<?xml version="1.0"?>
<dblpperson name="Zahra Ahmadian" pid="16/8013" n="57">
<person key="homepages/16/8013" mdate="2010-04-26">
<author pid="16/8013">Zahra Ahmadian</author>
</person>
<r><article key="journals/tosc/PengKAHHHNRW26" mdate="2026-03-30">
<author pid="153/9050">Shuo Peng</author>
<author pid="255/2006">Akram Khalesi</author>
<author pid="16/8013">Zahra Ahmadian</author>
<author pid="244/8979">Hosein Hadipour</author>
<author pid="205/5150-2">Jiahui He 0002</author>
<author pid="57/6633-1">Kai Hu 0001</author>
<author pid="244/3186">Zhongfeng Niu</author>
<author pid="145/1717">Shahram Rasoolzadeh</author>
<author pid="88/158">Meiqin Wang</author>
<title>Cube and Integral Attacks on ChiLow-32.</title>
<year>2026</year>
<pages>253-292</pages>
<volume>2026</volume>
<journal>IACR Trans. Symmetric Cryptol.</journal>
<number>1</number>
<ee type="oa">https://doi.org/10.46586/tosc.v2026.i1.253-292</ee>
<url>db/journals/tosc/tosc2026.html#PengKAHHHNRW26</url>
<stream>streams/journals/tosc</stream>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/PengKAHHHNRW26" mdate="2026-03-21">
<author pid="153/9050">Shuo Peng</author>
<author pid="255/2006">Akram Khalesi</author>
<author pid="16/8013">Zahra Ahmadian</author>
<author pid="244/8979">Hosein Hadipour</author>
<author pid="205/5150-2">Jiahui He 0002</author>
<author pid="57/6633-1">Kai Hu 0001</author>
<author pid="244/3186">Zhongfeng Niu</author>
<author pid="145/1717">Shahram Rasoolzadeh</author>
<author pid="88/158">Meiqin Wang</author>
<title>Cube and Integral Attacks on ChiLow-32.</title>
<year>2026</year>
<pages>365</pages>
<volume>2026</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2026/365</ee>
<url>db/journals/iacr/iacr2026.html#PengKAHHHNRW26</url>
<stream>streams/journals/iacr</stream>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/KhalesiAH25" mdate="2025-10-28">
<author pid="255/2006">Akram Khalesi</author>
<author pid="16/8013">Zahra Ahmadian</author>
<author pid="244/8979">Hosein Hadipour</author>
<title>Improved Integral Attack on ChiLow-32 Exploiting the Inverse of the ChiChi Function.</title>
<pages>1806</pages>
<year>2025</year>
<volume>2025</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2025/1806</ee>
<url>db/journals/iacr/iacr2025.html#KhalesiAH25</url>
<stream>streams/journals/iacr</stream>
</article>
</r>
<r><article key="journals/dcc/AhmadianKMMN24" mdate="2025-01-02">
<author pid="16/8013">Zahra Ahmadian</author>
<author pid="255/2006">Akram Khalesi</author>
<author pid="357/9914">Dounia M'foukh</author>
<author pid="358/0176">Hossein Moghimi</author>
<author pid="24/1241">Mar&#237;a Naya-Plasencia</author>
<title>Truncated differential cryptanalysis: new insights and application to QARMAv1-n and QARMAv2-64.</title>
<pages>4549-4591</pages>
<year>2024</year>
<month>December</month>
<volume>92</volume>
<journal>Des. Codes Cryptogr.</journal>
<number>12</number>
<ee>https://doi.org/10.1007/s10623-024-01486-8</ee>
<url>db/journals/dcc/dcc92.html#AhmadianKMMN24</url>
<stream>streams/journals/dcc</stream>
</article>
</r>
<r><article key="journals/fgcs/MahdaviTHA24" mdate="2024-10-06">
<author pid="284/2567">Mahdi Mahdavi</author>
<author orcid="0000-0002-0865-7993" pid="81/9199">Mohammad Hesam Tadayon</author>
<author orcid="0000-0003-1042-837X" pid="02/4828">Mohammad Sayad Haghighi</author>
<author orcid="0000-0001-9356-4064" pid="16/8013">Zahra Ahmadian</author>
<title>IoT-friendly, pre-computed and outsourced attribute based encryption.</title>
<pages>115-126</pages>
<year>2024</year>
<month>January</month>
<volume>150</volume>
<journal>Future Gener. Comput. Syst.</journal>
<ee>https://doi.org/10.1016/j.future.2023.08.015</ee>
<url>db/journals/fgcs/fgcs150.html#MahdaviTHA24</url>
</article>
</r>
<r><article key="journals/fgcs/MahdaviTHA24a" mdate="2024-10-06">
<author pid="284/2567">Mahdi Mahdavi</author>
<author pid="81/9199">Mohammad Hesam Tadayon</author>
<author orcid="0000-0003-1042-837X" pid="02/4828">Mohammad Sayad Haghighi</author>
<author pid="16/8013">Zahra Ahmadian</author>
<title>Corrigendum to &#34;IoT-friendly, pre-computed and outsourced attribute based encryption&#34; [Future Generation Computer Systems (FGCS) volume 150 (2024) 115-126/ FGCS-D-23-00424].</title>
<pages>396</pages>
<year>2024</year>
<volume>154</volume>
<journal>Future Gener. Comput. Syst.</journal>
