List of Articles رمزنگاری Open Access Article Abstract Page Full-Text 1 - A method based on deep neural network optimized with Huffman algorithm and meta-heuristic algorithms for medical image compression and reconstruction Mohammad Hossein Khalifeh Mehdi Taghizadeh Mohammad Mehdi Ghanbarian جاسم جمالی Open Access Article Abstract Page Full-Text 2 - The new protocol blind digital signature based on the discrete logarithm problem on elliptic curve R. shahverdi Open Access Article Abstract Page Full-Text 3 - An Analysis of the Civil Liability for Environmental Damages Resulted from Cryptocurrency Mining Mahdi Madadi mohsen ghaemi khargh 10.30495/jest.2021.47723.4885 Open Access Article Abstract Page Full-Text 4 - Improvement of IOT Security in ZigBee Network Using AES256 Algorithm MohammadJavad Zand Mohammad Tahghighi Sharabian Open Access Article Abstract Page Full-Text 5 - A new method in the security of encryption systems by unbalanced gates seyyed hamidreza mousavi mehdi safaeian Amir Hassan Ahmadi Ghaleh Open Access Article Abstract Page Full-Text 6 - An Overview of Common Post-Processing Methods in Random Number Generators with an Emphasis on Use in Renewable Systems Mohsen Mousavi 10.30486/teeges.2023.1984909.1069 Open Access Article Abstract Page Full-Text 7 - Electronic Voting Based on Homomorphic Encryption in Elliptic Curve Sajjad Rezaee Adaryani Sayyed Mahdi Sajadieh 10.30486/teeges.2022.1964503.1028 Open Access Article Abstract Page Full-Text 8 - Optimal Hardware Accelerator Design for Implementation of BLAKE2b Hash Function Algorithm Mohsen Dadkhah Atefeh Salimi Nadia Hajikhiadani 10.30486/teeges.2022.1960348.1019 Open Access Article Abstract Page Full-Text 9 - A Review of Signal Security Protocols Suitable for Power-Limited Hardware Mohsen Mousavi 10.30486/teeges.2024.2004141.1121 Open Access Article Abstract Page Full-Text 10 - آستانه انعطاف پذیر در رمزنگاری مبتنی بر شناسه فازی صدیقه خواجویی نژاد سام جبه داری سید حمید حاج سید جوادی سید محمد حسین معطر Open Access Article Abstract Page Full-Text 11 - رمزنگاری بلاکی مبتنی بر اتوماتای سلولی سه بعدی مجید وفایی جهان سید مرتضی حسینی Open Access Article Abstract Page Full-Text 12 - رمزنگاری امن تصویر مبتنی بر جایگشت سطوح بیت و نگاشتهای آشوب ابوالفضل یاقوتی نیت متینه زوار Open Access Article Abstract Page Full-Text 13 - A Review of the Quantum Key Distribution Network in Fiber Optics Masoumeh Shirichian Reza Sabbaghi-Nadooshan Mahboobeh Houshmand Monireh Houshmand Open Access Article Abstract Page Full-Text 14 - Improvement of Networked Control Systems Performance Using a New Encryption Algorithm Seyed Ali Mesbahifard Benyamin Hagh Niaz Jahrimi Pooya Hajebi Seyed Mohammad Taghi Almadrasi Open Access Article Abstract Page Full-Text 15 - The Comparison of Cryptocurrency Returns Prediction Based on Geometric Brownian Motion and Wavelet Transform Ahmad Shojaei Alireza Heidarzadeh Hanzaei Open Access Article Abstract Page Full-Text 16 - Impact of applying block chain on controlling, monitoring and enforcement costs in Iran maryam Farzanehrafat amir gholami Seyed Mohammad Mehdi Ahmadi Open Access Article Abstract Page Full-Text 17 - A Review of Simulator Platforms for Quantum Key Distribution Systems Ali Mehri-Toonabi 10.71691/teeges.2026.1185967