The ISC International Journal of Information Security

ارسال های اخیر

  • A New Scheme Based on (t,n)-Secret Image Sharing With Steganography Based on Joseph’s Problem and HLR 

    Saeidi, Zahra؛ Mashhadi, Samaneh (Iranian Society of Cryptology, 2025-07-01)
    The paper presents a novel approach to Secret Image Sharing (SIS) that combines (t, n)-threshold schemes with steganography, utilizing Joseph's problem and Homogeneous Linear Recursion (HLR) to enhance security. The ...

  • Shapley Value for Federated Learning: A Distributed and Fair Framework 

    Sarzaeem, Mohammad Amin؛ Hoseini Najarkolaei, Seyed Reza؛ Aref, Mohammad Reza (Iranian Society of Cryptology, 2025-07-01)
    In a federated learning system, the objective is to train a global model over distributed datasets without centralizing all data on a single unit. This is accomplished by training a local model on the dataset of each data ...

  • A Lightweight General Modular Multiplier for Kyber PQC 

    Naderi Varandi, Hossein؛ Salarifard, Raziye (Iranian Society of Cryptology, 2025-07-01)
    Kyber, a key encapsulation mechanism (KEM), plays a pivotal role in post-quantum cryptography. As a finalist in the NIST project, Kyber is gaining traction in industry libraries and systems. The heart of the Kyber algorithm ...

  • A Lightweight Online Intrusion Detection and Localization Framework for Industrial Control Systems 

    Salehi, Amirhosein؛ Ahmadi, Siavash؛ Aref, Mohammad Reza (Iranian Society of Cryptology, 2025-07-01)
    As the Industrial Internet of Things (IIoT) faces increasing cyber threats, the need for effective and practical intrusion detection systems (IDS) becomes paramount. One of the key challenges in designing IDS is ensuring ...

  • Differential Fault Analysis of the BipBip Block Cipher 

    Mokhtari, Narges؛ vafaei, navid؛ Sadeghi, Sadegh؛ Bagheri, Nasour (Iranian Society of Cryptology, 2025-07-01)
    Differential Fault Analysis (DFA) represents one of the most effective physical attacks against cryptographic algorithms. It exploits the implementation weaknesses by injecting faults. DFA is a cryptographic technique in ...

  • Spotting and Mitigating DDoS Attacks Using Deep Learning for Online Traffic Analysis 

    Shirinjani, Mojtaba؛ Amiri, Mojtaba؛ Salehi, Amirhosein؛ Arefi Jamal, Pouria؛ Khazaei Laki, Rasoul؛ Sadegh Esfahani, Seyed Hatef؛ Ahmadi, Siavash؛ Koochak Shooshtari, Masoumeh؛ Aref, Mohammad Reza (Iranian Society of Cryptology, 2025-07-01)
    Distributed Denial of Service (DDoS) attacks threaten server and network availability with minimal resources. These attacks mimic legitimate traffic, evading Intrusion Detection Systems (IDS) and Intrusion Prevention ...

  • Division Property-Based Integral Attack on Reduced-Round SAND-128 

    Mirzaie, Atiyeh؛ Ahmadi, Siavash؛ Aref, Mohammad Reza (Iranian Society of Cryptology, 2025-07-01)
    Given the rapid evolution of emerging technologies, such as the Internet of Things (IoT), there is a growing interest in lightweight block ciphers. This paper focuses on the security assessment of SAND-128, a newly proposed ...

  • A Fine-Grained Hybrid Inversion-Based Membership Inference Attack Against GANs 

    Azadmanesh, Maryam (Iranian Society of Cryptology, 2025-07-01)
    Generative Adversarial Networks (GANs) are commonly used in various applications. Different membership inference attacks have been carried out against GANs. However, the accuracy of these attacks decreases with a large ...

  • Cryptanalysis of Two Authenticated Key Agreement Protocols in Multi-Server Environments 

    Jaberi, Mehrad؛ Mala, Hamid؛ Sadat Madani, Seyede Marzieh (Iranian Society of Cryptology, 2025-07-01)
    Today, the use of Multi-Server Authenticated Key Agreement (MAKA) schemes has become widespread. In the multiserver authenticated key agreement, each entity registers with a registration server, and the key agreement takes ...

  • Security Weaknesses of Some Policy-Hiding Attribute-Based Encryption Schemes 

    Sotoudeh, Reihaneh؛ Eghlidos, Taraneh؛ Mohajeri, Javad (Iranian Society of Cryptology, 2025-07-01)
    In Ciphertext-Policy Attribute-Based Encryption (CP-ABE) schemes, an access structure is sent with each ciphertext to specify the intended recipients. This design can reveal sensitive information about the encrypted data ...

