You are now in the main content area
Dr. Atefeh Mashatan, Director, Cybersecurity Research Lab, Assistant Professor

Dr. Atefeh Mashatan

Director, Cybersecurity Research Lab | Associate Professor
DepartmentInformation Technology Management
EducationBMath, MMath, PhD
OfficeTRS 2-038
Phone416-979-5000 x 553632


Dr. Atefeh (Atty) Mashatan is the founder and director of the Cybersecurity Research Lab (CRL) at Ryerson University and recognized as a leading expert in cryptography, blockchain technology, quantum-resistant solutions, enterprise security architecture and Internet-of-Things (IoT) security.

Mashatan’s expertise at the frontlines of the global cybersecurity field was recognized by SC Magazine in 2019, when she was named one of the top five Women of Influence in Security. She was recognized as one of Canada’s Top 19 of 2019 Tech Titans at IBM CASCON Evoke conference for her efforts in developing emerging technological solutions to address timely societal needs. In 2020, she received the Enterprise Blockchain Award in the category of New Frontiers in Blockchain Academic Research by Blockchain Research Institute for developing the Mosaïque Digital Wallet, which is a fully decentralized identity management system for business environments. Most recently, she received the recognition of Top Women in Cybersecurity in Canada for her efforts in advancing cybersecurity research and training highly qualified personnel in the field.

Through strategic collaborations with government and industry, Mashatan and the CRL seek to spearhead crucial, ongoing dialogue with the Information and Computer Technology (ICT) industry in Canada, and to help solve industry problems through cutting edge information security and research into cyber risk mitigation strategies and solutions. Previously, Mashatan was a Scientific Collaborator at the Security and Cryptography Laboratory of School of Computer and Communication Sciences, EPFL (Swiss Federal Institute of Technology, Lausanne), where she conducted research into cryptographic protocols, followed by a position at CIBC, where she was a Senior Information Security Consultant and Solutions Architect focusing on cryptography and enterprise architecture.

Since 2016, Mashatan has been a professor of information technology management at Ryerson where she is training the next generation of cybersecurity experts. Mashatan serves on the board of directors at Compute Ontario, a consortia which serves to drive the province’s capacity in advanced research computing and big data; and on the board of the Rogers Cybersecure Catalyst, which is dedicated to solving critical cybersecurity challenges, accelerating Canadian cyber technologies and creating new opportunities for Canadian workers and entrepreneurs. As of recently, she has joined the Core Group at the National Research Council of Canada (NRC), who will focus on the Canadian challenges that will arise over the next 10 to 15 years through six areas of critical importance, including cybersecurity and privacy.

Her research has been supported by numerous industry partners as well as agencies such as the Natural Sciences and Engineering Research Council of Canada, the Social Sciences and Humanities Research Council of Canada and the Ontario Centres of Excellence. She is a Certified Service Oriented Architect (SOA) with Honours and holds a Certified Information Systems Security Professional (CISSP) certification from the International Information Systems Security Certification Consortium (ISC2).   

Dr. Mashatan has an Erdős Number of 2!, external link This is the best a researcher can achieve since 1996 when Paul Erdős passed away.

Security of Internet of Things (IoT), Privacy enhancing technologies, Information Technology Security & Management, Big data and data security, Cryptographic Protocols, Postquantum Cryptography, Security in Ad Hoc Pervasive Networks.

