Volume 5, Issue 1
مرور بر اساس
ارسال های اخیر
-
Design and formal verification of DZMBE+
(Iranian Society of Cryptology, 2013-01-01)In this paper, a new broadcast encryption scheme is presented based on threshold secret sharing and secure multiparty computation. This scheme is maintained to be dynamic in that a broadcaster can broadcast a message to ...
-
Image encryption based on chaotic tent map in time and frequency domains
(Iranian Society of Cryptology, 2013-01-01)The present paper is aimed at introducing a new algorithm for image encryption using chaotic tent maps and the desired key image. This algorithm consists of two parts, the first of which works in the frequency domain and ...
-
Robust multiplicative video watermarking using statistical modeling
(Iranian Society of Cryptology, 2013-01-01)The present paper is intended to present a robust multiplicative video watermarking scheme. In this regard, the video signal is segmented into 3-D blocks like cubes, and then, the 3-D wavelet transform is applied to each ...
-
Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC
(Iranian Society of Cryptology, 2013-01-01)Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public ...
-
A survey on digital data hiding schemes: principals, algorithms, and applications
(Iranian Society of Cryptology, 2013-01-01)This paper investigates digital data hiding schemes. The concept of information hiding will be explained at first, and its traits, requirements, and applications will be described subsequently. In order to design a digital ...
-
DyVSoR: dynamic malware detection based on extracting patterns from value sets of registers
(Iranian Society of Cryptology, 2013-01-01)To control the exponential growth of malware files, security analysts pursue dynamic approaches that automatically identify and analyze malicious software samples. Obfuscation and polymorphism employed by malwares make it ...



