Personal information

Verified email addresses

Verified email domains

cryptology, symmetric cryptography, cryptanalysis, RFID security, lightweight cryptography
Iran

Activities

Employment (3)

Shahid Rajaee Teacher Training University: Tehran, Shahid Rajaee Teacher Training University, IR

2022-08-02 to present | Professor (Electrical Engineering )
Employment
Source: Self-asserted source
Nasour Bagheri

Shahid Rajaee Teacher Training University: Tehran, IR

2017-09-01 to 2022-08-01 | Associate Professor (EE)
Employment
Source: Self-asserted source
Nasour Bagheri

Shahid Rajaee Teacher Training University: Tehran, Tehran, IR

2010-09-20 to 2017-09-01 | Assistant Professor (EE)
Employment
Source: Self-asserted source
Nasour Bagheri

Education and qualifications (3)

Iran University of Science and Technology: Tehran, Tehran, IR

2004-09 to 2010-05 | phd (EE)
Education
Source: Self-asserted source
Nasour Bagheri

Iran University of Science and Technology: Tehran, Tehran, IR

2000 to 2004 | MSc (EE)
Education
Source: Self-asserted source
Nasour Bagheri

University of Mazandaran: Babolsar, IR

1996 to 2000 | BS (Technical Dept. Noushiravani)
Education
Source: Self-asserted source
Nasour Bagheri

Works (50 of 78)

Items per page:
Page 1 of 2

The Rise of Passive RFID RTLS Solutions in Industry 5.0

Sensors
2024-03 | Journal article | Author
Contributors: Ygal Bendavid; Samad Rostampour; Yacine Berrabah; Nasour Bagheri; Masoumeh Safkhani
Source: check_circle
Multidisciplinary Digital Publishing Institute

Smart Grid Security: A PUF-Based Authentication and Key Agreement Protocol

Future Internet
2023-12 | Journal article | Author
Contributors: Nasour Bagheri; Ygal Bendavid; Masoumeh Safkhani; Samad Rostampour
Source: check_circle
Multidisciplinary Digital Publishing Institute

Toward Designing a Secure Authentication Protocol for IoT Environments

Sustainability
2023-03 | Journal article | Author
Contributors: mehdi; Mazhar Malik; Masoumeh Safkhani; Nasour Bagheri; Quynh Hoang Le; Lilia Tightiz; 0000-0003-4842-0613
Source: check_circle
Multidisciplinary Digital Publishing Institute

ECG Identification Based on the Gramian Angular Field and Tested with Individuals in Resting and Activity States

Sensors
2023-01 | Journal article | Author
Contributors: Carmen Camara; PEDRO PERIS; Masoumeh Safkhani; Nasour Bagheri
Source: check_circle
Multidisciplinary Digital Publishing Institute

Improvement and Cryptanalysis of a Physically Unclonable Functions Based Authentication Scheme for Smart Grids

Mathematics
2022-12 | Journal article | Author
Contributors: Masoumeh Safkhani; Nasour Bagheri; Prof. Saqib Ali; Mazhar Hussain Malik; Omed Hassan Ahmed; mehdi; 0000-0003-4842-0613
Source: check_circle
Multidisciplinary Digital Publishing Institute

BCmECC: A Lightweight Blockchain-Based Authentication and Key Agreement Protocol for Internet of Things

Mathematics
2021-12 | Journal article | Author
Contributors: Jan Lansky; Amir Masoud Rahmani; Prof. Saqib Ali; Nasour Bagheri; Masoumeh Safkhani; Omed Hassan Ahmed; mehdi
Source: check_circle
Multidisciplinary Digital Publishing Institute

A New Strong Adversary Model for RFID Authentication Protocols

IEEE Access
2020 | Journal article
EID:

2-s2.0-85088699338

Part of ISBN:

21693536

Contributors: Hosseinzadeh, M.; Lansky, J.; Rahmani, A.M.; Trinh, C.; Safkhani, M.; Bagheri, N.; Huynh, B.
Source: Self-asserted source
Nasour Bagheri via Scopus - Elsevier

