Volume 12, Issue 1
مرور بر اساس
ارسال های اخیر
-
Modified Sliding-Mode Control Method for Synchronization a Class of Chaotic Fractional-Order Systems with Application in Encryption
(Iranian Society of Cryptology, 2020-01-01)In this study, we propose a secure communication scheme based on the synchronization of two identical fractional-order chaotic systems. The fractional-order derivative is in Caputo sense, and for synchronization, we use a ...
-
Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants
(Iranian Society of Cryptology, 2020-01-01)In this paper, we present some attacks on GAGE, InGAGE, and CiliPadi which are candidates of the first round of the NIST-LWC competition. GAGE and InGAGE are lightweight sponge based hash function and Authenticated ...
-
Anomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism
(Iranian Society of Cryptology, 2020-01-01)Today, the use of the Internet and Internet sites has been an integrated part of the people's lives, and most activities and important data are in the Internet websites. Thus, attempts to intrude into these websites have ...
-
Improved Univariate Microaggregation for Integer Values
(Iranian Society of Cryptology, 2020-01-01)Privacy issues during data publishing is an increasing concern of involved entities. The problem is addressed in the field of statistical disclosure control with the aim of producing protected datasets that are also useful ...
-
Extension of Cube Attack with Probabilistic Equations and its Application on Cryptanalysis of KATAN Cipher
(Iranian Society of Cryptology, 2020-01-01)Cube Attack is a successful case of Algebraic Attack. Cube Attack consists of two phases, linear equation extraction and solving the extracted equation system. Due to the high complexity of equation extraction phase in ...
-
New High Secure Network Steganography Method Based on Packet Length
(Iranian Society of Cryptology, 2020-01-01)In network steganography methods based on packet length, the length of the packets is used as a carrier for exchanging secret messages. Existing methods in this area are vulnerable against detections due to abnormal network ...



