|
|
|
1.
Title:
Hardware design and implementation of ElGamal public-key cryptography algorithm / by Saadeh Z. Sweadan ; supervised by Lo'ai Tawalbeh.
للتشفير باستخدام أدوات تصميم الكمبيوتر المبرمجة elGamal تصميم وتنفيذ خوارزمية
Author:
Suwaydan, Saadah Zuhayr.
Publication:
2007.
|
|
|
|
2.
Title:
Secure Authentication protocol and key agreement for mobile networks using public-key cryptography / by Haneen Mohammed al-Fayoumi ; supervised by Nidal Shilbayeh.
Author:
al-Fayyumi, Hanin Muhammad.
Publication:
2011.
|
|
|
|
3.
Title:
Applying advanced searching techniques to encrypted data / by Maisa S. Halloush ; supervised by Oqeili Saleh.
Author:
Hallush, Maysa S.
Publication:
2007
|
|
|
|
4.
Title:
Discrete logarithm attack against RSA cryptosystem / by Abdullah Darwish Radi ; supervised by Saleh Oqeili.
RSAطريقة هجوم اللوغاريتم المتميز ضد نظام التشفير.
Author:
Radi, Abdullah Darwish.
Publication:
2005.
|
|
|
|
5.
Title:
Modular squaring algorithms suitable for hardware implementation in GF(p) / by Saed Fuad Swedan ; supervised by Lo'ai Tawalbeh.
GF(p) خوارزميات تربيع باقي القسمة مناسبة للتطبيق على القطع المادية في حقل.
Author:
Swedan, Saed Fuad.
Publication:
2008.
|
|
|
|
6.
Title:
Evaluation and comparison of public key encryption schemes over various algebraic systems / by Youssef Mohamad Ali-Bakkar ; supervised by Mohamad Rizek, co-supervisor Abdul Nasser el-Kassar.
تقييم و مقارنة طرق التشفير باستخدام المفتاح المعلن في نظم جبرية مختلفة
Author:
Ali-Bakkar, Youssef Mohamad.
Publication:
2003.
|
|
|
|
7.
Title:
Investigation of FPGA implementation for public key cryptosystem
/ by Ghaida Younis Mohammed al-Tamimi ; supervised by Prof. Dr. Andraws Issa Swidan.
التحقيق في تنفيذ FPGA لنظام تشفير المفتاح العام
Author:
al-Tamimi, Ghaida Younis Mohammed ,
Publication:
2022.
|
|
|
|
8.
Title:
A proposed block cipher system based on three-dimensional cellular automata / by Abdualwase Mohammad Obaid alezzani ; supervised by Hilal M. Yousif.
نظام تجفير كتلي مقترح بالاعتماد على الماكينة الخلوية ثلاثية الأبعاد.
Author:
al-Ezzani, Abd al-Wase' Mohammad Obaid.
Publication:
2004.
|
|
|
|
9.
Title:
Precluding software piracy using asymmetric cryptography / by Zeana Sattar Jabbar ; supervised by Mohammad A. al-Fayoumi.
Author:
Jabbar, Zaynah Sattar.
Publication:
2009.
|
|
|
|
10.
Title:
A course in mathematical cryptography / Gilbert Baumslag, Benjamin Fine, Martin Kreuzer, Gerhard Rosenberger.
De Gruyter graduate
De Gruyter graduate.
Author:
Baumslag, Gilbert,
Publication:
De Gruyter, Berlin : [2015]
|
|
|
|
|
|
|