In the Name of GOD.

Hamid Mala

Associate professor at the

Department of Information Technology,

Faculty of Computer Engineering, University of Isfahan, Iran.

Contact: email: h.mala@eng.ui.ac.ir

                   Tel: +98-31-37935608                                                  

 
About Me Education Journal Papers Selected Conference Papers
Dissertations Supervised Research Interests Teaching Executive Responsibilities
 

  About Me

Name: Hamid Mala (Pronounced: M&la)

I am an associate professor at Department of Information Technology Engineering at Faculty of Computer Engineering of University of IOsfahan (UI), since 2011. My research interests include  applied cryptography and cryptographic protocols. I have supervised three PhD and more than 15 BSc dissertations. I have the chance to serve as the Technical Program Committee Chair of ISCISC2021 and ISCISC2023. I am honored to have been elected as an executive council members of Iranian Society of Cryptology in 2022.

 

 

Education 

BSc Isfahan University of Technology Electical Engineering (Electronics) 1999-2003
MSc Isfahan University of Technology Electical Engineering (Communications) 2003-2006
PhD Isfahan University of Technology Electical Engineering (Communications) 2006-2011
 

Journal Pepers

1- , , , New impossible differential attacks on reduced-round Crypton. Computer Standards & Interfaces 32(4): 222-227 ()
2- , , , An improved impossible differential cryptanalysis of Zodiac. Journal of Systems and Software 83(4): 702-709 ()
3- , , , Impossible Differential Attacks on 13-Round CLEFIA-128. J. Comput. Sci. Technol. 26(4): 744-750 ()
4-, , Perfect involutory diffusion layers based on invertibility of some linear functions. IET Information Security 5(4): 228-236 ()
5- , , , Impossible differential cryptanalysis of reduced-round Camellia-256. IET Information Security 5(3): 129-134 ()
6- , , , Cryptanalysis of mCrypton - A lightweight block cipher for security of RFID tags and sensors. Int. J. Communication Systems 25(4): 415-426 ()
7- , , , , On construction of involutory MDS matrices from Vandermonde Matrices in GF(2 q ). Des. Codes Cryptography 64(3): 287-308 ()
8- , , , , Improving Radio Resource Utilization and User Level Fairness in OFDMA Femtocell Networks. Wireless Personal Communications 77(3): 2341-2358 ()
9- , , On computational complexity of impossible differential cryptanalysis. Inf. Process. Lett. 114(5): 252-255 ()
10- , , , Security Analysis and Strengthening of an RFID Lightweight Authentication Protocol Suitable for VANETs. Wireless Personal Communications 83(4): 2607-2621 ()
11- , , , , Efficient Recursive Diffusion Layers for Block Ciphers and Hash Functions. J. Cryptology 28(2): 240-256 ()
12- , , Cryptanalysis of mCrypton-64. Int. J. Communication Systems 28(8): 1401-1418 ()
13- , , Non-isomorphic biclique cryptanalysis of full-round Crypton. Computer Standards & Interfaces 41: 72-78 ()
14- Sajadieh, M., Mirzaei, A., Mala, H., Rijmen, V., A new counting method to bound the number of active S-boxes in Rijndael and 3D, Designs, Codes and Cryptography 83(2), 327-343 (2017).
15- Aghili, SF , Ashouri-Talouki, M., Mala, H., DoS, impersonation and de-synchronization attacks against an ultra-lightweight RFID mutual authentication protocol for IoT, The Journal of Super-computing 74(1), 509-525 (2018).
16- Aghili, SF., Mala, H., Peris-Lopez, P., Securing heterogeneous wireless sensor networks: Breaking and Fixing a three-factor authentication protocol, Sensors 18(11), 3663 (2018).
17- Aghili, SF., Mala, H., Security analysis of an ultra?lightweight RFID authentication protocol for m-commerce, International Journal of Communication Systems 32(3), e3837 (2019).
18- Zarezadeh, M., Mala, H., Determining Honesty of Accuser Nodes in Key Revocation Procedure for MANETs, Mobile Networks and Applications 24(3), 903-912 (2019).
19- Aghili, SF., Mala, M., Shojafar, M., Peris-Lopez P., LACO: Lightweight three-factor authentication, access control and ownership transfer scheme for e-health systems in IoT, Future Generation Computer Systems 96, 410-424 (2019).
20- Azizi, S., Ashouri-Talouki, M., Mala, H., Ecient privacy-preserving group-nearest-neighbor queries with the presence of active adversaries, Wireless Networks 25(8), 4799-4814 (2019).
21- Aghili, SF., Mala, H. Kaliyar, P. Conti, M., Seclap: Secure and lightweight r d authentication protocol for medical iot, Future Generation Computer Systems 101, 621-634 (2019).
22- Aghili, SF., Mala, H., New authentication/ownership transfer protocol for RFID objects, Journal of Information Security and Applications 49, 102401 (2019).
23- Zarezadeh, M., Mala, H., Ashouri-Talouki, M., Multi-keyword ranked searchable encryption scheme with access control for cloud storage, Peer-to-Peer Networking and Applications 13(1), 207-218 (2020).
24- Salimi, M., Mala, H., Martin, H., Peris-Lopez, P., Full-Resilient Memory-Optimum Multi-Party Non-Interactive Key Exchange, IEEE Access 8, 8821-8833 (2020).
25- Erfan, F., Mala, H., Secure and ecient publicly veri able outsourcing of matrix multiplication in online mode, Cluster Computing, 1-11 (2020).
26- Aghili, SF., Mala, H., Tracking and impersonating tags in a CRC-based ultralightweight RFID authentication protocol, Peer-to-Peer Networking and Applications 13(3), 816-824 (2020).
27- Zarezadeh, M., Mala, H., Ladani, B.T., Secure parameterized pattern matching, Information Sciences 522, 299-316 (2020).
28- Zarezadeh, M., Mala, H., Khajeh, H., Preserving Privacy of Software-Defined Networking Policies by Secure Multi-Party Computation, Journal of Computer Science and Technology 35 (4), 863-874 (2020).
29- Aghili, SF., Mala, H., Schindelhauer, C., Shojafar, M., Tafazolli, R., Closed-loop and open-loop authentication protocols for blockchain-based IoT systems, Information Processing Management 58 (4), 102568 (2021).
30- Zarezadeh, M., Mala, H., Ladani, BT., Efficient Secure Pattern Matching with Malicious Adversaries, IEEE Transactions on Dependable and Secure Computing 19(2): 1407-1419 (2022).
31- Jolfaei, AA., Mala, H., Zarezadeh, M., EO-PSI-CA: Efficient outsourced private set intersection cardinality, Journal of Information Security and Applications 65, 102996, (2022).
32- Jaberi, M., Mala, H., Privacy-preserving multi-party PCA computation on horizontally and vertically partitioned data based on outsourced QR decomposition, The Journal of Supercomputing 79(13): 14358–14387 (2023).
33- Saeidi, H. Mala, Secure Outsourcing of Two Standard Identity-based Cryptosystems, ISeCure 15(2), 2023.
 