An Enhanced Authentication Protocol for RFID Systems

IEEE Access
2020 | Journal article
EID:

2-s2.0-85089246729

Part of ISBN:

21693536

Contributors: Hosseinzadeh, M.; Ahmed, O.H.; Ahmed, S.H.; Trinh, C.; Bagheri, N.; Kumari, S.; Lansky, J.; Huynh, B.
Source: Self-asserted source
Nasour Bagheri via Scopus - Elsevier

ECCbAP: A secure ECC-based authentication protocol for IoT edge devices

Pervasive and Mobile Computing
2020 | Journal article
EID:

2-s2.0-85086888212

Part of ISBN:

15741192

Contributors: Rostampour, S.; Safkhani, M.; Bendavid, Y.; Bagheri, N.
Source: Self-asserted source
Nasour Bagheri via Scopus - Elsevier

IoT in medical & pharmaceutical: Designing lightweight RFID security protocols for ensuring supply chain integrity

Computer Networks
2020 | Journal article
EID:

2-s2.0-85091330937

Part of ISBN:

13891286

Contributors: Safkhani, M.; Rostampour, S.; Bendavid, Y.; Bagheri, N.
Source: Self-asserted source
Nasour Bagheri via Scopus - Elsevier

Lightweight implementation of SILC, CLOC, AES-JAMBU and COLM authenticated ciphers

Microprocessors and Microsystems
2020 | Journal article
EID:

2-s2.0-85074251719

Part of ISBN:

01419331

Contributors: Jahanbani, M.; Bagheri, N.; Norozi, Z.
Source: Self-asserted source
Nasour Bagheri via Scopus - Elsevier

On the designing a secure biometric-based remote patient authentication scheme for mobile healthcare environments

Journal of Ambient Intelligence and Humanized Computing
2020 | Journal article
EID:

2-s2.0-85089603601

Part of ISBN:

18685145 18685137

Contributors: Adeli, M.; Bagheri, N.; Meimani, H.R.
Source: Self-asserted source
Nasour Bagheri via Scopus - Elsevier

Comprehensive security analysis of CRAFT

IACR Transactions on Symmetric Cryptology
2019 | Journal article
EID:

2-s2.0-85079887563

Part of ISBN:

2519173X

Contributors: Hadipour, H.; Sadeghi, S.; Niknam, M.M.; Song, L.; Bagheri, N.
Source: Self-asserted source
Nasour Bagheri via Scopus - Elsevier

DPA protected implementation of OCB and COLM authenticated ciphers

IEEE Access
2019 | Journal article
EID:

2-s2.0-85077709562

Part of ISBN:

21693536

Contributors: Jahanbani, M.; Norozi, Z.; Bagheri, N.
Source: Self-asserted source
Nasour Bagheri via Scopus - Elsevier

High throughput fault-resilient AES architecture

IET Computers and Digital Techniques
2019 | Journal article
EID:

2-s2.0-85068211640

Part of ISBN:

17518601

Contributors: Sheikhpour, S.; Mahani, A.; Bagheri, N.
Source: Self-asserted source
Nasour Bagheri via Scopus - Elsevier

Practical fault resilient hardware implementations of AES

IET Circuits, Devices and Systems
2019 | Journal article
EID:

2-s2.0-85070934447

Part of ISBN:

1751858X

Contributors: Sheikhpour, S.; Mahani, A.; Bagheri, N.
Source: Self-asserted source
Nasour Bagheri via Scopus - Elsevier

Reliable S-Box Hardware Implementation by Gate-Level Fault Masking Enhancement

Journal of Control, Automation and Electrical Systems
2019 | Journal article
EID:

2-s2.0-85062788677

Part of ISBN:

21953899 21953880

Contributors: Sheikhpour, S.; Mahani, A.; Bagheri, N.
Source: Self-asserted source
Nasour Bagheri via Scopus - Elsevier

