DSpace Repository

Browsing by Author "Hamamreh, Rushdi"

Browsing by Author "Hamamreh, Rushdi"

Sort by: Order: Results:

  • Hamamreh, Rushdi; Farajallah, Mousa (International Journal of Computer Science and Network Security, 2009-05-29)
    Information security is an important issue. Hill Cipher is one of the most famous symmetric cryptosystem that can be used to protect information from unauthorized access.Hill cipher is a polygraph substitution cipher based ...
  • Abutaha, Mohammed; Hamamreh, Rushdi
    Nowadays, Cryptography plays a major role in protecting technology applications information. Hash function is a well-defined procedure that converts a large data into a small one, The returned value from hash function is ...
  • Qumsieh, Rawan; Farajallah, Mousa; Hamamreh, Rushdi (Springer US, 2019-12-01)
    Image encryption is very different from that of texts due to the bulk data capacity and the high redundancy of images. Thus, traditional methods are difficult to use for image encryption as their pseudo-random sequences ...
  • Abutaha, Mohammed; Hamamreh, Rushdi (IEEE, 2013)
    Hash functions are widely used in encryption schemes and security layers of communication protocols for data integrity, digital signature and message authentication codes [18]. Hash function is a well-defined procedure ...
  • Farajallah, Mousa; Hamamreh, Rushdi (Proceedings of the 2009 International Conference on Security Management, SAM 2009, 2009-07-13)
    Many cryptosystems were designed to prevent data from unauthorized access, and some are relatively secure but slow. Others are fast but relatively not secure enough. One of the most efficient cryptosystems is Hill ...

Search DSpace

Browse

My Account