Volume 11, Issue 2

 

ارسال های اخیر

  • Persian Abstract 

    پدیدآور نامشخص (Iranian Society of Cryptology, 2019-07-01)
    Persian abstracts of the issue''s article

  • New Fixed Point Attacks on GOST2 Block Cipher 

    Ahmadi, Siavash؛ Aref, Mohammad Reza (Iranian Society of Cryptology, 2019-07-01)
    GOST block cipher designed in the 1970s and published in 1989 as the Soviet and Russian standard GOST 28147-89. In order to enhance the security of GOST block cipher after proposing various attacks on it, designers published ...

  • Editorial 

    Aref, Mohammad Reza (Iranian Society of Cryptology, 2019-07-01)
    From the Editor-in-Chief

  • A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications 

    Bayat, Majid؛ Zare Jousheghani, Zahra؛ Kumar Das, Ashok؛ Singh, Pitam؛ Kumari, Saru؛ Aref, Mohammad Reza (Iranian Society of Cryptology, 2019-07-01)
    Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, ...

  • Anomaly Detection Using SVM as Classifier and Decision Tree for Optimizing Feature Vectors 

    Serkani, Elham؛ Gharaee Garakani, Hossein؛ Mohammadzadeh, Naser (Iranian Society of Cryptology, 2019-07-01)
    Abstract- With the advancement and development of computer network technologies, the way for intruders has become smoother; therefore, to detect threats and attacks, the importance of intrusion detection systems (IDS) as ...

  • Detection of Fake Accounts in Social Networks Based on One Class Classification 

    Mohammadrezaei, Mohammad Reza؛ Shiri, Mohammad Ebrahim؛ Rahmani, Amir Masoud (Iranian Society of Cryptology, 2019-07-01)
    Detection of fake accounts on social networks is a challenging process. The previous methods in identification of fake accounts have not considered the strength of the users' communications, hence reducing their efficiency. ...

  • Interdependent Security Game Design over Constrained Linear Influence Networks 

    Hasheminasab, Seyed Alireza؛ Tork Ladani, Behrouz؛ Alpcan, Tansu (Iranian Society of Cryptology, 2019-07-01)
    In today's highly interconnected networks, security of the entities are often interdependent. This means security decisions of the agents are not only influenced by their own costs and constraints, but also are affected ...

  • Relaxed Differential Fault Analysis of SHA-3 

    Hosiny Nezhad, S.Ehsan؛ Safkhani, Masoumeh؛ Bagheri, Nasour (Iranian Society of Cryptology, 2019-07-01)
    In this paper, we propose a new method of differential fault analysis of SHA-3 which is based on the differential relations of the algorithm. Employing those differential relations in the fault analysis of SHA-3 gives new ...