  • Over-the-Air Federated Adaptive Data Analysis: Preserving Accuracy via Opportunistic Differential Privacy 

    Hadavi, Amirhossein؛ Mojahedian, Mohammad Mahdi؛ Aref, Mohammad Reza (Iranian Society of Cryptology, 2025-07-01)
    Adaptive data analysis (ADA) involves a dynamic interaction between an analyst and a dataset owner, where the analyst submits queries sequentially, adapting them based on previous answers. This process can become adversarial, ...

  • Attacking Two Pairing-Free Ciphertext-Policy Attribute-Based Encryption Schemes 

    Hamednejad, Farnoosh؛ Mohajeri, Javad؛ Aref, Mohammad Reza (Iranian Society of Cryptology, 2025-07-01)
    Attribute-based encryption (ABE) is one of the recommended tools to secure real systems like the Internet of Things (IoT). Almost all the ABE schemes utilize bilinear map operations, known as pairings. The challenge with ...

  • Divergent Twins Fencing: Protecting Deep Neural Networks Against Query-based Black-box Adversarial Attacks 

    Farshadfar, Elahe؛ Sadeghzadeh Mesgar, Amir Mahdi؛ Jalili, Rasool (Iranian Society of Cryptology, 2025-07-01)
    Recent advances in Machine Learning and Deep Learning have significantly expanded their applications in various domains. The resource-intensive process of training deep neural networks, in terms of substantial labeled data ...

  • Impossible Differential Cryptanalysis of Reduced-Round mCrypton-64 

    Hajari, Masroor؛ Salmasizadeh, Mahmoud؛ Mohajeri, Javad؛ Ahmadi, Siavash؛ Rasoolzadeh, Shahram (Iranian Society of Cryptology, 2025-07-01)
    Impossible-differential cryptanalysis is one of the powerful methods utilized for evaluating the robustness of block ciphers; however, mCrypton is one of the block ciphers whose master key has not been recovered with this ...

  • A New Bit-Wise Approach for Image-in-Audio Steganography Using Deep Learning 

    Raeisian Dashtaki, Ebrahim؛ Ghaemmaghami, Shahrokh (Iranian Society of Cryptology, 2025-07-01)
    This work proposes a novel steganographic scheme that employs deep learning to embed RGB images into audio files, and it also introduces an innovative steganalysis approach. The proposed method embeds an image at the bit ...

  • DSRL-APT-2023: A New Synthetic Dataset for Advanced Persistent Threats 

    Shadabfar, Hossein؛ Dehghan, Motahareh؛ Sadeghian, Babak (Iranian Society of Cryptology, 2025-07-01)
    Detecting Advanced Persistent Threats (APTs) is crucial, and a practical approach involves using an intrusion detection system (IDS) integrated with supervised machine learning algorithms. These algorithms require a balanced ...

  • Design of an Accurate BKZ Simulation 

    Moghissi, Gholam Reza؛ Payandeh, Ali (Iranian Society of Cryptology, 2025-01-01)
    The main role of BKZ simulations focuses on showing the behavior of BKZ algorithm for high block sizes, therefore current lattice security analysis (e.g., bit-security estimations and selection of efficient/secure parameter ...

  • CST-SDL: A Scenario Description Language for Collaborative Security Training in Cyber Ranges 

    Shirmohammadi, Navid؛ Tork Ladani, Behrouz (Iranian Society of Cryptology, 2025-01-01)
    As cyber threats grow increasingly sophisticated, the importance of security training as an effective means of prevention will become even more critical. Cyber Range (CR) is a platform for creating cyber training programs ...

  • ProAPT: Projection of APTs with Deep Reinforcement Learning 

    Dehghan, Motahareh؛ Sadeghiyan, Babak؛ Khosravian, Erfan؛ Sedighi Moghadam, Alireza؛ Nooshi, Farshid (Iranian Society of Cryptology, 2025-01-01)
    The highest level in Endsley's situation awareness model is called projection when the status of elements in the environment is shortly predicted. In cybersecurity situation awareness, the projection for an Advanced ...

  • Detection of Membership Inference Attacks on GAN Models 

    Ekramifard, Ala؛ Amintoosi, Haleh؛ Hosseini Seno, Seyed Amin (Iranian Society of Cryptology, 2025-01-01)
    In the realm of machine learning, Generative Adversarial Networks (GANs) have revolutionized the generation of synthetic data, closely mirroring the distribution of real datasets. This paper delves into the privacy concerns ...

View more