<ee>https://doi.org/10.1016/j.future.2023.12.027</ee>
<url>db/journals/fgcs/fgcs154.html#MahdaviTHA24a</url>
</article>
</r>
<r><article key="journals/virology/KhalesiA24" mdate="2024-03-16">
<author pid="255/2006">Akram Khalesi</author>
<author orcid="0000-0001-9356-4064" pid="16/8013">Zahra Ahmadian</author>
<title>Provably minimum data complexity integral distinguisher based on conventional division property.</title>
<pages>113-125</pages>
<year>2024</year>
<volume>20</volume>
<journal>J. Comput. Virol. Hacking Tech.</journal>
<number>1</number>
<ee>https://doi.org/10.1007/s11416-023-00502-0</ee>
<url>db/journals/virology/virology20.html#KhalesiA24</url>
</article>
</r>
<r><inproceedings key="conf/eurocrypt/AhmadianKMMN24" mdate="2024-05-09">
<author pid="16/8013">Zahra Ahmadian</author>
<author pid="255/2006">Akram Khalesi</author>
<author pid="357/9914">Dounia M'foukh</author>
<author pid="358/0176">Hossein Moghimi</author>
<author pid="24/1241">Mar&#237;a Naya-Plasencia</author>
<title>Improved Differential Meet-in-the-Middle Cryptanalysis.</title>
<pages>280-309</pages>
<year>2024</year>
<booktitle>EUROCRYPT (1)</booktitle>
<ee>https://doi.org/10.1007/978-3-031-58716-0_10</ee>
<crossref>conf/eurocrypt/2024-1</crossref>
<url>db/conf/eurocrypt/eurocrypt2024-1.html#AhmadianKMMN24</url>
</inproceedings>
</r>
<r><inproceedings key="conf/trustcom/MahdaviAA24" mdate="2025-10-14">
<author pid="284/2567">Mahdi Mahdavi</author>
<author orcid="0000-0003-4293-8518" pid="318/3034">Navid Abapour</author>
<author pid="16/8013">Zahra Ahmadian</author>
<title>Trustworthy Approaches to RSA: Efficient Exploitation Strategies Based on Common Modulus.</title>
<pages>2535-2540</pages>
<year>2024</year>
<booktitle>TrustCom</booktitle>
<ee>https://doi.org/10.1109/TrustCom63139.2024.00353</ee>
<crossref>conf/trustcom/2024</crossref>
<url>db/conf/trustcom/trustcom2024.html#MahdaviAA24</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/AhmadianKMMN24" mdate="2024-03-18">
<author pid="16/8013">Zahra Ahmadian</author>
<author pid="255/2006">Akram Khalesi</author>
<author pid="357/9914">Dounia M'foukh</author>
<author pid="358/0176">Hossein Moghimi</author>
<author pid="24/1241">Mar&#237;a Naya-Plasencia</author>
<title>Improved Differential Meet-In-The-Middle Cryptanalysis.</title>
<pages>351</pages>
<year>2024</year>
<volume>2024</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2024/351</ee>
<url>db/journals/iacr/iacr2024.html#AhmadianKMMN24</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/MahdaviAA24" mdate="2024-12-11">
<author pid="284/2567">Mahdi Mahdavi</author>
<author pid="318/3034">Navid Abapour</author>
<author pid="16/8013">Zahra Ahmadian</author>
<title>Trustworthy Approaches to RSA: Efficient Exploitation Strategies Based on Common Modulus.</title>
<pages>1903</pages>
<year>2024</year>
<volume>2024</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2024/1903</ee>
<url>db/journals/iacr/iacr2024.html#MahdaviAA24</url>
<stream>streams/journals/iacr</stream>
</article>
</r>
<r><article key="journals/virology/OliaeeA23" mdate="2025-01-19">
<author pid="284/2567">Mahdi Mahdavi Oliaee</author>
<author orcid="0000-0001-9356-4064" pid="16/8013">Zahra Ahmadian</author>
<title>Fine-grained flexible access control: ciphertext policy attribute based encryption for arithmetic circuits.</title>
<pages>515-528</pages>
<year>2023</year>
<month>November</month>
<volume>19</volume>
<journal>J. Comput. Virol. Hacking Tech.</journal>
<number>4</number>
<ee>https://doi.org/10.1007/s11416-022-00459-6</ee>
<ee>https://www.wikidata.org/entity/Q122603094</ee>
<url>db/journals/virology/virology19.html#OliaeeA23</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/MehraeinAN23" mdate="2023-06-05">
<author pid="348/5403">Elnaz Mehraein</author>
<author pid="16/8013">Zahra Ahmadian</author>
<author pid="333/3666">Reza Nourmohammadi</author>
<title>IGD-ScoreChain: A Lightweight and Scalable Blockchain Based on Node Sharding for the Internet of Things.</title>
<pages>576</pages>
<year>2023</year>
<volume>2023</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2023/576</ee>
<url>db/journals/iacr/iacr2023.html#MehraeinAN23</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/KhalesiA23" mdate="2023-07-03">
<author pid="255/2006">Akram Khalesi</author>
<author pid="16/8013">Zahra Ahmadian</author>
