Volume 9 (2022)
Volume 8 (2021)
Volume 7 (2020)
Volume 6 (2019)
Volume 5 (2018)
Volume 4 (2017)
Volume 3 (2016)
Volume 2 (2015)
Volume 1 (2014)
Number of Articles: 7
Bit-Parallel ECC Coprocessor resistant to Differential Power Analysis Attacks in GF(2m)
Volume 8, Issue 1 , January 2021, Pages 1-18
Abstract
Elliptic curve cryptography (ECC) is one of the most popular public key systems in recent years due to its both high security and low resource consumption. Thus, ECC is more appropriate ... Read MoreAutomatic Black-Box Detection of Resistance Against CSRF Vulnerabilities in Web Applications
Volume 8, Issue 1 , January 2021, Pages 19-32
Abstract
Cross-Site Request Forgery (CSRF) is an attack in which an infected website causes a victim's browser to perform an unwanted operation on a trusted website. The main solution to tackle ... Read MoreMomentum Contrast Self-Supervised Based Training for Adversarial Robustness
Volume 8, Issue 1 , January 2021, Pages 33-43
Abstract
By the rapid progress of deep learning and its use in a variety of applications, however, deep networks have shown that they are vulnerable to adversarial examples. Recently developed ... Read MoreCombination of Genetic Programming and Support Vector Machine-Based Prediction of Protein-Peptide Binding Sites With Sequence and Structure-Based Features
Volume 8, Issue 1 , January 2021, Pages 45-63
Abstract
Prediction of the peptide-binding site of proteins is a significant and essential task in different processes such as understanding biological processes, protein functional analysis, ... Read MoreRejecting Claimed Speedup of 2^𝛽/2 in Extreme Pruning and Revising BKZ 2.0 for Better Speedup
Volume 8, Issue 1 , January 2021, Pages 65-91
Abstract
BKZ 2.0 algorithm is one of the claimant lattice reduction algorithms which incorporates extreme pruning as its main phase. The non-extreme pruning and extreme pruning in the ... Read MoreModel-Driven Software Engineering: A Bibliometric Analysis
Volume 8, Issue 1 , January 2021, Pages 93-108