Mohsen Toorani

Postdoctoral Fellow in Cryptography

Department of Informatics, University of Bergen

 

 

 

Postal Address:      Department of Informatics, University of Bergen, P.O.Box 7803, N-5020 Bergen, Norway

Tel. (Mobile):             (+47) 47 16 14 14

Fax (Office):             (+47) 55 58 41 99

 

Email:                        toorani  [AT]  ieee  [DOT]  org

                                  mohsen.toorani  [AT]  uib  [DOT]  no

PGP Public Key

 

Education

 

*      Ph.D. in Information Security, Department of Informatics, University of Bergen, Bergen, Norway.

*      Master of Science (M.S.) in Secure Communications, School of Electrical Engineering, Iran University of Science and Technology, Tehran, Iran.

*      Bachelor of Science (B.S.) in Communications Engineering, School of Electrical Engineering, Iran University of Science and Technology, Tehran, Iran.

 

Publications

 

*      C. Boyd, G.T. Davies, K. Gjøsteen, H. Raddum and M. Toorani, “Definitions for Plaintext-Existence Hiding in Cloud Storage,” Proceedings of the 3rd Workshop on Security, Privacy, and Identity Management in the Cloud (SECPIC'18), in conjunction with ARES'18, Hamburg, Germany. [PDF]

*      C. Boyd, G.T. Davies, K. Gjøsteen, H. Raddum and M. Toorani, “Security notions for cloud storage and deduplication,” eprint, 2017. [PDF]

*      F. Armknecht, C. Boyd, G.T. Davies, K. Gjøsteen, and M. Toorani, Side channels in deduplication: trade-offs between leakage and efficiency,” Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security (ASIACCS’17), pp.266-274, April 2017. [DOI] [BibTeX] [PDF]

*      M. Toorani, “Security Analysis of the IEEE 802.15.6 Standard,” International Journal of Communication Systems, Vol.29, No.17, pp.2471-2489, Nov. 2016. [DOI]  [BibTeX]  [PDF]

*      C. Boyd, G.T. Davies, K. Gjøsteen, H. Raddum and M. Toorani, Using Cryptography to Control Your Data at a Distance,” ERCIM News, Vol. 106, pp. 17-18, July 2016. [PDF]

*      M. Toorani, “Security protocols in a Nutshell,” Arxiv, 2016. [DOI] [PDF]

*      M. Toorani, “Fully Homomorphic Encryption (Abstract),” Proceedings of Norwegian-Slovakian Workshop in Crypto, Feb. 2016. [PDF]

*      M. Toorani, “Cryptanalysis of a robust key agreement based on public key authentication,” Journal of Security and Communication Networks, Vol.9, No.1, pp.19-26, Jan. 2016. [DOI]  [BibTeX]  [PDF]

*      M. Toorani, Cryptanalysis of Two PAKE Protocols for Body Area Networks and Smart Environments,” International Journal of Network Security, Vol.17, No.5, pp.629-636, Sep. 2015. [BibTeX]  [PDF]

*      M. Toorani, “Cryptanalysis of a new protocol of wide use for e-mail with perfect forward secrecy,” Journal of Security and Communication Networks, Vol.8, No.4, pp.694-701, Mar. 2015. [DOI]  [BibTeX]  [PDF]

*      M. Toorani, “On Vulnerabilities of the Security Association in the IEEE 802.15.6 Standard,” Financial Cryptography and Data Security, LNCS 8976, pp.245-260, Springer, Jan. 2015.  [DOI]  [BibTeX] [PDF]

*      M. Toorani, “Cryptanalysis of a protocol from FC'10 (poster abstract),” Financial Cryptography and Data Security, LNCS 8975, pp. 596, Springer, Jan. 2015. [DOI] [BibTeX] [PDF]

*      M. Toorani, “On Continuous After-the-Fact Leakage-Resilient Key Exchange,” Proceedings of the 2nd Workshop on Cryptography and Security in Computing Systems (CS2’15), Amsterdam, Netherlands, Jan. 2015.  [DOI]   [BibTeX]   [PDF]

*      M. Toorani, “Security Analysis of J-PAKE,” Proceedings of the 19th IEEE Symposium on Computers and Communications (ISCC'14), Madeira, Portugal, June 2014.  [DOI]  [BibTeX]  [PDF]

*      M.C. Amirani, M. Toorani, and S. Mihandoost, Feature-based Type Identification of File Fragments,” Journal of Security and Communication Networks, Vol.6, No.1, pp.115-128, Jan. 2013. [DOI]  [BibTeX]  [PDF]

*      M. Toorani, and A. Falahati, A Secure Cryptosystem based on Affine Transformation,” Journal of Security and Communication Networks, Vol.4, No.2, pp.207-215, Feb. 2011. [DOI]  [BibTeX]  [PDF]

