Journal Pepers 
1- Hamid Mala, Mohsen Shakiba, Mohammad Dakhilalian, New impossible differential attacks on reduced-round Crypton. Computer Standards & Interfaces 32(4): 222-227 (2010) |
2- Mohsen Shakiba, Mohammad Dakhilalian, Hamid Mala, An improved impossible differential cryptanalysis of Zodiac. Journal of Systems and Software 83(4): 702-709 (2010) |
3- Hamid Mala, Mohammad Dakhilalian, Mohsen Shakiba, Impossible Differential Attacks on 13-Round CLEFIA-128. J. Comput. Sci. Technol. 26(4): 744-750 (2011) |
4-Mahdi Sajadieh, Mohammad Dakhilalian, Hamid Mala, Perfect involutory diffusion layers based on invertibility of some linear functions. IET Information Security 5(4): 228-236 (2011) |
5- Hamid Mala, Mohammad Dakhilalian, Mohsen Shakiba, Impossible differential cryptanalysis of reduced-round Camellia-256. IET Information Security 5(3): 129-134 (2011) |
6- Hamid Mala, Mohammad Dakhilalian, Mohsen Shakiba, Cryptanalysis of mCrypton - A lightweight block cipher for security of RFID tags and sensors. Int. J. Communication Systems 25(4): 415-426 (2012) |
7- Mahdi Sajadieh, Mohammad Dakhilalian, Hamid Mala, Behnaz Omoomi, On construction of involutory MDS matrices from Vandermonde Matrices in GF(2 q ). Des. Codes Cryptography 64(3): 287-308 (2012) |
8- Omid Fallah-Mehrjardi, Behrouz Shahgholi Ghahfarokhi, Hamid Mala, Naser Movahhedinia, Improving Radio Resource Utilization and User Level Fairness in OFDMA Femtocell Networks. Wireless Personal Communications 77(3): 2341-2358 (2014) |
9- Mohsen Shakiba, Mohammad Dakhilalian, Hamid Mala, On computational complexity of impossible differential cryptanalysis. Inf. Process. Lett. 114(5): 252-255 (2014) |
10- Fereidoun Moradi, Hamid Mala, Behrouz Tork Ladani, Security Analysis and Strengthening of an RFID Lightweight Authentication Protocol Suitable for VANETs. Wireless Personal Communications 83(4): 2607-2621 (2015) |
11- Mahdi Sajadieh, Mohammad Dakhilalian, Hamid Mala, Pouyan Sepehrdad, Efficient Recursive Diffusion Layers for Block Ciphers and Hash Functions. J. Cryptology 28(2): 240-256 (2015) |
12- Mohsen Shakiba, Mohammad Dakhilalian, Hamid Mala, Cryptanalysis of mCrypton-64. Int. J. Communication Systems 28(8): 1401-1418 (2015) |
13- Mohsen Shakiba, Mohammad Dakhilalian, Hamid Mala, Non-isomorphic biclique cryptanalysis of full-round Crypton. Computer Standards & Interfaces 41: 72-78 (2015) |
14- Sajadieh, M., Mirzaei, A., Mala, H., Rijmen, V., A new counting method to bound the number of active S-boxes in Rijndael and 3D, Designs, Codes and Cryptography 83(2), 327-343 (2017). |
15- Aghili, SF , Ashouri-Talouki, M., Mala, H., DoS, impersonation and de-synchronization attacks against an ultra-lightweight RFID mutual authentication protocol for IoT, The Journal of Super-computing 74(1), 509-525 (2018). |
16- Aghili, SF., Mala, H., Peris-Lopez, P., Securing heterogeneous wireless sensor networks: Breaking and Fixing a three-factor authentication protocol, Sensors 18(11), 3663 (2018). |
17- Aghili, SF., Mala, H., Security analysis of an ultra?lightweight RFID authentication protocol for m-commerce, International Journal of Communication Systems 32(3), e3837 (2019). |
18- Zarezadeh, M., Mala, H., Determining Honesty of Accuser Nodes in Key Revocation Procedure for MANETs, Mobile Networks and Applications 24(3), 903-912 (2019). |
19- Aghili, SF., Mala, M., Shojafar, M., Peris-Lopez P., LACO: Lightweight three-factor authentication, access control and ownership transfer scheme for e-health systems in IoT, Future Generation Computer Systems 96, 410-424 (2019). |
20- Azizi, S., Ashouri-Talouki, M., Mala, H., Ecient privacy-preserving group-nearest-neighbor queries with the presence of active adversaries, Wireless Networks 25(8), 4799-4814 (2019). |
