Volume 16 (2024)
Volume 15 (2023)
Volume 14 (2022)
Volume 13 (2021)
Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
Secure and Low-Area Implementation of the AES Using FPGA

Muhamadali Hajisoltani; Raziyeh Salarifard; Hadi Soleimany

Volume 14, Issue 3 , October 2022, , Pages 93-99

https://doi.org/10.22042/isecure.2022.14.3.0

Abstract
  Masking techniques are used to protect the hardware implementation of cryptographic algorithms against side-channel attacks. Reconfigurable hardware, such as FPGA, is an ideal target for the secure implementation of cryptographic algorithms. Due to the restricted resources available to the reconfigurable ...  Read More

Evict+Time Attack on Intel CPUs without Explicit Knowledge of Address Offsets

Vahid Meraji; Hadi Soleimany

Volume 13, Issue 1 , January 2021, , Pages 19-27

https://doi.org/10.22042/isecure.2020.209945.500

Abstract
  Numerous studies have been conducted to present new attacks using the time difference between the processor access to main memory and cache memory. Access-driven attacks are a series of cache-based attacks using fewer measurement samples to extract sensitive key values due to the ability of the attacker ...  Read More

Enhanced Flush+Reload Attack on AES

Milad Seddigh; Hadi Soleimany

Volume 12, Issue 2 , July 2020, , Pages 81-89

https://doi.org/10.22042/isecure.2020.219248.519

Abstract
  In cloud computing, multiple users can share the same physical machine that can potentially leak secret information, in particular when the memory de-duplication is enabled. Flush+Reload attack is a cache-based attack that makes use of resource sharing. T-table implementation of AES is commonly used ...  Read More

Impossible Differential Cryptanalysis on Deoxys-BC-256

F. Moazami; A.R. Mehrdad; H. Soleimany

Volume 10, Issue 2 , July 2018, , Pages 93-105

https://doi.org/10.22042/isecure.2018.114245.405

Abstract
  Deoxys is a final-round candidate of the CAESAR competition. Deoxys is built upon an internal tweakable block cipher Deoxys-BC, where in addition to the plaintext and key, it takes an extra non-secret input called a tweak. This paper presents the first impossible differential cryptanalysis of Deoxys-BC-256 ...  Read More