Volume 5, Issue 1
مرور بر اساس
ارسال های اخیر
-
A Provably Secure Variant of ETRU Based on Extended Ideal Lattices Over Direct Product of Dedekind Domains
(University of Isfahan & Iranian Society of Cryptology, 2018-01-01)Jarvis and Nevins presented ETRU in 2013 which has applausive performance with moderate key-sizes and conjectured resistance to quantum computers. ETRU, as an efficient NTRUEncrypt-like cryptosystem, is over the ring of ...
-
Towards a Model-Driven Framework for Simulating Interactive Emergency Response Environments
(University of Isfahan & Iranian Society of Cryptology, 2018-01-01)Due to the increasing occurrence of unexpected events and the need for pre-crisis planning to reduce risks and losses, modeling emergency response environments (ERE) is needed more than ever. Modeling may lead to more ...
-
Change Impact Analysis by Concept Propagation
(University of Isfahan & Iranian Society of Cryptology, 2018-01-01)Software maintenance is an important phase of the software life cycle. An important task in this phase is to locate code fragments affected by user change requests. However, performing this task manually is costly and ...
-
An Improvement Over Lee et al.'s Key Agreement Protocol
(University of Isfahan & Iranian Society of Cryptology, 2018-01-01)In 2004, Hwang et al. proposed a group key exchange protocol for sharing a secure key in a group. Their protocol is an extension from the two party key exchange protocol to the group one. Recently, Jung-San Lee et al. noted ...
-
Vol. 5, No. 1, 2018
(University of Isfahan & Iranian Society of Cryptology, 2018-01-01)Vol. 5, No. 1, 2018



