COUNTER MODE DEVELOPMENT FOR BLOCK CIPHER OPERATIONS
COUNTER MODE DEVELOPMENT FOR BLOCK CIPHER OPERATIONS

Ali M. Sagheer; Ahmed T. Suod

Volume 4, Issue 1 , April 2010, , Page 95-104

https://doi.org/10.37652/juaps.2010.15401

Abstract
  There are two basic types of symmetric cipher: block ciphers and stream ciphers. Block ciphers operate on blocks of plaintext and ciphertext—usually of 64 bits but sometimes longer. ...  Read More ...
ERROR CORRECTING CODE USING LATIN SQUARE
ERROR CORRECTING CODE USING LATIN SQUARE

Makarim Abdul-Waheed.Abdul-Jabbar; Ali Makki Sagheer

Volume 2, Issue 3 , December 2008, , Page 81-91

https://doi.org/10.37652/juaps.2008.15649

Abstract
  ABSTRACT:Digital data stored in computers or transmitted over computer networks are constantly subject to error due to the physical medium in which they are stored or transmitted. Error-correction ...  Read More ...
MONITORING SYSTEM FOR DETECTION OF OVER SPEED OBJECT
MONITORING SYSTEM FOR DETECTION OF OVER SPEED OBJECT

Ali M. Sagheer; Abdulrahman D. Khalaf

Volume 2, Issue 1 , April 2008, , Page 56-65

https://doi.org/10.37652/juaps.2008.15479

Abstract
  This paper introduces a system, which can be applied for monitoring of the speed of moving objects using a single camera. The Monitoring System is developed to monitor one moving object ...  Read More ...
ELLIPTIC CURVES PUBLIC KEY TRAITOR TRACING SCHEME
ELLIPTIC CURVES PUBLIC KEY TRAITOR TRACING SCHEME

Ali M. Sagheer

Volume 2, Issue 1 , April 2008, , Page 106-115

https://doi.org/10.37652/juaps.2008.15446

Abstract
  In this paper we use the elliptic curves system in the Public Key Traitor Tracing Scheme. The Elliptic Curve points form Abelian group that used in the Public Key Traitor Tracing Scheme. ...  Read More ...