*      M. Toorani, “Security Vulnerabilities of USSD,” Proceedings of the 1st International Conference on eCitizen & Cellphone (ICECC2010), Tehran, Iran, Sep. 2010. (In Persian).  [PDF]

*      M. Toorani, and A. Beheshti, Cryptanalysis of a New Signcryption Scheme,” Proceedings of the 15th Annual Computer Society of Iran Conference on Computers (CSICC’10), Tehran, Iran, Feb. 2010. (In Persian).  [BibTeX]   [PDF]   [Slides-PDF]   [Slides-PPT]

*      M. Toorani, and A. Beheshti, Cryptanalysis of an Elliptic Curve-based Signcryption Scheme,” International Journal of Network Security, Vol.10, No.1, pp.51–56, Jan. 2010. [BibTeX]  [PDF]

*      M. Toorani, and A. Beheshti, A Directly Public Verifiable Signcryption Scheme based on Elliptic Curves,” Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC'09), pp.713-716, Sousse, Tunisia, July 2009. [DOI]   [BibTeX]   [PDF]

*      M. Toorani, and A. Falahati, A Secure Variant of the Hill Cipher,” Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC'09), pp.313-316, Sousse, Tunisia, July 2009. [DOI]   [BibTeX]   [PDF]

*      M. Toorani, and A. Beheshti, An Elliptic Curve-based Signcryption Scheme with Forward Secrecy,” Journal of Applied Sciences, Vol.9, No.6, pp.1025-1035, 2009. [DOI]  [BibTeX]  [PDF]

*      M. Toorani, SMEmail - A New Protocol for the Secure E-mail in Mobile Environments,” Proceedings of the Australian Telecommunications Networks and Applications Conference (ATNAC'08), pp.39-44, Adelaide, Australia, Dec. 2008. [DOI]   [BibTeX]   [PDF]

*      M. Toorani, and A. Beheshti, Cryptanalysis of an efficient signcryption scheme with forward secrecy based on elliptic curve,” Proceedings of 2008 International Conference on Computer and Electrical Engineering (ICCEE'08), pp.428-432, Phuket, Thailand, Dec. 2008. [DOI]   [BibTeX]   [PDF]

*      M. Toorani, and A. Beheshti, LPKI - A Lightweight Public Key Infrastructure for the Mobile Environments,” Proceedings of the 11th IEEE International Conference on Communication Systems (IEEE ICCS'08), pp.162-166, Guangzhou, China, Nov. 2008. [DOI]   [BibTeX]   [PDF]

*      M. Toorani, and A. Beheshti, Solutions to the GSM Security Weaknesses,” Proceedings of the 2nd International Conference on Next Generation Mobile Applications, Services, and Technologies (NGMAST'08), pp.576-581, Cardiff, UK, Sep. 2008.  [DOI]   [BibTeX]   [PDF]

*      M.C. Amirani, M. Toorani, and A. Beheshti, A New Approach to Content-based File Type Detection,” Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC'08), pp.1103-1108, Marrakech, Morocco, July 2008. [DOI]   [BibTeX]   [PDF]   [Slides-PDF]

*      M. Toorani, and A. Beheshti, SSMS - A Secure SMS Messaging Protocol for the M-payment Systems,” Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC'08), pp.700-705, Marrakech, Morocco, July 2008.  [DOI]   [BibTeX]   [PDF]   [Slides-PDF]

Technical Reports:

*      M. Toorani, Security Evaluation of the Homeland Cellular System,” Technical Report, 25 pages, Feb. 2007. (In Persian)

*      M. Toorani, and M. Fazli, Smart Cards: Security attributes and vulnerabilities,” Technical Report, 62 pages, Oct. 2007. (In Persian)

*      M. Toorani, and M. Ahmadian, Security Evaluation of the Short Message Service,” Technical Report, ICTCERT, Oct. 2008. (In Persian)   [PDF]

*      S.H. Ahmadinejad, N. Khakpour, M. Khaxar, M.H. Tadayon, N. Taj, M. Toorani, “A Service-Oriented Security Model based on Public Key Infrastructure,” Technical Report, ITRC, 253 pages, June 2009. (In Persian)

*      M. Toorani, Authenticated Key Exchange and Password-Authenticated Key Exchange Protocols,” Iran University of Science and Technology, 69 pages, Dec 2006. (In Persian)   [PDF]

Thesis/Dissertations:

*      M. Toorani, Security Protocols and related topics,” PhD Thesis, University of Bergen.

*      M. Toorani, Design and Simulation of a Protocol for End-to-end Security in SMS,” M.Sc. Thesis (191 Pages), Iran University of Science and Technology. (In Persian) (Funded by a Grant from Iran Telecommunications Research Center).

