نصور باقری

دانشکده مهندسی برق، دانشگاه تربیت دبیر شهید رجایی

[ 1 ] - توانایی مسیر پیش‌رو قشر بینایی در مقابله با تغییرات در بازشناسی اشیاء: آزمایش‌های انسانی و مدل محاسباتی سازگار با قشر بینایی

در این مقاله بازشناسی اشیاء در انسان در مواجهه با تغییرات مختلف بصورت کمّی مورد ارزیابی قرار می‌گیرد. در سالیان اخیر سامانه بینایی انسان به جهت سرعت و دقت بسیار بالا در بازشناسی اشیاء به عنوان الگویی برای توسعه بسیاری از الگوریتم‌های محاسباتی در حوزه بینایی ماشین بوده است. از این رو، شناخت هرچه بهتر این سامانه و کمّی‌سازی رفتار آن در شرایط مختلف می‌تواند تا حد زیادی به مدل‌سازی بهتر آن کمک نماید....

[ 2 ] - Artemia: a family of provably secure authenticated encryption schemes

Authenticated encryption schemes establish both privacy and authenticity. This paper specifies a family of the dedicated authenticated encryption schemes, Artemia. It is an online nonce-based authenticated encryption scheme which supports the associated data. Artemia uses the permutation based mode, JHAE, that is provably secure in the ideal permutation model. The scheme does not require the in...

[ 3 ] - Lightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives

Linear diffusion layer is an important part of lightweight block ciphers and hash functions. This paper presents an efficient class of lightweight 4x4 MDS matrices such that the implementation cost of them and their corresponding inverses are equal. The main target of the paper is hardware oriented cryptographic primitives and the implementation cost is measured in terms of the required number ...

[ 4 ] - Relaxed Differential Fault Analysis of SHA-3

In this paper, we propose a new method of differential fault analysis of SHA-3 which is based on the differential relations of the algorithm. Employing those differential relations in the fault analysis of SHA-3 gives new features to the proposed attacks, e.g., the high probability of fault detection and the possibility of re-checking initial faults and the possibility to recover internal state...

[ 5 ] - Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants

In this paper, we present some attacks on GAGE, InGAGE, and CiliPadi which are candidates of the first round of the NIST-LWC competition. GAGE and InGAGE are lightweight sponge based hash function and Authenticated Encryption with Associated Data (AEAD), respectively and support different sets of parameters. The length of hash, key, and tag are always 256, 128, and 128 bits, respec...

[ 6 ] - CPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking

Authenticated encryption schemes are important cryptographic primitives that received extensive attention recently. They can provide both confidentiality and authenticity services, simultaneously. Correlation power analysis (CPA) can be a thread for authenticated ciphers, similar to the any physical implementation of any other cryptographic scheme. In this paper, a three-step CPA attack against...

[ 7 ] - Some observations on a lightweight authentication scheme with capabilities of anonymity and trust in Internet of Things (IoT)

Over the last years‎, ‎the concept of Internet of Things (IoT) leads to a revolution in the communications of humans and things. ‎Security and efficiency could be the main challenges of that communication‎‎. ‎‎On the other hand, ‎ authenticity and confidentiality are two important goals to provide desired security in an information system‎, including IoT-based applications. An Authentication an...