Refereed Journal Articles
M. Edwards, A. Mashatan, and S. Ghose, “A Review of Quantum and Hybrid Quantum / Classical Blockchain Protocols,” Quantum Information Processing, vol. 19, no. 184, pp. 1-22, May 11, 2020. (Q1 in Theoretical Computer Science and IF: 2.433)
M. R. Alagheband, A. Mashatan, and M. Zihayat, “Time-based Gap Analysis of Cybersecurity Trends in Academic and Digital Media,” ACM Transactions on Management Information Systems (Special Issue on Analytics for Cybersecurity and Privacy). (Forthcoming. 21 pages. Submission: September 11, 2019. Acceptance: March 22, 2020) (Q1 in Computer Science)
A. Mashatan, M. Lee, V. Lemieux, and Z. Roberts, “Usurping Double-Ending Fraud in Real Estate Transactions via Blockchain Technology,” Journal of Database Management. (Forthcoming. 34 pages. Submission: May 29, 2019. Acceptance: April 12, 2020, IF: 1.138)
A. Farouk, A. Alahmadi, S.Ghose, and A. Mashatan. “Blockchain platform for industrial healthcare: Vision and future opportunities,” Computer Communications, vol. 154, pp. 223-235, March 15, 2020. (IF: 2.816)
B. Kamiński, L. Kraiński, A. Mashatan, P. Prałat, and P. Szufel, “Multiagent Routing Simulation with Partial Smart Vehicles Penetration,” Journal of Advanced Transportation, vol. 2020, pp. 1-11, March 3, 2020. (Ranked A in Australian Business Deans Council Journal Quality List and IF: 1.670)
M. Demir, O. Turetken, and A. Mashatan, “An Enterprise Transformation Guide for the Inevitable Blockchain Disruption,” IEEE Computer, vol. 53, no. 6, pp. 34-43, June 2020. (IF: 4.419)
A. Mashatan and O. Turetken, “Preparing for the Information Security Threat from Quantum Computers,” MIS Quarterly Executive, vol. 19, no. 2, pp. 157 - 164, May 31, 2020. (Ranked A in Australian Business Deans Council Journal Quality List and IF: 4.088)
H. Abulkasim, A. Farouk, S. Hamad, A. Mashatan, and S. Ghose, “Secure dynamic multiparty quantum private comparison,” Scientific Reports, vol. 9, no. 17818, pp. 1-16, November 28, 2019. (IF: 3.998)
M. Dehghani, A. Mashatan, and R. W. Kennedy, “Innovation within networks – patent strategies for blockchain technology,” Journal of Business & Industrial Marketing, vol. ahead-of-print, no. ahead-of-print, February 14, 2020. (Ranked A in Australian Business Deans Council Journal Quality List and IF: 2.497)
H. Abulkasim, H. Alsuqaih, W. Hamdan, S. Hamad, A. Farouk, A. Mashatan, and S. Ghose, “Improved Dynamic Multi-Party Quantum Private Comparison for Next-Generation Mobile Network,” IEEE Access, vol. 7, pp. 17917-17926, January 21, 2019. (IF: 3.745)
K. Petrenko, A. Mashatan, and F. Shirazi, “Assessing the quantum-resistant cryptographic agility of routing and switching IT network infrastructure in a large-size financial organization,” Journal of Information Security and Applications, vol. 46, pp. 151-163, June 2019. (IF: 2.327)

A. Bay, A. Mashatan, and S. Vaudenay, “Revisiting iterated attacks in the context of decorrelation theory,” Cryptography and Communications, vol. 6, no. 4, pp. 279-311, December 2014.

E. Malekian, A. Mashatan, and A. Zakerolhosseini, “QTRU: Quaternionic Version of the NTRU Public-Key Cryptosystems,” The ISC International Journal of Information Security, vol. 3, no. 1, pp. 29-42, January 2011.

A. Mashatan and D. R. Stinson, “Practical unconditionally secure two-channel message authentication,” Designs, Codes and Cryptography, vol. 55, no. 2-3, pp. 169-188, May 2010.

I. Goldberg, A. Mashatan, and D. R. Stinson, “On message recognition protocols: recoverability and explicit confirmation,” International Journal of Applied Cryptography, vol. 2, no. 2, pp. 100-120, January 2010.

