Application of dominating sets in wireless sensor networks AH Karbasi, RE Atani Int. J. Secur. Its Appl 7, 185-202, 2013 | 41 | 2013 |
A post-quantum end-to-end encryption over smart contract-based blockchain for defeating man-in-the-middle and interception attacks AH Karbasi, S Shahpasand Peer-to-peer networking and applications 13, 1423-1441, 2020 | 33 | 2020 |
ILTRU: An NTRU-like public key cryptosystem over ideal lattices AH Karbasi, RE Atani Cryptology ePrint Archive, 2015 | 29 | 2015 |
PairTRU: Pairwise non-commutative extension of the NTRU public key cryptosystem AH Karbasi, RE Atani, SE Atani International Journal of Information Security Science 7 (1), 11-19, 2018 | 24 | 2018 |
NETRU: A Non-commutative and Secure Variant of CTRU Cryptosystem. RE Atani, SE Atani, AH Karbasi ISeCure 10 (1), 2018 | 24 | 2018 |
A New Ring-Based SPHF and PAKE Protocol on Ideal Lattices. AH Karbasi, RE Atani, SE Atani ISeCure 11 (1), 2019 | 15 | 2019 |
A Provably Secure Variant of ETRU Based on Extended Ideal Lattices over Direct Product of Dedekind domains SE Atani, RE Atani, AH Karbasi Journal of Computing and Security 5 (1), 13-34, 2018 | 13 | 2018 |
SINGLETON: A lightweight and secure end-to-end encryption protocol for the sensor networks in the Internet of Things based on cryptographic ratchets A Hassani Karbasi, S Shahpasand The Journal of Supercomputing 77 (4), 3516-3554, 2021 | 11 | 2021 |
EEH: AGGH-Like Public Key Cryptosystem Over The Eisenstein Integers Using Polynomial Representations. RE Atani, SE Atani, AH Karbasi ISeCure 7 (2), 2015 | 10* | 2015 |
Projective plane-based key pre-distribution by key copying and exchanging based on connected dominating set in distributed wireless sensor networks AH Karbasi, RE Atani International Journal of Information and Communication Technology 9 (4), 438-462, 2016 | 6 | 2016 |
A Survey on Lattice-based Cryptography AH Karbasi, RE Atani Biannual Journal for Cyberspace Security (Monadi AFTA) 3 (1), 3-14, 2015 | 5 | 2015 |
PSTRU: A provably secure variant of NTRUEncrypt over extended ideal lattices AH Karbasi, RE Atani The 2nd National Industrial Mathematics Conference, Tabriz, Iran, 2015 | 5 | 2015 |
Application of connected dominating sets in wildfire detection based on wireless sensor networks S Tahouri, RE Atani, AH Karbasi, Y Deldjoo International Journal of Information Technology, Communications and …, 2015 | 4 | 2015 |
Stop tracking me: An anti-detection type solution for anonymous data MA Nia, AH Karbasi, RE Atani 2014 4th International Conference on Computer and Knowledge Engineering …, 2014 | 4 | 2014 |
Designing Anonymous Communication System by Lattice-Based Cryptography A Hassani Karbasi, M Alidoust Nia, R Ebrahimi Atani Electronic and Cyber Defense 2 (3), 13-22, 2014 | 3 | 2014 |
A Protocol for Authenticated Anonymous Communications by Post-Quantum Cryptography and Smart Contracts MM Mojahed, AH Karbasi, SD Nogoorani, A Kiakojouri TABRIZ JOURNAL OF ELECTRICAL ENGINEERING 53 (1), 49-59, 2023 | 1 | 2023 |
On semiprime comultiplication modules over pullback rings RE Atani, SE Atani, AH Karbasi Colloquium Mathematicum 146, 197-211, 2017 | 1 | 2017 |
The filter theory in quotients of complete lattices AS Ebrahimi, A Reza-Ebrahimi, K Amir-Hassani Quasigroups and Related Systems 32 (2), 209-216, 2014 | 1 | 2014 |
A New Provably Secure Cryptosystem Using Dedekind Domain Direct Product Approach AH Karbasi Ratio Mathematica 34, 49, 2018 | | 2018 |