All Stories

  1. On some realizable metabelian 5-groups
  2. A Combination of BB84 Quantum Key Distribution and An Improved Scheme of NTRU Post-Quantum Cryptosystem
  3. On the structure of the 2-Iwasawa module of some number fields of degree 16
  4. Classification of ransomware using different types of neural networks
  5. 5-Rank of ambiguous class groups of quintic Kummer extensions
  6. Note on the Hilbert 2-class field tower
  7. A Blind Digital Signature Protocol over NTRU
  8. On the $2$-class group of some number fields of $2$-power degree
  9. PRINCIPAL FACTORS AND LATTICE MINIMA IN CUBIC FIELDS
  10. Structure of the Galois group of the maximal unramified pro-$2$-extension of some $\mathbb{Z}_2$-extensions
  11. Rhythms of Arabic words and Fibonacci words
  12. On some imaginary triquadratic number fields $k$ with ${\rm Cl}_2(k) \simeq (2, 4)$ or $(2, 2, 2)$
  13. A Key Establishment Attempt Based on Genetic Algorithms Applied to RFID Technologies
  14. On the key-exchange protocol using real quadratic fields
  15. Boosted Performances of NTRUencrypt Post-Quantum Cryptosystem
  16. Cycles of reduced ideals and class number of pure cubic number field
  17. The2-rankof the class group of some real cyclic quartic number fields II
  18. The 2-rank of the class group of some real cyclic quartic number fields
  19. Unit groups and Iwasawa lambda invariants of some multiquadratic number fields
  20. On the rank of the 2-class group of some imaginary triquadratic number fields
  21. Unit groups of some multiquadratic number fields of degree 16
  22. On the $2$-class group of some number fields with large degree
  23. Study on the Different Types of Neural Networks to Improve the Classification of Ransomwares
  24. The generators of $3$-class group of some fields of degree $6$ over $\mathbb{Q}$
  25. On the maximal unramified pro-2-extension of certain cyclotomic $$\mathbb {Z}_2$$-extensions
  26. On the Hilbert $2$-class field tower of some imaginary biquadratic number fields
  27. On an Infinite Family of Imaginary Triquadratic Number Fields
  28. On Hilbert class field tower for some quartic number fields
  29. Classification and Watermarking of Brain Tumor Using Artificial and Convolutional Neural Networks
  30. Units and2-class field towers of some multiquadratic number fields
  31. On a conjecture of Lemmermeyer
  32. 3-rank of ambiguous class groups of cubic Kummer extensions
  33. Arabic Scientific and Technical Heritage in Morocco
  34. The reduced ideals of a special order in a pure cubic number field
  35. 5-Class towers of cyclic quartic fields arising from quintic reflection
  36. Classification of ransomwaresusing Artificial Neural Networks and Bayesian Networks
  37. Fields ℚ(d3,ζ3) whose 3-class group is of type (9,3)
  38. Crypto-Watermarking of Images based on the Permutation on Z/pZ and the Wavelet Decompositions of Legall 5/3
  39. On the Hilbert 2-class field of some quadratic number fields
  40. On the capitulation of the $2$-ideal classes of the field Q(\sqrt{pq_1q_2}, i) of type (2, 2, 2)
  41. Capitulation of the 2-ideal classes of type (2, 2, 2) of some quartic cyclic number fields
  42. Improving scalar multiplication over elliptic curves
  43. Arabic Cryptography and Steganography in Morocco
  44. On the 2-class field towers of some imaginary quartic cyclic number fields
  45. On the Splitting Field of Some Polynomials with Class Number One
  46. The structure of the second 2-class group of some special Dirichlet fields
  47. Classification of Ransomware Based on Artificial Neural Networks
  48. On the Efficiency of Scalar Multiplication on the Elliptic Curves
  49. On the rank of the 2-class group of an extension of degree 8 over $$\mathbb {Q}$$ Q
  50. On the unit index of some real biquadratic number fields
  51. EMV Cards Vulnerabilities Detection Using Deterministic Finite Automaton
  52. Unramified extensions of some cyclic quartic fields
  53. Internet of Things Protocols Comparison, Architecture, Vulnerabilities and Security
  54. On the second 2-class groupGal(K
  55. Steganographical application based on Al Khalil Models of poetry
  56. Internet of things security
  57. On the security of some elliptic curve standards in the presence of random fault analysis attacks
  58. On some metabelian 2-groups and applications III
  59. Capitulation in the Absolutely Abelian Extensions of some Number Fields II
  60. A game theoretic approach to multipath traffic control in Content-Centric Networking
  61. Improvement of SPEKE Protocol Using ECC and HMAC for Applications in Telecare Medicine Information Systems
  62. Multi-layer Neural Network for EMV Evaluation
  63. The group Gal(k3(2)|k) for k = ℚ(−3,d) of type (3,3)