A. Mashatan and D. R. Stinson, “Interactive two-channel message authentication based on Interactive-Collision Resistant hash functions,” International Journal of Information Security, vol. 8, no. 1, pp. 49–60, February 2009.
A. Mashatan and D. R. Stinson, “Non-interactive two-channel message authentication based on hybrid-collision resistant hash functions,” IET Information Security, vol. 1, no. 3, pp. 111-118, September 2007.
Refereed Conference Proceedings  
M.S. Sangari and A. Mashatan. “Blockchain-enabled Supply Chain for Building Resilience Through Exploitation and Exploration: How do Supply Chain Contingencies Affect Adoption Outcomes?” in Proc. Annu. Conf. Admin. Sci. Assoc. Canada (ASAC 2020), June 12-15, 2020.  
M.S. Sangari and A. Mashatan. “Towards a Predictive Model of Blockchain-based Medical Records Adoption: How do Technology Readiness and Initial Trust Affect Behavioral Intentions?” in Proc. Annu. Conf. Admin. Sci. Assoc. Canada (ASAC 2020), June 12-15, 2020.  
B. Kaminski, L. Kraiński, A. Mashatan, P. Pralat, and P. Szufel. “Multi-agent routing simulation with partial smart vehicles penetration” in Proc. Transp. Sci. & Logistics (TSL) 2nd Triennial Conf., May 27-29, 2020.  
A. Gruzd, D. Abul-Fottouh, and A. Mashatan, “Who is Influencing the #GDPR Discussion on Twitter: Implications for Public Relations” in Proc. 2020 HICSS Conf., (Grand Wailea, HI, USA), January 7, 2020.  
M. Demir, A. Mashatan, O. Turetken, and A. Ferworn,Utility Blockchain for Transparent Disaster Recovery” in Proc. 2018 IEEE Elec. Power and Energy Conf. (EPEC), (Toronto, ON, Canada), January 3, 2019, pp. 1-6.  
A. Mashatan and Z. Roberts, “An Enhanced Real Estate Transaction Process Based on Blockchain Technology” in Proc. 23rd Americas Conf. Info. Sys. (AMCIS), (Boston, MA, USA), May 17, 2017, pp. 11-17.  
A. Mashatan and S. Vaudenay, “Fully Dynamic Universal Accumulators” in Proc. Romanian Crypto. Conf., (Bucharest, Romania), January 2013, pp. 269-285.  
A. Bay, A. Mashatan, and S. Vaudenay, “Resistance Against Iterated Attacks by Decorrelation Theory, Revisited” in Proc. CRYPTO, (Santa Barba, CA, USA), August 2012, pp. 741-757.  
A. Bay, A. Mashatan, and S. Vaudenay, Resistance against Adaptive Plaintext-Ciphertext Iterated Distinguishers” in Proc. INDOCRYPT, (New Delhi, India), December 2012, pp. 528-544.  
A. Mashatan and K. Ouafi, “Forgery-Resilience for Digital Signature Schemes: A new paradigm for practical digital signature schemes exhibiting desirable legislative properties” in Proc. 7th ACM Symp. Inf., Comput. and Comm. Security, AsiaCCS, (Seoul, South Korea), May 2012, pp. 24-46.  
A. Mashatan and K. Ouafi, “Efficient Fail-Stop Signatures from the Factoring Assumption” in Proc. 14th Inf. Sec. Conf. (ISC 2011), (Xi’an, China), October 2011, pp. 372-385.  
A. Mashatan and S. Vaudenay, “A Message Recognition Protocol Based on Standard Assumptions” in Jianying Zhou and Moti Yung (Eds.), in Proc. Applied Crypto. and Net. Sec. (ACNS), (Beijing, China), June 2010, pp. 384-401.  
I. Goldberg, A. Mashatan, and D. R. Stinson, “A new message recognition protocol with self-recoverability for ad hoc pervasive networks” in Michel Abdalla, David Pointcheval, Pierre-Alain Fouque, and Damien Vergnaud (Eds.), in Proc. Applied Crypto. and Net. Sec. (ACNS), (Paris-Rocquencourt, France), May 2009, pp. 219-237.  
A. Mashatan and D. R. Stinson, “A new message recognition protocol for ad hoc pervasive networks” in M. K. Franklin, L. C. K. Hui and D. S. Wong (Eds.), in Proc. Crypto. and Net. Sec.,7th Int. Conf. (CANS), (Hong-Kong, China), December 2008, pp. 378-394.  
Patents and Invention Disclosures
Mosaïque: A Fully Decentralized and Data-driven Identity and Credential Management System for Business Environments by D. McKay and A. Mashatan. (2020, May 3).
Quantum-Resistant Augmented Key/Data Encapsulation Mechanism Encryption Algorithm (QUAKE) by B. Goncalvez and A. Mashatan. (2019, Jan. 25).
Method and apparatus for providing efficient management of certificate revocation by A. Mashatan, I. Aad, S. Vaudenay, P. V. Niemi, and R. Chaabouni. (2015). US 9083535 B2 [Online] Available: , external link, external link

Atefeh Mashatan and Serge Vaudenay (2013), Fully Dynamic Universal Accumulators. Proceedings of the Romanian Academy, vol. 14: 269-285.

Jean-Philippe Aumasson, Atefeh Mashatan, and Willi Meier (2009), More on Shabal’s permutation. Official Comment - NIST Hash Competition.

Atefeh Mashatan (2008), Do student ratings of mathematics professors in research universities tend to discriminate against female instructors? 19 pages. This paper was a research project and a requirement for Certificate In University Teaching, Centre for Teaching Excellence, Waterloo, Ontario.