*      M. Toorani, End-to-end Security in GSM,” M.S. Technical Report (Seminar / 184 Pages), Iran University of Science and Technology. (In Persian).   [PDF]   [Slides-PDF]

*      M. Toorani, Analytically Determination of Intrinsic Matrices for Microstrip Multiconductor Lines,” B.S. Thesis (134 Pages), Iran University of Science and Technology. (In Persian).   [PDF]

 

Miscellaneous Talks

 

*      Security notions for symmetric encryption, Simula@UiB, Bergen, Norway, June 2017.

*      Cryptography for Cloud Security, lecture at FRISC/COINS winter school, Finse, Norway, May  2017. [Slides-PDF]

*      Secure Deduplication, Simula@UiB, Bergen, Norway, Dec. 2016.

*      Fully Homomorphic Encryption, Norwegian-Slovakian Workshop in Crypto, Bergen, Norway, Feb. 2016. [Slides-PDF]

*      Interactive Information Theory, Department of Informatics, University of Bergen, Norway, Nov. 2015.  [Slides-PDF]

*      Security Protocols and Provable Security, BratislavaCrypt, Bratislava, Slovakia, Nov. 2015.  [Slides-PDF]

*      Signature Schemes for Network Coding, Selmer Center, Bergen, Norway, Nov. 2012.  [Slides-PDF]

*      Feature-based Type Identification of Computer Data, FRISC Winter School, Finse, Norway, May 2012.  [Slides-PDF]

*      Certificateless PublicKey Cryptography, Norsk Kryptoseminar, Selmer Center, Bergen, Norway, November 2011.  [Slides-PDF]

*      Sequences in Mobile Communication Systems, Selmer Center, Bergen, Norway, May 2011.  [Slides-PDF]

 

Teaching

Teaching assistant for:

*      INF247 (Cryptology)

*      INF240 (Basic codes)

*      INF142 (Computer networks)

*      INF109 (Computer programming for science)

 

Technical Reviewing

Journals:

*      Springer’s Journal of Designs, Codes and Cryptography (ISSN 0925-1022).

*      Wiley's Journal of Security and Communication Networks (ISSN 1939-0114).

*      Springer’s Journal of Cryptography and Communications (ISSN 1936-2447).

*      IEEE Systems Journal (ISSN 1932-8184).

*      IEEE Transactions on Mobile Computing (ISSN 1536-1233).

*      IET Journal of Computers & Digital Techniques (ISSN 1751-8601).

*      Elsevier’s Journal of Computers & Security (ISSN 0167-4048).

*      Elsevier’s Journal of Computers & Electrical Engineering (ISSN 0045-7906).

*      Elsevier's Journal of Systems and Software (ISSN 0164-1212).

*      Elsevier's Journal of Computer Standards and Interfaces (ISSN 0920-5489).

*      IEEE Transactions on Dependable and Secure Computing (ISSN 1545-5971).

*      Oxford University Press’s The Computer Journal (ISSN 0010-4620).

*      Springer’s Journal of Mobile Networks and Applications (ISSN 1383-469X).

*      IET Journal of Computers & Digital Techniques (ISSN 1751-8601).

*      International Journal of Foundations of Computer Science (ISSN 0129-0541).

*      Elsevier's Journal of Network and Computer Applications (ISSN 1084-8045).

*      Elsevier's Journal of Mathematical and Computer Modelling (ISSN 0895-7177).

*      Springer’s Transactions on Computational Science (ISSN 1866-4733).

*      EURASIP Journal on Wireless Communications and Networking (ISSN 1687-1472).

*      Wiley's Journal of International Journal of Communication systems (ISSN 1099-1131)

*      IETE Technical Review (ISSN 0256-4602)

*      Springer’s Journal of Medical Systems (ISSN 0148-5598).

*      International Journal of Network Security (ISSN 1816-353X).

 

Professional Activities

 

*      Member of Editorial Board, International Journal of Network Security (IJNS).

 

Media

 

*      How to stay safe online, The UiB magazine 2017/2018, pp. 42-43, June 2017.

*      Hvor mye kan internett ødelegge for oss?, Bergen Student-TV, Oct. 2016.

*      Kva må vi passe oss for på nett?, Forskning.no, Sep. 2016.

*      How to stay safe online, UiB News, Sep. 2016.

 

Areas of Interest

 

*      Information and Cyber Security

*      Cryptography

*      Security Protocols

 

Links

 

*      Google Scholar

*      Scopus

*      DBLP

*      Researchgate

*      ResearcherID

*      ORCID

*      Linkedin

 

Description: Description: Description: Description: Description: Description: Description: Description: drupal stats