<title>Beyond-Full-Round Integral Distinguisher of NIST Lightweight Cryptography Competition Finalist TinyJAMBU.</title>
<pages>960</pages>
<year>2023</year>
<volume>2023</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2023/960</ee>
<url>db/journals/iacr/iacr2023.html#KhalesiA23</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/RezapourA23" mdate="2023-08-04">
<author pid="228/3818">Ali Rezapour</author>
<author pid="16/8013">Zahra Ahmadian</author>
<title>Cryptanalysis and Improvement of a Flexible and Lightweight Group Authentication Scheme.</title>
<pages>1132</pages>
<year>2023</year>
<volume>2023</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2023/1132</ee>
<url>db/journals/iacr/iacr2023.html#RezapourA23</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/AhmadianKMMN23" mdate="2023-10-07">
<author pid="16/8013">Zahra Ahmadian</author>
<author pid="255/2006">Akram Khalesi</author>
<author pid="357/9914">Dounia M'foukh</author>
<author pid="358/0176">Hossein Moghimi</author>
<author pid="24/1241">Mar&#237;a Naya-Plasencia</author>
<title>Truncated Differential Attacks: New Insights and 10-round Attacks on QARMA.</title>
<pages>1449</pages>
<year>2023</year>
<volume>2023</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2023/1449</ee>
<url>db/journals/iacr/iacr2023.html#AhmadianKMMN23</url>
</article>
</r>
<r><article key="journals/isecure/AmiryousefiA22" mdate="2022-10-25">
<author pid="258/1697">Hamid Amiryousefi</author>
<author pid="16/8013">Zahra Ahmadian</author>
<title>Revisiting the Security and Efficiency of SP2DAS, 3PDA, and EPPA Smart Grid Security Protocols.</title>
<pages>157-165</pages>
<year>2022</year>
<volume>14</volume>
<journal>ISC Int. J. Inf. Secur.</journal>
<number>2</number>
<ee type="oa">https://doi.org/10.22042/isecure.2022.275064.645</ee>
<url>db/journals/isecure/isecure14.html#AmiryousefiA22</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/KhalesiA22" mdate="2022-09-27">
<author pid="255/2006">Akram Khalesi</author>
<author pid="16/8013">Zahra Ahmadian</author>
<title>Provably Minimum Data Complexity Integral Distinguisher Based on Conventional Division Property.</title>
<pages>752</pages>
<year>2022</year>
<volume>2022</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2022/752</ee>
<url>db/journals/iacr/iacr2022.html#KhalesiA22</url>
</article>
</r>
<r><inproceedings key="conf/iscisc/KhalesiA21" mdate="2022-03-08">
<author pid="255/2006">Akram Khalesi</author>
<author pid="16/8013">Zahra Ahmadian</author>
<title>Integral Analysis of Saturnin Using Bit-Based Division Property.</title>
<pages>63-67</pages>
<year>2021</year>
<booktitle>ISCISC</booktitle>
<ee>https://doi.org/10.1109/ISCISC53448.2021.9720461</ee>
<crossref>conf/iscisc/2021</crossref>
<url>db/conf/iscisc/iscisc2021.html#KhalesiA21</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/OliaeeA21" mdate="2021-02-02">
<author pid="284/2567">Mahdi Mahdavi Oliaee</author>
<author pid="16/8013">Zahra Ahmadian</author>
<title>Ciphertext Policy Attribute Based Encryption for Arithmetic circuits.</title>
<pages>3</pages>
<year>2021</year>
<volume>2021</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2021/003</ee>
<url>db/journals/iacr/iacr2021.html#OliaeeA21</url>
</article>
</r>
<r><article key="journals/cj/MoghaddamA20" mdate="2021-01-12">
<author pid="237/1601">Amirhossein Ebrahimi Moghaddam</author>
<author pid="16/8013">Zahra Ahmadian</author>
<title>New Automatic Search Method for Truncated-Differential Characteristics Application to Midori, SKINNY and CRAFT.</title>
<pages>1813-1825</pages>
<year>2020</year>
<volume>63</volume>
<journal>Comput. J.</journal>
<number>12</number>
<ee>https://doi.org/10.1093/comjnl/bxaa004</ee>
<url>db/journals/cj/cj63.html#MoghaddamA20</url>
</article>
</r>
<r><article key="journals/iet-ifs/BagherzadehA20" mdate="2023-10-22">
<author pid="229/4604">Elnaz Bagherzadeh</author>
<author orcid="0000-0001-9356-4064" pid="16/8013">Zahra Ahmadian</author>
<title>MILP-based automatic differential search for LEA and HIGHT block ciphers.</title>
<pages>595-603</pages>
<year>2020</year>
<volume>14</volume>
<journal>IET Inf. Secur.</journal>
<number>5</number>
<ee>https://doi.org/10.1049/iet-ifs.2018.5539</ee>
<ee>https://www.wikidata.org/entity/Q122639942</ee>
<url>db/journals/iet-ifs/iet-ifs14.html#BagherzadehA20</url>
</article>
</r>
<r><article key="journals/ipl/JamshidpourA20" mdate="2021-01-05">