Security analysis of SIMECK block cipher against related-key impossible differential

Information Processing Letters
2019 | Journal article
EID:

2-s2.0-85062978172

Part of ISBN:

00200190

Contributors: Sadeghi, S.; Bagheri, N.
Source: Self-asserted source
Nasour Bagheri via Scopus - Elsevier

A Scalable and Lightweight Grouping Proof Protocol for Internet of Things Applications

Journal of Supercomputing
2018 | Journal article
EID:

2-s2.0-85021952106

Part of ISBN:

15730484 09208542

Contributors: Rostampour, S.; Bagheri, N.; Hosseinzadeh, M.; Khademzadeh, A.
Source: Self-asserted source
Nasour Bagheri via Scopus - Elsevier

A secure search protocol for lightweight and low-cost RFID systems

Telecommunication Systems
2018 | Journal article
EID:

2-s2.0-85023182349

Part of ISBN:

15729451 10184864

Contributors: Eslamnezhad Namin, M.; Hosseinzadeh, M.; Bagheri, N.; Khademzadeh, A.
Source: Self-asserted source
Nasour Bagheri via Scopus - Elsevier

An improved low-cost yoking proof protocol based on Kazahaya’s flaws

Journal of Supercomputing
2018 | Journal article
EID:

2-s2.0-85034860580

Part of ISBN:

15730484 09208542

Contributors: Bagheri, N.; Safkhani, M.; Namin, M.E.; Rostampour, S.
Source: Self-asserted source
Nasour Bagheri via Scopus - Elsevier

Analysis of a Distance Bounding Protocol for Verifying the Proximity of Two-Hop Neighbors

2017 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, ISCISC 2017
2018 | Conference paper
EID:

2-s2.0-85056634785

Contributors: Jannati, H.; Bagheri, N.; Safkhani, M.
Source: Self-asserted source
Nasour Bagheri via Scopus - Elsevier

Cryptanalysis of reduced round SKINNY block cipher

IACR Transactions on Symmetric Cryptology
2018 | Journal article
EID:

2-s2.0-85061661215

Part of ISBN:

2519173X

Contributors: Sadeghi, S.; Mohammadi, T.; Bagheri, N.
Source: Self-asserted source
Nasour Bagheri via Scopus - Elsevier

Differential fault attack on SKINNY block cipher

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2018 | Book
EID:

2-s2.0-85058503513

Part of ISBN:

16113349 03029743

Contributors: Vafaei, N.; Bagheri, N.; Saha, S.; Mukhopadhyay, D.
Source: Self-asserted source
Nasour Bagheri via Scopus - Elsevier

Improved zero-correlation and impossible differential cryptanalysis of reduced-round SIMECK block cipher

IET Information Security
2018 | Journal article
EID:

2-s2.0-85049751804

Part of ISBN:

17518717 17518709

Contributors: Sadeghi, S.; Bagheri, N.
Source: Self-asserted source
Nasour Bagheri via Scopus - Elsevier

On the security of two ownership transfer protocols and their improvements

International Arab Journal of Information Technology
2018 | Journal article
EID:

2-s2.0-85040946871

Part of ISBN:

23094524 16833198

Contributors: Bagheri, N.; Aghili, F.; Safkhani, M.
Source: Self-asserted source
Nasour Bagheri via Scopus - Elsevier

IoT Device Security: Challenging “A Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function”

Sensors
2018-12 | Journal article | Author
Contributors: Ygal Bendavid; Nasour Bagheri; Masoumeh Safkhani; Samad Rostampour
Source: check_circle
Multidisciplinary Digital Publishing Institute
grade
Preferred source (of 2)‎

On the Security of Rotation Operation Based Ultra-Lightweight Authentication Protocols for RFID Systems

Future Internet
2018-08 | Journal article | Author
Contributors: Masoumeh Safkhani; Nasour Bagheri; Mahyar Shariat
Source: check_circle
Multidisciplinary Digital Publishing Institute
grade
Preferred source (of 2)‎

