| 89 | -- | 90 | Rasool Jalili. Editorial |
| 91 | -- | 99 | Samaneh Mashhadi. Computationally secure multiple secret sharing: models, schemes, and formal security analysis |
| 101 | -- | 114 | Bahram Rashidi, Reza Rezaeian Farashahi, Sayed Masoud Sayedi. Efficient implementation of low time complexity and pipelined bit-parallel polynomial basis multiplier over binary finite fields |
| 115 | -- | 126 | Reza Ebrahimi Atani, Shahabaddin Ebrahimi Atani, Amir Hassani Karbasi. EEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations |
| 127 | -- | 134 | Javad Alizadeh, Mohammad Reza Aref, Nasour Bagheri, Hassan Sadeghi. Cryptanalysis of some first round CAESAR candidates |
| 135 | -- | 149 | Karim Baghery, Behzad Abdolmaleki, Bahareh Akhbari, Mohammad Reza Aref. Enhancing privacy of recent authentication schemes for low-cost RFID systems |
| 151 | -- | 166 | Mina Niknafs, Sadegh Dorri Nogoorani, Rasool Jalili. A collusion mitigation scheme for reputation systems |