مرور Volume 15, Issue 3 بر اساس تاریخ انتشار

در حال نمایش موارد 1 - 15 از 15

  • A Lightweight Mutual Authentication Scheme for VANETs Between Vehicles and RSUs 

    Amani, Mohamadreza؛ Mohajeri, Javad؛ Salmasizadeh, Mahmoud (Iranian Society of Cryptology, 2023-10-01)
    Vehicular Ad-hoc Networks (VANETs) have emerged as part of Intelligent Transportation Systems (ITS), offering the potential to enhance passenger and driver safety, as well as driving conditions. However, VANETs face ...

  • A Semi-Supervised IDS for Cyber-Physical Systems Using a Deep Learning Approach 

    Salehi, Amirhosein؛ Ahmadi, Siavash؛ Aref, Mohammad Reza (Iranian Society of Cryptology, 2023-10-01)
    Industrial control systems are widely used in industrial sectors and critical infrastructures to monitor and control industrial processes. Recently, the security of industrial control systems has attracted a lot of attention, ...

  • Using ChatGPT as a Static Application Security Testing Tool 

    Bakhshandeh, Atieh؛ Keramatfar, Abdalsamad؛ Norouzi, Amir؛ M. Chekidehkhoun, Mohammad (Iranian Society of Cryptology, 2023-10-01)
    In recent years, artificial intelligence has had a conspicuous growth in almost every aspect of life. One of the most applicable areas is security code review, in which a lot of AI-based tools and approaches have been ...

  • Private Federated Learning: An Adversarial Sanitizing Perspective 

    Shirinjani, Mojtaba؛ Ahmadi, Siavash؛ Eghlidos, Taraneh؛ Aref, Mohammad Reza (Iranian Society of Cryptology, 2023-10-01)
    Large-scale data collection is challenging in alternative centralized learning as privacy concerns or prohibitive policies may rise. As a solution, Federated Learning (FL) is proposed wherein data owners, called participants, ...

  • An Efficient Scheme for Secure Medical Data Sharing in the Cloud 

    Jafarian, Iman؛ Khorsandi, Siavash (Iranian Society of Cryptology, 2023-10-01)
    The Internet of Things has significantly improved healthcare with its promise of transforming technological, social, and economic perspectives. Medical devices with wireless internet access enable remote monitoring of ...

  • Cross-Device Deep Learning Side-Channel Attacks using Filter and Autoencoder 

    Tabaeifard, Maryam؛ Jahanian, Ali (Iranian Society of Cryptology, 2023-10-01)
    Side-channel Analysis (SCA) attacks are effective methods for extracting encryption keys, and with deep learning (DL) techniques, much stronger attacks have been carried out on victim devices. However, carrying out this ...

  • Quantum Multiple Access Wiretap Channel: On the One-Shot Achievable Secrecy Rate Regions 

    Aghaee, Hadi؛ Akhbari, Bahareh (Iranian Society of Cryptology, 2023-10-01)
    In this paper, we want to investigate classical-quantum multiple access wiretap channels (CQ-MA-WTC) under one-shot setting. In this regard, we analyze the CQ-MA-WTC using a simultaneous position-based decoder for reliable ...

  • New Directions in the Design of Binary Matrices for SPN Block Ciphers 

    Sajadieh, Mahdi؛ Mirzaei, Arash (Iranian Society of Cryptology, 2023-10-01)
    The diffusion layer plays an important role in a block cipher. Some block ciphers, such as ARIA, Camellia, and Skinny use binary matrices as diffusion layers which can be efficiently implemented in hardware and software. ...

  • A Lightweight RFID Grouping Proof Protocol With Forward Secrecy and Resistant to Reader Compromised Attack 

    Borjal Bayatiani, Fateme؛ Mala, Hamid (Iranian Society of Cryptology, 2023-10-01)
    Today, passive RFID tags have many applications in various fields such as healthcare, transportation, asset management, and supply chain management. In some of these applications, a group of tags need to prove they are ...

  • Integral Cryptanalysis of Reduced-Round SAND-64 Based on Bit-Based Division Property 

    Mirzaie, Atiyeh؛ Ahmadi, Siavash؛ Aref, Mohammad Reza (Iranian Society of Cryptology, 2023-10-01)
    Conventional Bit-based Division Property (CBDP), as a generalization of integral property, has been a powerful tool for integral cryptanalysis of many block ciphers. Exploiting a Mixed Integral Linear Programming (MILP) ...

  • Designated-Server Hierarchical Searchable Encryption in Identity-Based Setting 

    Shiraly, Danial؛ Pakniat, Nasrollah؛ Eslami, Ziba (Iranian Society of Cryptology, 2023-10-01)
    Public key encryption with keyword search (PEKS) is a cryptographic primitive designed for performing secure search operations over encrypted data stored on untrusted cloud servers. However, in some applications of cloud ...

  • HyLock: Hybrid Logic Locking Based on Structural Fuzzing for Resisting Learning-based Attacks 

    Moradi Shahmiri, Mohammad؛ Alizadeh, Bijan (Iranian Society of Cryptology, 2023-10-01)
    The growing popularity of the fabless manufacturing model and the resulting threats have increased the importance of Logic locking as a key-based method for intellectual property (IP) protection. Recently, machine learning ...

  • Security Analysis and Improvement of an Access Control Scheme for Wireless Body Area Networks 

    Dadkhah, Parichehr؛ Dakhilalian, Mohammad؛ Rastegari, Parvin (Iranian Society of Cryptology, 2023-10-01)
    Wireless Body Area Networks (WBANs) have attracted a lot of attention in recent researches as they play a vital role in diagnosing, controlling and treating diseases. These networks can improve the quality of medical ...

  • Post Quantum Digital Signature Based on the McEliece Cryptosystems with Dual Inverse Matrix 

    Haidary Makoui, Farshid؛ Gulliver, Thomas Aaron؛ Dakhilalian, Mohammad (Iranian Society of Cryptology, 2023-10-01)
    Digital signatures are used to ensure legitimate access through identity authentication. They are also used in blockchains and to authenticate transactions. Code-based digital signatures are not widely used due to their ...

  • New Variations of Discrete Logarithm Problem 

    Mahdavi Oliaee, Mahdi؛ Khaleghifard, Sahar؛ Ahmadian, Zahra (Iranian Society of Cryptology, 2023-10-01)
    The security of public key cryptography relies on the complexity of certain mathematical hard problems. It is vital to comprehend the intricacy of these problems to develop secure cryptographic schemes and security protocols. ...