Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
ORIGINAL RESEARCH PAPER
2. On the computational complexity of finding a minimal basis for the guess and determine attack

Sh. Khazaei; F. Moazami

Volume 9, Issue 2 , Summer and Autumn 2017, Pages 101-110

http://dx.doi.org/10.22042/isecure.2017.79681.373

Abstract
  Guess-and-determine attack is one of the general attacks on stream ciphers. It is a common cryptanalysis tool for evaluating security of stream ciphers. The effectiveness of this attack is based on the number of unknown bits which will be guessed by the attacker to break the cryptosystem. In this work, ...  Read More

ORIGINAL RESEARCH PAPER
3. An efficient secure channel coding scheme based on polar codes

B. Mafakheri; T. Eghlidos; H. Pilaram

Volume 9, Issue 2 , Summer and Autumn 2017, Pages 111-118

http://dx.doi.org/10.22042/isecure.2017.84609.380

Abstract
  In this paper, we propose a new framework for joint encryption encoding scheme based on polar codes, namely efficient and secure joint secret key encryption channel coding scheme. The issue of using new coding structure, i.e. polar codes in Rao-Nam (RN) like schemes is addressed. Cryptanalysis methods ...  Read More

ORIGINAL RESEARCH PAPER
4. A new CPA resistant software implementation for symmetric ciphers with smoothed power consumption: SIMON case study

M. Safaei Pour; M. Salmasizadeh

Volume 9, Issue 2 , Summer and Autumn 2017, Pages 119-130

http://dx.doi.org/10.22042/isecure.2017.82990.376

Abstract
  In this paper we propose a new method for applying hiding countermeasure against CPA attacks. This method is for software implementation, based on smoothing power consumption of the device. This method is evaluated on the SIMON scheme as a case study; however, it is not relying on any specific SIMON ...  Read More

ORIGINAL RESEARCH PAPER
5. Cipher text only attack on speech time scrambling systems using correction of audio spectrogram

H. Ghasemzadeh; M. Tajik Khasss; H. Mehrara

Volume 9, Issue 2 , Summer and Autumn 2017, Pages 131-145

Abstract
  Recently permutation multimedia ciphers were broken in a chosen-plaintext scenario. That attack models a very resourceful adversary which may not always be the case. To show insecurity of these ciphers, we present a cipher-text only attack on speech permutation ciphers. We show inherent redundancies ...  Read More

ORIGINAL RESEARCH PAPER
6. Phishing website detection using weighted feature line embedding

M. Imani; Gh. A. Montazer

Volume 9, Issue 2 , Summer and Autumn 2017, Pages 147-159

http://dx.doi.org/10.22042/isecure.2017.83439.377

Abstract
  The aim of phishing is tracing the users' s private information without their permission by designing a new website which mimics the trusted website. The specialists of information technology do not agree on a unique definition for the discriminative features that characterizes the phishing websites. ...  Read More

ORIGINAL RESEARCH PAPER
7. Analyzing new features of infected web content in detection of malicious web pages

J. Hajian Nezhad; Majid Vafaei Jahan; M. Tayarani-N; Z. Sadrnezhad

Volume 9, Issue 2 , Summer and Autumn 2017, Pages 161-181

http://dx.doi.org/10.22042/isecure.2017.9.2.2

Abstract
  Recent improvements in web standards and technologies enable the attackers to hide and obfuscate infectious codes with new methods and thus escaping the security filters. In this paper, we study the application of machine learning techniques in detecting malicious web pages. In order to detect malicious ...  Read More