.Shakiba, Impossible Differential Attacks on 13-Round CLEFIA-128 ,Journal of Computer Science and Technology,2011, Volume 26, Number 4,pp.744-750..

I6- H.Mala,M.Dakhilalian, M.Shakiba, Cryptanalysis of mCrypton - a lightweight block cipher for security of RFID tags and sensors ,International Journal of Communication Systems, Vol.25,Iss.4,pp.415-426 April 2012.

I7- M. Sajadieh,M. Dakhilalian,H. Mala, B. Omoomi, On construction of involutory MDS matrices from Vandermonde Matrices in GF(2q), Design Codes and Cryptography,Vol.64,No.3,,pp.287-308,2012.

LNCS

L1- Mala, H., Shakiba, M., Dakhilalia, M., New Results on Impossible Differential Cryptanalysis of Reduced Round Camellia128, In: Jacobson, M.J., Rijmen, V., Safavi-Naini, R. (eds) SAC 2009, LNCS 5867, pp. 281-294, Springer, Heidelberg, 2009.

 

L2-Mala, H., Dakhilalia, M., Rijmen, V., Modarres Hashemi, M.,Improved Impossible Differential Cryptanalysis of 7-Round AES-128, In: Gong, G., Gupta, K.C., (eds) INDOCRYPT 2010, LNCS 6498, pp. 282-291, Springer, Heidelberg, 2010.

 

L3-Sajadieh, MahdiDakhilalian, MohammadMala, HamidSepehrdad, Pouyan, Recursive Diffusion Layers for Block Ciphers and Hash Functions, FSE2012,,LNCS 7549,pp.385-401, Springer, 2012.

Conference Papers

 

C1- Hajivandi,M. and Dakhilalian, M., Analysis and Simulation of Convolutional Codes in a Specific Command and Image System ,2nd Iranian Conference on Electrical Engineering (ICEE 1994), Tarbiat Modares University,Tehran, IRAN.

C2- Dakhilalian, M. and Aref M., Evaluation of Statistical Tests on Stream Cipher Systems, Communication Security Conference, Emam Hosein University, Feb. 1998.

C3- Dakhilalian, M. and Aref M., A New Correlation Test, 6th Iranian Conference on Electrical Engineering (ICEE 1998), Khajeh-Nasir-Toosi University of Technology, Tehran, IRAN.

C4- Dakhilalian, M., Aref M.,Modares Hashemi M.,Linear Complexity Analysis and presentation of a New Statistical Test, 6th Iranian Conference on Electrical Engineering (ICEE 1998), Khajeh-Nasir-Toosi University of Technology, Tehran, IRAN.

C5- Dakhilalian, M., Aref M., Sadeghian, Symbols Combination Test , 4th Annual Computer Society of Iran Computer Conference (CSICC1999), Sharif University of Technology, Tehran, IRAN.

C6- Dakhilalian, M., Aref M., Sadeghian,A New Known Plain Text Attack on Binary Chaotic Pseudo-random Generators , 7th Iranian Conference on Electrical Engineering (ICEE1999), Iran Telecommunication Research Center (ITRC),Tehran, IRAN.

C7- Dakhilalian, M., Aref M., Sadeghian, Behavior Analysis of Sequences which Generated by Chaotic Maps, 7th Iranian Conference on Electrical Engineering (ICEE1999), Iran Telecommunication Research Center (ITRC),Tehran, IRAN.

C8- Dakhilalian, M., Aref M., Sadeghian, Design and Statistical Analysis of Binary Chaotic Pseudo-random Sequences, 7th Iranian Conference on Electrical Engineering (ICEE1999), Iran Telecommunication Research Center (ITRC),Tehran, IRAN.

C9- Hashemi,A.,Ahmadi,A.,Dakhilalian,M, A Practical Circuit for Generation of Truly Random Sequences, 1st Iranian Society of Cryptology Conference (ISCC2001), Emam Hosein University , Tehran, IRAN.

C10- Dakhilalian, M., Probabilistic Behavior of Runs And it's Application to some Statistical Tests ,,11th Iranian Conference on Electrical Engineering (ICEE 2003), School of engineering, Shiraz University, Shiraz, IRAN.

C11-Bagherikaram,G.,Dakhilalian,M,Berenjkoub,M.,.Linear Analysis of IES80 Algorithm ,11th Iranian Conference on Electrical Engineering (ICEE 2003), School of Engineering, Shiraz University, Shiraz, IRAN.

C12- Peizari,B., Dakhilalian,M ,Autocorrelation Test for Sub Blocks, 2nd Iranian Society of Cryptology Conference (ISCC2003), Sharif University of Technology, Tehran, IRAN.

C13- Peizari,B., Dakhilalian,M Improving The Run Test and Presentation of a New Run Test for Sub Blocks, 2nd Iranian Society of Cryptology Conference(ISCC2003), Sharif University of Technology, Tehran, IRAN.