A new anti-collision protocol based on information of collided tags in RFID systems

International Journal of Communication Systems
2017 | Journal article
EID:

2-s2.0-84929207747

Contributors: Bagheri, N.; Alenaby, P.; Safkhani, M.
Source: Self-asserted source
Nasour Bagheri via Scopus - Elsevier

Average activity, but not variability, is the dominant factor in the representation of object categories in the brain

Neuroscience
2017 | Journal article
EID:

2-s2.0-85010683537

Contributors: Karimi-Rouzbahani, H.; Bagheri, N.; Ebrahimpour, R.
Source: Self-asserted source
Nasour Bagheri via Scopus - Elsevier

Cryptanalysis of reduced QTL block cipher

Microprocessors and Microsystems
2017 | Journal article
EID:

2-s2.0-85020045361

Part of ISBN:

01419331

Contributors: Sadeghi, S.; Bagheri, N.; Abdelraheem, M.A.
Source: Self-asserted source
Nasour Bagheri via Scopus - Elsevier

Hard-wired feed-forward visual mechanisms of the brain compensate for affine variations in object recognition

Neuroscience
2017 | Journal article
EID:

2-s2.0-85015426201

Contributors: Karimi-Rouzbahani, H.; Bagheri, N.; Ebrahimpour, R.
Source: Self-asserted source
Nasour Bagheri via Scopus - Elsevier

Invariant object recognition is a personalized selection of invariant features in humans, not simply explained by hierarchical feed-forward vision models

Scientific Reports
2017 | Journal article
EID:

2-s2.0-85032641169

Part of ISBN:

20452322

Contributors: Karimi-Rouzbahani, H.; Bagheri, N.; Ebrahimpour, R.
Source: Self-asserted source
Nasour Bagheri via Scopus - Elsevier

On the (Im)Possibility of Receiving Security Beyond 2<sup>l</sup> Using an l-Bit PRNG

Wireless Personal Communications
2017 | Journal article
EID:

2-s2.0-84982311108

Contributors: Safkhani, M.; Hosseinzadeh, M.; Namin, M.E.; Rostampour, S.; Bagheri, N.
Source: Self-asserted source
Nasour Bagheri via Scopus - Elsevier

On the security of an RFID-based parking lot management system

International Journal of Communication Systems
2017 | Journal article
EID:

2-s2.0-85016330311

Contributors: Safkhani, M.; Bagheri, N.; Hosseinzadeh, M.; Eslamnezhad namin, M.; Rostampour, S.
Source: Self-asserted source
Nasour Bagheri via Scopus - Elsevier

Passive secret disclosure attack on an ultralightweight authentication protocol for Internet of Things

Journal of Supercomputing
2017 | Journal article
EID:

2-s2.0-85009733750

Contributors: Safkhani, M.; Bagheri, N.
Source: Self-asserted source
Nasour Bagheri via Scopus - Elsevier

Security analysis of niu et al. authentication and ownership management protocol

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2017 | Book
EID:

2-s2.0-85026733598

Part of ISBN:

16113349 03029743

Contributors: Safkhani, M.; Jannati, H.; Bagheri, N.
Source: Self-asserted source
Nasour Bagheri via Scopus - Elsevier

An authenticated encryption based grouping proof protocol for RFID systems

Security and Communication Networks
2016 | Journal article
EID:

2-s2.0-85008426041

Contributors: Rostampour, S.; Bagheri, N.; Hosseinzadeh, M.; Khademzadeh, A.
Source: Self-asserted source
Nasour Bagheri via Scopus - Elsevier

Building indifferentiable compression functions from the PGV compression functions

Designs, Codes, and Cryptography
2016 | Journal article
EID:

2-s2.0-84955350327

Contributors: Gauravaram, P.; Bagheri, N.; Knudsen, L.R.
Source: Self-asserted source
Nasour Bagheri via Scopus - Elsevier

Cryptanalysis of reduced NORX

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2016 | Book
EID:

