Background
دکتر حمید ملا

دکتر حمید ملا

دانشیار

گروه مهندسی فناوری‌اطلاعات
دانشکده مهندسی کامپیوتر

پست الکترونیکی

h.mala@eng.ui.ac.ir

آدرس

دانشگاه اصفهان میدان آزادی اصفهان، ایران
کد پستی : 8174673441

برونداد‌های پژوهشی

63

همه موارد

63

مقالات

مرتب سازی بر اساس:

مقالات لاتین
2025

Heydari, G., Mahdavi, M., Mala, H.
SN Computer Science (2662995X)6(6)
Saeidi, M.R., Mala, H.
Peer-to-Peer Networking and Applications (19366450)18(4)
Jaberi, M., Mala, H., Sadat madani, S.M.
ISeCure (20083076)17(2)pp. 179-187

Cryptanalysis of two post-quantum authenticated key agreement protocols

( Article . )

Abri, M., Mala, H.
Journal of Computer Virology and Hacking Techniques (22638733)21(1)

Preventing collusion in secure computation with preprocessing via function secret sharing

( Article . )

Heydari, G., Mahdavi, M., Mala, H.
Expert Systems with Applications (09574174)289

Secure fully-verifiable outsourcing of modular exponentiation: two servers check each other

( Article . )

Torki, O., Mala, H., Ashouri, M.
Journal of Supercomputing (15730484)81(1)
2024

An Anonymous Authenticated Key Agreement Scheme for Telecare Medical Information Systems

( Article . Gold )

Faraj, G.H., Shahtalebi, K., Mala, H.
Cryptography (2410387X)8(4)

Control of Bilateral Teleoperation Systems with Observer-Based Detection of Data Injection Attack

( Article . )

Vaheb, M.H., Motaharifar, M., Koofigar, H.R., Mala, H.
pp. 281-287

Cryptanalysis of Two Password Authenticated Key Exchange Schemes

( Article . )

Poorafsahi, M.A., Mala, H.
pp. 151-156

Enhancing privacy in commit-chains based on blind signature

( Article . )

Akraminasab, M., Mahdavi, M., Mala, H.
Expert Systems with Applications (09574174)244

Privacy-preserving eigenvector computation with applications in spectral clustering

( Article . )

Jaberi, M., Mala, H.
International Journal of Information Technology (Singapore) (25112104)

To Kill a Mockingbird: Cryptanalysis of an Authenticated Key Exchange Scheme for Drones

( Article . )

Toghraee, N., Mala, H.
pp. 228-233
2023

A Lightweight RFID Grouping Proof Protocol With Forward Secrecy and Resistant to Reader Compromised Attack

( Article . )

Borjal bayatiani, F., Mala, H.
ISeCure (20083076)15(3 Special Issue)pp. 117-128

Privacy-preserving multi-party PCA computation on horizontally and vertically partitioned data based on outsourced QR decomposition

( Article . )

Jaberi, M., Mala, H.
Journal of Supercomputing (15730484)79(13)pp. 14358-14387

Secure Outsourcing of Two Standard Identity-Based Cryptosystems

( Article . )

Saeidi, M.R., Mala, H.
ISeCure (20083076)15(2)pp. 162-175
2022

Efficient Secure Pattern Matching with Malicious Adversaries

( Article . )

Zarezadeh, M., Mala, H., Torkladani, B.
IEEE Transactions on Dependable and Secure Computing (15455971)19(2)pp. 1407-1419

EO-PSI-CA: Efficient outsourced private set intersection cardinality

( Article . )

Adavoudi-jolfaei, A., Mala, H., Zarezadeh, M.
Journal of Information Security and Applications (22142126)65
2021

Closed-loop and open-loop authentication protocols for blockchain-based IoT systems

( Article . )

Aghili, S.F., Mala, H., Schindelhauer, C., Shojafar, M., Tafazolli, R.
Information Processing and Management (18735371)58(4)

Secure Determining of the k-th Greatest Element among Distributed Private Values

( Article . )

Jaberi, M., Mala, H.

Secure Outsourcing of Boneh-Franklin Identity-Based Encryption Scheme

( Article . )

Saeidi, M.R., Mala, H.
pp. 42-49

Secure Parameterized Multi-Pattern Matching in Multi-Text Owner Setting

( Article . )

Zarezadeh, M., Mala, H.
pp. 6-12
2020

A Secure and Efficient Mobile Payment Protocol with Fair-Exchange Feature

( Article . )

Zamanian, F., Mala, H.

