Volume 3, Issue 1


ارسال های اخیر

  • Intelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms 

    Deljavan Amiri, M.؛ Danyali, H.؛ Zahir-Azami, B. (Iranian Society of Cryptology, 2011-01-01)
    Image watermarking refers to the process of embedding an authentication message, called watermark, into the host image to uniquely identify the ownership. In this paper a novel, intelligent, scalable, robust wavelet-based ...

  • Double voter perceptible blind signature based electronic voting protocol 

    Baseri, Y.؛ Mortazavi, A.؛ Rajabzadeh Asaar, M.؛ Pourpouneh, M.؛ Mohajeri, J. (Iranian Society of Cryptology, 2011-01-01)
    Mu et al. have proposed an electronic voting protocol and claimed that it protects anonymity of voters, detects double voting and authenticates eligible voters. It has been shown that it does not protect voter's ...

  • QTRU: quaternionic version of the NTRU public-key cryptosystems 

    Malekian, E.؛ Zakerolhosseini, A.؛ Mashatan, A. (Iranian Society of Cryptology, 2011-01-01)
    In this paper we will construct a lattice-based public-key cryptosystem using non-commutative quaternion algebra, and since its lattice does not fully fit within Circular and Convolutional Modular Lattice (CCML), ...

  • Computer security in the future 

    Bishop, M. (Iranian Society of Cryptology, 2011-01-01)
    Until recently, computer security was an obscure discipline that seemed to have little relevance to everyday life. With the rapid growth of the Internet, e-commerce, and the widespread use of computers, computer security ...

  • Editorial 

    Jalili, R. (Iranian Society of Cryptology, 2011-01-01)
    From the Editor-in-Chief