Keywords = Encryption
Number of Articles: 58

1

A Compartive Study Between (AES) and (DES) Algorithms Based on the (SET) Protocol

Kirkuk University Journal-Scientific Studies
Volume 13, Issue 3, Summer 2018, Page 64-74
Khattab O. Khorsheed

2

A Development of Least Significant Bit Steganography Technique

IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING
Volume 20, Issue 1, Winter 2020, Page 31-39
Mohammed Majid Msallam

3

A Hybrid Algorithm to Protect Computer Networks Based on Human Biometrics and Computer Attributes

Ibn Al-Haitham Journal For Pure And Applied Science
Volume 29, Issue 3, Autumn 2016, Page 209-221
Rahim Abdul-Al Sahib Ogla

4

A Hybrid Verifiable and Delegated Cryptographic Model in Cloud Computing

Journal of University of Babylon
Volume 26, Issue 3, Summer 2018, Page 67-74
Jaber Ibrahim Naser

5

A Modification on Key Stream Generator for RC4 Algorithm

Engineering and Technology Journal
Volume 38, 2B, Summer 2020, Page 54-60
Suhad M. Kareem; Abdul Monem S. Rahma

6

A Modified Technique For Image Encryption

Journal of Univesity of Thi-Qar
Volume 5, Issue 1, Winter 2010, Page 1-11
Dr. Turki Y. Abdalla; Hameed A. Younis

7

A New Algorithm to Encryption and Compression Image Data File

JOURNAL OF EDUCATION AND SCIENCE
Volume 24, Issue 1, Winter 2011, Page 108-118
Riyad Mubarak Abdullah

8

A New Technique For Image Encryption

Journal of Univesity of Thi-Qar
Volume 6, Issue 2, Spring 2011, Page 1-11
Dr. Turki Y. Abdalla; Hameed A. Younis

9

Apply Block Ciphers Using Tiny Encryption Algorithm (TEA)

Baghdad Science Journal
Volume 7, Issue 2, Spring 2010, Page 1061-1069
Hana Rashied Ismaeel

10

A Proposed Algorithm to Improve the Security Level of Advanced Encryption Standard

Iraqi Journal of Applied Physics
Volume 8, Issue 4, Autumn 2012, Page 29-32
H.M. Azzawi

11

A Proposed Method for Encrypting Data In Image by Using Cryptography Technique and Steganography

AL-MANSOUR JOURNAL
Volume 0, Issue 22, Summer 2017, Page 95-109
Hasan M. Azzawi

12

A Random Key Generation Approach for Rijndael Algorithm

Journal of Al-Nahrain University - Science
Volume 15, Issue 3, Summer 2012, Page 190-195
Dalal Naeem Hmood

13

A Secure Enhancement for Encoding/ Decoding data using Elliptic Curve Cryptography

Iraqi Journal of Science
Volume 59, Issue 1, Spring 2018, Page 189-198
Kawther E. Abdullah; Nada Hussein M. Ali

14

Build Encrypted Chat System by using multicast technique with determine delay time

Journal of College of Education for Pure Science
Volume 4, Issue 1, Spring 2014, Page 215-220
Atheer Y. Oudah; Wessam A. hamed; Hyder Y. Atwan

15

Chaotic Encryption Based on Biometric Key

AL-Rafidain Journal of Computer Sciences and Mathematics
Volume 7, Issue 3, Autumn 2010, Page 183-198
Saja J. Mohammed; Melad jader saeed; Ielaf O. Abdul Majjed

16

Ciphering an Embedded Text Based in Magic Squares (MS) and It's Applications

Tikrit Journal of Pure Science
Volume 19, Issue 5, Summer 2014, Page 135-137
Mageed Hameed Ali

17

CIPHERING OF TEXT BY USING SHFIT REGISTER TECHNIQUE AND ITS TRANSMISSION OVER OPTICAL FIBER

Al-Qadisiyah Journal for Engineering Sciences
Volume 3, Issue 1, Winter 2010, Page 91-108
Haider J. Abd; Mohanned Hassan Ali

18

Data encryption Using Backpropagation Neural Network

Tikrit Journal of Pure Science
Volume 15, Issue 2, Summer 2010, Page 112-117
Raid R. Al-nima

19

Data integrity enhancement for the encryption of color images based on CRC64 technique using multiple look-up tables

Iraqi Journal of Science
Volume 58, Issue 3, Spring 2018, Page 1729-1739
Nada Hussein M. Ali; Ruaa A. Abdul-Sattar

20

Data Security Protection in Cloud Computing by using Encryption

Kirkuk University Journal-Scientific Studies
Volume 12, Issue 4, Autumn 2017, Page 276-286
Asst. Lec. Ghassan Sabeeh Mahmood

