Survey paper: cryptography is the science of information security M AbuTaha, M Farajallah, R Tahboub, M Odeh International Journal of Computer Science and Security (IJCSS), 2011 | 78 | 2011 |
Design and efficient implementation of a chaos-based stream cipher MA Taha, SE Assad, A Queudet, O Deforges International Journal of Internet Technology and Secured Transactions 7 (2 …, 2017 | 33 | 2017 |
SURVEY PAPER: PSEUDO RANDOM NUMBER GENERATORS AND SECURITY TESTS. O Salhab, N Jweihan, MA Jodeh, M Abutaha, M Farajallah | 26 | 2018 |
A practical one way hash algorithm based on matrix multiplication M Abutaha, M Farajallah, R Tahboub International Journal of Computer Applications, 2011 | 23 | 2011 |
Secure hash algorithm based on efficient chaotic neural network N Abdoun, S El Assad, MA Taha, R Assaf, O Deforges, M Khalil 2016 International Conference on Communications (COMM), 405-410, 2016 | 22 | 2016 |
Privacy protection in real time HEVC standard using chaotic system M Abu Taha, W Hamidouche, N Sidaty, M Viitanen, J Vanne, S El Assad, ... Cryptography 4 (2), 18, 2020 | 21 | 2020 |
Design of a pseudo-chaotic number generator as a random number generator M Abutaha, S El Assad, O Jallouli, A Queudet, O Deforges 2016 International Conference on Communications (COMM), 401-404, 2016 | 14 | 2016 |
End-to-end real-time ROI-based encryption in HEVC videos MA Taha, N Sidaty, W Hamidouche, O Dforges, J Vanne, M Viitanen 2018 26th European Signal Processing Conference (EUSIPCO), 171-175, 2018 | 13 | 2018 |
Chaos-based cryptosystems using dependent diffusion: An overview M AbuTaha, S El Assad, M Farajallah, A Queudet, O Deforge 2015 10th International Conference for Internet Technology and Secured …, 2015 | 13 | 2015 |
New one way hash algorithm using non-invertible matrix M Abutaha, R Hamamreh 2013 International Conference on Computer Medical Applications (ICCMA), 1-5, 2013 | 12 | 2013 |
Hash function based on efficient chaotic neural network N Abdoun, S El Assad, MA Taha, R Assaf, O Deforges, M Khalil 2015 10th International Conference for Internet Technology and Secured …, 2015 | 9 | 2015 |
Comparative study of two pseudo chaotic number generators for securing the iot O Jallouli, M Abutaha, S El Assad, M Chetto, A Queudet, O Déforges 2016 International Conference on Advances in Computing, Communications and …, 2016 | 8 | 2016 |
Using AES, RSA, SHA1 for securing cloud MS Abutaha, AA Amro International conference on communication, internet and information …, 2014 | 8 | 2014 |
Secure lightweight cryptosystem for IoT and pervasive computing M Abutaha, B Atawneh, L Hammouri, G Kaddoum Scientific Reports 12 (1), 19649, 2022 | 7 | 2022 |
Power consumption of a chaos-based stream cipher algorithm B Atawneh, ALH Layla, M Abutaha 2020 3rd International Conference on Computer Applications & Information …, 2020 | 6 | 2020 |
An efficient pseudo chaotic number generator based on coupling and multiplexing techniques O Jallouli, S El Assad, MA Taha, M Chetto, R Lozi, D Caragata International Conference on Emerging Security Information, Systems and …, 2016 | 6 | 2016 |
Parallel and Practical Approach of Efficient Image Chaotic Encryption Based on Message Passing Interface (MPI) M Abutaha, I Amar, S AlQahtani Entropy 24 (4), 2022 | 5 | 2022 |
Real-time and portable chaos-based crypto-compression systems for efficient embedded architectures M Abutaha Nantes, 2017 | 5 | 2017 |
PSEUDO RANDOM NUMBER GENERATOR BASED ON LOOK-UP TABLE AND CHAOTIC MAPS Farajallah, Mousa, Mohammed Abutaha JATIT, 2020 | 4 | 2020 |
A survey of lightweight image encryption for IoT H Dweik, M Abutaha Lightweight Cryptographic Techniques and Cybersecurity Approaches, 2022 | 3 | 2022 |