Full-Resilient Memory-Optimum Multi-Party Non-Interactive Key Exchange

( Article . Gold • Green )

Salimi, M., Mala, H., Martin, H., Peris-lopez, P.
IEEE Access (21693536)8pp. 8821-8833

Multi-keyword ranked searchable encryption scheme with access control for cloud storage

( Article . )

Zarezadeh, M., Mala, H., Ashouri, M.
Peer-to-Peer Networking and Applications (19366450)13(1)pp. 207-218

Preserving Privacy of Software-Defined Networking Policies by Secure Multi-Party Computation

( Article . )

Zarezadeh, M., Mala, H., Khajeh, H.
Journal of Computer Science and Technology (18604749)35(4)pp. 863-874

Secure and efficient publicly verifiable outsourcing of matrix multiplication in online mode

( Article . )

Erfan, F., Mala, H.
Cluster Computing (13867857)23(4)pp. 2835-2845

Secure parameterized pattern matching

( Article . )

Zarezadeh, M., Mala, H., Torkladani, B.
Information Sciences (00200255)522pp. 299-316

Tracking and impersonating tags in a CRC-based ultralightweight RFID authentication protocol

( Article . )

Aghili, S.F., Mala, H.
Peer-to-Peer Networking and Applications (19366450)13(3)pp. 816-824
2019

Determining Honesty of Accuser Nodes in Key Revocation Procedure for MANETs

( Article . )

Zarezadeh, M., Mala, H.
Mobile Networks and Applications (1383469X)24(3)pp. 903-912

Efficient privacy-preserving group-nearest-neighbor queries with the presence of active adversaries

( Article . )

Azizi, S., Ashouri, M., Mala, H.
Wireless Networks (10220038)25(8)pp. 4799-4814

LACO: Lightweight Three-Factor Authentication, Access Control and Ownership Transfer Scheme for E-Health Systems in IoT

( Article . )

Aghili, S.F., Mala, H., Shojafar, M., Peris-lopez, P.
Future Generation Computer Systems (0167739X)96pp. 410-424

New authentication/ownership transfer protocol for RFID objects

( Article . )

Aghili, S.F., Mala, H.
Journal of Information Security and Applications (22142126)49

PAKIT: Proactive Authentication and Key Agreement Protocol for Internet of Things

( Article . )

Aghili, S.F., Mala, H., Shojafar, M., Conti, M.
pp. 348-353

SecLAP: Secure and lightweight RFID authentication protocol for Medical IoT

( Article . )

Aghili, S.F., Mala, H., Kaliyar, P., Conti, M.
Future Generation Computer Systems (0167739X)101pp. 621-634

Security analysis of an ultra-lightweight RFID authentication protocol for m-commerce

( Article . )

Aghili, S.F., Mala, H.
International Journal of Communication Systems (10991131)32(3)
2018

DoS, impersonation and de-synchronization attacks against an ultra-lightweight RFID mutual authentication protocol for IoT

( Article . )

Aghili, S.F., Ashouri, M., Mala, H.
Journal of Supercomputing (15730484)74(1)pp. 509-525

Securing heterogeneous wireless sensor networks: Breaking and fixing a three-factor authentication protocol

( Article . Gold • Green )

Aghili, S.F., Mala, H., Peris-lopez, P.
Sensors (14248220)18(11)
2017

A new counting method to bound the number of active S-boxes in Rijndael and 3D

( Article . )

Sajadieh, M., Mirzaei, A., Mala, H., Rijmen, V.
Designs, Codes, and Cryptography (09251022)83(2)pp. 327-343

Cryptanalysis of an Asymmetric Searchable Encryption Scheme

( Article . )

Zare, F., Mala, H.
pp. 25-30

Online privacy preserving outsourcing of large matrix multiplication

( Article . )

Erfan, F., Mala, H.
2017pp. 235-240
2016

A new anonymous unlinkable mobile payment protocol

( Article . )

Zamanian, F., Mala, H.
pp. 117-122

A new lightweight authentication and key agreement protocol for Internet of Things

( Article . )

Arasteh, S., Aghili, S.F., Mala, H.
pp. 52-59

Security analysis of the RBS block cipher

( Article . )

