Personal information

Activities

Employment (1)

China University of Mining and Technology: Xuzhou, Jiangsu, CN

(School of Information and Control Engineering)
Employment
Source: Self-asserted source
Vahid Amin-Ghafari

Education and qualifications (1)

University of Science and Technology of China: Hefei, Anhui, CN

Education
Source: Self-asserted source
Vahid Amin-Ghafari

Works (8)

A new idea in response to fast correlation attacks on small-state stream ciphers

Microprocessors and Microsystems
2023-02 | Journal article
Contributors: Vahid Amin-Ghafari; Fujiang Lin; Zhongzhi Zhou
Source: check_circle
Crossref
grade
Preferred source (of 3)‎

An Attack on a Proposed Construction of Small-State Stream Ciphers and Proposals for New Constructions

2022-11-26 | Other
Contributors: Vahid Amin Ghafari; Mahmoud Ahmadian Attari
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

A new chosen IV statistical distinguishing framework to attack symmetric ciphers, and its application to ACORN-v3 and Grain-128a

Journal of Ambient Intelligence and Humanized Computing
2019-06 | Journal article
Part of ISSN: 1868-5137
Part of ISSN: 1868-5145
Source: Self-asserted source
Vahid Amin-Ghafari
grade
Preferred source (of 3)‎

Fruit-80: A Secure Ultra-Lightweight Stream Cipher for Constrained Environments

Entropy
2018-03 | Journal article
Source: check_circle
Multidisciplinary Digital Publishing Institute
grade
Preferred source (of 4)‎

A New Chosen IV Statistical Attack on Grain-128a cipher

International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)
2017 | Conference paper
Contributors: Ghafari, Vahid Amin; Hu, Honggang
Source: check_circle
Web of Science Researcher Profile Sync

Cryptanalysis of GSM Encryption Algorithm A5/1

ISC International Journal of Information Security
2012 | Journal article
Contributors: Ghafari, Vahid Amin; Vardasbi, Ali; Mohajeri, Javad
Source: check_circle
Web of Science Researcher Profile Sync

An improved attack on A5/1

2011 8th International ISC Conference on Information Security and Cryptology, ISCISC 2011
2011 | Conference paper
EID:

2-s2.0-81155123923

Contributors: Amin Ghafari, V.; Mohajeri, J.
Source: Self-asserted source
Vahid Amin-Ghafari via Scopus - Elsevier

On the period of GSM's A5/1 stream cipher and its internal state transition structure

2011 8th International ISC Conference on Information Security and Cryptology, ISCISC 2011
2011 | Conference paper
EID:

2-s2.0-81155132440

Contributors: Amin Ghaffari, V.; Vardasbi, A.
Source: Self-asserted source
Vahid Amin-Ghafari via Scopus - Elsevier

Peer review (6 reviews for 4 publications/grants)

Review activity for IEEE transactions on information forensics and security. (3)
Review activity for IET information security. (1)
Review activity for Information and computation. (1)
Review activity for The computer journal. (1)