Selected Conference Papers 

1- Mala, H., Shakiba, M., Dakhilalian, M., Bagherikaram, G.: New Results on Impossible Differential Cryptanalysis of Reduced Round Camellia-128. In: Jacobson, M.J., Rijmen, V., Safavi-Naini, R.(eds) SAC 2009. LNCS, vol. 5867, pp. 281-294. Springer, Heidelberg, 2009.

2- Mala, H., Dakhilalian, M., Rijmen, V., Modarres-Hashemi, M.: Improved Impossible Differential Cryptanalysis of 7-Round AES-128. In: Gong, G., Gupta, K.C. (eds.) Indocrypt 2010. LNCS, vol. 6498, pp. 282-291. Springer, Heidelberg, 2010.

3- Sadjadieh, M., Dakhilalian, M., Mala, H., Sepehrdad, P.: Recursive Diffusion Layers for Block Ciphers and Hash Functions, In Canteaut A. (ed.) FSE 2012, LNCS, vol. 7549, pp. 385-401. Springer , Heidelberg, 2012.

4- A new lightweight authentication and key agreement protocol for Internet of Things. ISCISC 52-59
5- Cryptanalysis of an Asymmetric Searchable Encryption Scheme. ISCISC 82-85
6- PAKIT: Proactive Authentication and Key Agreement Protocol for Internet of Things. INFOCOM Workshops 348-353
7- Secure Outsourcing of Boneh-Franklin Identity-Based Encryption Scheme. ISCISC 42-49
:
Secure Parameterized Multi-Pattern Matching in Multi-Text Owner Setting. ISCISC 6-12
9- Secure Determining of the k-th Greatest Element Among Distributed Private Values. CSICC 1-5
 

Dissertations Supervised

 
1- Energy-efficient authentication for resource-constrained things in Internet of Medical Things Net-
works, Farhad Aghili (Dec 2019).
2- Efficient Multi-party Non-Interactive Key Distribution, Majid Salimi (Oct, 2020).
3- Privacy-Preserving Pattern Matching, Maryam Zarezadeh (Oct, 2021).
4- Secure Development of Principal Component Analysis over Vertically Distributed Astronomical Data, Mehrad Jaberi (TBD).
5- Anonymous Password-based Authenticated Key Exchange in Post-Quantum World, Mohammad-Reza Saeidi (TBD).
 

Research Interests

 

Authentication and Key Agreement
Design and Cryptanalysis of Block Ciphers
IoT Security
Secure Outsourcing of Computation
Secure Multi-Party Computation
Post-Quantum Cryptography
 

Teaching 

Fall 2011:   Digital Electronics, Probability , Engineering Math
Spring 2011:  Discrete Math, Digital Design, Multimedia Systems
....
Spring 2023:  Security Protocols, Discrete Math, Game Theory
Fall 2023:       Discrete Math, Applied Cryptography, Advanced Topics in Secure Computing
 

Executive responsibilities

1- Head of Information Technology Department, Faculty of Computer Engineering, University of Isfahan, Jan 2017-Jan 2019.

2- Head of Information Technology Department, Faculty of Computer Engineering, University of Isfahan, September 2021-present.

3- Member of the 12th Executive Council of Iranian Society of Cryptology, October 2022-present.