ISI Papers
- "Secret image sharing scheme with hierarchical threshold access structure", Elsevier BV, (2014), Vol 25, No 5: 1093-1101
- "A note on “Selling multiple secrets to a single buyer”", Elsevier BV, (2014), Vol 279, No : 889-892
- "Distributed key generation protocol with hierarchical threshold access structure", Institution of Engineering and Technology (IET), (2015), Vol 9, No 4: 248-255
- "A note on “Selling multiple secrets to a single buyer”", Elsevier BV, (2014), Vol 279, No : 889-892
- "Distributed key generation protocol with hierarchical threshold access structure", Institution of Engineering and Technology (IET), (2015), Vol 9, No 4: 248-255
- "Hierarchical threshold multi-secret sharing scheme based on Birkhoff interpolation and cellular automata", IEEE, (2015), Vol , No :
- "Collocation method using sinc and Rational Legendre functions for solving Volterra’s population model", Elsevier BV, (2011), Vol 16, No 4: 1811-1819
- "Ideal social secret sharing using Birkhoff interpolation method", Wiley, (2016), Vol 9, No 18: 4973-4982
- "Comments on a chaos-based public key encryption with keyword search scheme", Springer Science and Business Media LLC, (2018), Vol 94, No 2: 1127-1132
- "Cryptanalysis and Improvement of a Pairing-Free Certificateless Signature Scheme", IEEE, (2018), Vol , No :
- "Certificateless aggregate signcryption: Security model and a concrete construction secure in the random oracle model", Elsevier BV, (2014), Vol 26, No 3: 276-286
Conference Papers
- تحلیل امنیت یک امضای فاقد گواهینامه جهت دار ارائه شده در Third National Conference on New Researches in Engineering and Applied Sciences (1400)
- On the Security of a Certificateless Strong Designated Verifier Signature Scheme ارائه شده در Third National Conference on Computer Engineering, Information Technology and Data Processing (1397)
- A simple protocol for selling multiple secrets to a single buyer without a trusted party ارائه شده در 6th Iranian Security Community Conference (1388)
Journal Papers
- بررسی و تحلیل چند طرح تسهیم راز مبتنی بر روش های درونیابی منتشر شده در Electronic and cyber defense (1403)
- تحلیل امنیت و بهبود یک سامانه حمل ونقل هوشمند مبتنی بر امضای تجمعی فاقد گواهینامه منتشر شده در Electronic and cyber defense (1399)
- Security Analysis of Two Lightweight Certificateless Signature Schemes منتشر شده در Journal of Computing and Security (1397)
- Verifiable Social Multi-Secret Sharing Secure in Active Adversarial Model منتشر شده در Journal of Computing and Security (1396)
- Cryptanalysis of an Attribute-based Key Agreement Protocol منتشر شده در International Journal of Computer & Information Technologies (1393)