Showing
1 - 16
results of
16
for search '
Mahmood Al Dabbagh, Sufyan Salim
'
Skip to content
VuFind
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Find
Advanced
Author
Mahmood Al Dabbagh, Sufyan Salim
Showing
1 - 16
results of
16
for search '
Mahmood Al Dabbagh, Sufyan Salim
'
, query time: 0.02s
Refine Results
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
1
Blakely’s secret sharing scheme
by
Mahmood
Al
Dabbagh
,
Sufyan
Salim
,
Alshaikhli, Imad Fakhri Taha
,
Israfil, Muhammad
Published 2011
Get full text
Get full text
Get full text
2
Shamir’s threshold scheme
by
Alshaikhli, Imad Fakhri Taha
,
Mahmood
Al
Dabbagh
,
Sufyan
Salim
,
Israfil, Muhammad
Published 2011
Get full text
Get full text
Get full text
3
Introduction
by
Israfil, Muhammad
,
Alshaikhli, Imad Fakhri Taha
,
Mahmood
Al
Dabbagh
,
Sufyan
Salim
Published 2011
Get full text
Get full text
Get full text
4
HISEC: a new lightweight block cipher algorithm
by
Alshaikhli, Imad Fakhri Taha
,
Mahmood
Al
Dabbagh
,
Sufyan
Salim
,
Alahmad, Mohammad
Published 2014
Get full text
Get full text
Get full text
Get full text
5
Rivest-Shamir-Adleman (RSA)
by
Mohammed Hayek, Iqram
,
Alshaikhli, Imad Fakhri Taha
,
Mahmood
Al
Dabbagh
,
Sufyan
Salim
,
Abu Hilal, Kusai
Published 2011
Get full text
Get full text
Get full text
6
Cryptanalysis of RSA
by
Alshaikhli, Imad Fakhri Taha
,
Mahmood
Al
Dabbagh
,
Sufyan
Salim
,
Mohammed Hayek, Iqram
,
Abu Hilal, Kusai
Published 2011
Get full text
Get full text
Get full text
7
Digital signature algorithm
by
Mahmood
Al
Dabbagh
,
Sufyan
Salim
,
Alshaikhli, Imad Fakhri Taha
,
Mohammed Hayek, Iqram
,
Abu Hilal, Kusai
Published 2011
Get full text
Get full text
Get full text
8
Cyber-attacks detection & protection in Kuwait government sectors
by
Alshaikhli, Imad Fakhri Taha
,
Al-Enezi , Khalid Abdulkareem
,
Al-kandari, Abdulrahman
,
Mahmood
Al
Dabbagh
,
Sufyan
Salim
Published 2014
Get full text
Get full text
Get full text
9
Block and stream cipher
by
Mahmood
Al
Dabbagh
,
Sufyan
Salim
,
Alshaikhli, Imad Fakhri Taha
,
Lubis, Muhammad Fadil
,
Mohd Azhar, Usman
,
Ando, Nopan Ziro
Published 2011
Get full text
Get full text
Get full text
10
Data Encryption Standard (DES)
by
Alshaikhli, Imad Fakhri Taha
,
Mahmood
Al
Dabbagh
,
Sufyan
Salim
,
Lubis, Muhammad Fadil
,
Mohd Azhar, Usman
,
Ando, Nopan Ziro
Published 2011
Get full text
Get full text
Get full text
11
Advanced Encryption Standard (AES)
by
Mahmood
Al
Dabbagh
,
Sufyan
Salim
,
Alshaikhli, Imad Fakhri Taha
,
Lubis, Muhammad Fadil
,
Mohd Azhar, Usman
,
Ando, Nopan Ziro
Published 2011
Get full text
Get full text
Get full text
12
Trivium and Rabbit stream cipher
by
Alshaikhli, Imad Fakhri Taha
,
Mahmood
Al
Dabbagh
,
Sufyan
Salim
,
Lubis, Muhammad Fadil
,
Mohd Azhar, Usman
,
Ando, Nopan Ziro
Published 2011
Get full text
Get full text
Get full text
13
Introduction
by
Abdulmajed, Khanssaa Munthir
,
Alshaikhli, Imad Fakhri Taha
,
Mahmood
Al
Dabbagh
,
Sufyan
Salim
,
Abdul Matin, Ahmad Faridi
,
Hussein, Sibomana Hilali
Published 2011
Get full text
Get full text
Get full text
14
Message Digest (MDx) family
by
Alshaikhli, Imad Fakhri Taha
,
Mahmood
Al
Dabbagh
,
Sufyan
Salim
,
Abdulmajed, Khanssaa Munthir
,
Abdul Matin, Ahmad Faridi
,
Hussein, Sibomana Hilali
Published 2011
Get full text
Get full text
Get full text
15
SHA family hash function
by
Abdulmajed, Khanssaa Munthir
,
Alshaikhli, Imad Fakhri Taha
,
Mahmood
Al
Dabbagh
,
Sufyan
Salim
,
Abdul Matin, Ahmad Faridi
,
Hussein, Sibomana Hilali
Published 2011
Get full text
Get full text
Get full text
16
RIPEMD and Chameleon hash function
by
Mahmood
Al
Dabbagh
,
Sufyan
Salim
,
Alshaikhli, Imad Fakhri Taha
,
Abdulmajed, Khanssaa Munthir
,
Abdul Matin, Ahmad Faridi
,
Hussein, Sibomana Hilali
Published 2011
Get full text
Get full text
Get full text
Search Tools:
RSS Feed
–
Email Search