Volume 13, Issue 2

 

ارسال های اخیر

  • Better Sampling Method of Enumeration Solution for BKZ-Simulation 

    Moghissi, Gholam Reza؛ Payandeh, Ali (Iranian Society of Cryptology, 2021-07-01)
    The exact manner of BKZ algorithm for higher block sizes cannot be studied by practical running, so simulation of BKZ can be used to predict the total cost and output quality of BKZ algorithm. Sampling method of enumeration ...

  • Intensive Analysis of Physical Parameters of Power Sensors for Remote Side-Channel Attacks 

    Salimian, Milad؛ Jahanian, Ali (Iranian Society of Cryptology, 2021-07-01)
    Side-channel analysis methods can reveal the secret information of digital electronic systems by analyzing the dependency between the power consumption of implemented cryptographic algorithms and the secret data. Recent ...

  • An Obfuscation Method Based on CFGLUTs for Security of FPGAs 

    Labafniya, Mansoureh؛ Etemadi Borujeni, Shahram (Iranian Society of Cryptology, 2021-07-01)
    There are many different ways of securing FPGAs to prevent successful reverse engineering. One of the common forms is obfuscation methods. In this paper, we proposed an approach based on obfuscation to prevent FPGAs from ...

  • Blind Multipurpose Image Watermarking with Perfect Security 

    Sheidani, Sorour؛ Eslami, Ziba (Iranian Society of Cryptology, 2021-07-01)
    Nowadays, from one hand multimedia authentication techniques are widely used to achieve trustworthiness, on the other hand, due to the rapid growth of image processing software technologies, having a secure method to protect ...

  • Curious-Monkey: Evolved Monkey for Triggering Malicious Payloads in Android Malware 

    Hasan, Hayyan؛ Tork Ladani, Behrouz؛ Zamani, Bahman (Iranian Society of Cryptology, 2021-07-01)
    Dynamic analysis is a prominent approach in analyzing the behavior of Android apps. To perform dynamic analysis, we need an event generator to provide proper environment for executing the app in an emulator. Monkey is the ...

  • IDOT: Black-Box Detection of Access Control Violations in Web Applications 

    Hadavi, Mohammad Ali؛ Bagherdaei, Arash؛ Ghasemi, Simin (Iranian Society of Cryptology, 2021-07-01)
    Automatic detection of access control violations in software applications is a challenging problem. Insecure Direct Object Reference (IDOR) is among top-ranked vulnerabilities, which violates access control policies ...

  • File Fragment Type Classification by Bag-Of-Visual-Words 

    Erfan, Mina؛ Jalili, Saeed (Iranian Society of Cryptology, 2021-07-01)
    File fragment's type classification in the absence of header and file system information, is a major building block in various solutions devoted to file carving, memory analysis and network forensics. Over the past decades, ...

  • Privacy Preserving Attribute-Based Encryption with Conjunctive Keyword Search for E-health Records in Cloud 

    Najafi, Aniseh؛ Bayat, Majid؛ Haj Seyyed Javadi, Hamid (Iranian Society of Cryptology, 2021-07-01)
    The advent of cloud computing in the healthcare system makes accuracy and speed increased, costs reduced, and health services widely used. However, system users are always seriously concerned about the security of outsourced ...