Bit-Parallel ECC Coprocessor resistant to Differential Power Analysis Attacks in GF(2m)
1. Bit-Parallel ECC Coprocessor resistant to Differential Power Analysis Attacks in GF(2m)

Hashem Rezaei; Alireza Shafieinejad

Volume 8, Issue 1 , Winter and Spring 2021, Pages 1-18

http://dx.doi.org/10.22108/jcs.2021.123698.1051

Abstract
  Elliptic curve cryptography (ECC) is one of the most popular public key systems in recent years due to its both high security and low resource consumption. Thus, ECC is more appropriate ...  Read More
Automatic Black-Box Detection of Resistance Against CSRF Vulnerabilities in Web Applications
2. Automatic Black-Box Detection of Resistance Against CSRF Vulnerabilities in Web Applications

Mohammad Ali Hadavi; Samira Sadeghi

Volume 8, Issue 1 , Winter and Spring 2021, Pages 19-32

http://dx.doi.org/10.22108/jcs.2021.127261.1064

Abstract
  Cross-Site Request Forgery (CSRF) is an attack in which an infected website causes a victim's browser to perform an unwanted operation on a trusted website. The main solution to tackle ...  Read More
Momentum Contrast Self-Supervised Based Training for Adversarial Robustness
3. Momentum Contrast Self-Supervised Based Training for Adversarial Robustness

Monireh Moshavash; Mahdi Eftekhari; Kaveh Bahraman

Volume 8, Issue 1 , Winter and Spring 2021, Pages 33-43

http://dx.doi.org/10.22108/jcs.2021.126680.1063

Abstract
  By the rapid progress of deep learning and its use in a variety of applications, however, deep networks have shown that they are vulnerable to adversarial examples. Recently developed ...  Read More