A self-synchronized chaotic image encryption scheme A Daneshgar, B Khadem Signal Processing: Image Communication 36, 106-114, 2015 | 21 | 2015 |
An improved WBSN key-agreement protocol based on static parameters and hash functions B Khadem, AM Suteh, M Ahmad, A Alkhayyat, MS Farash, HS Khalifa IEEE Access 9, 78463-78473, 2021 | 17 | 2021 |
Construction of Side Channel Attacks Resistant S-boxes using Genetic Algorithms based on Coordinate Functions B Khadem, S Rajavzade Journal of Electrical and Computer Engineering Innovations, 2021 | 7 | 2021 |
Efficient UAV Physical Layer Security based on Deep Learning and Artificial Noise B Khadem, S Mohebalizadeh Preprint arXive:2004.01343 ,2020, 2020 | 7 | 2020 |
Improved Algoritms in Parallel Evaluation of Large Cryptographic S-Box B Khadem, R Ghasemi International Journal of Parallel, Emergent and Distributed Systems, 2020 | 6 | 2020 |
An Idea to Increase the Security of EAP-MD5 Protocol Against Dictionary Attack B Khadem, S Abedi, I Sa-adatyar 3rd International Conference on Combinatorics, Cryptography and Computation, 2018 | 3 | 2018 |
Two new methods for designing 192-bit block ciphers based on switching structure and recursive diffusion layers A Mirghadri, M Yosefipour, B Khadem, M Sajadieh J. Passive Defence Sci. & Technol 7, 251-259, 2016 | 3 | 2016 |
A stream cipher based on chaotic permutations B Khadem, A Daneshgar, F Mohebipur Mathematical Researches 1 (1), 13-36, 2015 | 3 | 2015 |
Masking Midori64 against correlation power analysis attack H Ghanbari, B Khadem, mohammad jadidi 18th International ISC Conference on Information Security and Cryptology, 2021 | 2 | 2021 |
Correlation differential power analysis attack to midori64 B Khadem, H Ghanbari arXiv preprint arXiv:2108.11115, 2021 | 2 | 2021 |
A Hybrid Image Encryption Scheme based on Chaos and a DPA-Resistant Sbox M Gholamzadeh, B Khadem arXiv preprint arXiv:2312.15280, 2023 | 1 | 2023 |
رمزشکنی و بهبود یک طرح جدید رمز تصویر آشوبی خادم, پازوکی, علیزاده فصلنامه علمی علوم و فناوریهای پدافند نوین 5 (4), 296-287, 2014 | 1* | 2014 |
A novel anonymity-preserving authentication scheme for the Internet of Things networks M Moradnia, SM Pour_Naqi, B Khadem 7th International Conference on Combinatorics, Cryptography, Computer …, 2023 | | 2023 |
Correlation Power Analysis Attack to Midori-64 B Khadem, H Ghanbari, M Moradnia Preprints, 2022 | | 2022 |
An accelerated method for evaluating large cryptographic substitution boxes G Reza, B Khadem 17th International ISC Conference on Information Security and Cryptology, 2020 | | 2020 |
A New Approach to Secure Transmission of Compressed Images By Combination of Artificial Noise with Deep Learning based on Neural Network M Salar, K Behrooz Joint Congress on Computational Intelligence 2020, 2020 | | 2020 |
Complexity Improvement of Walsh-Hadamard Transformation to Evaluation of Large Cryptographic S-boxes G Reza, K Behrooz Joint Congress on Computational Intelligence 2020, 2020 | | 2020 |
Comparative Study of Joint Image Encryption and Compression Schemes B Khadem, R Ahmadian International Journal of Engineering and Applied Sciences (IJEAS) 6 (6), 2019 | | 2019 |
Structural Analysis based on Integral Characteristic of a Reduced Round Block Cipher with Making an Improvement B Khadem, A Tajadod, K Bakhtiyari Electronic and Cyber Defence 6 (1), 2019 | | 2019 |
Time/Memory/Data Trade-Off Attack on a Chaotic Pseudo-Random Generator: A Case Study of GMJK B Khadem, A Madadi, K Bakhtiyari Journal of Computational and Theoretical Nanoscience 15 (11-12), 3174-3179, 2018 | | 2018 |