Exploring Identity Theft: Motives, Techniques, and Consequents on Different Age Groups
Exploring Identity Theft: Motives, Techniques, and Consequents on Different Age Groups

Maedeh Mosharraf; Fatemeh Hora Haghighatkhah

Volume 1, Issue 1 , June 2023, , Pages 63-74

https://doi.org/10.48308/jicse.2023.231077.1017

Abstract
  While the growth of technology has greatly benefited humanity, it also brings along several drawbacks that can undermine these benefits. Despite its ability to detect attacks and deter ...  Read More
Efficient NTT Multiplier of NTRU Prime PQC Algorithm
Efficient NTT Multiplier of NTRU Prime PQC Algorithm

Raziyeh Salarifard; Reza Rashidian; Reyhaneh Kharazmi; Ali Jahanian

Volume 1, Issue 1 , June 2023, , Pages 83-89

https://doi.org/10.48308/jicse.2023.103638

Abstract
  As quantum computers become increasingly powerful, the threat of attacking classical algorithms will become more significant. Hence, post-quantum cryptography algorithms are effective ...  Read More