Volume 5, Issue 1

 

ارسال های اخیر

  • Persian Abstract 

    پدیدآور نامشخص (Iranian Society of Cryptology, 2013-01-01)

  • Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC 

    Sabzinejad Farash, M.؛ Ahmadian Attari, M. (Iranian Society of Cryptology, 2013-01-01)
    Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public ...

  • A survey on digital data hiding schemes: principals, algorithms, and applications 

    Akhaee, M. A.؛ Marvasti, F. (Iranian Society of Cryptology, 2013-01-01)
    This paper investigates digital data hiding schemes. The concept of information hiding will be explained at first, and its traits, requirements, and applications will be described subsequently. In order to design a digital ...

  • DyVSoR: dynamic malware detection based on extracting patterns from value sets of registers 

    Ghiasi, M.؛ Sami, A.؛ Salehi, Z. (Iranian Society of Cryptology, 2013-01-01)
    To control the exponential growth of malware files, security analysts pursue dynamic approaches that automatically identify and analyze malicious software samples. Obfuscation and polymorphism employed by malwares make it ...

  • Design and formal verification of DZMBE+ 

    Soodkhah Mohammadi, M.؛ Ghaemi Bafghi, A. (Iranian Society of Cryptology, 2013-01-01)
    In this paper, a new broadcast encryption scheme is presented based on threshold secret sharing and secure multiparty computation. This scheme is maintained to be dynamic in that a broadcaster can broadcast a message to ...

  • Image encryption based on chaotic tent map in time and frequency domains 

    Hassani, E.؛ Eshghi, M. (Iranian Society of Cryptology, 2013-01-01)
    The present paper is aimed at introducing a new algorithm for image encryption using chaotic tent maps and the desired key image. This algorithm consists of two parts, the first of which works in the frequency domain and ...

  • Robust multiplicative video watermarking using statistical modeling 

    Diyanat, A.؛ Akhaee, M. A.؛ Ghaemmaghami, Sh. (Iranian Society of Cryptology, 2013-01-01)
    The present paper is intended to present a robust multiplicative video watermarking scheme. In this regard, the video signal is segmented into 3-D blocks like cubes, and then, the 3-D wavelet transform is applied to each ...

  • Editorial 

    Jalili, R. (Iranian Society of Cryptology, 2013-01-01)
    From the Editor-in-Chief