Volume 15 (2023)
Volume 14 (2022)
Volume 13 (2021)
Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
Number of Articles: 8
Editorial
Volume 9, Issue 2 , July 2017, Pages 99-100
Abstract
From the Editor-in-Chief Read MoreOn the computational complexity of finding a minimal basis for the guess and determine attack
Volume 9, Issue 2 , July 2017, Pages 101-110
Abstract
Guess-and-determine attack is one of the general attacks on stream ciphers. It is a common cryptanalysis tool for evaluating security of stream ciphers. The effectiveness of this attack is based on the number of unknown bits which will be guessed by the attacker to break the cryptosystem. In this work, ... Read MoreAn efficient secure channel coding scheme based on polar codes
Volume 9, Issue 2 , July 2017, Pages 111-118
Abstract
In this paper, we propose a new framework for joint encryption encoding scheme based on polar codes, namely efficient and secure joint secret key encryption channel coding scheme. The issue of using new coding structure, i.e. polar codes in Rao-Nam (RN) like schemes is addressed. Cryptanalysis methods ... Read MoreA new CPA resistant software implementation for symmetric ciphers with smoothed power consumption: SIMON case study
Volume 9, Issue 2 , July 2017, Pages 119-130
Abstract
In this paper we propose a new method for applying hiding countermeasure against CPA attacks. This method is for software implementation, based on smoothing power consumption of the device. This method is evaluated on the SIMON scheme as a case study; however, it is not relying on any specific SIMON ... Read MoreCipher text only attack on speech time scrambling systems using correction of audio spectrogram
Volume 9, Issue 2 , July 2017, Pages 131-145
Abstract
Recently permutation multimedia ciphers were broken in a chosen-plaintext scenario. That attack models a very resourceful adversary which may not always be the case. To show insecurity of these ciphers, we present a cipher-text only attack on speech permutation ciphers. We show inherent redundancies ... Read MorePhishing website detection using weighted feature line embedding
Volume 9, Issue 2 , July 2017, Pages 147-159
Abstract
The aim of phishing is tracing the users' s private information without their permission by designing a new website which mimics the trusted website. The specialists of information technology do not agree on a unique definition for the discriminative features that characterizes the phishing websites. ... Read MoreAnalyzing new features of infected web content in detection of malicious web pages
Volume 9, Issue 2 , July 2017, Pages 161-181
Abstract
Recent improvements in web standards and technologies enable the attackers to hide and obfuscate infectious codes with new methods and thus escaping the security filters. In this paper, we study the application of machine learning techniques in detecting malicious web pages. In order to detect malicious ... Read MorePersian Abstract
Volume 9, Issue 2 , July 2017, Pages 183-189