Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Nabil Abdoun"'
Autor:
Samira Abboud, Nabil Abdoun
Publikováno v:
IEEE Access, Vol 12, Pp 2589-2606 (2024)
The unique set of LoRaWAN design prerequisites, which include low power consumption, cost-effectiveness, and high scalability, requires its security protocols to be equally robust and enduring, especially since devices are often deployed for extended
Externí odkaz:
https://doaj.org/article/2536ab2335fd49319078f65030c8ab01
Autor:
Nabil Abdoun, Safwan El Assad, Thang Manh Hoang, Olivier Deforges, Rima Assaf, Mohamad Khalil
Publikováno v:
Symmetry, Vol 13, Iss 12, p 2432 (2021)
In this paper, we propose, implement and analyze an Authenticated Encryption with Associated Data Scheme (AEADS) based on the Modified Duplex Construction (MDC) that contains a chaotic compression function (CCF) based on our chaotic neural network re
Externí odkaz:
https://doaj.org/article/7943ac45a6e64d3a81f4daeae1bdd024
Autor:
Nabil Abdoun, Safwan El Assad, Thang Manh Hoang, Olivier Deforges, Rima Assaf, Mohamad Khalil
Publikováno v:
Entropy, Vol 22, Iss 9, p 1012 (2020)
In this paper, we propose, implement, and analyze the structures of two keyed hash functions using the Chaotic Neural Network (CNN). These structures are based on Sponge construction, and they produce two variants of hash value lengths, i.e., 256 and
Externí odkaz:
https://doaj.org/article/1d86a04c5d4b4850b8ece5522da1e227
Autor:
Olivier Deforges, Nabil Abdoun, Mohamad Khalil, Thang Manh Hoang, Safwan El Assad, Rima Assaf
Publikováno v:
Entropy
Entropy, MDPI, 2020, 22 (9), pp.1012. ⟨10.3390/e22091012⟩
Volume 22
Issue 9
Entropy, 2020, 22 (9), pp.1012. ⟨10.3390/e22091012⟩
Entropy, Vol 22, Iss 1012, p 1012 (2020)
Entropy, MDPI, 2020, 22 (9), pp.1012. ⟨10.3390/e22091012⟩
Volume 22
Issue 9
Entropy, 2020, 22 (9), pp.1012. ⟨10.3390/e22091012⟩
Entropy, Vol 22, Iss 1012, p 1012 (2020)
In this paper, we propose, implement, and analyze the structures of two keyed hash functions using the Chaotic Neural Network (CNN). These structures are based on Sponge construction, and they produce two variants of hash value lengths, i.e., 256 and
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f16af144c9ca00e15c322818df3808bd
https://hal.archives-ouvertes.fr/hal-02935637/document
https://hal.archives-ouvertes.fr/hal-02935637/document
Publikováno v:
International Conference for Internet Technology and Secured Transactions
International Conference for Internet Technology and Secured Transactions, Dec 2017, Cambridge, United Kingdom. pp.35-38, ⟨10.23919/ICITST.2017.8356341⟩
ICITST
International Conference for Internet Technology and Secured Transactions, Dec 2017, Cambridge, United Kingdom. pp.35-38, ⟨10.23919/ICITST.2017.8356341⟩
ICITST
International audience; This paper presents a new structure for keyed hash function based on chaotic maps, neural network and sponge construction. The structure of proposed Keyed Sponge Chaotic Neural Network KSCNN hash function is composed of three
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ae11e3cd72d37eb9e74bbbae2120e456
https://hal.archives-ouvertes.fr/hal-01666446
https://hal.archives-ouvertes.fr/hal-01666446
Autor:
Mohammad Abu Taha, Mohamad Khalil, Nabil Abdoun, Olivier Deforges, Rima Assaf, Safwan El Assad
Publikováno v:
The 11th International Conference on Communications
The 11th International Conference on Communications, Jun 2016, Bucarest, Romania. pp.421-426
The 11th International Conference on Communications, Jun 2016, Bucarest, Romania. pp.421-426
Secure Hash Algorithm (SHA) is the most popular standard of Cryptographic Hash functions. Several security protocols use SHA to provide message integrity, authentication and digital signature. Nowadays, a new technology based on Chaotic Neural Networ
Autor:
Rima Assaf, Olivier Deforges, Mohammad Abu Taha, Mohamad Khalil, Nabil Abdoun, Safwan El Assad
Publikováno v:
International Conference on Internet Technology and Secured Transactions
International Conference on Internet Technology and Secured Transactions, Dec 2015, Londres, United Kingdom. pp.32-37, ⟨10.1109/ICITST.2015.7412051⟩
ICITST
International Conference on Internet Technology and Secured Transactions, Dec 2015, Londres, United Kingdom. pp.32-37, ⟨10.1109/ICITST.2015.7412051⟩
ICITST
International audience; This paper presents an efficient algorithm for constructinga secure Hash function based on Chaotic Neural Networkstructure. The proposed Hash function includes two mainoperations: Generation of Neural Network parameters using
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::eb92d1638a378597e38748815ecaf752
https://hal.archives-ouvertes.fr/hal-01250274
https://hal.archives-ouvertes.fr/hal-01250274