Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
Research Article
1. Extension of Cube Attack with Probabilistic Equations and its Application on Cryptanalysis of KATAN Cipher

Zahra Eskandari; Abbas Ghaemi Bafghi

Volume 12, Issue 1 , Winter and Spring 2020, Pages 1-12

http://dx.doi.org/10.22042/isecure.2020.199304.481

Abstract
  Cube Attack is a successful case of Algebraic Attack. Cube Attack consists of two phases, linear equation extraction and solving the extracted equation system. Due to the high complexity of equation extraction phase in finding linear equations, we can extract nonlinear ones that could be approximated ...  Read More

Research Article
2. Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants

Majid Mahmoudzadeh Niknam; Sadegh Sadeghi; Mohammad Reza Aref; Nasour Bagheri

Volume 12, Issue 1 , Winter and Spring 2020, Pages 13-23

http://dx.doi.org/10.22042/isecure.2020.199099.480

Abstract
  In this paper, we present some attacks on GAGE, InGAGE, and CiliPadi which are candidates of the first round of the NIST-LWC competition. GAGE and InGAGE are lightweight sponge based hash function and Authenticated Encryption with Associated Data (AEAD), respectively and support different sets of parameters. ...  Read More

Research Article
3. New High Secure Network Steganography Method Based on Packet Length

Vajiheh Sabeti; Minoo Shoaei

Volume 12, Issue 1 , Winter and Spring 2020, Pages 24-44

http://dx.doi.org/10.22042/isecure.2020.194573.475

Abstract
  In network steganography methods based on packet length, the length of the packets is used as a carrier for exchanging secret messages. Existing methods in this area are vulnerable against detections due to abnormal network traffic behaviors. The main goal of this paper is to propose a method which has ...  Read More

Research Article
4. Improved Univariate Microaggregation for Integer Values

Reza Mortazavi

Volume 12, Issue 1 , Winter and Spring 2020, Pages 35-43

http://dx.doi.org/10.22042/isecure.2019.185397.465

Abstract
  Privacy issues during data publishing is an increasing concern of involved entities. The problem is addressed in the field of statistical disclosure control with the aim of producing protected datasets that are also useful for interested end users such as government agencies and research communities. ...  Read More

Research Article
5. Anomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism

Shahriar Mohammadi; Amin Namadchian

Volume 12, Issue 1 , Winter and Spring 2020, Pages 44-54

http://dx.doi.org/10.22042/isecure.2020.199009.479

Abstract
  Today, the use of the Internet and Internet sites has been an integrated part of the people’s lives, and most activities and important data are in the Internet websites. Thus, attempts to intrude into these websites have grown exponentially. Intrusion detection systems (IDS) of web attacks are ...  Read More

Research Article
6. Modified Sliding-Mode Control Method for Synchronization a Class of Chaotic Fractional-Order Systems with Application in Encryption

Bashir Naderi; Hossein Kheiri; Vajiheh Vafaei

Volume 12, Issue 1 , Winter and Spring 2020, Pages 55-66

http://dx.doi.org/10.22042/isecure.2019.156417.439

Abstract
  In this study, we propose a secure communication scheme based on the synchronization of two identical fractional-order chaotic systems. The fractional-order derivative is in Caputo sense, and for synchronization, we use a robust sliding-mode control scheme. The designed sliding surface is taken simply ...  Read More