A Survey on Authenticated Encryption
In this paper we survey authenticated encryption concept. We classify different approaches to design an authenticated encryption scheme and study their important properties. Next, we review three dedicated AES-based authenticated encryption schemes and the known security analysis on them. In addition, the paper briefly reviews CAESAR, an international competition to design authenticated encryption schemes, and discusses open challenges related to this competition and authenticated encryption for future works.
-
Spotting and Mitigating DDoS Attacks Using Deep Learning for Online Traffic Analysis
Mojtaba Shirinjani, Mojtaba Amiri, Amirhosein Salehi, Pouria Arefi Jamal, Rasoul Khazaei Laki, Seyed Hatef Sadegh Esfahani, Siavash Ahmadi, Masoumeh Koochak Shooshtari *,
International Journal of Information Security, Jul 2025 -
A Lightweight Online Intrusion Detection and Localization Framework for Industrial Control Systems
Amirhosein Salehi *, Siavash Ahmadi,
International Journal of Information Security, Jul 2025