1.

256 Bits Symmetric-key BLOCK CIPHER ALGORITHM

Volume 36, Issue 1, March 2010, Pages 44-50
Basim Sahar Yaseen

2.

A Comparative Study of Researches Based on Magic Square in Encryption with Proposing a New Technology

Volume 21, Issue 2, June 2021, Pages 102-114
Ibrahim Malik ALattar; Abdul Monem S Rahma

3.

A Compartive Study Between (AES) and (DES) Algorithms Based on the (SET) Protocol

Volume 13, Issue 3, September 2018, Pages 64-74
Khattab O. Khorsheed

4.

A Lightweight Hash Function Based on Enhanced Chaotic Map Algorithm(Keccak)

Volume 22, Issue 2, June 2022, Pages 53-62
Yusra Ahmed Ghareeb; Ekhlas Khalaf Gbashi

5.

A Method for Randomly Hiding Secret Encrypted Data in Images using Cellular Automata

Volume 13, Issue 1, June 2019, Pages 28-36
Ansam O. Abdulmajeed; Fatima M. Abdullatif; Wafaa A. Mustafa

6.

A Modification of TEA Block Cipher Algorithm for Data Security (MTEA)

Volume 29, Issue 5, March 2011, Pages 822-832
Gaidaa Saeed Mahdi

7.

Application of Polyalphabetic Substitution Cipher using Genetic Algorithm

Volume 5, Issue 1, June 2008, Pages 57-68
Ghusoon Salim Basheer

8.

Applying Encryption Method to Color FlC

Volume 0, Issue 26, September 2018, Pages 248-268
Nevart Alias Yousif; Faten Hassan Al-Qadhee

9.

Arabic Text Encryption Using Artificial Neural Networks

Volume 34, 5A, May 2016, Pages 887-899
Oday Kamil Hamid

10.

A Review of Block Cipher’s S-Boxes Tests Criteria

Volume 16, Issue 2, September 2019, Pages 91-104
Auday H. Saeed AL-Wattar

11.

Authentication using Hidden Encrypted Barcode

Volume 10, Issue 3, August 2014, Pages 44-53
Sana Ahmed Kadhom

12.

BLOCK CIPHER PERFORMANCE AND RISK ANALYSIS

Volume 17, Issue 1, June 2023, Pages 23-33
amina Alregabo; Yassin Hikmat Ismael

13.

Breaking A Playfair Cipher Using Memetic Algorithm

Volume 17, Issue 5, October 2013, Pages 172-183
Dalal Abdulmohsin Hammood

14.

Computing the shortest route amongmultiple points without revealing theirgeographical locations

Volume 7, Issue 1, June 2015, Pages 28-40
Ayad Ibrahim Abdulsada Ali Hussein Rason Ali A. Yassin

15.

Cryptanalysis of Knapsack Cipher Using Genetic Algorithm

Volume 4, Issue 2, December 2007, Pages 125-136
Subhi H. Hamdon; Najlaa B. Al-Dabbagh; Milad J. Saeed

16.

Design and Implementation Multi Level Security System

Volume 24, Issue 9, December 2016, Pages 2383-2388
Saba Mohammed Husain

17.

Design and Implementation of Stream Cipher Using Neural Network

Volume 6, Issue 1, April 2009, Pages 237-249
Siddeq Y. Ameen; Mazin Z. Othman; Safwan Hasoon; Moyed Abud Al-Razaq

18.

Designing a New Lightweight AES Algorithm to Improve the Security of the IoT Environment

Volume 22, Issue 2, June 2022, Pages 96-108
Sameeh Abdulghafour Jassim; Alaa K. Farhan

19.

Effect of Dual Reinforcement on Wear Resistance by Aluminum Compacts Reinforce by SiC, Al2O3

Volume 27, Issue 13, September 2009, Pages 423-429
Mohammed Saeed. Waheed; Hassan Hamed. Abed

20.

Encrypting Audio Data Hiding by Visual Secret Sharing

Volume 27, Issue 13, September 2009, Pages 2352-2364
Nidaa F. Hassan; Rehab F. Hassan; Akbas E. Ali

21.

Encryption VoIP based on Generated Biometric Key for RC4 Algorithm

Volume 39, 1B, March 2021, Pages 209-221
Raya W. Abd Aljabar; Nidaa F. Hassan

22.

Enhancing Embedded Data Security By Turns Cipher Block Chaining Mode Into Stream Cipher

Volume 27, Issue 13, September 2009, Pages 2457-2473
Salah Mahdi Saleh

23.

Generate Random Image-Key using Hash Technique

Volume 28, Issue 2, January 2010, Pages 382-398
Nidaa F. Hassan; Akbas E. Ali; Teaba Wala Aldeen

24.

Hiding Encryption Text by DNA using Exploiting Modification Direction Algorithm

Volume 15, Issue 1, June 2021, Pages 147-158
Mohammad S. Hashim; Melad jader saeed

25.

Hiding Sensitive Frequent Itemsets over Privacy Preserving Distributed Data

Volume 10, Issue 1, March 2013, Pages 91-105
Alaa Jumaa; Sufyan T. F. Al-Janabi; Nazar A. Ali

First Page Previous Page 1 2 Next Page Last Page


Journal Management System. Powered by ejournalplus.com