Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
1. Cryptanalysis of GSM encryption algorithm A5/1

V. Amin Ghafari; A. Vardasbi; J. Mohajeri

Volume 4, Issue 2 , Summer and Autumn 2012, , Pages 107-114

http://dx.doi.org/10.22042/isecure.2013.4.2.2

Abstract
  The A5/1 algorithm is one of the most famous stream cipher algorithms used for over-the-air communication privacy in GSM. The purpose of this paper is to analyze several weaknesses of A5/1, including an improvement to an attack and investigation of the A5/1 state transition. Biham and Dunkelman proposed ...  Read More

2. On the multi _ chi-square tests and their data complexity

A. Vardasbi; M. Salmasizadeh; J. Mohajeri

Volume 4, Issue 1 , Winter and Spring 2012, , Pages 15-24

http://dx.doi.org/10.22042/isecure.2015.4.1.3

Abstract
  Chi-square tests are generally used for distinguishing purposes; however when they are combined to simultaneously test several independent variables, extra notation is required. In this study, the chi-square statistics in some previous works is revealed to be computed half of its real value. Therefore, ...  Read More