Volume 13 (2021)
Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
Number of Articles: 216
1. Editorial
Volume 5, Issue 1 , Winter and Spring 2013, , Pages 1-3
Abstract
From the Editor-in-Chief Read More2. Editorial
Volume 6, Issue 1 , Winter and Spring 2014, , Pages 1-2
Abstract
From the Editor-in-Chief Read More3. Editorial
Volume 1, Issue 1 , Winter and Spring 2009, , Pages 1-2
Abstract
From the Editor-in-Chief Read More4. Editorial
Volume 2, Issue 1 , Winter and Spring 2010, , Pages 1-2
Abstract
From the Editor-in-Chief Read More5. Editorial
Volume 3, Issue 1 , Winter and Spring 2011, , Pages 1-2
Abstract
From the Editor-in-Chief Read More6. Editorial
Volume 4, Issue 1 , Winter and Spring 2012, , Pages 1-2
Abstract
From the Editor-in-Chief Read More7. Editorial
Volume 7, Issue 1 , Winter and Spring 2015, , Pages 1-2
Abstract
From the Editor-in-Chief Read More8. Editorial
Volume 8, Issue 1 , Winter and Spring 2016, , Pages 1-2
Abstract
From the Editor-in-Chief Read More9. Editorial
Volume 9, Issue 1 , Winter and Spring 2017, , Pages 1-2
Abstract
From the Editor-in-Chief Read More10. Editorial
Volume 10, Issue 1 , Winter and Spring 2018, , Pages 1-2
Abstract
From the Editor-in-Chief Read More11. Editorial
Volume 11, Issue 1 , Winter and Spring 2019, , Pages 1-2
Abstract
From the Editor-in-Chief Read More12. Extension of Cube Attack with Probabilistic Equations and its Application on Cryptanalysis of KATAN Cipher
Volume 12, Issue 1 , Winter and Spring 2020, , Pages 1-12
Abstract
Cube Attack is a successful case of Algebraic Attack. Cube Attack consists of two phases, linear equation extraction and solving the extracted equation system. Due to the high complexity of equation extraction phase in finding linear equations, we can extract nonlinear ones that could be approximated ... Read More13. OT-Feature Extraction on Scrambled Images with Instantaneous Clustering for CBIR Scheme in Cloud Computing
Volume 13, Issue 1 , Winter and Spring 2021, , Pages 1-17
Abstract
A novel feature extraction algorithm using Otsu’s Threshold (OT-features) on scrambled images and the Instantaneous Clustering (IC-CBIR) approach is proposed for Content-Based Image Retrieval in cloud computing. Images are stored in the cloud in an encrypted or scrambled form to preserve the privacy ... Read More14. Editorial
Volume 2, Issue 2 , Summer and Autumn 2010, , Pages 67-68
Abstract
From the Editor-in-Chief Read More15. Editorial
Volume 3, Issue 2 , Summer and Autumn 2011, , Pages 67-68
Abstract
From the Editor-in-Chief Read More16. CPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking
Volume 12, Issue 2 , Summer and Autumn 2020, , Pages 67-80
Abstract
Authenticated encryption schemes are important cryptographic primitives that received extensive attention recently. They can provide both confidentiality and authenticity services, simultaneously. Correlation power analysis (CPA) can be a thread for authenticated ciphers, similar to the any physical ... Read More17. Editorial
Volume 1, Issue 2 , Summer and Autumn 2009, , Pages 69-70
Abstract
From the Editor-in-Chief Read More18. Editorial
Volume 10, Issue 2 , Summer and Autumn 2018, , Pages 77-78
Abstract
From the Editor-in-Chief Read More19. Editorial
Volume 7, Issue 2 , Summer and Autumn 2015, , Pages 89-90
Abstract
From the Editor-in-Chief Read More20. Editorial
Volume 8, Issue 2 , Summer and Autumn 2016, , Pages 91-92
Abstract
From the Editor-in-Chief Read More21. Editorial
Volume 11, Issue 2 , Summer and Autumn 2019, , Pages 93-94
Abstract
From the Editor-in-Chief Read More22. Editorial
Volume 4, Issue 2 , Summer and Autumn 2012, , Pages 95-96
Abstract
From the Editor-in-Chief Read More23. Editorial
Volume 6, Issue 2 , Summer and Autumn 2014, , Pages 97-98
Abstract
From the Editor-in-Chief Read More24. Editorial
Volume 9, Issue 2 , Summer and Autumn 2017, , Pages 99-100
Abstract
From the Editor-in-Chief Read More25. Editorial
Volume 5, Issue 2 , Summer and Autumn 2013, , Pages 117-118