Volume 5, Issue 1

 

ارسال های اخیر

  • A Provably Secure Variant of ETRU Based on Extended Ideal Lattices Over Direct Product of Dedekind Domains 

    Ebrahimi Atani, Reza؛ Ebrahimi Atani, Shahabaddin؛ Hassani Karbasi, Amir (University of Isfahan & Iranian Society of Cryptology, 2018-01-01)
    Jarvis and Nevins presented ETRU in 2013 which has applausive performance with moderate key-sizes and conjectured resistance to quantum computers. ETRU, as an efficient NTRUEncrypt-like cryptosystem, is over the ring of ...

  • Towards a Model-Driven Framework for Simulating Interactive Emergency Response Environments 

    HoseinDoost, Samaneh؛ Fatemi, Afsaneh؛ Zamani, Bahman (University of Isfahan & Iranian Society of Cryptology, 2018-01-01)
    Due to the increasing occurrence of unexpected events and the need for pre-crisis planning to reduce risks and losses, modeling emergency response environments (ERE) is needed more than ever. Modeling may lead to more ...

  • Change Impact Analysis by Concept Propagation 

    mahzoon, Zeinab؛ Bushehrian, Omid (University of Isfahan & Iranian Society of Cryptology, 2018-01-01)
    Software maintenance is an important phase of the software life cycle. An important task in this phase is to locate code fragments affected by user change requests. However, performing this task manually is costly and ...

  • An Improvement Over Lee et al.'s Key Agreement Protocol 

    Oraei, Hossein؛ Pourpouneh, Mohsen؛ Ramezanian, Rasoul (University of Isfahan & Iranian Society of Cryptology, 2018-01-01)
    In 2004, Hwang et al. proposed a group key exchange protocol for sharing a secure key in a group. Their protocol is an extension from the two party key exchange protocol to the group one. Recently, Jung-San Lee et al. noted ...

  • Vol. 5, No. 1, 2018 

    پدیدآور نامشخص (University of Isfahan & Iranian Society of Cryptology, 2018-01-01)
    Vol. 5, No. 1, 2018