Volume 13 (2021)
Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
1. NETRU: A Non-commutative and Secure Variant of CTRU Cryptosystem

Reza Ebrahimi Atani; Shahabaddin Ebrahimi Atani; A. Hassani Karbasi

Volume 10, Issue 1 , Winter and Spring 2018, , Pages 45-53


  In this paper we present a new finite field-based public key cryptosystem(NETRU) which is a non-commutative variant of CTRU. The original CTRU is defined by the ring of polynomials in one variable over a finite field F2. This system works in the ring R = F2[x]=hxN 􀀀 1i and is already broken ...  Read More

2. EEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations

R. Ebrahimi Atani; Sh. Ebrahimi Atani; A. Hassani Karbasi

Volume 7, Issue 2 , Summer and Autumn 2015, , Pages 115-126


  GGH class of public-key cryptosystems relies on computational problems based on the closest vector problem (CVP) in lattices for their security. The subject of lattice based cryptography is very active and there have recently been new ideas that revolutionized the field. We present EEH, a GGH-Like public ...  Read More

3. Improving Tor security against timing and traffic analysis attacks with fair randomization

A. Tavakoly; R. Ebrahimi Atani

Volume 6, Issue 1 , Winter and Spring 2014, , Pages 67-76


  The Tor network is probably one of the most popular online anonymity systems in the world. It has been built based on the volunteer relays from all around the world. It has a strong scientific basis which is structured very well to work in low latency mode that makes it suitable for tasks such as web ...  Read More