Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
1. Extension of Cube Attack with Probabilistic Equations and its Application on Cryptanalysis of KATAN Cipher

Zahra Eskandari; Abbas Ghaemi Bafghi

Volume 12, Issue 1 , Winter and Spring 2020, , Pages 1-12


  Cube Attack is a successful case of Algebraic Attack. Cube Attack consists of two phases, linear equation extraction and solving the extracted equation system. Due to the high complexity of equation extraction phase in finding linear equations, we can extract nonlinear ones that could be approximated ...  Read More

2. A confidence-aware interval-based trust model

H. Shakeri; A. Ghaemi Bafghi

Volume 4, Issue 2 , Summer and Autumn 2012, , Pages 151-165


  It is a common and useful task in a web of trust to evaluate the trust value between two nodes using intermediate nodes. This technique is widely used when the source node has no experience of direct interaction with the target node, or the direct trust is not reliable enough by itself. If trust is used ...  Read More