Volume 12, Issue 2

 

ارسال های اخیر

  • GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication 

    Modiri, Mohammad؛ Mohajeri, Javad؛ Salmasizadeh, Mahmoud (Iranian Society of Cryptology, 2020-07-01)
    Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the ...

  • Enhanced Flush+Reload Attack on AES 

    Seddigh, Milad؛ Soleimany, Hadi (Iranian Society of Cryptology, 2020-07-01)
    In cloud computing, multiple users can share the same physical machine that can potentially leak secret information, in particular when the memory de-duplication is enabled. Flush+Reload attack is a cache-based attack that ...

  • F-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management 

    Nooribakhsh, Mahsa؛ Mollamotalebi, Mahdi (Iranian Society of Cryptology, 2020-07-01)
    Distributed Denial of Service (DDoS) is a common attack in recent years that can deplete the bandwidth of victim nodes by flooding packets. Based on the type and quantity of traffic used for the attack and the exploited ...

  • CPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking 

    Jahanbani, Mohsen؛ Bagheri, Nasour؛ Norozi, Zynolabedin (Iranian Society of Cryptology, 2020-07-01)
    Authenticated encryption schemes are important cryptographic primitives that received extensive attention recently. They can provide both confidentiality and authenticity services, simultaneously. Correlation power analysis ...