Volume 3, Issue 1
مرور بر اساس
ارسال های اخیر
-
Computer security in the future
(Iranian Society of Cryptology, 2011-01-01)Until recently, computer security was an obscure discipline that seemed to have little relevance to everyday life. With the rapid growth of the Internet, e-commerce, and the widespread use of computers, computer security ...
-
Double voter perceptible blind signature based electronic voting protocol
(Iranian Society of Cryptology, 2011-01-01)Mu et al. have proposed an electronic voting protocol and claimed that it protects anonymity of voters, detects double voting and authenticates eligible voters. It has been shown that it does not protect voter's ...
-
QTRU: quaternionic version of the NTRU public-key cryptosystems
(Iranian Society of Cryptology, 2011-01-01)In this paper we will construct a lattice-based public-key cryptosystem using non-commutative quaternion algebra, and since its lattice does not fully fit within Circular and Convolutional Modular Lattice (CCML), ...
-
Intelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms
(Iranian Society of Cryptology, 2011-01-01)Image watermarking refers to the process of embedding an authentication message, called watermark, into the host image to uniquely identify the ownership. In this paper a novel, intelligent, scalable, robust wavelet-based ...