Mala, H., Adavoudi, A., Aghili, S.F.
pp. 130-132
2015

Cryptanalysis and strengthening of SRP+ protocol

( Article . )

Moradi, F., Mala, H., Torkladani, B.
pp. 91-97

Cryptanalysis of mCrypton-64

( Article . )

Shakiba, M., Dakhilalian, M., Mala, H.
International Journal of Communication Systems (10991131)28(8)pp. 1401-1418

Efficient Recursive Diffusion Layers for Block Ciphers and Hash Functions

( Article . Green • Bronze )

Sajadieh, M., Dakhilalian, M., Mala, H., Sepehrdad, P.
Journal of Cryptology (14321378)28(2)pp. 240-256

Non-isomorphic biclique cryptanalysis of full-round Crypton

( Article . )

Shakiba, M., Dakhilalian, M., Mala, H.
Computer Standards and Interfaces (09205489)41pp. 72-78

Security Analysis and Strengthening of an RFID Lightweight Authentication Protocol Suitable for VANETs

( Article . )

Moradi, F., Mala, H., Torkladani, B.
Wireless Personal Communications (1572834X)83(4)pp. 2607-2621
2014

Biclique-based cryptanalysis of the block cipher SQUARE

( Article . )

Mala, H.
IET Information Security (17518709)8(3)pp. 207-212

Improving radio resource utilization and user level fairness in OFDMA femtocell networks

( Article . )

Fallah-mehrjardi, O., Shahgholi, B., Mala, H., Movahhedinia, N.
Wireless Personal Communications (1572834X)77(3)pp. 2341-2358

On computational complexity of impossible differential cryptanalysis

( Article . )

Shakiba, M., Dakhilalian, M., Mala, H.
Information Processing Letters (00200190)114(5)pp. 252-255
2013

New blind signature schemes based on the (elliptic curve) discrete logarithm problem

( Article . )

Mala, H., Nezhadansari, N.
pp. 196-201
2012

Cryptanalysis of mCrypton-A lightweight block cipher for security of RFID tags and sensors

( Article . )

Mala, H., Dakhilalian, M., Shakiba, M.
International Journal of Communication Systems (10991131)25(4)pp. 415-426

On construction of involutory MDS matrices from Vandermonde Matrices in GF(2 q)

( Article . )

Sajadieh, M., Dakhilalian, M., Mala, H., Omoomi, B.
Designs, Codes, and Cryptography (09251022)64(3)pp. 287-308

Recursive diffusion layers for block ciphers and hash functions

( Article . )

Sajadieh, M., Dakhilalian, M., Mala, H., Sepehrdad, P.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (03029743)7549pp. 385-401
2011

Impossible differential attacks on 13-round CLEFIA-128

( Article . )

Mala, H., Dakhilalian, M., Shakiba, M.
Journal of Computer Science and Technology (18604749)26(4)pp. 744-750

Impossible differential cryptanalysis of reduced-round Camellia-256

( Article . )

Mala, H., Dakhilalian, M., Shakiba, M.
IET Information Security (17518709)5(3)pp. 129-134

Perfect involutory diffusion layers based on invertibility of some linear functions

( Article . )

Sajadieh, M., Dakhilalian, M., Mala, H.
IET Information Security (17518709)5(4)pp. 228-236
2010

An improved impossible differential cryptanalysis of Zodiac

( Article . )

Shakiba, M., Dakhilalian, M., Mala, H.
Journal of Systems and Software (01641212)83(4)pp. 702-709

Improved impossible differential cryptanalysis of 7-round AES-128

( Article . )

Mala, H., Dakhilalian, M., Rijmen, V., Modarres hashemi m., M.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (03029743)6498pp. 282-291

New impossible differential attacks on reduced-round Crypton

( Article . )

Mala, H., Shakiba, M., Dakhilalian, M.
Computer Standards and Interfaces (09205489)32(4)pp. 222-227
2009

New results on impossible differential cryptanalysis of reduced-round camellia-128

( Article . )

Mala, H., Shakiba, M., Dakhilalian, M., Bagherikaram, G.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (03029743)5867pp. 281-294
2006

A New identity-based proxy signature scheme from bilinear pairings

( Article . )

Mala, H., Dakhil-alian, M., Brenjkoub, M.
2pp. 3304-3308