21

Design and Simulation of Secure Communication System

Journal of Engineering and Sustainable Development
Volume 18, Issue 4, Summer 2014, Page 155-161
Ahmed S. Hadi; Zaid Ali Salman; Saleem M. Mohammed

22

Design New Algorithm For Partial Image Encryption Based colors Space

Journal of University of Babylon
Volume 20, Issue 2, Spring 2012, Page 458-471
Ali A.Yassin

23

Development AES Algorithm to Encryption Images and Sounds Files

AL-Rafidain Journal of Computer Sciences and Mathematics
Volume 9, Issue 1, Spring 2012, Page 113-127
Mohammed C.Y. Al-Zubaidy

24

Encrypt and Hide Data in True Color Image Classes

AL-Rafidain Journal of Computer Sciences and Mathematics
Volume 10, Issue 3, Summer 2013, Page 75-89
Maha A. Hasso; Shahad A. Hasso; Ban Ghanem Maayouf

25

Encrypted Data Hiding & Retrieval of an Image using LSB Based on RBF Network

AL-Rafidain Journal of Computer Sciences and Mathematics
Volume 7, Issue 3, Autumn 2010, Page 199-208
Amera Istiqlal Badran; Abdulsattar M. Khidhir; laheeb Mohammed Ibrahim

26

Encryption and Compression Digital Video Files using Artificial Neural Networks and Genetic Algorithm

JOURNAL OF EDUCATION AND SCIENCE
Volume 28, Issue 4, Autumn 2019, Page 189-205
Hasan M.A. Anwer

27

Encryption and Hiding Watermarking Using A Chaotic Modified Wavelet Transform

AL-Rafidain Journal of Computer Sciences and Mathematics
Volume 8, Issue 2, Autumn 2011, Page 87-97
Shaimaa Sh. Mohammad

28

Enhance the Hiding Image by Using Compression and Securing Techniques

Iraqi Journal for Computers and Informatics ijci
Volume 43, Issue 1, Spring 2017, Page 14-16
Saif Saad; Fouad H. Awad; Ahmed S. Farhan

29

Enhancing The Encryption Process Of Advanced Encryption Standard (AES) By Using Proposed Algorithm To Generate S-Box

Journal of Engineering and Sustainable Development
Volume 18, Issue 2, Spring 2014, Page 89-105
Hasan M. Azzawi

30

Fast Techniques For Partial Encryption of Wavelet-based Digital Images

basrah journal of science
Volume 25, Issue 2, Autumn 2007, Page 78-96
Abdulkareem Y. Abdalla; Hameed A. Younis; Turki Y. Abdalla

31

Finding the Best Key Stream by Using Genetic Algorithm for Image Encryption

Journal of Basrah Researches (Sciences)
Volume 36, Issue 3, Summer 2010, Page 72-80
Issa A. Abed

32

Hardware Implementation of Artificial Neural Network for Data Ciphering

Tikrit Journal of Engineering Sciences
Volume 23, Issue 2, Spring 2016, Page 74-85
Sahar L. Kadoory; Toka A. Fatehi; Qutaiba A. Hasan

33

Hyper Secure Algorithm for Text

AL-Rafidain Journal of Computer Sciences and Mathematics
Volume 8, Issue 2, Autumn 2011, Page 51-65
Melad jader saeed

34

Image Encryption Using Block Cipher Based Serpent Algorithm

Engineering and Technology Journal
Volume 34, Issue 2, Winter 2016, Page 278-286
Yossra Hussain Ali; Haider Aabdali Ressan

35

Improvement of A5/1 encryption algorithm based on Using Unit Delay

journal of al-qadisiyah for pure science(quarterly)
Volume 14, Issue 3, Summer 2014, Page 211-222
Sattar B. Sadkhan

36

Measurement of Encryption Quality of Bitmap Images with RC6, and two modified version Block Cipher

Engineering and Technology Journal
Volume 28, Issue 17, Summer 2010, Page 5603-5613
Baedaa H. Helal; Ashwaq T. Hashim

37

Modified Blowfish Algorithm for Image Encryption using Multi Keys based on five Sboxes

Iraqi Journal of Science
Volume 57, Issue 4, Summer 2016, Page 2968-2978
Nada Hussein M. Ali; Suaad Ali Abead

38

New Approach for Serpent Block Cipher Algorithm Based on Multi Techniques

Iraqi Journal of Information Technology
Volume 7, Issue 3, Summer 2017, Page 1-13
Israa Ahmed; Gada Ali; Semaa Hassin; Alaa kadhim F

