Refereed Conference Papers:
[C26] Y. Yoo, R. Azarderakhsh, A. Jalali, D. Jao, V. Soukharev, “A Post-Quantum Digital Signature Scheme based on Supersingular Isogenies”, in Proc. Financial Cryptography FC 2017, to appear, 2017.
[C25] B. Koziel, R. Azarderakhsh, D. Jao, “On Secure Implementations of Quantum-Resistant Supersingular Isogeny Diffie-Hellman”, poster, in Proc. HOST 2017, to appear 2017.
[C24] B. Koziel, R. Azarderakhsh, D. Jao and M. Mozaffari Kermani, “On Fast Calculation of Addition Chains for Isogeny-Based Cryptography”, in Proc. Inscrypt 2016, pp.334-347, 2016.
[C23] Zh. Liu, R. Azarderakhsh and H. Kim, H. Seo, “Efficient Implementation of Ring-LWE Encryption on High-end IoT Platform”, in Proc. RFIDSec 2016, to appear, 2016.
[C22] B. Koziel, R. Azarderakhsh, and M. Mozaffari Kermani, “Fast Hardware Architectures for Supersingular Isogeny Diffie-Hellman Key Exchange on FPGA”, in Proc. IndoCrypt 2016, to appear, 2016.
[C21] K. Järvinen; A. Miele, R. Azarderakhsh, P. Longa, “FourQ on FPGA: New Hardware Speed Records for Elliptic Curve Cryptography over Prime Fields”, in Proc. CHES 2016, pp. 517-537, LNCS, vol. 9813, Aug. 2016.
[C20] B. Koziel, R. Azarderakhsh, A. Jalali, D. Jao, and M. Mozaffari Kermani, “NEON-SIDH: Efficient implementation of supersingular isogeny Diffie-Hellman key exchange protocol on ARM”, in Proc. Conf. Cryptology and Network Security, CANS 2016, to appear in 2016.
[C19] M. Mozaffari Kermani, R. Azarderakhsh, and J. Xie, “Error detection reliable architectures of Camellia block cipher applicable to different variants of its substitution boxes”, in Proc. AsianHOST 2016, to appear 2016.
[C18] R. Azarderakhsh, D. Jao, K. Kalach, B. Koziel and Ch. Leonardi, “Key compression for isogeny-based cryptosystems”, in Proc. AsiaPKC 2016, pp. 1-10, ACM, Jun. 2016.
[C17] M. Mozaffari Kermani and R. Azarderakhsh, “Lightweight Hardware Architectures for Fault Diagnosis Schemes of Efficiently-Maskable Cryptographic Substitution Boxes,” in Proc. IEEE Int. Conf. ICECS 2016, to appear 2016.
[C16] A. Aghaei, M. Mozaffari Kermani, R. Azarderakhsh, “Fault Diagnosis Schemes for Secure Lightweight Cryptographic Block Cipher Rectangle Benchmarked on FPGA”, in Proc. IEEE Int. Conf. ICECS 2016, to appear, 2016.
[C15] M. Mozaffari Kermani, R. Azarderakhsh, and Mehdi Mirakhorli, “Multidisciplinary approaches and challenges in integrating emerging medical devices security research and education”, in Proc. Conf. American Society for Engineering Education, ASEE 2016, pp. 1-13, June 2016.
[C14] M. Mozaffari Kermani, R. Ramadoss, and R. Azarderakhsh, “Efficient error detection architectures for CORDIC through recomputing with encoded operands,” in Proc. ISCAS 2016, pp. 2154-2157, May. 2016.
[C13] R. Azarderakhsh and K. Karabina, “Efficient Algorithms and Architectures for the Computation of Double Point Multiplication on Elliptic Curves”, in Proc. Third ACM workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2016, ACM, pp.25-30, Jan. 2016.
[C12] B. Koziel, R. Azarderakhsh, and M. Mozaffari Kermani, “Low-resource and fast binary Edwards curves cryptography using Gaussian normal basis,” in Proc. IndoCrypt 2015, pp. 347-369, Dec. 2015.
[C11] M. Mozaffari Kermani and R. Azarderakhsh, “Integrating emerging cryptographic engineering research and security education,” in Proc. Conf. American Society for Engineering Education, ASEE 2015, pp. 1-13, June 2015.
[C10] M. Mozaffari Kermani and R. Azarderakhsh, “Reliable hash trees for post-quantum stateless cryptographic hash-based signatures,” in Proc. IEEE Int. Symp. Defect and Fault Tolerance in VLSI Systems, DFT 2015, pp. 325-331, Oct. 2015.
[C9] G. Grewal, R. Azarderakhsh, P. Longa, Sh. Hu, and David Jao, “Efficient Implementation of Bilinear Pairings on ARM Processors,” a chapter in proceedings of International Conference on Selected Areas in Cryptography, SAC 2012, LNCS 7707, Pages: 149-165, 2012.
[C8] R. Azarderakhsh and A. Reyhani-Masoleh, “A Modified Low Complexity Digit-Level Gaussian Normal Basis Multiplier,” a chapter in proceedings of 3rd International Workshop on the Arithmetic of Finite Fields, WAIFI 2010, LNCS 6087, Pages: 25-40, 27-30 Jun. 2010.
[C7] R. Azarderakhsh and A. Reyhani-Masoleh, and Z. Abid, “A Key Management Scheme for Cluster Based Wireless Sensor Networks,” in proceedings of IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, EUC 2008, Volume 2, Pages: 222–227, 17-20 Dec. 2008.
[C6] X. Yuan, H. Jürgensen, R. Azarderakhsh, and A. Reyhani-Masoleh, “Key Management for Wireless Sensor Networks Using Trusted Neighbors,” in proceedings of IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, EUC 2008, Volume 2, Pages: 228-233,17-20 Dec. 2008.
[C5] A. R. Masoum, A. H. Jahangir, Z. Taghikhaki, R. Azarderakhsh, “A New Multi Level Clustering Model to Increase Lifetime in Wireless Sensor Networks,” in proceedings of the 2nd IEEE International Conference on Sensor Technologies and Applications, SENSORCOMM 2008, Pages: 185-190, 25-31 Aug. 2008.
[C4] R. Azarderakhsh, A. H. Jahangir, and M. Keshtgary, “Network Survivability Performance Evaluation in Wireless Sensor Networks,” in proceedings of the 11th International CSI Computer Conference, CSI 2006, Pages: 567-570, 24-26 Jan. 2006.
[C3] R. Azarderakhsh, A. H. Jahangir and M. Keshtgary, “A New Virtual Backbone for Wireless Ad Hoc Sensor Network with Connected Dominating Set,” in proceedings of the 3rd IFIP Annual Conference on Wireless On demand Network Systems and Services, WONS 2006, Pages: 191-195, 18-20 Jan. 2006.
[C2] R. Azarderakhsh, A. H. Jahangir, “Optimized Routing Algorithms for Efficient Power Consumption in Wireless Sensor Networks” in proceedings of 13th International Electrical Engineering Conference, IEEC 2005, Pages 178-183, Apr. 2005.
[C1] R. Azarderakhsh, S.Gh. Miremadi, Gh. Moradi, “Dependability Model of Flight Safety Management Systems” in proceedings of the 1st International Conference on Air Transport Industries Management, ICATIM 2005, Pages: 89-99, 19-20 Jan. 2005.