<author pid="211/8202">Sadegh Jamshidpour</author>
<author pid="16/8013">Zahra Ahmadian</author>
<title>Security analysis of a dynamic threshold secret sharing scheme using linear subspace method.</title>
<pages>105994</pages>
<year>2020</year>
<volume>163</volume>
<journal>Inf. Process. Lett.</journal>
<ee>https://doi.org/10.1016/j.ipl.2020.105994</ee>
<url>db/journals/ipl/ipl163.html#JamshidpourA20</url>
</article>
</r>
<r><article key="journals/isecure/AhmadiAMA19" mdate="2020-08-27">
<author pid="134/7662">Siavash Ahmadi</author>
<author pid="16/8013">Zahra Ahmadian</author>
<author pid="02/1739">Javad Mohajeri</author>
<author pid="91/4838">Mohammad Reza Aref</author>
<title>Biclique Cryptanalysis of Block Ciphers LBlock and TWINE-80 with Practical Data Complexity.</title>
<pages>57-74</pages>
<year>2019</year>
<volume>11</volume>
<journal>ISC Int. J. Inf. Secur.</journal>
<number>1</number>
<ee type="oa">https://doi.org/10.22042/isecure.2018.138036.420</ee>
<url>db/journals/isecure/isecure11.html#AhmadiAMA19</url>
</article>
</r>
<r><inproceedings key="conf/iscisc/AmiryousefiA19" mdate="2020-02-11">
<author pid="258/1697">Hamid Amiryousefi</author>
<author pid="16/8013">Zahra Ahmadian</author>
<title>Cryptanalysis of SP<sup>2</sup>DAS and 3PDA, Two Data Aggregation Schemes for Smart Grid.</title>
<pages>45-48</pages>
<year>2019</year>
<booktitle>ISCISC</booktitle>
<ee>https://doi.org/10.1109/ISCISC48546.2019.8985140</ee>
<crossref>conf/iscisc/2019</crossref>
<url>db/conf/iscisc/iscisc2019.html#AmiryousefiA19</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/MoghaddamA19" mdate="2021-01-12">
<author pid="237/1601">Amirhossein Ebrahimi Moghaddam</author>
<author pid="16/8013">Zahra Ahmadian</author>
<title>New Automatic search method for Truncated-differential characteristics: Application to Midori and SKINNY.</title>
<pages>126</pages>
<year>2019</year>
<volume>2019</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2019/126</ee>
<url>db/journals/iacr/iacr2019.html#MoghaddamA19</url>
</article>
</r>
<r><article key="journals/ijcomsys/AzimiAAMA18" mdate="2021-07-13">
<author pid="212/4739">Seyyed Arash Azimi</author>
<author pid="134/7662">Siavash Ahmadi</author>
<author orcid="0000-0001-9356-4064" pid="16/8013">Zahra Ahmadian</author>
<author pid="02/1739">Javad Mohajeri</author>
<author pid="91/4838">Mohammad Reza Aref</author>
<title>Improved impossible differential and biclique cryptanalysis of HIGHT.</title>
<year>2018</year>
<volume>31</volume>
<journal>Int. J. Commun. Syst.</journal>
<number>1</number>
<ee>https://doi.org/10.1002/dac.3382</ee>
<url>db/journals/ijcomsys/ijcomsys31.html#AzimiAAMA18</url>
</article>
</r>
<r><article key="journals/tifs/AhmadianJ18" mdate="2020-08-06">
<author orcid="0000-0001-9356-4064" pid="16/8013">Zahra Ahmadian</author>
<author pid="211/8202">Sadegh Jamshidpour</author>
<title>Linear Subspace Cryptanalysis of Harn's Secret Sharing-Based Group Authentication Scheme.</title>
<pages>502-510</pages>
<year>2018</year>
<volume>13</volume>
<journal>IEEE Trans. Inf. Forensics Secur.</journal>
<number>2</number>
<ee>https://doi.org/10.1109/TIFS.2017.2757454</ee>
<url>db/journals/tifs/tifs13.html#AhmadianJ18</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/BagherzadehA18" mdate="2020-05-11">
<author pid="229/4604">Elnaz Bagherzadeh</author>
<author pid="16/8013">Zahra Ahmadian</author>
<title>MILP-Based Automatic Differential Searches for LEA and HIGHT.</title>
<pages>948</pages>
<year>2018</year>
<volume>2018</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2018/948</ee>
<url>db/journals/iacr/iacr2018.html#BagherzadehA18</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/JamshidpourA17" mdate="2020-05-11">
<author pid="211/8202">Sadegh Jamshidpour</author>
<author pid="16/8013">Zahra Ahmadian</author>
<title>Security Analysis of a Dynamic Threshold Secret Sharing Scheme Using Linear Subspace Method.</title>
<pages>1099</pages>
<year>2017</year>
<volume>2017</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2017/1099</ee>
<url>db/journals/iacr/iacr2017.html#JamshidpourA17</url>
</article>
</r>
<r><article key="journals/iet-ifs/AhmadianSA15" mdate="2023-08-28">
<author pid="16/8013">Zahra Ahmadian</author>
<author pid="72/252">Mahmoud Salmasizadeh</author>
<author pid="91/4838">Mohammad Reza Aref</author>
<title>Biclique cryptanalysis of the full-round KLEIN block cipher.</title>
