Volume 12, Issue 2

 

ارسال های اخیر

  • F-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management 

    Nooribakhsh, Mahsa؛ Mollamotalebi, Mahdi (Iranian Society of Cryptology, 2020-07-01)
    Distributed Denial of Service (DDoS) is a common attack in recent years that can deplete the bandwidth of victim nodes by flooding packets. Based on the type and quantity of traffic used for the attack and the exploited ...

  • GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication 

    Modiri, Mohammad؛ Mohajeri, Javad؛ Salmasizadeh, Mahmoud (Iranian Society of Cryptology, 2020-07-01)
    Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the ...

  • A Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions 

    Zaghian, Ali؛ Bagherpour, Bagher (Iranian Society of Cryptology, 2020-07-01)
    A non-interactive (t,n)-publicly veri able secret sharing scheme (non-interactive (t,n)-PVSS scheme) is a (t,n)-secret sharing scheme in which anyone, not only the participants of the scheme, can verify the correctness of ...

  • Enhanced Flush+Reload Attack on AES 

    Seddigh, Milad؛ Soleimany, Hadi (Iranian Society of Cryptology, 2020-07-01)
    In cloud computing, multiple users can share the same physical machine that can potentially leak secret information, in particular when the memory de-duplication is enabled. Flush+Reload attack is a cache-based attack that ...

  • Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems 

    Zarezadeh, Maryam؛ Ashouri-Talouki, Maede؛ Siavashi, Mohammad (Iranian Society of Cryptology, 2020-07-01)
    Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. ...

  • CPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking 

    Jahanbani, Mohsen؛ Bagheri, Nasour؛ Norozi, Zynolabedin (Iranian Society of Cryptology, 2020-07-01)
    Authenticated encryption schemes are important cryptographic primitives that received extensive attention recently. They can provide both confidentiality and authenticity services, simultaneously. Correlation power analysis ...