Behrooz Khadem
Behrooz Khadem
Kharazmi University
Verified email at - Homepage
Cited by
Cited by
A self-synchronized chaotic image encryption scheme
A Daneshgar, B Khadem
Signal Processing: Image Communication 36, 106-114, 2015
An improved WBSN key-agreement protocol based on static parameters and hash functions
B Khadem, AM Suteh, M Ahmad, A Alkhayyat, MS Farash, HS Khalifa
IEEE Access 9, 78463-78473, 2021
Efficient UAV Physical Layer Security based on Deep Learning and Artificial Noise
B Khadem, S Mohebalizadeh
Preprint arXive:2004.01343 ,2020, 2020
Construction of Side Channel Attacks Resistant S-boxes using Genetic Algorithms based on Coordinate Functions
B Khadem, S Rajavzade
Journal of Electrical and Computer Engineering Innovations, 2021
Improved Algoritms in Parallel Evaluation of Large Cryptographic S-Box
B Khadem, R Ghasemi
International Journal of Parallel, Emergent and Distributed Systems, 2020
An Idea to Increase the Security of EAP-MD5 Protocol Against Dictionary Attack
B Khadem, S Abedi, I Sa-adatyar
3rd International Conference on Combinatorics, Cryptography and Computation, 2018
Two new methods for designing 192-bit block ciphers based on switching structure and recursive diffusion layers
A Mirghadri, M Yosefipour, B Khadem, M Sajadieh
J. Passive Defence Sci. & Technol 7, 251-259, 2016
A stream cipher based on chaotic permutations
B Khadem, A Daneshgar, F Mohebipur
Mathematical Researches 1 (1), 13-36, 2015
Masking Midori64 against correlation power analysis attack
H Ghanbari, B Khadem, mohammad jadidi
18th International ISC Conference on Information Security and Cryptology, 2021
Correlation differential power analysis attack to midori64
B Khadem, H Ghanbari
arXiv preprint arXiv:2108.11115, 2021
A Hybrid Image Encryption Scheme based on Chaos and a DPA-Resistant Sbox
M Gholamzadeh, B Khadem
arXiv preprint arXiv:2312.15280, 2023
رمزشکنی و بهبود یک طرح جدید رمز تصویر آشوبی
خادم, پازوکی, علیزاده
فصلنامه علمی علوم و فناوریهای پدافند نوین 5 (4), 296-287, 2014
A novel anonymity-preserving authentication scheme for the Internet of Things networks
M Moradnia, SM Pour_Naqi, B Khadem
7th International Conference on Combinatorics, Cryptography, Computer …, 2023
Correlation Power Analysis Attack to Midori-64
B Khadem, H Ghanbari, M Moradnia
Preprints, 2022
An accelerated method for evaluating large cryptographic substitution boxes
G Reza, B Khadem
17th International ISC Conference on Information Security and Cryptology, 2020
A New Approach to Secure Transmission of Compressed Images By Combination of Artificial Noise with Deep Learning based on Neural Network
M Salar, K Behrooz
Joint Congress on Computational Intelligence 2020, 2020
Complexity Improvement of Walsh-Hadamard Transformation to Evaluation of Large Cryptographic S-boxes
G Reza, K Behrooz
Joint Congress on Computational Intelligence 2020, 2020
Comparative Study of Joint Image Encryption and Compression Schemes
B Khadem, R Ahmadian
International Journal of Engineering and Applied Sciences (IJEAS) 6 (6), 2019
Structural Analysis based on Integral Characteristic of a Reduced Round Block Cipher with Making an Improvement
B Khadem, A Tajadod, K Bakhtiyari
Electronic and Cyber Defence 6 (1), 2019
Time/Memory/Data Trade-Off Attack on a Chaotic Pseudo-Random Generator: A Case Study of GMJK
B Khadem, A Madadi, K Bakhtiyari
Journal of Computational and Theoretical Nanoscience 15 (11-12), 3174-3179, 2018
The system can't perform the operation now. Try again later.
Articles 1–20