Volume 8, Issue 1

 

ارسال های اخیر

  • Persian Abstract 

    پدیدآور نامشخص (Iranian Society of Cryptology, 2016-01-01)
    Persian abstracts of the issue's article

  • On the design and security of a lattice-based threshold secret sharing scheme 

    Amini Khorasgani, H. R.؛ Asaad, S.؛ Pilaram, H.؛ Eghlidos, T.؛ Aref, M. R. (Iranian Society of Cryptology, 2016-01-01)
    In this paper, we introduce a method of threshold secret sharing scheme (TSSS) in which secret reconstruction is based on Babai's nearest plane algorithm. In order to supply secure public channels for transmitting shares ...

  • Self authentication path insertion in FPGA-based design flow for tamper-resistant purpose 

    Zamanzadeh, Sh.؛ Jahanian, A. (Iranian Society of Cryptology, 2016-01-01)
    FPGA platforms have been widely used in many modern digital applications due to their low prototyping cost, short time-to-market and flexibility. Field-programmability of FPGA bitstream has made it as a flexible and ...

  • Unauthenticated event detection in wireless sensor networks using sensors co-coverage 

    Kamarei, M.؛ Patooghy, A.؛ Fazeli, M. (Iranian Society of Cryptology, 2016-01-01)
    Wireless Sensor Networks (WSNs) offer inherent packet redundancy since each point within the network area is covered by more than one sensor node. This phenomenon, which is known as sensors co-coverage, is used in this ...

  • Aggrandizing the beast's limbs: patulous code reuse attack on ARM architecture 

    Aminmansour, F.؛ Shahriari, H. (Iranian Society of Cryptology, 2016-01-01)
    Since smartphones are usually personal devices full of private information, they are a popular target for a vast variety of real-world attacks such as Code Reuse Attack (CRA). CRAs enable attackers to execute any arbitrary ...

  • Editorial 

    Aref, M. (Iranian Society of Cryptology, 2016-01-01)
    From the Editor-in-Chief