Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Hossam Diab"'
Publikováno v:
IEEE Access, Vol 12, Pp 82926-82937 (2024)
The S-Box (Substitution Box) plays a crucial role in cryptographic security by introducing non-linearity and confusion into the encryption process. It enhances the resistance against cryptanalytic attacks, such as differential and linear cryptanalysi
Externí odkaz:
https://doaj.org/article/2cd8b835cd4544738b76a0f87064b4b1
Autor:
Aly M. El-Semary, Hossam Diab
Publikováno v:
IEEE Access, Vol 7, Pp 95197-95211 (2019)
Even though the ad-hoc on-demand distance vector (AODV) is a broadly used routing protocol for mobile ad-hoc networks (MANETs), it is vulnerable to a blackhole attack. Lu et al. developed a secure MANET routing protocol called SAODV to address the se
Externí odkaz:
https://doaj.org/article/8f83bf6340564ec3be1428d41339d886
Autor:
Hossam Diab
Publikováno v:
IEEE Access, Vol 6, Pp 42227-42244 (2018)
Recently, several multimedia encryption techniques with permutation-diffusion architecture have been developed. The traditional architecture applies the diffusion and permutation functions as two separate phases. This separable design enables the att
Externí odkaz:
https://doaj.org/article/b735d0764fa247aa90a63a63098041cb
Publikováno v:
Cardiology and Angiology: An International Journal. :92-101
Background: Acute myocardial infarction (AMI) is often characterised pathologically as the death of cardiomyocytes as a consequence of persistent ischaemia result in an acute imbalance among oxygen supply and demand. Coronary artery disease (CAD) is
Autor:
Aly Mohamed El-Semary, Hossam Diab
Publikováno v:
Signal Processing. 148:172-192
This paper proposes an attack model to break the security of an image cipher entitled with “Reusing the permutation matrix dynamically for efficient image cryptographic algorithm” developed by Chen et al. The attack model uses only two chosen pla
Autor:
Aly Mohamed El-Semary, Hossam Diab
Publikováno v:
Signal Processing. 142:53-68
This paper cryptanalyses the hyper-chaotic image encryption scheme developed by Norouzi et al. and presents a chosen-plain-image attack scenario to reveal its generated key stream. The recovered key stream can be used to decrypt any future related ci
Autor:
Hossam Diab
Publikováno v:
KSII Transactions on Internet and Information Systems. 11
Publikováno v:
Communications in Nonlinear Science and Numerical Simulation. 18:136-147
Based on elementary cellular automata, a new image encryption algorithm is proposed in this paper. In this algorithm, a special kind of periodic boundary cellular automata with unity attractors is used. From the viewpoint of security, the number of c
Publikováno v:
International Journal of Information Acquisition. :227-241
Based on memory reversible cellular automata, a new self-adaptive image encryption is proposed in this paper. The self-adaptive encryption is realized by dividing the image data in to equal halves and then encrypting each half of image data using oth