Journal: ISeCure

Volume 7, Issue 2

89 -- 90Rasool Jalili. Editorial
91 -- 99Samaneh Mashhadi. Computationally secure multiple secret sharing: models, schemes, and formal security analysis
101 -- 114Bahram Rashidi, Reza Rezaeian Farashahi, Sayed Masoud Sayedi. Efficient implementation of low time complexity and pipelined bit-parallel polynomial basis multiplier over binary finite fields
115 -- 126Reza Ebrahimi Atani, Shahabaddin Ebrahimi Atani, Amir Hassani Karbasi. EEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations
127 -- 134Javad Alizadeh, Mohammad Reza Aref, Nasour Bagheri, Hassan Sadeghi. Cryptanalysis of some first round CAESAR candidates
135 -- 149Karim Baghery, Behzad Abdolmaleki, Bahareh Akhbari, Mohammad Reza Aref. Enhancing privacy of recent authentication schemes for low-cost RFID systems
151 -- 166Mina Niknafs, Sadegh Dorri Nogoorani, Rasool Jalili. A collusion mitigation scheme for reputation systems