Advance your academic career, collaborate globally, and expand your network— join now !

Nasour Bagheri

Prof. Nasour Bagheri

Share Link

Share

Information

Nasour Bagheri is an Associate Professor at the Electrical Engineering Department, Shahid Rajaee Teacher Training University, Tehran, Iran. He is also a part-time Researcher with the Institute for Research in Fundamental Sciences (IPM). Nasour Bagheri received his M.S. and Ph.D. degrees in electrical engineering from the Iran University of Science and Technology (IUST), Tehran, Iran, in 2002 and 2010, respectively. He is the author of more than 100 articles in information security and cryptology. His research interests include cryptology, more precisely, designing, and analysis of symmetric schemes, such as lightweight ciphers, e.g., block ciphers, hash functions, and authenticated encryption schemes, cryptographic protocols for constrained environments, such as RFID tags, and the IoT edge devices and hardware security, e.g., the security of symmetric schemes against side-channel attacks, such as fault injection and power analysis.

Research Keywords & Expertise

Security Protocols
Cryptology
Security & Privacy
Cryptanalyse
Hardware security (sid...

Fingerprints

16%
Security Protocols
8%
Security & Privacy
5%
Cryptanalyse

Short Biography

Nasour Bagheri is an Associate Professor at the Electrical Engineering Department, Shahid Rajaee Teacher Training University, Tehran, Iran. He is also a part-time Researcher with the Institute for Research in Fundamental Sciences (IPM). Nasour Bagheri received his M.S. and Ph.D. degrees in electrical engineering from the Iran University of Science and Technology (IUST), Tehran, Iran, in 2002 and 2010, respectively. He is the author of more than 100 articles in information security and cryptology. His research interests include cryptology, more precisely, designing, and analysis of symmetric schemes, such as lightweight ciphers, e.g., block ciphers, hash functions, and authenticated encryption schemes, cryptographic protocols for constrained environments, such as RFID tags, and the IoT edge devices and hardware security, e.g., the security of symmetric schemes against side-channel attacks, such as fault injection and power analysis.