Security analysis of blowfish algorithm A Alabaichi, F Ahmad, R Mahmod 2013 Second International Conference on Informatics & Applications (ICIA), 12-18, 2013 | 93 | 2013 |
Image steganography using least significant bit and secret map techniques. A ALabaichi, MAAK Al-Dabbas, A Salih International journal of electrical & computer engineering (2088-8708) 10 (1), 2020 | 89 | 2020 |
Enhance security of advance encryption standard algorithm based on key-dependent S-box A Alabaichi, AI Salih 2015 Fifth International Conference on Digital Information Processing and …, 2015 | 61 | 2015 |
Color image encryption using 3D chaotic map with AES key dependent S-Box AM Alabaichi International Journal of Computer Science and Network Security (IJCSNS) 16 …, 2016 | 21 | 2016 |
Identification of human resource analytics using machine learning algorithms EMTA Alsaadi, SF Khlebus, A Alabaichi Telkomnika (Telecommunication Computing Electronics and Control) 20 (5 …, 2022 | 16 | 2022 |
Randomness analysis on Blowfish block cipher using ECB and CBC modes AM Alabaichi, R Mahmood, F Ahmad, MS Mechee Journal of Applied Sciences Volume 13, Issue 6, 2013, Pages 768-789, 2013 | 16 | 2013 |
Enhancing advance encryption standard security based on dual dynamic XOR table and mixcolumns transformation AI Salih, AM Alabaichi, AY Tuama Indonesian Journal of Electrical Engineering and Computer Science 19 (3 …, 2020 | 15 | 2020 |
Dual method cryptography image by two force secure and steganography secret message in IoT KA Maisa'a Abid Ali, A Alabaichi, AS Abbas TELKOMNIKA (Telecommunication Computing Electronics and Control) 18 (6 …, 2020 | 13 | 2020 |
A novel approach for enhancing security of advance encryption standard using private XOR table and 3D chaotic regarding to software quality factor AI Salih, A Alabaichi, AS Abbas ICIC Express Letters Part B: Applications, An International Journal of …, 2019 | 12 | 2019 |
TRUE COLOR IMAGE ENCRYPTION BASED ON DNA SEQUENCE, 3D CHAOTIC MAP, AND KEY-DEPENDENT DNA S-BOX OF AES. A Alabaichi Journal of Theoretical & Applied Information Technology 96 (2), 2018 | 12 | 2018 |
Analysis of some security criteria for S-boxes in blowfish algorithm A ALabaichi, R Mahmod, F Ahmad International Journal of Digital Content Technology and its Applications 7 …, 2013 | 12 | 2013 |
A review on security challenges and approaches in the cloud computing EMTA Alsaadi, SM Fayadh, A Alabaichi AIP Conference Proceedings 2290 (1), 2020 | 10 | 2020 |
Steganography encryption secret message in video raster using DNA and chaotic map A Alabaichi, AA Altameemi Iraqi Journal of Science, 5534-5548, 2022 | 9 | 2022 |
A dynamic 3D S-box based on cylindrical coordinate system for blowfish algorithm AM Alabaichi Indian Journal of Science and Technology 8 (30), 2015 | 7 | 2015 |
Randomness analysis of 128 bits blowfish block cipher on ECB and CBC modes A Alabaichi, R Mahmod, F Ahmad International Journal of Digital Content Technology and its Applications 7 …, 2013 | 7 | 2013 |
A novel lightweight image encryption scheme RA Mohammed, A Alabaichi Computers, Materials and Continua 75 (1), 2137-2153, 2023 | 5 | 2023 |
Randomness analysis of 128 bits Blowfish block cipher on ECB mode A ALabaichi, R Mahmod, F Ahmad International Journal of Computer Science and Information Security 11 (10), 8, 2013 | 5 | 2013 |
Image Encryption in IOT Using Hyper-chaotic System. RA Mohammed, MAA Khodher, A Alabaichi International Journal of Intelligent Engineering & Systems 16 (6), 2023 | 4 | 2023 |
Iraqi vehicle license plate recognition using template matching technique AAJ Altameemi, HH Abbas, A Alabaichi ICIC express letters. Part B, Applications: an international journal of …, 2019 | 4 | 2019 |
Evaluation of a dynamic 3d s-box based on cylindrical coordinate system for blowfish algorithm A ALabaichi, MS Mechee Journal of Applied Sciences 15 (5), 728-740, 2015 | 3 | 2015 |