21- Aghili, SF., Mala, H. Kaliyar, P. Conti, M., Seclap: Secure and lightweight rd authentication protocol for medical iot, Future Generation Computer Systems 101, 621-634 (2019). |
22- Aghili, SF., Mala, H., New authentication/ownership transfer protocol for RFID objects, Journal of Information Security and Applications 49, 102401 (2019). |
23- Zarezadeh, M., Mala, H., Ashouri-Talouki, M., Multi-keyword ranked searchable encryption scheme with access control for cloud storage, Peer-to-Peer Networking and Applications 13(1), 207-218 (2020). |
24- Salimi, M., Mala, H., Martin, H., Peris-Lopez, P., Full-Resilient Memory-Optimum Multi-Party Non-Interactive Key Exchange, IEEE Access 8, 8821-8833 (2020). |
25- Erfan, F., Mala, H., Secure and ecient publicly veriable outsourcing of matrix multiplication in online mode, Cluster Computing, 1-11 (2020). |
26- Aghili, SF., Mala, H., Tracking and impersonating tags in a CRC-based ultralightweight RFID authentication protocol, Peer-to-Peer Networking and Applications 13(3), 816-824 (2020). |
27- Zarezadeh, M., Mala, H., Ladani, B.T., Secure parameterized pattern matching, Information Sciences 522, 299-316 (2020). |
28- Zarezadeh, M., Mala, H., Khajeh, H., Preserving Privacy of Software-Defined Networking Policies by Secure Multi-Party Computation, Journal of Computer Science and Technology 35 (4), 863-874 (2020). |
29- Aghili, SF., Mala, H., Schindelhauer, C., Shojafar, M., Tafazolli, R., Closed-loop and open-loop authentication protocols for blockchain-based IoT systems, Information Processing Management 58 (4), 102568 (2021). |
30- Zarezadeh, M., Mala, H., Ladani, BT., Efficient Secure Pattern Matching with Malicious Adversaries, IEEE Transactions on Dependable and Secure Computing 19(2): 1407-1419 (2022). |
31- Jolfaei, AA., Mala, H., Zarezadeh, M., EO-PSI-CA: Efficient outsourced private set intersection cardinality, Journal of Information Security and Applications 65, 102996, (2022). |
32- Jaberi, M., Mala, H., Privacy-preserving multi-party PCA computation on horizontally and vertically partitioned data based on outsourced QR decomposition, The Journal of Supercomputing 79(13): 14358–14387 (2023). |
33- Saeidi, H. Mala, Secure Outsourcing of Two Standard Identity-based Cryptosystems, ISeCure 15(2), 2023. |
|
Selected Conference Papers 
1- Mala, H., Shakiba, M., Dakhilalian, M., Bagherikaram, G.: New Results on Impossible Differential Cryptanalysis of Reduced Round Camellia-128. In: Jacobson, M.J., Rijmen, V., Safavi-Naini, R.(eds) SAC 2009. LNCS, vol. 5867, pp. 281-294. Springer, Heidelberg, 2009.
|
2- Mala, H., Dakhilalian, M., Rijmen, V., Modarres-Hashemi, M.: Improved Impossible Differential Cryptanalysis of 7-Round AES-128. In: Gong, G., Gupta, K.C. (eds.) Indocrypt 2010. LNCS, vol. 6498, pp. 282-291. Springer, Heidelberg, 2010. |
3- Sadjadieh, M., Dakhilalian, M., Mala, H., Sepehrdad, P.: Recursive Diffusion Layers for Block Ciphers and Hash Functions, In Canteaut A. (ed.) FSE 2012, LNCS, vol. 7549, pp. 385-401. Springer , Heidelberg, 2012.
|
4- Sima Arasteh, Seyed Farhad Aghili, Hamid Mala, A new lightweight authentication and key agreement protocol for Internet of Things. ISCISC 2016: 52-59 |
5- Fahimeh Zare, Hamid Mala, Cryptanalysis of an Asymmetric Searchable Encryption Scheme. ISCISC 2017: 82-85 |
6- Seyed Farhad Aghili, Hamid Mala, Mohammad Shojafar, Mauro Conti: PAKIT: Proactive Authentication and Key Agreement Protocol for Internet of Things. INFOCOM Workshops 2019: 348-353 |
7- Mohammad Reza Saeidi, Hamid Mala: Secure Outsourcing of Boneh-Franklin Identity-Based Encryption Scheme. ISCISC 2021: 42-49 |
8- Maryam Zarezadeh, Hamid Mala:
Secure Parameterized Multi-Pattern Matching in Multi-Text Owner Setting. ISCISC 2021: 6-12 |
9- Mehrad Jaberi, Hamid Mala, Secure Determining of the k-th Greatest Element Among Distributed Private Values. CSICC 2021: 1-5 |
|