Volume 16 (2024)
Volume 15 (2023)
Volume 14 (2022)
Volume 13 (2021)
Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
Post Quantum Digital Signature Based on the McEliece Cryptosystems with Dual Inverse Matrix

Farshid Haidary Makoui; Thomas Aaron Gulliver; Mohammad Dakhilalian

Volume 15, Issue 3 , October 2023, , Pages 101-108

https://doi.org/10.22042/isecure.2023.419559.1026

Abstract
  Digital signatures are used to ensure legitimate access through identity authentication. They are also used in blockchains and to authenticate transactions. Code-based digital signatures are not widely used due to their complexity. This paper presents a new code-based signature algorithm withlower complexity ...  Read More

Revisiting the Security and Efficiency of SP2DAS, 3PDA, and EPPA Smart Grid Security Protocols

Hamid Amiryousefi; Zahra Ahmadian

Volume 14, Issue 2 , July 2022, , Pages 157-165

https://doi.org/10.22042/isecure.2022.275064.645

Abstract
  This paper analyses the security and efficiency of some notable privacy preserving data aggregation schemes, SP2DAS, 3PDA, and EPPA. For SP2DAS and 3PDA schemes, We show that despite the designers’ claims, there are efficient forgery attacks on the signature scheme used. We present aselective forgery ...  Read More