<pages>294-301</pages>
<year>2015</year>
<volume>9</volume>
<journal>IET Inf. Secur.</journal>
<number>5</number>
<ee>https://doi.org/10.1049/iet-ifs.2014.0160</ee>
<ee>https://www.wikidata.org/entity/Q121357191</ee>
<url>db/journals/iet-ifs/iet-ifs9.html#AhmadianSA15</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/SunAWSA15" mdate="2020-05-11">
<author pid="12/6486">Da-Zhi Sun</author>
<author pid="16/8013">Zahra Ahmadian</author>
<author pid="157/0195">Yue-Jiao Wang</author>
<author pid="72/252">Mahmoud Salmasizadeh</author>
<author pid="91/4838">Mohammad Reza Aref</author>
<title>Analysis and Enhancement of Desynchronization Attack on an Ultralightweight RFID Authentication Protocol.</title>
<pages>37</pages>
<year>2015</year>
<volume>2015</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2015/037</ee>
<url>db/journals/iacr/iacr2015.html#SunAWSA15</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/AhmadianRSA15" mdate="2020-05-11">
<author pid="16/8013">Zahra Ahmadian</author>
<author pid="145/1717">Shahram Rasoolzadeh</author>
<author pid="72/252">Mahmoud Salmasizadeh</author>
<author pid="91/4838">Mohammad Reza Aref</author>
<title>Automated Dynamic Cube Attack on Block Ciphers: Cryptanalysis of SIMON and KATAN.</title>
<pages>40</pages>
<year>2015</year>
<volume>2015</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2015/040</ee>
<url>db/journals/iacr/iacr2015.html#AhmadianRSA15</url>
</article>
</r>
<r><article key="journals/isecure/RasoolzadehASA14" mdate="2023-09-30">
<author orcid="0000-0001-6848-2227" pid="145/1717">Shahram Rasoolzadeh</author>
<author pid="16/8013">Zahra Ahmadian</author>
<author pid="72/252">Mahmoud Salmasizadeh</author>
<author pid="91/4838">Mohammad Reza Aref</author>
<title>Total break of Zorro using linear and differential attacks.</title>
<pages>23-34</pages>
<year>2014</year>
<volume>6</volume>
<journal>ISC Int. J. Inf. Secur.</journal>
<number>1</number>
<ee type="oa">https://doi.org/10.22042/isecure.2014.6.1.3</ee>
<url>db/journals/isecure/isecure6.html#RasoolzadehASA14</url>
</article>
</r>
<r><article key="journals/tifs/AhmadiAMA14" mdate="2023-08-28">
<author pid="134/7662">Siavash Ahmadi</author>
<author pid="16/8013">Zahra Ahmadian</author>
<author pid="02/1739">Javad Mohajeri</author>
<author pid="91/4838">Mohammad Reza Aref</author>
<title>Low-Data Complexity Biclique Cryptanalysis of Block Ciphers With Application to Piccolo and HIGHT.</title>
<pages>1641-1652</pages>
<year>2014</year>
<volume>9</volume>
<journal>IEEE Trans. Inf. Forensics Secur.</journal>
<number>10</number>
<ee>https://doi.org/10.1109/TIFS.2014.2344445</ee>
<ee>https://www.wikidata.org/entity/Q114984291</ee>
<url>db/journals/tifs/tifs9.html#AhmadiAMA14</url>
</article>
</r>
<r><article key="journals/twc/AhmadianLM14" mdate="2020-09-06">
<author pid="16/8013">Zahra Ahmadian</author>
<author pid="21/788">Lutz Lampe</author>
<author pid="95/6224">Jan Mietzner</author>
<title>Multiuser Two-Way Relaying Schemes for UWB Communication.</title>
<pages>6382-6396</pages>
<year>2014</year>
<volume>13</volume>
<journal>IEEE Trans. Wirel. Commun.</journal>
<number>11</number>
<ee>https://doi.org/10.1109/TWC.2014.2337897</ee>
<url>db/journals/twc/twc13.html#AhmadianLM14</url>
</article>
</r>
<r><inproceedings key="conf/iscisc/AzimiAMA14" mdate="2020-04-13">
<author pid="212/4739">Seyyed Arash Azimi</author>
<author pid="16/8013">Zahra Ahmadian</author>
<author pid="02/1739">Javad Mohajeri</author>
<author pid="91/4838">Mohammad Reza Aref</author>
<title>Impossible differential cryptanalysis of Piccolo lightweight block cipher.</title>
<pages>89-94</pages>
<year>2014</year>
<booktitle>ISCISC</booktitle>
<ee>https://doi.org/10.1109/ISCISC.2014.6994028</ee>
<crossref>conf/iscisc/2014</crossref>
<url>db/conf/iscisc/iscisc2014.html#AzimiAMA14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/iscisc/RabaninejadASA14" mdate="2020-04-13">
<author pid="191/5981">Reyhaneh Rabaninejad</author>
<author pid="16/8013">Zahra Ahmadian</author>
<author pid="72/252">Mahmoud Salmasizadeh</author>
<author pid="91/4838">Mohammad Reza Aref</author>
<title>Cube and dynamic cube attacks on SIMON32/64.</title>
<pages>98-103</pages>
<year>2014</year>
<booktitle>ISCISC</booktitle>
<ee>https://doi.org/10.1109/ISCISC.2014.6994030</ee>
<crossref>conf/iscisc/2014</crossref>