C14- Bagherikaram,G., Dakhilalian,M ,Linear and Differential Analysis of Taregh2 Algorithm, 2nd Iranian Society of Cryptology Conference (ISCC2003), Sharif University of Technology, Tehran, IRAN.

C15- Mala,H., Dakhilalian,M ,Fuzzy Statistical Evaluating of Pseudorandom Generators, 3rd Iranian Society of Cryptology Conference (ISCC2005), Isfahan University of Technology, Isfahan, IRAN.

C16- Koleini,M.,Berenjkoub M., Dakhilalian,M ,Security Evaluation of 3DSecure protocol, 3rd Iranian Society of Cryptology Conference (ISCC2005), Isfahan University of Technology, Isfahan, IRAN.

C17- Koleini,M.,Berenjkoub M., Dakhilalian,M , A New Protocol for Credit Card Transaction Systems, International Symposium on Telecommunications (IST2005), Shiraz University , Shiraz, IRAN.

C18- A. Kakhbod,,M.,Dakhilalian,S. Mohajer , Extension of Rank Test for Sequences over GF(q), IEEE International Conference on Information & Communication Technologies:from Theory to Applications(ICTTA2006), Damascus, Syria.

C19- H.Mala,M.,Dakhilalian, M.,Berenjkoub ,A New Identity-based Proxy Signature Scheme from Bilinear Pairings, IEEE International Conference on Information & Communication Technologies:from Theory to Applications(ICTTA'2006), Damascus, Syria.

C20- H.Mala,M.,Dakhilalian,M.,Berenjkoub ,Modified Identity-based Proxy Signature Scheme from Bilinear Pairings,14th Iranian Conference on Electrical Engineering(ICEE 2006),Amir Kabir University, Tehran,IRAN.

C21- M.Pourhomyoun, M.,Dakhilalian,Improvement of Security Protocol of Smart Card and Card Reader by Using ECC, ,14th Iranian Conference on Electrical Engineering(ICEE 2006),Amir Kabir University, Tehran,IRAN.

C22- H.Mala,M.,Dakhilalian, " A New Undeniable Identity-based Digital Signature" ,15th Iranian Coference on Electrical Engineering (ICEE2007), Iran Telecommunication Research Center (ITRC),Tehran, IRAN.

C23- M.Sajadie,M.,Dakhilalian,V.,Nahvi ,Noise effects on Stream Cipher attacks , 4th Iranian Society of Cryptology Conference (ISCC2007), Iran University of Science and Technology, Tehran, IRAN.

C24- M.Shakiba,M.,Dakhilalian," A New Multilevel Strategy as an Effective Method to Reduce Complexity of Linear and Differential Attacks ", 5th Iranian Society of Cryptology Conference (ISCC2008), Tehran, IRAN.

C25-H.Mala, M.Dakhilalian, M.Sajadieh, Provable Security for a 4-Blocked Unbalanced Feistel Structure Against Differential Cryptanalysis,,5th International ISC Conference on Information Security & Cryptology 2008(ISCC2008),Tehran,IRAN.

C26- A. Mirzaei, M.Dakhilalian,M. Modarees Hashemi,Distinguishing Attack on a Modified Version of MAG Stream Cipher, 6th International ISC Conference on Information Security and Cryptology(ISCISC2009),Isfahan University, IRAN.

C27- H. Mala, M.Dakhilalian,M. Sajdadieh and Roya Arabloodariche,Input-Output Weight Distribution of 4*4 MDS Matrices, 6th International ISC Conference on Information Security and Cryptology(ISCISC2009),Isfahan University, IRAN.

C28- A. Mirzaei, M.Dakhilalian,M. Modarees Hashemi, Reduce Resynchronization Attack to Distinguish Attack on Stream Ciphers, 18th Iranian Conference on Electrical Engineering (ICEE2010), Isfahan University of Technology, Esfahan , IRAN.

C29- Z. Hajibabaei, M.Dakhilalian,M, Second Preimage Attack on a Chaos_beased Hash function Construction and its Improvement,, 4th International Interdisciplinary Chaos Symposium Chaos and Complex Systems, April 29- May 02, 2012,Turkey.

Others

 

J1- Dakhilalian, M., Aref M., Sadeghian, B.,M. Modares Hashemi M.,A New Statistical Test Based on Linear Complexity Profile, Amirkabir Journal of Science& Technology, Vol.11, No.42, pp.67-73,1997.

J2- M.Dakhilalian, E. Molavian, M. Taghiyar, Analysis of Randomness of Runs and Its Application for Statistical Tests, International Journal of Computer Science and Network Security(IJCSNS), Vo.l9, No.9,pp.83-89,Sepetmber 2009.

J3- A.Mirzaei,M.Dakhilalian,M.Modares Hashemi, An Improved Attack on WG Stream Cipher, JCSNS International Journal of Computer Science and Network Security, VOL.10 No.4, April 2010.