مرور Volume 15, Issue 2 بر اساس تاریخ انتشار

  • Towards Event Aggregation for Reducing the Volume of Logged Events During IKC Stages of APT Attacks 

    Ahmadian Ramaki, Ali؛ Ghaemi-Bafghi, Abbas؛ Rasoolzadegan, Abbas (Iranian Society of Cryptology, 2023-07-01)
    Nowadays, targeted attacks like Advanced Persistent Threats (APTs) has become one of the major concern of many enterprise networks. As a common approach to counter these attacks, security staff deploy a variety of heterogeneous ...

  • A Fragile Watermarking by Hamming Code on Distributed Pixels with Perfect Recovery for Small Tampers 

    Rasouli, Faeze؛ Taheri, Mohammad؛ Rohani Sarvestani, Reza (Iranian Society of Cryptology, 2023-07-01)
    Fragile watermarking is the task of embedding a watermark in a media (an image in this paper) such that even small changes, called tamper, can be detected or even recovered to prevent unauthorized alteration. A well-known ...

  • An Auto-Encoder based Membership Inference Attack against Generative Adversarial Network 

    Azadmanesh, Maryam؛ Shahgholi Ghahfarokhi, Behrouz؛ Ashouri-Talouki, Maede (Iranian Society of Cryptology, 2023-07-01)
    Using generative models to produce unlimited synthetic samples is a popular replacement for database sharing. Generative Adversarial Network (GAN) is a popular class of generative models which generates synthetic data ...

  • Secure Outsourcing of Two Standard Identity-Based Cryptosystems 

    Mala, Hamid؛ Saeidi, Mohammad Reza (Iranian Society of Cryptology, 2023-07-01)
    In the last two decades bilinear pairings have found many applications in cryptography. Meanwhile identity-based cryptosystems based on bilinear pairings have received particular attention. The IEEE, IETF, and ISO organizations ...

  • Reverse Engineering of Authentication Protocol in DesFire 

    Labbafniya, Mansoureh؛ Yusefi, Hamed؛ Khalesi, Akram (Iranian Society of Cryptology, 2023-07-01)
    Nowadays contactless smart cards are extensively used in applications that need strong authentication and security feature protection. Among different cards from different companies, MIFARE DESFire cards are one of the ...

  • Oblivious Transfer Using Generalized Jacobian of Elliptic Curves 

    Rezaei Kashi, Maryam؛ Bahramian, Mojtaba (Iranian Society of Cryptology, 2023-07-01)
    ‎Oblivious transfer is one of the important tools in cryptography‎, ‎in which a sender sends a message to a receiver with a probability between 0 and 1‎, ‎while the sender remains oblivious that the receiver has received ...

  • Analysis of IOTA Tangle Stability in High Transaction Rates 

    Yajam, Habibullah؛ Akhaee, Mohammad Ali (Iranian Society of Cryptology, 2023-07-01)
    The future of the IoT requires new methods of payment that can handle millions of transactions per second. IOTA cryptocurrency aims at providing such a solution. It uses a consensus algorithm based on directed acyclic ...

  • MISC: Multi-Input Secure Two-Party Computation 

    Taheri Ardakani, Farhad؛ Bayat Sarmadi, Siavash (Iranian Society of Cryptology, 2023-07-01)
    Secure multi-party computation (MPC) allows a group of parties to compute a function on their private inputs securely. Classic MPC protocols for two parties use either Yao's garbled circuit (GC) or the Goldreich-Micali-Wigderson ...