<url>db/conf/iscisc/iscisc2014.html#RabaninejadASA14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/vtc/AhmadianLM14" mdate="2017-05-21">
<author pid="16/8013">Zahra Ahmadian</author>
<author pid="21/788">Lutz H.-J. Lampe</author>
<author pid="95/6224">Jan Mietzner</author>
<title>Multiuser Two-Way Filter-and-Forward Relaying for Ultra-Wideband Communications.</title>
<pages>1-6</pages>
<year>2014</year>
<booktitle>VTC Fall</booktitle>
<ee>https://doi.org/10.1109/VTCFall.2014.6966068</ee>
<crossref>conf/vtc/2014f</crossref>
<url>db/conf/vtc/vtc2014f.html#AhmadianLM14</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/RasoolzadehASA14" mdate="2020-05-11">
<author pid="145/1717">Shahram Rasoolzadeh</author>
<author pid="16/8013">Zahra Ahmadian</author>
<author pid="72/252">Mahmoud Salmasizadeh</author>
<author pid="91/4838">Mohammad Reza Aref</author>
<title>Total Break of Zorro using Linear and Differential Attacks.</title>
<pages>220</pages>
<year>2014</year>
<volume>2014</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2014/220</ee>
<url>db/journals/iacr/iacr2014.html#RasoolzadehASA14</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/RasoolzadehASA14a" mdate="2020-05-11">
<author pid="145/1717">Shahram Rasoolzadeh</author>
<author pid="16/8013">Zahra Ahmadian</author>
<author pid="72/252">Mahmoud Salmasizadeh</author>
<author pid="91/4838">Mohammad Reza Aref</author>
<title>An Improved Truncated Di fferential Cryptanalysis of KLEIN.</title>
<pages>485</pages>
<year>2014</year>
<volume>2014</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2014/485</ee>
<url>db/journals/iacr/iacr2014.html#RasoolzadehASA14a</url>
</article>
</r>
<r><article key="journals/ipl/AhmadianSA13" mdate="2017-05-26">
<author pid="16/8013">Zahra Ahmadian</author>
<author pid="72/252">Mahmoud Salmasizadeh</author>
<author pid="91/4838">Mohammad Reza Aref</author>
<title>Desynchronization attack on RAPP ultralightweight authentication protocol.</title>
<pages>205-209</pages>
<year>2013</year>
<volume>113</volume>
<journal>Inf. Process. Lett.</journal>
<number>7</number>
<ee>https://doi.org/10.1016/j.ipl.2013.01.003</ee>
<url>db/journals/ipl/ipl113.html#AhmadianSA13</url>
</article>
</r>
<r><article key="journals/tcom/AhmadianL13" mdate="2026-01-04">
<author pid="16/8013">Zahra Ahmadian</author>
<author orcid="0000-0002-6583-1978" pid="21/788">Lutz Lampe</author>
<title>Robust Design of Widely Linear Pre-Equalization Filters for Pre-Rake UWB Systems.</title>
<pages>4206-4217</pages>
<year>2013</year>
<volume>61</volume>
<journal>IEEE Trans. Commun.</journal>
<number>10</number>
<ee>https://doi.org/10.1109/TCOMM.2013.0828131.120920</ee>
<url>db/journals/tcom/tcom61.html#AhmadianL13</url>
</article>
</r>
<r><article key="journals/tifs/AhmadianSA13" mdate="2020-08-06">
<author pid="16/8013">Zahra Ahmadian</author>
<author pid="72/252">Mahmoud Salmasizadeh</author>
<author pid="91/4838">Mohammad Reza Aref</author>
<title>Recursive Linear and Differential Cryptanalysis of Ultralightweight Authentication Protocols.</title>
<pages>1140-1151</pages>
<year>2013</year>
<volume>8</volume>
<journal>IEEE Trans. Inf. Forensics Secur.</journal>
<number>7</number>
<ee>https://doi.org/10.1109/TIFS.2013.2263499</ee>
<url>db/journals/tifs/tifs8.html#AhmadianSA13</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/MohammadaliAA13" mdate="2020-05-11">
<author pid="126/6020">Amin Mohammadali</author>
<author pid="16/8013">Zahra Ahmadian</author>
<author pid="91/4838">Mohammad Reza Aref</author>
<title>Analysis and Improvement of the securing RFID systems conforming to EPC Class 1 Generation 2 standard.</title>
<pages>66</pages>
<year>2013</year>
<volume>2013</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2013/066</ee>
<url>db/journals/iacr/iacr2013.html#MohammadaliAA13</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/AhmadianSA13" mdate="2020-05-11">
<author pid="16/8013">Zahra Ahmadian</author>
<author pid="72/252">Mahmoud Salmasizadeh</author>
<author pid="91/4838">Mohammad Reza Aref</author>
<title>Biclique Cryptanalysis of the Full-Round KLEIN Block Cipher.</title>
<pages>97</pages>
<year>2013</year>
<volume>2013</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2013/097</ee>
<url>db/journals/iacr/iacr2013.html#AhmadianSA13</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/AhmadiAMA13" mdate="2020-05-11">
