Volume 15 (2023)
Volume 14 (2022)
Volume 13 (2021)
Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
Number of Articles: 8
Editorial
Volume 8, Issue 1 , January 2016, Pages 1-2
Abstract
From the Editor-in-Chief Read MoreA short introduction to two approaches in formal verification of security protocols: model checking and theorem proving
Volume 8, Issue 1 , January 2016, Pages 3-24
Abstract
In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in ... Read MoreOn the design and security of a lattice-based threshold secret sharing scheme
Volume 8, Issue 1 , January 2016, Pages 25-38
Abstract
In this paper, we introduce a method of threshold secret sharing scheme (TSSS) in which secret reconstruction is based on Babai's nearest plane algorithm. In order to supply secure public channels for transmitting shares to parties, we need to ensure that there are no quantum threats to these channels. ... Read MoreAggrandizing the beast's limbs: patulous code reuse attack on ARM architecture
Volume 8, Issue 1 , January 2016, Pages 39-52
Abstract
Since smartphones are usually personal devices full of private information, they are a popular target for a vast variety of real-world attacks such as Code Reuse Attack (CRA). CRAs enable attackers to execute any arbitrary algorithm on a device without injecting an executable code. Since the standard ... Read MoreSelf authentication path insertion in FPGA-based design flow for tamper-resistant purpose
Volume 8, Issue 1 , January 2016, Pages 53-60
Abstract
FPGA platforms have been widely used in many modern digital applications due to their low prototyping cost, short time-to-market and flexibility. Field-programmability of FPGA bitstream has made it as a flexible and easy-to-use platform. However, access to bitstream degraded the security of FPGA IPs ... Read MoreUnauthenticated event detection in wireless sensor networks using sensors co-coverage
Volume 8, Issue 1 , January 2016, Pages 61-71
Abstract
Wireless Sensor Networks (WSNs) offer inherent packet redundancy since each point within the network area is covered by more than one sensor node. This phenomenon, which is known as sensors co-coverage, is used in this paper to detect unauthenticated events. Unauthenticated event broadcasting in a WSN ... Read MoreA new method for accelerating impossible differential cryptanalysis and its application on LBlock
Volume 8, Issue 1 , January 2016, Pages 73-84
Abstract
Impossible differential cryptanalysis, the extension of differential cryptanalysis, is one of the most efficient attacks against block ciphers. This cryptanalysis method has been applied to most of the block ciphers and has shown significant results. Using structures, key schedule considerations, early ... Read MorePersian Abstract
Volume 8, Issue 1 , January 2016, Pages 85-90