  64. On the strongly ambiguous classes of some biquadratic number fields
  65. Capitulation in Abelian extensions of some fields ℚ(p1p2q,i)
  66. Group Theory and the Capitulation Problem for Some Number Fields
  67. On some metabelian 2-groups and applications I
  68. On the $2$-groups whose abelianizations are of type $(2, 4)$ and applications
  69. The Password Authenticated Connection Establishment Protocol (PACE) Based on Imaginary Quadratic Fields
  70. Artificial neural network-based methodology for vulnerabilities detection in EMV cards
  71. Social network analysis in the m-learning service
  72. Coclass of ${\rm Gal}({\mathbb K}_2^{(2)}/{\mathbb K})$ for some fields ${\mathbb K} = {\mathbb Q}(\sqrt{p_1p_2q}, \sqrt{-1})$ with 2-class groups of types (2, 2, 2)
  73. Quaternary quartic forms representing infinitely many prime squares
  74. THE GENERATORS OF THE $2$-CLASS GROUP OF SOME FIELDS: CORRECTION TO THEOREM 3 OF }
  75. On some metabelian 2-group whose abelianization is of type (2, 2, 2) and applications
  76. On some metabelian 2-group and applications II
  77. Sur la tour de Hilbert de certains corps
  78. Security on RFID technology
  79. Performance Comparison of Routing Protocols in Mobile Ad Hoc Networks
  80. Intrusion Detection Systems in Mobile Ad Hoc Networks: State of The Art
  81. Principalization of 2-class groups of type (2, 2, 2) of biquadratic fields ${\mathbb Q}(\sqrt{p_1p_2q}, \sqrt{-1})$
  82. Performance Comparison of Routing Protocols in Mobile Ad Hoc Networks
  83. A Modified Secure Scheme of Quantum Key Distribution Without Public Announcement Bases
  84. Intrusion Detection Systems in mobile ad hoc networks: A survey
  85. How can we succeed the fault attack on PACE protocol
  86. On the rank of the $$2$$ 2 -class group of $$\mathbb {Q}(\sqrt{p}, \sqrt{q},\sqrt{-1} )$$ Q ( p , q , - 1 )
  87. A VARIANT OF POLLARD’S RHO ATTACK ON ELLIPTIC CURVE CRYPTOSYSTEMS
  88. Optimizing the computing of pairing with Miller's algorithm
  89. Structure of $$\mathrm {Gal}(\mathbb {k}_2^{(2)}/\mathbb {k})$$ Gal ( k 2 ( 2 ) / k ) for some fields $$\mathbb {k}=\mathbb {Q}(\sqrt{2p_1p_2},i)$$ k = Q ( 2 p 1 p 2 , i ) with $$\mathbf {C}l_2(\mathbb {k})\simeq (2, 2, 2)$$ C l 2 ( k ) ≃ ( 2 , 2 , 2 )
  90. A key exchange system based on some bicyclic biquadratic number fields
  91. Substitution & transposition on images by using advanced affine cipher
  92. Sur un problème de capitulation du corps ℚ $\sqrt {p_1 p_2 } $ , i dont le 2-groupe de classes est élémentaire
  93. ON THE STRONGLY AMBIGUOUS CLASSES OF
  94. Security Vulnerabilities Tests Generation from SysML and Event-B Models for EMV Cards
  95. A fast algorithm to test the principality of ideals
  96. On the Hilbert 2-class field tower of some abelian 2-extensions over the field of rational numbers
  97. Instances of Arabic Cryptography in Morocco II
  98. On the 2-class field tower of $$\mathbb Q (\sqrt{2p_1p_2},i)$$ Q ( 2 p 1 p 2 , i ) and the Galois group of its second Hilbert 2-class field
  99. Affine cipher extended to (Z/pZ) and it's application in images
  100. Sur une question de capitulation
  101. Abstract tests based on SysML models for EMV Card
  102. EMV Card: Generation of Test Cases based on SysML Models
  103. Improving Miller’s Algorithm Using the NAF and the Window NAF
  104. Video Encryption Based on the Permutation of the (ℤ/pℤ) Fields
  105. Java cryptographycal application based on Arabic poetry
  106. CLASSIFICATION OF ATTACKS ON EMBEDDED SYSTEMS
  107. Modeling Embedded Systems with SysML
  108. Improving Pollard's Rho attack on elliptic curve cryptosystems
  109. Instances of Arabic Cryptography in Morocco
  110. Verification of Quantum Cryptography Protocols by Model Checking
  111. Integration of quantum key distribution in EAP-TLS protocol used for wireless LAN authentication
  112. Quantum Key Distribution in practice: The state of art
  113. Improving TLS Security By Quantum Cryptography
  114. Analysis of the Security of BB84 by Model Checking
  115. Improving the Security of CHAP Protocol by Quantum Cryptography
  116. Implementation of secure key distribution based on quantum cryptography
  117. Security Oriented Analysis of B92 by Model Checking
  118. Capitulation des 2-classes d'idéaux de k=Q (\sqrt 2p, i)
  119. Capitulation des 2-classes d'idéaux de certains corps biquadratiques cycliques
  120. LE 2-RANG DU GROUPE DE CLASSES DE CERTAINS CORPS BIQUADRATIQUES ET APPLICATIONS
  121. Sur une question de capitulation
  122. Sur le 2-groupe de classes d'idéaux de ℚ(√d,i)
  123. Sur la capitulation des 2-classes d'idéaux de Q(√d, i)
  124. Key Management Protocols in Mobile Ad Hoc Networks