<author pid="134/7662">Siavash Ahmadi</author>
<author pid="16/8013">Zahra Ahmadian</author>
<author pid="02/1739">Javad Mohajeri</author>
<author pid="91/4838">Mohammad Reza Aref</author>
<title>Low Data Complexity Biclique Cryptanalysis of Block Ciphers with Application to Piccolo and HIGHT.</title>
<pages>511</pages>
<year>2013</year>
<volume>2013</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2013/511</ee>
<url>db/journals/iacr/iacr2013.html#AhmadiAMA13</url>
</article>
</r>
<r><article key="journals/tcom/AhmadianSL12" mdate="2020-09-01">
<author pid="16/8013">Zahra Ahmadian</author>
<author pid="02/425">Michael Botros Shenouda</author>
<author pid="21/788">Lutz Lampe</author>
<title>Design of Pre-Rake DS-UWB Downlink with Pre-Equalization.</title>
<pages>400-410</pages>
<year>2012</year>
<volume>60</volume>
<journal>IEEE Trans. Commun.</journal>
<number>2</number>
<ee>https://doi.org/10.1109/TCOMM.2011.112811.100146A</ee>
<url>db/journals/tcom/tcom60.html#AhmadianSL12</url>
</article>
</r>
<r><inproceedings key="conf/globecom/AhmadianL12" mdate="2017-05-23">
<author pid="16/8013">Zahra Ahmadian</author>
<author pid="21/788">Lutz Lampe</author>
<title>Robust pre-equalization for pre-rake UWB systems with spectral mask constraints.</title>
<pages>4060-4064</pages>
<year>2012</year>
<booktitle>GLOBECOM</booktitle>
<ee>https://doi.org/10.1109/GLOCOM.2012.6503752</ee>
<crossref>conf/globecom/2012</crossref>
<url>db/conf/globecom/globecom2012.html#AhmadianL12</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/AhmadianSA12" mdate="2020-05-11">
<author pid="16/8013">Zahra Ahmadian</author>
<author pid="72/252">Mahmoud Salmasizadeh</author>
<author pid="91/4838">Mohammad Reza Aref</author>
<title>Recursive Linear and Differential Cryptanalysis of Ultralightweight Authentication Protocols.</title>
<pages>489</pages>
<year>2012</year>
<volume>2012</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2012/489</ee>
<url>db/journals/iacr/iacr2012.html#AhmadianSA12</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/AhmadianSA12a" mdate="2020-05-11">
<author pid="16/8013">Zahra Ahmadian</author>
<author pid="72/252">Mahmoud Salmasizadeh</author>
<author pid="91/4838">Mohammad Reza Aref</author>
<title>Desynchronization Attack on RAPP Ultralightweight Authentication Protocol.</title>
<pages>490</pages>
<year>2012</year>
<volume>2012</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2012/490</ee>
<url>db/journals/iacr/iacr2012.html#AhmadianSA12a</url>
</article>
</r>
<r><article key="journals/cn/AhmadianSS10" mdate="2020-02-19">
<author pid="16/8013">Zahra Ahmadian</author>
<author pid="34/6656">Somayeh Salimi</author>
<author pid="45/2870">Ahmad Salahi</author>
<title>Security enhancements against UMTS-GSM interworking attacks.</title>
<pages>2256-2270</pages>
<year>2010</year>
<volume>54</volume>
<journal>Comput. Networks</journal>
<number>13</number>
<ee>https://doi.org/10.1016/j.comnet.2010.01.005</ee>
<url>db/journals/cn/cn54.html#AhmadianSS10</url>
</article>
</r>
<r><article key="journals/jss/AhmadianMSHN10" mdate="2023-10-22">
<author pid="16/8013">Zahra Ahmadian</author>
<author pid="02/1739">Javad Mohajeri</author>
<author pid="72/252">Mahmoud Salmasizadeh</author>
<author pid="16/7399">Risto M. Hakala</author>
<author orcid="0000-0003-2885-6364" pid="46/2601">Kaisa Nyberg</author>
<title>A practical distinguisher for the Shannon cipher.</title>
<pages>543-547</pages>
<year>2010</year>
<volume>83</volume>
<journal>J. Syst. Softw.</journal>
<number>4</number>
<ee>https://doi.org/10.1016/j.jss.2009.10.019</ee>
<ee>https://www.wikidata.org/entity/Q122957972</ee>
<url>db/journals/jss/jss83.html#AhmadianMSHN10</url>
</article>
</r>
<r><inproceedings key="conf/icc/AhmadianSL10" mdate="2017-05-25">
<author pid="16/8013">Zahra Ahmadian</author>
<author pid="02/425">Michael Botros Shenouda</author>
<author pid="21/788">Lutz H.-J. Lampe</author>
<title>Design of Multiuser Pre-Rake Systems for Reliable Ultra-Wideband Communications.</title>
<pages>1-6</pages>
<year>2010</year>
<booktitle>ICC</booktitle>
<ee>https://doi.org/10.1109/ICC.2010.5502764</ee>
<crossref>conf/icc/2010</crossref>
<url>db/conf/icc/icc2010.html#AhmadianSL10</url>
</inproceedings>
</r>
<r><article key="journals/tcom/AhmadianL09" mdate="2020-09-01">
<author pid="16/8013">Zahra Ahmadian</author>
<author pid="21/788">Lutz H.-J. Lampe</author>