2-s2.0-84979574768

Contributors: Bagheri, N.; Huang, T.; Jia, K.; Mendel, F.; Sasaki, Y.
Source: Self-asserted source
Nasour Bagheri via Scopus - Elsevier

Improved rebound attacks on AESQ: Core permutation of CAESAR candidate PAEQ

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2016 | Book
EID:

2-s2.0-84978884004

Contributors: Bagheri, N.; Mendel, F.; Sasaki, Y.
Source: Self-asserted source
Nasour Bagheri via Scopus - Elsevier

Differential fault analysis of SHA-3

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2015 | Book
EID:

2-s2.0-84951870861

Contributors: Bagheri, N.; Ghaedi, N.; Sanadhya, S.K.
Source: Self-asserted source
Nasour Bagheri via Scopus - Elsevier

Improved linear cryptanalysis of reduced-round SIMON-32 and SIMON-48

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2015 | Book
EID:

2-s2.0-84951870245

Contributors: Abdelraheem, M.A.; Alizadeh, J.; Alkhzaimi, H.A.; Aref, M.R.; Bagheri, N.; Gauravaram, P.
Source: Self-asserted source
Nasour Bagheri via Scopus - Elsevier

Linear cryptanalysis of reduced-round SIMECK variants

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2015 | Book
EID:

2-s2.0-84951875161

Contributors: Bagheri, N.
Source: Self-asserted source
Nasour Bagheri via Scopus - Elsevier

On the designing of EPC C1 G2 authentication protocols using AKARI-1 and AKARI-2 PRNGs

Information Technology and Control
2015 | Journal article
EID:

2-s2.0-84926205136

Contributors: Safkhani, M.; Baghernejad, F.; Bagheri, N.
Source: Self-asserted source
Nasour Bagheri via Scopus - Elsevier

Weaknesses of fingerprint-based mutual authentication protocol

Security and Communication Networks
2015 | Journal article
EID:

2-s2.0-84937013021

Contributors: Picazo-Sanchez, P.; Ortiz-Martin, L.; Peris-Lopez, P.; Bagheri, N.
Source: Self-asserted source
Nasour Bagheri via Scopus - Elsevier

A note on the security of IS-RFID, an inpatient medication safety

International Journal of Medical Informatics
2014 | Journal article
EID:

2-s2.0-84888430442

Contributors: Safkhani, M.; Bagheri, N.; Naderi, M.
Source: Self-asserted source
Nasour Bagheri via Scopus - Elsevier

Cryptanalysis of a new EPC class-1 generation-2 standard compliant RFID protocol

Neural Computing and Applications
2014 | Journal article
EID:

2-s2.0-84893913319

Contributors: Bagheri, N.; Safkhani, M.; Naderi, M.
Source: Self-asserted source
Nasour Bagheri via Scopus - Elsevier

Cryptanalysis of SIMON variants with connections

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2014 | Book
EID:

2-s2.0-84911907668

Contributors: Alizadeh, J.; Alkhzaimi, H.A.; Aref, M.R.; Bagheri, N.; Gauravaram, P.; Kumar, A.; Lauridsen, M.M.; Sanadhya, S.K.
Source: Self-asserted source
Nasour Bagheri via Scopus - Elsevier

Cryptanalysis of the Cho et al. protocol: A hash-based RFID tag mutual authentication protocol

Journal of Computational and Applied Mathematics
2014 | Journal article
EID:

2-s2.0-84889098244

Contributors: Safkhani, M.; Peris-Lopez, P.; Hernandez-Castro, J.C.; Bagheri, N.
Source: Self-asserted source
Nasour Bagheri via Scopus - Elsevier
Items per page:
Page 1 of 2

Peer review (21 reviews for 5 publications/grants)

Review activity for Annales des télécommunications. (1)
Review activity for Designs, codes and cryptography. (1)
Review activity for Journal in computer virology. (1)
Review activity for Journal of ambient intelligence & humanized computing (17)
Review activity for The journal of supercomputing. (1)