Volume 13 (2021)
Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
Research Article
2. A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving

M. Pourpouneh; R. Ramezanian

Volume 8, Issue 1 , Winter and Spring 2016, Pages 3-24


  In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in ...  Read More

Research Article
3. On the design and security of a lattice-based threshold secret sharing scheme

H. R. Amini Khorasgani; S. Asaad; H. Pilaram; T. Eghlidos; M. R. Aref

Volume 8, Issue 1 , Winter and Spring 2016, Pages 25-38


  In this paper, we introduce a method of threshold secret sharing scheme (TSSS) in which secret reconstruction is based on Babai's nearest plane algorithm. In order to supply secure public channels for transmitting shares to parties, we need to ensure that there are no quantum threats to these channels. ...  Read More

Research Article
4. Aggrandizing the beast's limbs: patulous code reuse attack on ARM architecture

F. Aminmansour; H. R. Shahriari

Volume 8, Issue 1 , Winter and Spring 2016, Pages 39-52


  Since smartphones are usually personal devices full of private information, they are a popular target for a vast variety of real-world attacks such as Code Reuse Attack (CRA). CRAs enable attackers to execute any arbitrary algorithm on a device without injecting an executable code. Since the standard ...  Read More

Research Article
5. Self authentication path insertion in FPGA-based design flow for tamper-resistant purpose

Sh. Zamanzadeh; A. Jahanian

Volume 8, Issue 1 , Winter and Spring 2016, Pages 53-60


  FPGA platforms have been widely used in many modern digital applications due to their low prototyping cost, short time-to-market and flexibility. Field-programmability of FPGA bitstream has made it as a flexible and easy-to-use platform. However, access to bitstream degraded the security of FPGA IPs ...  Read More

Research Article
6. Unauthenticated event detection in wireless sensor networks using sensors co-coverage

M. Kamarei; A. Patooghy; M. Fazeli

Volume 8, Issue 1 , Winter and Spring 2016, Pages 61-71


  Wireless Sensor Networks (WSNs) offer inherent packet redundancy since each point within the network area is covered by more than one sensor node. This phenomenon, which is known as sensors co-coverage, is used in this paper to detect unauthenticated events. Unauthenticated event broadcasting in a WSN ...  Read More

Research Article
7. A new method for accelerating impossible differential cryptanalysis and its application on LBlock

A. Khalesi; H. Bahramgiri; D. Mansuri

Volume 8, Issue 1 , Winter and Spring 2016, Pages 73-84


  Impossible differential cryptanalysis, the extension of differential cryptanalysis, is one of the most efficient attacks against block ciphers. This cryptanalysis method has been applied to most of the block ciphers and has shown significant results. Using structures, key schedule considerations, early ...  Read More