<title>Performance Analysis of the IEEE 802.15.4a UWB System.</title>
<pages>1474-1485</pages>
<year>2009</year>
<volume>57</volume>
<journal>IEEE Trans. Commun.</journal>
<number>5</number>
<ee>https://doi.org/10.1109/TCOMM.2009.05.070599</ee>
<url>db/journals/tcom/tcom57.html#AhmadianL09</url>
</article>
</r>
<r><inproceedings key="conf/wts/AhmadianSS09" mdate="2017-05-19">
<author pid="16/8013">Zahra Ahmadian</author>
<author pid="34/6656">Somayeh Salimi</author>
<author pid="45/2870">Ahmad Salahi</author>
<title>New attacks on UMTS network access.</title>
<pages>1-6</pages>
<year>2009</year>
<booktitle>WTS</booktitle>
<ee>https://doi.org/10.1109/WTS.2009.5068979</ee>
<crossref>conf/wts/2009</crossref>
<url>db/conf/wts/wts2009.html#AhmadianSS09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/acssc/AhmadianL08" mdate="2023-01-05">
<author pid="16/8013">Zahra Ahmadian</author>
<author pid="21/788">Lutz Lampe</author>
<title>Performance of concatenated coded IR-UWB in the presence of multiple-access interference.</title>
<pages>2001-2005</pages>
<year>2008</year>
<booktitle>ACSCC</booktitle>
<ee>https://doi.org/10.1109/ACSSC.2008.5074782</ee>
<crossref>conf/acssc/2008</crossref>
<url>db/conf/acssc/acssc2008.html#AhmadianL08</url>
</inproceedings>
</r>
<coauthors n="38" nc="3">
<co c="0"><na f="a/Abapour:Navid" pid="318/3034">Navid Abapour</na></co>
<co c="0"><na f="a/Ahmadi:Siavash" pid="134/7662">Siavash Ahmadi</na></co>
<co c="-1"><na f="a/Amiryousefi:Hamid" pid="258/1697">Hamid Amiryousefi</na></co>
<co c="0"><na f="a/Aref:Mohammad_Reza" pid="91/4838">Mohammad Reza Aref</na></co>
<co c="0"><na f="a/Azimi:Seyyed_Arash" pid="212/4739">Seyyed Arash Azimi</na></co>
<co c="-1"><na f="b/Bagherzadeh:Elnaz" pid="229/4604">Elnaz Bagherzadeh</na></co>
<co c="0"><na f="h/Hadipour:Hosein" pid="244/8979">Hosein Hadipour</na></co>
<co c="0"><na f="h/Haghighi:Mohammad_Sayad" pid="02/4828">Mohammad Sayad Haghighi</na></co>
<co c="0"><na f="h/Hakala:Risto_M=" pid="16/7399">Risto M. Hakala</na></co>
<co c="0"><na f="h/He_0002:Jiahui" pid="205/5150-2">Jiahui He 0002</na></co>
<co c="0"><na f="h/Hu_0001:Kai" pid="57/6633-1">Kai Hu 0001</na></co>
<co c="-1"><na f="j/Jamshidpour:Sadegh" pid="211/8202">Sadegh Jamshidpour</na></co>
<co c="0"><na f="k/Khalesi:Akram" pid="255/2006">Akram Khalesi</na></co>
<co c="1" n="2"><na f="l/Lampe:Lutz" pid="21/788">Lutz Lampe</na><na>Lutz H.-J. Lampe</na></co>
<co c="2"><na f="m/Mehraein:Elnaz" pid="348/5403">Elnaz Mehraein</na></co>
<co c="0"><na f="m/M=foukh:Dounia" pid="357/9914">Dounia M'foukh</na></co>
<co c="1"><na f="m/Mietzner:Jan" pid="95/6224">Jan Mietzner</na></co>
<co c="-1"><na f="m/Moghaddam:Amirhossein_Ebrahimi" pid="237/1601">Amirhossein Ebrahimi Moghaddam</na></co>
<co c="0"><na f="m/Moghimi:Hossein" pid="358/0176">Hossein Moghimi</na></co>
<co c="0"><na f="m/Mohajeri:Javad" pid="02/1739">Javad Mohajeri</na></co>
<co c="0"><na f="m/Mohammadali:Amin" pid="126/6020">Amin Mohammadali</na></co>
<co c="0"><na f="n/Naya=Plasencia:Mar=iacute=a" pid="24/1241">Mar&#237;a Naya-Plasencia</na></co>
<co c="0"><na f="n/Niu:Zhongfeng" pid="244/3186">Zhongfeng Niu</na></co>
<co c="2"><na f="n/Nourmohammadi:Reza" pid="333/3666">Reza Nourmohammadi</na></co>
<co c="0"><na f="n/Nyberg:Kaisa" pid="46/2601">Kaisa Nyberg</na></co>
<co c="0" n="2"><na f="o/Oliaee:Mahdi_Mahdavi" pid="284/2567">Mahdi Mahdavi Oliaee</na><na>Mahdi Mahdavi</na></co>
<co c="0"><na f="p/Peng:Shuo" pid="153/9050">Shuo Peng</na></co>
<co c="0"><na f="r/Rabaninejad:Reyhaneh" pid="191/5981">Reyhaneh Rabaninejad</na></co>
<co c="0"><na f="r/Rasoolzadeh:Shahram" pid="145/1717">Shahram Rasoolzadeh</na></co>
<co c="-1"><na f="r/Rezapour:Ali" pid="228/3818">Ali Rezapour</na></co>
<co c="0"><na f="s/Salahi:Ahmad" pid="45/2870">Ahmad Salahi</na></co>
<co c="0"><na f="s/Salimi:Somayeh" pid="34/6656">Somayeh Salimi</na></co>
<co c="0"><na f="s/Salmasizadeh:Mahmoud" pid="72/252">Mahmoud Salmasizadeh</na></co>
<co c="1"><na f="s/Shenouda:Michael_Botros" pid="02/425">Michael Botros Shenouda</na></co>
<co c="0"><na f="s/Sun:Da=Zhi" pid="12/6486">Da-Zhi Sun</na></co>
<co c="0"><na f="t/Tadayon:Mohammad_Hesam" pid="81/9199">Mohammad Hesam Tadayon</na></co>
<co c="0"><na f="w/Wang:Meiqin" pid="88/158">Meiqin Wang</na></co>
<co c="0"><na f="w/Wang:Yue=Jiao" pid="157/0195">Yue-Jiao Wang</na></co>
</coauthors>
</dblpperson>

