Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Jump to: Article
Number of items: 16.

Article

F. AMOUNAS, and EL HASSAN EL KINANI, and H. SADKI, (2014) A Novel Approach of Amazigh Text Steganography based Elliptic Curve. International Journal of Information and Network Security, vol 3, No 2, pp. 83-91, 2014.

F. AMOUNAS, and EL HASSAN EL KINANI, (2014) Security Enhancement of Image Encryption Based on Matrix Approach using Elliptic Curve. International Journal of Engineering Inventions, vol 3, Issue 11, pp. 8-16, 2014.

F. AMOUNAS, and EL HASSAN EL KINANI, (2013) Construction Efficiency of the Elliptic Curve Cryptosystem using Code Computing for Amazigh Alphabet. International Journal of Information and Network Security (IJINS), vol 2, No 1, pp. 43-53 (2013)..

F. AMOUNAS, and EL HASSAN EL KINANI, and H. SADKI, (2013) An Efficient Signcryption Scheme based on the Elliptic Curve Discrete Logarithm Problem. International Journal of Information and Network Security (IJINS), vol 2, No 3, pp. 253-259 (2013)..

F. AMOUNAS, and EL HASSAN EL KINANI, (2013) Encryption of Data using Elliptic Curve over Circulant Matrices. iInternational Journal of Electronics Communication and computer Engineering, vol 4, No 1, pp. 1502-1506 (2013)..

F. AMOUNAS, and EL HASSAN EL KINANI, and M. HAJAR, (2013) A Matrix Approach for Information Security Based ECC using Mealy Machine and Fibonacci Q-Matrix. International Journal of Engineering and Innovative Technology, vol 3, Issue 1, pp. 500-504 (2013).

F. AMOUNAS, and EL HASSAN EL KINANI, and M. HAJAR, (2013) A Novel Approach for Enciphering Data based ECC using Catalan Numbers. International Journal of Information and Network Security (IJINS), vol 2, No 4, pp. 339-347 (2013)..

F. AMOUNAS, and EL HASSAN EL KINANI, (2013) A Novel Encryption Scheme of Amazigh Alphabet Based Elliptic Curve using Pauli Spin 1/2 Matrices. International Journal of Information and Network Security (IJINS), vol 2, No 2, pp. 190-196 (2013)..

F. AMOUNAS, and EL HASSAN EL KINANI, (2013) Proposed Developments of Blind Signature Scheme based on The Elliptic Curve Discrete Logarithm Problem. Computer Engineering and Applications Journal, vol 2, No 1, pp. 151-160 (2013)..

F. AMOUNAS, and EL HASSAN EL KINANI, (2013) Secure Encryption Scheme of Amazigh Alphabet Based ECC Using Finite State Machine. Proceedings of the JNS3, IEEE Xplore, pp.1-4 (2013)..

F. AMOUNAS, and EL HASSAN EL KINANI, (2012) Cryptography with elliptic curve using tifinagh characters. Journal of Mathematics and System Science 2 (2012) 139-144, ISSN:2159-5291.

F. AMOUNAS, and E. H. EL KINANI, (2012) ECC encryption and decryption with a data sequence. Applied Mathematical Sciences, Vol. 6, 2012, no. 101, 5039 - 5047, ISSN: 0066-5452, Springer.

F. AMOUNAS, and EL HASSAN EL KINANI, (2012) Elliptic curve digital signature algorithm using boolean permutation based ECC. International Journal of Information and Network Security (IJINS), Vol.1, No.3, August 2012, pp. 216 -222..

F. AMOUNAS, and EL HASSAN EL KINANI, (2012) Fast mapping method based on matrix approach for elliptic curve cryptography. International Journal of Information and Network Security (IJINS), Vol.1, No.2, June 2012, pp. 54~59..

F. AMOUNAS, and EL HASSAN EL KINANI, (2012) An efficient elliptic curve cryptography protocol based on matrices. International Journal ofEngineering Inventions, Vol.1, Issue 9, november 2012, pp. 49-54..

F. AMOUNAS, and EL HASSAN EL KINANI, and CHALLALI, (2011) An Application of discrete Algorithms asymmetric Cryptography. International Mathematical Forum, Vol. 6, 2011, N°. 49, 2409 - 2418.

This list was generated on Thu Mar 28 13:36:23 2024 CET.