Volume 15, Issue 1
مرور بر اساس
ارسال های اخیر
-
Lightweight Cryptographic S-Boxes Based on Efficient Hardware Structures for Block Ciphers
(Iranian Society of Cryptology, 2023-01-01)In this paper, we present four low-cost substitution boxes (S-boxes) including two 4-bit S-boxes called S1 and S2 and two 8-bit S-boxes called SB1 and SB2, which are suitable for the development of lightweight block ciphers. ...
-
4n × 4n Diffusion Layers Based on Multiple 4 × 4 MDS Matrices
(Iranian Society of Cryptology, 2023-01-01)In terms of security, MDS matrices are one of the best choices for diffusion layer of block ciphers. However, as these matrices grow in size, their software implementation becomes a challenge. In this paper, to benefit ...
-
Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT
(Iranian Society of Cryptology, 2023-01-01)Ciphertext-policy attribute-based encryption(CP-ABE) is considered a promising solution for secure data sharing in the cloud environment. Although very well expressiveness in ABE constructions can be achieved using a linear ...
-
Quantum Cryptanalysis of Symmetric Primitives by Improving Relaxed Variants of Simon’s Algorithm
(Iranian Society of Cryptology, 2023-01-01)The main goal of Simon's Algorithm is to find the period of periodic functions. However, if the target function does not satisfy Simon's promise completely or if the number of superposition queries of the adversary is ...
-
Hierarchical Deterministic Wallets for Secure Steganography in Blockchain
(Iranian Society of Cryptology, 2023-01-01)Steganography is a solution for covert communication and blockchain is a p2p network for data transmission, so the benefits of blockchain can be used in steganography. In this paper, we discuss the advantages of blockchain ...
-
A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware
(Iranian Society of Cryptology, 2023-01-01)Sensitive methods are those that are commonly used by Android malware to perform malicious behavior. These methods may be either evasion or malicious payload methods. Although there are several approaches to handle these ...