Showing
1 - 16
results of
16
Skip to content
VuFind
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Find
Advanced
Author
Mahmood Al Dabbagh, Sufyan Salim
Search Results - Mahmood Al Dabbagh, Sufyan Salim
Showing
1 - 16
results of
16
Refine Results
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
1
HISEC: a new lightweight block cipher algorithm
by
Alshaikhli, Imad Fakhri Taha
,
Mahmood Al Dabbagh, Sufyan Salim
,
Alahmad, Mohammad
Published 2014
Get full text
Get full text
Get full text
QR Code
2
Introduction
by
Israfil, Muhammad
,
Alshaikhli, Imad Fakhri Taha
,
Mahmood Al Dabbagh, Sufyan Salim
Published 2011
Get full text
Get full text
QR Code
3
Shamir’s threshold scheme
by
Alshaikhli, Imad Fakhri Taha
,
Mahmood Al Dabbagh, Sufyan Salim
,
Israfil, Muhammad
Published 2011
Get full text
Get full text
QR Code
4
Blakely’s secret sharing scheme
by
Mahmood Al Dabbagh, Sufyan Salim
,
Alshaikhli, Imad Fakhri Taha
,
Israfil, Muhammad
Published 2011
Get full text
Get full text
QR Code
5
Rivest-Shamir-Adleman (RSA)
by
Mohammed Hayek, Iqram
,
Alshaikhli, Imad Fakhri Taha
,
Mahmood Al Dabbagh, Sufyan Salim
,
Abu Hilal, Kusai
Published 2011
Get full text
Get full text
QR Code
6
Cryptanalysis of RSA
by
Alshaikhli, Imad Fakhri Taha
,
Mahmood Al Dabbagh, Sufyan Salim
,
Mohammed Hayek, Iqram
,
Abu Hilal, Kusai
Published 2011
Get full text
Get full text
QR Code
7
Digital signature algorithm
by
Mahmood Al Dabbagh, Sufyan Salim
,
Alshaikhli, Imad Fakhri Taha
,
Mohammed Hayek, Iqram
,
Abu Hilal, Kusai
Published 2011
Get full text
Get full text
QR Code
8
Cyber-attacks detection & protection in Kuwait government sectors
by
Alshaikhli, Imad Fakhri Taha
,
Al-Enezi , Khalid Abdulkareem
,
Al-kandari, Abdulrahman
,
Mahmood Al Dabbagh, Sufyan Salim
Published 2014
Get full text
Get full text
QR Code
9
Block and stream cipher
by
Mahmood Al Dabbagh, Sufyan Salim
,
Alshaikhli, Imad Fakhri Taha
,
Lubis, Muhammad Fadil
,
Mohd Azhar, Usman
,
Ando, Nopan Ziro
Published 2011
Get full text
Get full text
QR Code
10
Data Encryption Standard (DES)
by
Alshaikhli, Imad Fakhri Taha
,
Mahmood Al Dabbagh, Sufyan Salim
,
Lubis, Muhammad Fadil
,
Mohd Azhar, Usman
,
Ando, Nopan Ziro
Published 2011
Get full text
Get full text
QR Code
11
Advanced Encryption Standard (AES)
by
Mahmood Al Dabbagh, Sufyan Salim
,
Alshaikhli, Imad Fakhri Taha
,
Lubis, Muhammad Fadil
,
Mohd Azhar, Usman
,
Ando, Nopan Ziro
Published 2011
Get full text
Get full text
QR Code
12
Trivium and Rabbit stream cipher
by
Alshaikhli, Imad Fakhri Taha
,
Mahmood Al Dabbagh, Sufyan Salim
,
Lubis, Muhammad Fadil
,
Mohd Azhar, Usman
,
Ando, Nopan Ziro
Published 2011
Get full text
Get full text
QR Code
13
Introduction
by
Abdulmajed, Khanssaa Munthir
,
Alshaikhli, Imad Fakhri Taha
,
Mahmood Al Dabbagh, Sufyan Salim
,
Abdul Matin, Ahmad Faridi
,
Hussein, Sibomana Hilali
Published 2011
Get full text
Get full text
QR Code
14
Message Digest (MDx) family
by
Alshaikhli, Imad Fakhri Taha
,
Mahmood Al Dabbagh, Sufyan Salim
,
Abdulmajed, Khanssaa Munthir
,
Abdul Matin, Ahmad Faridi
,
Hussein, Sibomana Hilali
Published 2011
Get full text
Get full text
QR Code
15
SHA family hash function
by
Abdulmajed, Khanssaa Munthir
,
Alshaikhli, Imad Fakhri Taha
,
Mahmood Al Dabbagh, Sufyan Salim
,
Abdul Matin, Ahmad Faridi
,
Hussein, Sibomana Hilali
Published 2011
Get full text
Get full text
QR Code
16
RIPEMD and Chameleon hash function
by
Mahmood Al Dabbagh, Sufyan Salim
,
Alshaikhli, Imad Fakhri Taha
,
Abdulmajed, Khanssaa Munthir
,
Abdul Matin, Ahmad Faridi
,
Hussein, Sibomana Hilali
Published 2011
Get full text
Get full text
QR Code
Search Tools:
RSS Feed
Email Search