Alireza Jolfaei

Dr

20102019
If you made any changes in Pure these will be visible here soon.

Research Outputs 2010 2019

Filter
Article
2019

A lightweight integrity protection scheme for low latency smart grid applications

Jolfaei, A. & Kant, K., 1 Sep 2019, In : Computers and Security. 86, p. 471-483 13 p.

Research output: Contribution to journalArticleResearchpeer-review

Phasor measurement units
integrity
Communication
Electric potential
Time measurement
2016

On the security of permutation-only image encryption schemes

Jolfaei, A., Wu, X. & Muthukkumarasamy, V., Feb 2016, In : IEEE Transactions on Information Forensics and Security. 11, 2, p. 235-246 12 p.

Research output: Contribution to journalArticleResearchpeer-review

Cryptography
Polynomials
Color
Experiments
2015

A 3D object encryption scheme which maintains dimensional and spatial stability

Jolfaei, A., Wu, X-W. & Muthukkumarasamy, V., Feb 2015, In : IEEE Transactions on Information Forensics and Security. 10, 2, p. 409-422 14 p.

Research output: Contribution to journalArticleResearchpeer-review

Cryptography
Surface reconstruction
Geometry

Preserving the confidentiality of digital images using a chaotic encryption scheme

Jolfaei, A., Matinfar, A. & Mirghadri, A., 2015, In : International Journal of Electronic Security and Digital Forensics. 7, 3, p. 258-277 20 p.

Research output: Contribution to journalArticleResearchpeer-review

Cryptography
Entropy
entropy
Testing
multimedia
2014

Comments on the security of "Diffusion–substitution based gray image encryption" scheme

Jolfaei, A., Wu, X-W. & Muthukkumarasamy, V., 2014, In : Digital Signal Processing: A Review Journal. 32, p. 34-36 3 p.

Research output: Contribution to journalArticleResearchpeer-review

Cryptography
Substitution reactions
Defects
2012

Image encryption using HC-128 and HC-256 stream ciphers

Jolfaei, A., Vizandan, A. & Mirghadri, A., 2012, In : International Journal of Electronic Security and Digital Forensics. 4, 1, p. 19-42 24 p.

Research output: Contribution to journalArticleResearchpeer-review

Cryptography
Information analysis
Sensitivity analysis
Entropy
Scanning

Impact of rotations in the Salsa20/8 image encryption scheme

Jolfaei, A., Mirghadri, A. & Vizandan, A., 2012, In : International Journal of Computer Theory and Engineering. 4, 6, p. 938-943 6 p.

Research output: Contribution to journalArticleResearchpeer-review

Cryptography
2011

Image encryption using chaos and block cipher

Jolfaei, A. & Mirghadri, A., 1 Jan 2011, In : Computer and Information Science. 4, 1, p. 172-185 14 p.

Research output: Contribution to journalArticleResearchpeer-review

Open Access
Chaos theory
Cryptography
Sensitivity analysis
Entropy
Pixels

Substitution-permutation based image cipher using chaotic Henon and Baker’s maps

Jolfaei, A. & Mirghadri, A., 2011, In : International Review on Computers and Software. 6, 1, p. 40-54 15 p.

Research output: Contribution to journalArticleResearchpeer-review

Cryptography
Substitution reactions
Information analysis
Sensitivity analysis
Entropy

تصنيع جهاز محاكاة لإمكانات عمل الخلايا العصبية

Jolfaei, A., 2011, In : The Scientific Journal of Passive Defence Science and Technology. 1, 2, p. 13-23 11 p.

Research output: Contribution to journalArticleResearchpeer-review

Microcontrollers
Neurons
Simulators
Fabrication
Equivalent circuits

طرح جديد رمزنگاري تصوير با استفاده از نگاشتهاي آشوبي

Mirghadri, A. & Jolfaei, A., 2011, In : The Scientific Journal of Passive Defence Science and Technology. 2, 2, p. 111-124 14 p.

Research output: Contribution to journalArticleResearchpeer-review

Cryptography
Information analysis
Security of data
MATLAB
Sensitivity analysis
2010

A new approach to measure quality of image encryption

Jolfaei, A. & Mirghadri, A., 2010, In : International Journal of Computer and Network Security. 2, 8, p. 38-43 6 p.

Research output: Contribution to journalArticleResearchpeer-review

Cryptography
Inspection
Security of data
Pixels

An image encryption approach using chaos and stream cipher

Jolfaei, A. & Mirghadri, A., 2010, In : Journal of Theoretical and Applied Information Technology. 19, 2, p. 117-125 9 p.

Research output: Contribution to journalArticleResearchpeer-review

Image Encryption
Stream Cipher
Chaotic Map
Chaos theory
Cryptography

Survey: image encryption using A5/1 and W7

Jolfaei, A. & Mirghadri, A., 2010, In : Journal of Computing. 2, 8, p. 1-7 7 p.

Research output: Contribution to journalArticleResearchpeer-review

Cryptography
MATLAB
Sensitivity analysis
Entropy

Survey: image encryption using Salsa20

Jolfaei, A. & Mirghadri, A., 2010, In : International Journal of Computer Science Issues. 7, 5, p. 213-220 8 p.

Research output: Contribution to journalArticleResearchpeer-review

Cryptography
Information analysis
Sensitivity analysis
Entropy
Testing