39

Partial Encryption Of Color Image By Edge Detection

Journal of Al-Qadisiyah for Computer Science and Mathematics
Volume 2, Issue 2, Autumn 2010, Page 1-19
Ali A.Yassin

40

Proposal New Approach of Block Cipher using A.I

Iraqi Journal of Information Technology
Volume 6, Issue 4, Autumn 2014, Page 80-94
Alaa Kadhim

41

Proposal New S-box for AES Algorithm Depend on A.I Bee Colony

Engineering and Technology Journal
Volume 33, Issue 1, Winter 2015, Page 12-24
Alaa Kadhim; Sura Khalaf

42

Proposal of New Block Cipher Algorithm Depend on Public Key Algorithms

AL-MANSOUR JOURNAL
Volume 0, Issue 26, Autumn 2017, Page 119-140
Fadhil H. Abbood; Ameen A. Noor; Hussein Abed

43

Proposal to Complex DES Security Using Diffie Hellman Injection

Engineering and Technology Journal
Volume 29, Issue 6, Spring 2011, Page 1216-1226
Shatha habeeb Jafar

44

Proposed Hybrid-Encryption System for Multicast Network

Engineering and Technology Journal
Volume 28, Issue 24, Autumn 2010, Page 7027-7036
Mohammad Natiq Fadhil Ibraheem

45

Proposed Method for Text Encryption Using Two Secret Keys and One Secret Mathematical Equation

Al-Rafidain University College For Sciences
Volume 0, Issue 24, Winter 2017, Page 72-87
Qusay M. Jafar Alsadi

46

Reliable Implementation of Paillier Cryptosystem

Iraqi Journal of Applied Physics
Volume 10, Issue 4, Autumn 2014, Page 27-29
Alia K. Abdul Hassan

47

Retrieving Encrypted Query from Encrypted Database Depending on Symmetric Encrypted Cipher System Method

Diyala Journal For Pure Science
Volume 13, Issue 1, Winter 2017, Page 183-207
Ghassan H. Abdul-Majeed; Alaa Kadhim F; Rasha Subhi Ali

48

Secured Smart Card Simulation

Journal of Engineering
Volume 18, Issue 4, Spring 2012, Page 459-471
Oday A.L.A Ridha; Sarkout N. Abdulaah; Zahraa Ali Jwad

49

Secure mining of the cloud encrypted database

Journal of Basrah Researches (Sciences)
Volume 43, Issue 2, Autumn 2017, Page 44-57

50

Secure Video Coded System Model

Iraqi Journal for Computers and Informatics ijci
Volume 42, Issue 1, Autumn 2016, Page 5-9
Tariq Adnan Fadil

51

Speech Encryption Using Chaotic Map and Blowfish Algorithms

Journal of Basrah Researches (Sciences)
Volume 39, Issue 2, Spring 2013, Page 68-76
Maysaa abd ulkareem Nasser and Iman Qays Abduljaleel

52

Stream Cipher Using Genetic Algorithm

AL-Rafidain Journal of Computer Sciences and Mathematics
Volume 6, Issue 3, Autumn 2009, Page 111-126
Melad jader saeed

53

Text Compression & Encryption Method Based on RNA and MTF

Iraqi Journal of Science
Volume 58, Issue 2, Winter 2018, Page 1149-1158
Ekhlas Khalaf Gbashi

54

Use the Genetic Algorithm to Encode and Hide Gray Image Data

AL-Rafidain Journal of Computer Sciences and Mathematics
Volume 10, Issue 1, Winter 2013, Page 169-182
Raya Jassim Essa; Reham Jassim Essa; Inam Muhammad Sulaiman

55

Visual Cryptography for Color Image with Discrete Wavelet Transform & Chaos Theory

Iraqi Journal of Information Technology
Volume 7, Issue 2, Spring 2017, Page 17-34
Alaa Kadhim; Rand Mahmoud

56

Wireless Network Security Based on Multiple Cipher Techniques

Iraqi Journal of Information Technology
Volume 7, Issue 3, Summer 2017, Page 14-30
Hesham A. ALABBASI

57

X.K.N: A Proposed Method for Data Encryption Using XOR and NOT Logical Gates with LFSR Generated Keys

Iraqi Journal of Science
Volume 57, Issue 1, Winter 2016, Page 742-754
Qusay Mohamed Jaafar

58

طرق التشفير وفك التشفير باستخدام زمرة المنحنى البيضوي

مجلة الکلیة الاسلامیة الجامعة
Volume 4, Issue 7, Winter 2009, Page 11-18
م.م. نجلاء فلاح حميد; أ.د. ستار بدر سد خان