フォロー
hana ali pacha
hana ali pacha
University of Sciences and Technology of Oran Mohamed Boudiaf Algeria
確認したメール アドレス: univ-usto.dz
タイトル
引用先
引用先
An Efficient Schema of a Special Permutation Inside of Each Pixel of an Image for its Encryption
Ali-Pacha, N Hadj-Said, A Ali-Pacha, M Mamat, MA Mohamed
Indonesian Journal of Electrical Engineering and Computer Science 11 (2), 2018
82018
Cryptographic adaptation of the middle square generator
H Ali-Pacha, N Hadj-Said, A Ali-Pacha, MA Mohamed, M Mamat
International Journal of Electrical and Computer Engineering 9 (6), 5615, 2019
62019
Significant role of the specific prime number p= 257 in the improvement of cryptosystems
H Ali-Pacha, N Hadj-Said, A Ali-Pacha, Ö Özer
Notes on Number Theory and Discrete Mathematics 26 (4), 213-222, 2020
52020
Image encryption by using a specific adaptation of Lehmer’s algorithm
H Ali-Pacha, N Hadj-Said, A Ali-Pacha
Journal of Discrete Mathematical Sciences and Cryptography 23 (5), 949-971, 2020
42020
Lengthening the Period of a Linear Feedback Shift Register
M NAIM, H Ali-Pacha, A Ali-Pacha, N Hadj-Said
Journal of Engineering Technology and Applied Sciences 6 (1), 45-68, 2021
32021
Data security based on homographic function
H Ali-Pacha, N Hadj-Said, A Ali-Pacha
Pattern Recognition Letters 129, 240-246, 2020
3*2020
Numerical methods for differential equations as encryption key
H Ali-Pacha, N Hadj-Said, A Ali-Pacha, Ö Özer
Journal of Interdisciplinary Mathematics, 1-29, 2022
22022
Data reorganization for image encryption: presentation in the data of hare
H Ali-Pacha, A Hadj Brahim, A Ali Pacha, A Gutub
Journal of Cyber Security Technology, 1-16, 2024
12024
New Significant Results On The Cryptosystem With The Toeplitz Matrices
Ö Özen, H Ali-Pacha, A Ali-Pacha
Communications in Combinatorics, Cryptography & Computer Science 2024 (1 …, 2024
12024
New mode of operation inspired by the braid of long hair
H Ali-Pacha, AB Ali-Pacha, N Hadj-Said
Rom J Inf Technol Autom Control 33 (4), 21-32, 2023
12023
The six-dos transposition cipher based on the rubik s cube
H Ali-Pacha, N Hadj-Said, A Ali-Pacha, MA Mohamed, M Mamat
International Journal of Advanced Technology and Engineering Exploration 8 …, 2021
12021
Encryption System based on a Structured Matrix: Vandermonde Matrix
H Ali-Pacha, N Hadj-Said, A Ali-Pacha
Proceeding of the Electrical Engineering Computer Science and Informatics 4 …, 2017
12017
A New Pseudo-Random Generator Based on Two Chaotic Systems
AH BRAHIM, HALI PACHA, N Mohammed, AALI PACHA
Journal of Systems Science and Information 12 (6), 775-789, 2024
2024
A novel pseudo-random number generator: combining hyperchaotic system and DES algorithm for secure applications
A Hadj Brahim, H Ali Pacha, M Naim, A Ali Pacha
The Journal of Supercomputing 81, 2024
2024
A New Useful Efficient Text Encryption by a Finite Field
Ö Özer, H Ali Pacha, A Ali Pacha, N Hadj Said
Communications in Combinatorics, Cryptography & Computer Science (CCCS) 2024 …, 2024
2024
Cohabitation of Fibonacci and Galois Modes in One Linear Feedback Shift Register
A HADJ BRAHIM, H ALI-PACHA, N HADJ SAID, A ALİ-PACHA
Journal of Engineering Technology and Applied Sciences 6 (2), 91-109, 2021
2021
Proposition of a New Vernam Chaotic Cipher
H Ali-Pacha, N Hadj-Said, A Ali-Pacha
Malaysian Journal of Computing and Applied Mathematics 2 (2), 32-43, 2019
2019
Dynamic Generalization of the Vigénère Table based on the Logistics Map
H Ali-Pacha, N Hadj-Said, A Ali-Pacha
Malaysian Journal of Computing and Applied Mathematics 2 (1), 25-33, 2019
2019
Production of a Super-Increasing Sequence based on the Fibonaci Sequence
A Merzoug, A Ali-Pacha, N Hadj-Said, H Ali-Pacha
Malaysian Journal of Computing and Applied Mathematics 2 (1), 16-24, 2019
2019
現在システムで処理を実行できません。しばらくしてからもう一度お試しください。
論文 1–19