The ISC International Journal of Information Security
مرور بر اساس
مجموعههای این پایگاه
ارسال های اخیر
-
A New Scheme Based on (t,n)-Secret Image Sharing With Steganography Based on Joseph’s Problem and HLR
(Iranian Society of Cryptology, 2025-07-01)The paper presents a novel approach to Secret Image Sharing (SIS) that combines (t, n)-threshold schemes with steganography, utilizing Joseph's problem and Homogeneous Linear Recursion (HLR) to enhance security. The ...
-
Shapley Value for Federated Learning: A Distributed and Fair Framework
(Iranian Society of Cryptology, 2025-07-01)In a federated learning system, the objective is to train a global model over distributed datasets without centralizing all data on a single unit. This is accomplished by training a local model on the dataset of each data ...
-
A Lightweight General Modular Multiplier for Kyber PQC
(Iranian Society of Cryptology, 2025-07-01)Kyber, a key encapsulation mechanism (KEM), plays a pivotal role in post-quantum cryptography. As a finalist in the NIST project, Kyber is gaining traction in industry libraries and systems. The heart of the Kyber algorithm ...
-
A Lightweight Online Intrusion Detection and Localization Framework for Industrial Control Systems
(Iranian Society of Cryptology, 2025-07-01)As the Industrial Internet of Things (IIoT) faces increasing cyber threats, the need for effective and practical intrusion detection systems (IDS) becomes paramount. One of the key challenges in designing IDS is ensuring ...
-
Differential Fault Analysis of the BipBip Block Cipher
(Iranian Society of Cryptology, 2025-07-01)Differential Fault Analysis (DFA) represents one of the most effective physical attacks against cryptographic algorithms. It exploits the implementation weaknesses by injecting faults. DFA is a cryptographic technique in ...
-
Spotting and Mitigating DDoS Attacks Using Deep Learning for Online Traffic Analysis
(Iranian Society of Cryptology, 2025-07-01)Distributed Denial of Service (DDoS) attacks threaten server and network availability with minimal resources. These attacks mimic legitimate traffic, evading Intrusion Detection Systems (IDS) and Intrusion Prevention ...
-
Division Property-Based Integral Attack on Reduced-Round SAND-128
(Iranian Society of Cryptology, 2025-07-01)Given the rapid evolution of emerging technologies, such as the Internet of Things (IoT), there is a growing interest in lightweight block ciphers. This paper focuses on the security assessment of SAND-128, a newly proposed ...
-
A Fine-Grained Hybrid Inversion-Based Membership Inference Attack Against GANs
(Iranian Society of Cryptology, 2025-07-01)Generative Adversarial Networks (GANs) are commonly used in various applications. Different membership inference attacks have been carried out against GANs. However, the accuracy of these attacks decreases with a large ...
-
Cryptanalysis of Two Authenticated Key Agreement Protocols in Multi-Server Environments
(Iranian Society of Cryptology, 2025-07-01)Today, the use of Multi-Server Authenticated Key Agreement (MAKA) schemes has become widespread. In the multiserver authenticated key agreement, each entity registers with a registration server, and the key agreement takes ...
-
Security Weaknesses of Some Policy-Hiding Attribute-Based Encryption Schemes
(Iranian Society of Cryptology, 2025-07-01)In Ciphertext-Policy Attribute-Based Encryption (CP-ABE) schemes, an access structure is sent with each ciphertext to specify the intended recipients. This design can reveal sensitive information about the encrypted data ...
-
Over-the-Air Federated Adaptive Data Analysis: Preserving Accuracy via Opportunistic Differential Privacy
(Iranian Society of Cryptology, 2025-07-01)Adaptive data analysis (ADA) involves a dynamic interaction between an analyst and a dataset owner, where the analyst submits queries sequentially, adapting them based on previous answers. This process can become adversarial, ...
-
Attacking Two Pairing-Free Ciphertext-Policy Attribute-Based Encryption Schemes
(Iranian Society of Cryptology, 2025-07-01)Attribute-based encryption (ABE) is one of the recommended tools to secure real systems like the Internet of Things (IoT). Almost all the ABE schemes utilize bilinear map operations, known as pairings. The challenge with ...
-
Divergent Twins Fencing: Protecting Deep Neural Networks Against Query-based Black-box Adversarial Attacks
(Iranian Society of Cryptology, 2025-07-01)Recent advances in Machine Learning and Deep Learning have significantly expanded their applications in various domains. The resource-intensive process of training deep neural networks, in terms of substantial labeled data ...
-
Impossible Differential Cryptanalysis of Reduced-Round mCrypton-64
(Iranian Society of Cryptology, 2025-07-01)Impossible-differential cryptanalysis is one of the powerful methods utilized for evaluating the robustness of block ciphers; however, mCrypton is one of the block ciphers whose master key has not been recovered with this ...
-
A New Bit-Wise Approach for Image-in-Audio Steganography Using Deep Learning
(Iranian Society of Cryptology, 2025-07-01)This work proposes a novel steganographic scheme that employs deep learning to embed RGB images into audio files, and it also introduces an innovative steganalysis approach. The proposed method embeds an image at the bit ...
-
DSRL-APT-2023: A New Synthetic Dataset for Advanced Persistent Threats
(Iranian Society of Cryptology, 2025-07-01)Detecting Advanced Persistent Threats (APTs) is crucial, and a practical approach involves using an intrusion detection system (IDS) integrated with supervised machine learning algorithms. These algorithms require a balanced ...
-
Design of an Accurate BKZ Simulation
(Iranian Society of Cryptology, 2025-01-01)The main role of BKZ simulations focuses on showing the behavior of BKZ algorithm for high block sizes, therefore current lattice security analysis (e.g., bit-security estimations and selection of efficient/secure parameter ...
-
CST-SDL: A Scenario Description Language for Collaborative Security Training in Cyber Ranges
(Iranian Society of Cryptology, 2025-01-01)As cyber threats grow increasingly sophisticated, the importance of security training as an effective means of prevention will become even more critical. Cyber Range (CR) is a platform for creating cyber training programs ...
-
ProAPT: Projection of APTs with Deep Reinforcement Learning
(Iranian Society of Cryptology, 2025-01-01)The highest level in Endsley's situation awareness model is called projection when the status of elements in the environment is shortly predicted. In cybersecurity situation awareness, the projection for an Advanced ...
-
Detection of Membership Inference Attacks on GAN Models
(Iranian Society of Cryptology, 2025-01-01)In the realm of machine learning, Generative Adversarial Networks (GANs) have revolutionized the generation of synthetic data, closely mirroring the distribution of real datasets. This paper delves into the privacy concerns ...



