Welcome
user_choices_background_image
Welcome
login container bottom
Search Libraries Catalogue
Duplicate Items
Add to My List

Print
Sorts and Limits

Results 1 - 16 of 16
1. Title: Hardware design and implementation of ElGamal public-key cryptography algorithm / by Saadeh Z. Sweadan ; supervised by Lo'ai Tawalbeh.
للتشفير باستخدام أدوات تصميم الكمبيوتر المبرمجة elGamal تصميم وتنفيذ خوارزمية
Author: Suwaydan, Saadah Zuhayr.
Publication: 2007.
2. Title: Secure Authentication protocol and key agreement for mobile networks using public-key cryptography / by Haneen Mohammed al-Fayoumi ; supervised by Nidal Shilbayeh.
Author: al-Fayyumi, Hanin Muhammad.
Publication: 2011.
3. Title: Applying advanced searching techniques to encrypted data / by Maisa S. Halloush ; supervised by Oqeili Saleh.
Author: Hallush, Maysa S.
Publication: 2007
4. Title: Discrete logarithm attack against RSA cryptosystem / by Abdullah Darwish Radi ; supervised by Saleh Oqeili.
RSAطريقة هجوم اللوغاريتم المتميز ضد نظام التشفير.
Author: Radi, Abdullah Darwish.
Publication: 2005.
5. Title: Modular squaring algorithms suitable for hardware implementation in GF(p) / by Saed Fuad Swedan ; supervised by Lo'ai Tawalbeh.
GF(p) خوارزميات تربيع باقي القسمة مناسبة للتطبيق على القطع المادية في حقل.
Author: Swedan, Saed Fuad.
Publication: 2008.
6. Title: Evaluation and comparison of public key encryption schemes over various algebraic systems / by Youssef Mohamad Ali-Bakkar ; supervised by Mohamad Rizek, co-supervisor Abdul Nasser el-Kassar.
تقييم و مقارنة طرق التشفير باستخدام المفتاح المعلن في نظم جبرية مختلفة
Author: Ali-Bakkar, Youssef Mohamad.
Publication: 2003.
7. Title: Investigation of FPGA implementation for public key cryptosystem / by Ghaida Younis Mohammed al-Tamimi ; supervised by Prof. Dr. Andraws Issa Swidan.
التحقيق في تنفيذ FPGA لنظام تشفير المفتاح العام
Author: al-Tamimi, Ghaida Younis Mohammed ,
Publication: 2022.
8. Title: A proposed block cipher system based on three-dimensional cellular automata / by Abdualwase Mohammad Obaid alezzani ; supervised by Hilal M. Yousif.
نظام تجفير كتلي مقترح بالاعتماد على الماكينة الخلوية ثلاثية الأبعاد.
Author: al-Ezzani, Abd al-Wase' Mohammad Obaid.
Publication: 2004.
9. Title: Precluding software piracy using asymmetric cryptography / by Zeana Sattar Jabbar ; supervised by Mohammad A. al-Fayoumi.
Author: Jabbar, Zaynah Sattar.
Publication: 2009.
10. Title: A course in mathematical cryptography / Gilbert Baumslag, Benjamin Fine, Martin Kreuzer, Gerhard Rosenberger.
De Gruyter graduate
De Gruyter graduate.
Author: Baumslag, Gilbert,
Publication: De Gruyter, Berlin : [2015]
 
 
Results 1 - 16 of 16
Duplicate Items
Add to My List

Print
Sorts and Limits