Course Code Course Title

Directed Reading: User Acceptability of cryptocurrencies using Twitter data


Directed Readings: Quantum Computing Threat to Information and Communication Technologies


Directed Reading: Intellectual Property and Blockchain Technology Innovations


Course Code Course Title
ITM 805

Enterprise Information Security

ITM 820 Information Systems Security and Privacy
ITM 706 Enterprise Architecture


  • Cryptography and Security
  • Advanced Security
  • Introduction to Graph Theory
  • Math Discovery and Innovation
  • Applied Cryptography
  • Calculus II for Engineers
  • Math of Public-Key Cryptography
  • Discrete Math for Engineers
  • Combinatorial Enumeration
  • Introduction to Combinatorics
Grant or Project Title Year Amount

Principal Investigator - Mitacs Accelerate, “Security Analysis of POLARIS”

2020-2021 $60,000

Principal Investigator - Mitacs, “Research Training Award”

2020 $6,000

Principal Investigator - Ripple Inc., “University Blockchain Research Initiative”

2020-2021 $100,000 USD (approx. $136,210 CAD)

Principal Investigator - SSHRC Explore, “Desired Enhancement of Privacy Involvement: An Investigation of Smartphone Users towards Protecting and Disclosing Information”

2020-2021 $7,000

Principal Investigator - NRC IRAP / ITEA, “Interoperable Distributed Ledger Technologies (I-DELTA) Blockchain Project”

2020-2023 $348,000

Principal Investigator - Ontario Center of Excellence (OCE) VIP, “Development and Deployment of Policy and Infrastructure on IoT Security Monitoring”

2020-2021 $52,000

Principal Investigator - NSERC Engage Grant, “Sizing the Y2Q Problem”

2019-2020 $25,000

Principal Investigator - NSERC Discovery Grant and Launch Supplement Grant, “Enhancing Data Security and Privacy for IoT Devices”

2019-2024 $152,000

Principal Investigator - NSERC Collaborative Research and Development Grant, “Quantum-Resistance and Efficiency of Communications in Connected and Autonomous Vehicles”

2019-2023 $676,000

Principal Investigator - SSHRC Insight Grant, “Barriers and Opportunities in Blockchain Technology Adoption”

2019-2021 $42,600

Principal Investigator - Fields Institute for Research in Mathematical Sciences, “Security and Efficiency of Communication in Smart Connected Cars”

2018-2020 $240,000

Principal Investigator - NXM Inc Technologies, “Crypto-agility of Post Quantum 5G IoT Devices”

2018-2023 $322,500

Principal Investigator - NSERC Undergraduate Student Research Assistant Program, “IoT Identity Management”

2019 $7,000

Principal Investigator - Ontario Center of Excellence (OCE) VIP - Total Funding, “Costing Analysis of Large Scale Cryptographic Changes”

2016-2017 $30,000
  • PhD, Mathematics, University of Waterloo
  • MMath, University of Waterloo
  • BMath, Carleton University
  • Certificate in University Teaching, University of Waterloo
  • Certified Information Systems Security Professional (CISSP)
  • Certified Service Oriented Architect (SOA) with Honours
Presenting the Winners of the 2020 Enterprise Blockchain Awards, external link” - Blockchain Research Institute - July 08, 2020
Putting cybercriminals on notice” - Ryerson University Magazine - February 04, 2019
“Diversifying the Cybersecurity Industry”, external link - The Eyeopener - October 29, 2019
“Academia is playing a growing role in cybersecurity”, external link - University Affairs - September 16, 2019
“Women in Security: Women of Influence”, external link - SC Magazine - July 01, 2019
“Ryerson tackles quantum threat: Cybersecurity researcher works with industry on security technology” - Ryerson Today - May 23, 2019
“CBC Interview: Meegan Read & Dr. A Mashatan Marriott Breach”, external link - CBC Radio - December 10, 2018
“Diving into the Hype Surrounding Blockchain Technology in the Language Translation Industry”, external link - GlobalEyes - August 22, 2018
“Blockchain: The solution to real estate fraud” - Innovation - December 10, 2017
"Companies see cyber threat, but security spending tight", external link, opens in new window - National Post - May 30, 2017
"Be ‘vigilant’ online Cyber attack a wake-up call for KLers", external link - Northern News - May 16, 2017
"WannaCry ransomware: Is the GTA at risk?", external link - CTV News Toronto - May 16, 2017
"Experts cite security gaps as ‘WannaCry’ attacks abate", external link - Globe & Mail - May 16, 2017
"What you need to know about WannaCry ransomware", external link - Inside Toronto - May 15, 2017
"It’s a fluke Canada was largely spared from massive WannaCry cyber attack, expert says", external link - National Post - May 15, 2017
"Oshawa hospital among thousands of global ‘ransomware’ cyberattack victims", external link - CBC News - May 14, 2017

"We were lucky’: massive cyberextortion attack could have affected Canada", external link - National Post - May 13, 2017

Story was picked by 41 news outlets including:

"San Francisco transit system hijacked by ransomware attack", external link - CBC News - November 29, 2016
"Metrolinx making ‘significant investments’ to protect Presto from hackers", external link - CBC News - November 20, 2016
"How can you tell if you’ve fallen victim to a credit card sequencing scam?", external link - City News - October 13, 2016