Volume 9, Issue 1


ارسال های اخیر

  • Dwarf Frankenstein is still in your memory: tiny code reuse attacks 

    Sadeghi, A.A؛ Aminmansour, F.؛ Shahriari, H.R. (Iranian Society of Cryptology, 2017-01-01)
    Code reuse attacks such as return oriented programming and jump oriented programming are the most popular exploitation methods among attackers. A large number of practical and non-practical defenses are proposed that differ ...

  • An automatic test case generator for evaluating implementation of access control policies 

    Safarzadeh, M.؛ Taghizadeh, M.؛ Zamani, B.؛ Tork Ladani, B. (Iranian Society of Cryptology, 2017-01-01)
    One of the main requirements for providing software security is the enforcement of access control policies which aim to protect resources of the system against unauthorized accesses. Any error in the implementation of such ...

  • Persian Abstract 

    پدیدآور نامشخص (Iranian Society of Cryptology, 2017-01-01)
    Persian abstracts of the issue's article

  • LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring 

    Ahadipour, A. R.؛ Keshavarz-Haddad, A. R. (Iranian Society of Cryptology, 2017-01-01)
    Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although ...

  • An efficient certificateless signcryption scheme in the standard model 

    Rastegari, P.؛ Berenjkoub, M. (Iranian Society of Cryptology, 2017-01-01)
    Certificateless public key cryptography (CL-PKC) is a useful method in order to solve the problems of traditional public key infrastructure (i.e., large amount of computation, storage and communication costs for managing ...

  • A new security proof for FMNV continuous non-malleable encoding scheme 

    Mortazavi, A.؛ Salmasizadeh, M.؛ Daneshgar, A. (Iranian Society of Cryptology, 2017-01-01)
    A non-malleable code is a variant of an encoding scheme which is resilient to tampering attacks. The main idea behind non-malleable coding is that the adversary should not be able to obtain any valuable information about ...

  • Side channel parameter characteristics of code injection attacks 

    Aerabi, E.؛ Kaykha, M.؛ Fazeli, M.؛ Patooghy, A.؛ Akbari, A. (Iranian Society of Cryptology, 2017-01-01)
    Embedded systems are suggestive targets for code injection attacks in the recent years. Software protection mechanisms, and in general computers, are not usually applicable in embedded systems since they have limited ...

  • Editorial 

    Aref, M. R. (Iranian Society of Cryptology, 2017-01-01)
    From the Editor-in-Chief