An Efficient Schema of a Special Permutation Inside of Each Pixel of an Image for its Encryption Ali-Pacha, N Hadj-Said, A Ali-Pacha, M Mamat, MA Mohamed Indonesian Journal of Electrical Engineering and Computer Science 11 (2), 2018 | 8 | 2018 |
Cryptographic adaptation of the middle square generator H Ali-Pacha, N Hadj-Said, A Ali-Pacha, MA Mohamed, M Mamat International Journal of Electrical and Computer Engineering 9 (6), 5615, 2019 | 6 | 2019 |
Significant role of the specific prime number p= 257 in the improvement of cryptosystems H Ali-Pacha, N Hadj-Said, A Ali-Pacha, Ö Özer Notes on Number Theory and Discrete Mathematics 26 (4), 213-222, 2020 | 5 | 2020 |
Image encryption by using a specific adaptation of Lehmer’s algorithm H Ali-Pacha, N Hadj-Said, A Ali-Pacha Journal of Discrete Mathematical Sciences and Cryptography 23 (5), 949-971, 2020 | 4 | 2020 |
Lengthening the Period of a Linear Feedback Shift Register M NAIM, H Ali-Pacha, A Ali-Pacha, N Hadj-Said Journal of Engineering Technology and Applied Sciences 6 (1), 45-68, 2021 | 3 | 2021 |
Data security based on homographic function H Ali-Pacha, N Hadj-Said, A Ali-Pacha Pattern Recognition Letters 129, 240-246, 2020 | 3* | 2020 |
Numerical methods for differential equations as encryption key H Ali-Pacha, N Hadj-Said, A Ali-Pacha, Ö Özer Journal of Interdisciplinary Mathematics, 1-29, 2022 | 2 | 2022 |
Data reorganization for image encryption: presentation in the data of hare H Ali-Pacha, A Hadj Brahim, A Ali Pacha, A Gutub Journal of Cyber Security Technology, 1-16, 2024 | 1 | 2024 |
New Significant Results On The Cryptosystem With The Toeplitz Matrices Ö Özen, H Ali-Pacha, A Ali-Pacha Communications in Combinatorics, Cryptography & Computer Science 2024 (1 …, 2024 | 1 | 2024 |
New mode of operation inspired by the braid of long hair H Ali-Pacha, AB Ali-Pacha, N Hadj-Said Rom J Inf Technol Autom Control 33 (4), 21-32, 2023 | 1 | 2023 |
The six-dos transposition cipher based on the rubik s cube H Ali-Pacha, N Hadj-Said, A Ali-Pacha, MA Mohamed, M Mamat International Journal of Advanced Technology and Engineering Exploration 8 …, 2021 | 1 | 2021 |
Encryption System based on a Structured Matrix: Vandermonde Matrix H Ali-Pacha, N Hadj-Said, A Ali-Pacha Proceeding of the Electrical Engineering Computer Science and Informatics 4 …, 2017 | 1 | 2017 |
A New Pseudo-Random Generator Based on Two Chaotic Systems AH BRAHIM, HALI PACHA, N Mohammed, AALI PACHA Journal of Systems Science and Information 12 (6), 775-789, 2024 | | 2024 |
A novel pseudo-random number generator: combining hyperchaotic system and DES algorithm for secure applications A Hadj Brahim, H Ali Pacha, M Naim, A Ali Pacha The Journal of Supercomputing 81, 2024 | | 2024 |
A New Useful Efficient Text Encryption by a Finite Field Ö Özer, H Ali Pacha, A Ali Pacha, N Hadj Said Communications in Combinatorics, Cryptography & Computer Science (CCCS) 2024 …, 2024 | | 2024 |
Cohabitation of Fibonacci and Galois Modes in One Linear Feedback Shift Register A HADJ BRAHIM, H ALI-PACHA, N HADJ SAID, A ALİ-PACHA Journal of Engineering Technology and Applied Sciences 6 (2), 91-109, 2021 | | 2021 |
Proposition of a New Vernam Chaotic Cipher H Ali-Pacha, N Hadj-Said, A Ali-Pacha Malaysian Journal of Computing and Applied Mathematics 2 (2), 32-43, 2019 | | 2019 |
Dynamic Generalization of the Vigénère Table based on the Logistics Map H Ali-Pacha, N Hadj-Said, A Ali-Pacha Malaysian Journal of Computing and Applied Mathematics 2 (1), 25-33, 2019 | | 2019 |
Production of a Super-Increasing Sequence based on the Fibonaci Sequence A Merzoug, A Ali-Pacha, N Hadj-Said, H Ali-Pacha Malaysian Journal of Computing and Applied Mathematics 2 (1), 16-24, 2019 | | 2019 |