Security analysis of blowfish algorithm A Alabaichi, F Ahmad, R Mahmod 2013 Second International Conference on Informatics & Applications (ICIA), 12-18, 2013 | 69 | 2013 |
Enhance security of advance encryption standard algorithm based on key-dependent S-box A Alabaichi, AI Salih 2015 Fifth International Conference on Digital Information Processing and …, 2015 | 44 | 2015 |
Image steganography using least significant bit and secret map techniques. A ALabaichi, MAAK Al-Dabbas, A Salih International journal of electrical & computer engineering (2088-8708) 10 (1), 2020 | 28 | 2020 |
Color image encryption using 3D chaotic map with AES key dependent S-Box AM Alabaichi International Journal of Computer Science and Network Security (IJCSNS) 16 …, 2016 | 14 | 2016 |
Randomness analysis on Blowfish block cipher using ECB and CBC modes AM Al-Abiachi, R Mahmood, F Ahmad, M S Mechee Journal of Applied Sciences 13 (6), 768-789, 2013 | 13 | 2013 |
Analysis of Some Security Criteria for S-boxes in Blowfish Algorithm A Alabaichi, F Ahmad, R Mahmod International Journal of Digital Content Technology and its Applications …, 2013 | 12 | 2013 |
A competitive study of cryptography techniques over block cipher AM Al-Abiachi, F Ahmad, K Ruhana 2011 UkSim 13th International Conference on Computer Modelling and …, 2011 | 12 | 2011 |
Randomness analysis of 128 bits blowfish block cipher on ECB and CBC modes A Alabaichi, R Mahmod, F Ahmad International Journal of Digital Content Technology and its Applications 7 …, 2013 | 7 | 2013 |
Enhancing advance encryption standard security based on dual dynamic XOR table and mixcolumns transformation , S Adnan, A Ashwak, T Ammar, Yaseen Indonesian Journal of Electrical Engineering and Computer Science 19 (3 …, 2020 | 6 | 2020 |
TRUE COLOR IMAGE ENCRYPTION BASED ON DNA SEQUENCE, 3D CHAOTIC MAP, AND KEY-DEPENDENT DNA S-BOX OF AES A Alabaichi Journal of Theoretical and Applied Information Technology 96 (2), 304, 2018 | 6 | 2018 |
A NOVEL APPROACH FOR ENHANCING SECURITY OF ADVANCE ENCRYPTION STANDARD USING PRIVATE XOR TABLE AND 3D CHAOTIC REGARDING TO SOFTWARE QUALITY FACTOR A Salih, A Alabaichi, A Abbas ICIC Express Letters Part B: Applications 10, 823–832, 2019 | 4 | 2019 |
A dynamic 3D S-box based on cylindrical coordinate system for blowfish algorithm AM Alabaichi Indian Journal of Science and Technology 8 (30), 2015 | 4 | 2015 |
Randomness analysis of 128 bits Blowfish block cipher on ECB mode A ALabaichi, R Mahmod, F Ahmad International Journal of Computer Science and Information Security 11 (10), 8, 2013 | 4 | 2013 |
A review on security challenges and approaches in the cloud computing EMTA Alsaad, A Ashwak, SM Fayadh AIP Conference Proceedings, 2020 | 3 | 2020 |
Randomness Analysis on Blowfish Block Cipher AM ALabaich, R Mahmood, F Ahmad Global Journal on Technology 4 (2), 2013 | 3 | 2013 |
Dual method cryptography image by two force secure and steganography secret message in IoT KA Maisa'a Abid Ali, A Alabaichi, AS Abbas TELKOMNIKA 18 (6), 2928-2938, 2020 | 2 | 2020 |
IRAQI VEHICLE LICENSE PLATE RECOGNITION USING TEMPLATE MATCHING TECHNIQUE AAJ Altameemi, HH Abbas, A Alabaichi ICIC express letters. Part B, Applications: an international journal of …, 2019 | 2 | 2019 |
Proposed Prepaid System for Electricity Bills in Iraq AS Abbas, EA Abbood, A Alabaichi, S Abdulkadhm 2018 13th International Conference on Computer Engineering and Systems …, 2018 | 1 | 2018 |
Evaluation of A dynamic 3D S-Box based on Cylindrical Coordinate System for Blowfish Algorithm A ALabaichi Life Science Journal 15 (10), 2018 | 1 | 2018 |
A Novel Compressing a Sparse Matrix using Folding Technique A Alabaichi, AH Alhusiny, EM Thabit Research Journal of Applied Sciences, Engineering and Technology 14 (8), 310-319, 2017 | 1 | 2017 |