Kneser graphs and their complements are hyperenergetic S Akbari, F Moazami, S Zare Match 61 (2), 361, 2009 | 47 | 2009 |
Lightweight and secure PUF-based authenticated key agreement scheme for smart grid M Tahavori, F Moazami Peer-to-Peer Networking and Applications 13 (5), 1616-1628, 2020 | 28 | 2020 |
Lightweight authenticated key agreement for smart metering in smart grid SH Baghestani, F Moazami, M Tahavori IEEE Systems Journal 16 (3), 4983-4991, 2022 | 27 | 2022 |
Commutativity of the adjacency matrices of graphs S Akbari, F Moazami, A Mohammadian Discrete Mathematics 309 (3), 595-600, 2009 | 20 | 2009 |
Impossible differential cryptanalysis on Deoxys-BC-256 F Moazami, H Soleimany Cryptology ePrint Archive, 2018 | 17 | 2018 |
SEOTP: a new secure and efficient ownership transfer protocol based on quadric residue and homomorphic encryption F Moazami, M Safkhani Wireless Networks 26, 5285-5306, 2020 | 14 | 2020 |
Secure frameproof codes through biclique covers H Hajiabolhassan, F Moazami Discrete Mathematics & Theoretical Computer Science 14 (Graph Theory), 2012 | 11 | 2012 |
Some new bounds for cover-free families through biclique covers H Hajiabolhassan, F Moazami Discrete Mathematics 312 (24), 3626-3635, 2012 | 10 | 2012 |
An efficient and provably secure authenticated key agreement scheme for mobile edge computing M Rakeei, F Moazami Wireless Networks 28 (7), 2983-2999, 2022 | 8 | 2022 |
Framework for faster key search using related‐key higher‐order differential<? show [AQ ID= Q1]?> properties: applications to Agrasta C Dobraunig, F Moazami, C Rechberger, H Soleimany IET Information Security 14 (2), 202-209, 2020 | 7 | 2020 |
: improvement of TBGODP, a time bound group ownership delegation protocol F Moazami, M Safkhani Journal of Ambient Intelligence and Humanized Computing, 1-20, 2022 | 5 | 2022 |
Cryptanalysis of an anonymous authentication and key agreement protocol for secure wireless body area network MA Rakeei, F Moazami Cryptology ePrint Archive, 2020 | 3 | 2020 |
The square chromatic number of the torus AG Chegini, M Hasanvand, ES Mahmoodian, F Moazami Discrete Mathematics 339 (2), 447-456, 2016 | 3 | 2016 |
Biclique cover and local clique cover of graphs F Moazami Bulletin of the Iranian Mathematical Society 44, 225-235, 2018 | 2 | 2018 |
New single‐trace side‐channel attacks on a specific class of Elgamal cryptosystem P Mahdion, H Soleimany, P Habibi, F Moazami IET Information Security 14 (2), 151-156, 2020 | 1 | 2020 |
A new secure and efficient ownership transfer protocol based on quadric residue and homomorphic encryption F Moazami, M Safkhani Cryptology ePrint Archive, 2019 | 1 | 2019 |
On the Computational Complexity of Finding a Minimal Basis for the Guess and Determine Attack. S Khazaei, F Moazami ISeCure 9 (2), 2017 | 1 | 2017 |
On the Biclique cover of the complete graph F Moazami, N Soltankhah Graphs and Combinatorics 31 (6), 2347-2356, 2015 | 1 | 2015 |
A generalization of cover free families MA Motlagh, F Moazami arXiv preprint arXiv:1410.4361, 2014 | 1 | 2014 |
A note on d-biclique covers F Moazami, N Soltankhah, S Basiriz arXiv preprint arXiv:1207.3397, 2012 | 1 | 2012 |