| 99 | -- | 100 | Mohammad Reza Aref. Editorial |
| 101 | -- | 110 | Shahram Khazaei, Farokhlagha Moazami. On the computational complexity of finding a minimal basis for the guess and determine attack |
| 111 | -- | 118 | Behnam Mafakheri, Taraneh Eghlidos, Hossein Pilaram. An efficient secure channel coding scheme based on polar codes |
| 119 | -- | 130 | Morteza Safaei Pour, Mahmoud Salmasizadeh. A new CPA resistant software implementation for symmetric ciphers with smoothed power consumption: SIMON case study |
| 131 | -- | 145 | Hamzeh Ghasemzadeh, Mehdi Tajik Khass, Hamed Mehrara. Cipher text only attack on speech time scrambling systems using correction of audio spectrogram |
| 147 | -- | 159 | Maryam Imani, Gholam Ali Montazer. Phishing website detection using weighted feature line embedding |
| 161 | -- | 181 | Javad Hajian Nezhad, Majid Vafaei Jahan, Mohammad-H. Tayarani-N., Zohre Sadrnezhad. Analyzing new features of infected web content in detection of malicious web pages |
| 183 | -- | 189 | . Persian Abstract |