Items where Author is "Gutub, Adnan"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 39.

Thesis

(1998) Hardware Model of an Expandable RSA Cryptographic System. Masters thesis, King Fahd University of Petroleum and Minerals (KFUPM).

(2002) New Hardware Algorithms and Designs for Montgomery Modular Inverse Computation in Galois Fields GF(p) and GF(2n). PhD thesis, Oregon State University.

(1998) A Hardware Model of an Expandable RSA Cryptogrsphic System. Masters thesis, King Fahd University of Petroleum and Minerals (KFUPM).

Article

(2004) Efficient Scalable VLSI Architecture for Montgomery Inversion in GF(p). Integration, the VLSI Journal, 37 (2). pp. 103-120. ISSN 0167-9260

(2005) Efficient unified Montgomery inversion with multi-bit shifting. IEE Proceedings Computers and Digital Techniques, 152 (4). pp. 489-498. ISSN 1350-2387

(2006) Merging GF(p) Elliptic Curve Point Adding and Doubling on Pipelined VLSI Cryptographic ASIC Architecture. International Journal of Computer Science and Network Security (IJCSNS), 6 (3A). pp. 44-52. ISSN 1738-7906

(2006) Highly Efficient Elliptic Curve Crypto-Processor with Parallel GF(2m) Field Multipliers. Journal of Computer Science (JCS), 2 (5). pp. 395-400. ISSN 1549-3636

(2006) High Performance Elliptic Curve GF(2m) Crypto-processor. Information Technology Journal (ITJ), 5 (4). pp. 742-748. ISSN 1812-5638

(2006) Fast 160-Bits GF (P) Elliptic Curve Crypto Hardware of High-Radix Scalable Multipliers. International Arab Journal of Information Technology (IAJIT), 3 (4). pp. 342-349. ISSN 1683-3198

(2007) Area Flexible GF(2k) Elliptic Curve Cryptography Coprocessor. International Arab Journal of Information Technology (IAJIT), 4 (1). pp. 1-10.

(2007) High Speed Hardware Architecture to Compute GF(p) Montgomery Inversion with Scalability Features. IET (IEE) Proceedings Computers and Digital Techniques, 1 (4). pp. 389-396. ISSN 1751-861X

(2007) Efficient utilization of scalable multipliers in parallel to compute GF(p) elliptic curve cryptographic operations. Kuwait Journal of Science & Engineering (KJSE), December 2007, 34 (2). pp. 165-182.

Conference or Workshop Item

(2009) Improving Security and Capacity for Arabic Text Steganography Using 'Kashida' Extensions. In: The 7th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA-2009), 10-13 May 2009, Rabat, Morocco.

(2009) Triple-A: Secure RGB Image Steganography Based on Randomization. In: The 7th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA-2009), 10-13 May 2009, Rabat, Morocco.

(2003) High Performance Elliptic Curve GF(2k) Crypto processor Architecture for Multimedia. In: IEEE International Conference on Multimedia & Expo, ICME 2003, July 6-9, 2003, Baltimore, Maryland, USA.

(2003) Power-time flexible architecture for GF(2k) elliptic curve cryptosystem computation. In: The 13th ACM Great Lakes Symposium on VLSI, April 28 - 29, 2003, Washington, D. C., USA.

(2007) Utilizing Extension Character ‘Kashida’ With Pointed Letters For Arabic Text Digital Watermarking. In: International Conference on Security and Cryptography - SECRYPT, July 28 - 31, 2007, Barcelona, Spain.

(2007) Parallelizing GF(P) Elliptic Curve Cryptography Computations for Security and Speed. In: International Conference on Information Sciences, Signal Processing and their Applications (ISSPA), February 12-15, 2007, Sharjah, United Arab Emirates.

(2006) Scalable VLSI Design for Fast GF(p) Montgomery Inverse Computation. In: IEEE International Conference on Computer & Communication Engineering (ICCCE '06), 9-11 May 2006, Faculty of Engineering, International Islamic University Malaysia, Kuala Lumpur, Malaysia.

(2006) Pipelining GF(P) Elliptic Curve Cryptography Computation. In: The 4th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA-06), March 8-11, 2006, American University of Sharjah (AUS), Sharjah, United Arab Emirates.

(2004) Super Pipelined Digit Serial Adders for Multimedia and e-Security. In: IEEE 1st International Computer Engineering Conference on New Technologies for the Information Society (ICENCO 2004), December 27-30, 2004, Faculty of Engineering, Cairo University, Cairo, EGYPT.

(2003) VLSI Core Architecture For GF(P) Elliptic Curve Crypto Processor. In: IEEE 10th International Conference on Electronics, Circuits and Systems (ICECS 2003), December 14-17, 2003, University of Sharjah, United Arab Emirates.

(2003) Fast Elliptic Curve Cryptographic Processor Architecture Based On Three Parallel GF(2k) Bit Level Pipelined Digit Serial Multipliers. In: IEEE 10th International Conference on Electronics, Circuits and Systems (ICECS 2003), December 14-17, 2003, University of Sharjah, United Arab Emirates.

(2003) Improving Cryptographic Architectures by Adopting Efficient Adders in their Modular Multiplication Hardware VLSI. In: The 9th Annual Gulf Internet Symposium, October 13-15, 2003, Khobar, Saudi Arabia.

(2003) Efficient Scalable Hardware Architecture for Montgomery Inverse Computation in GF(P). In: IEEE Workshop on Signal Processing Systems (SIPS’03), August 27-29, 2003, Seoul, Korea.

(2003) GF(2k) Elliptic Curve Cryptographic Processor Architecture Based on Bit Level Pipelined Digit Serial Multiplication. In: ACS/IEEE International Conference on Computer Systems and Applications (AICCSA'03), July 14-18, 2003, Tunisia.

(2002) Scalable VLSI Architecture for GF(p) Montgomery Modular Inverse Computation. In: IEEE Computer Society Annual Symposium on VLSI, ISVLSI’02, April 25-26, 2002, Pittsburgh, Pennsylvania, USA.

(2002) Scalable and Unified Hardware to Compute Montgomery Inverse in GF(p) and GF(2n). In: Workshop on Cryptographic Hardware and Embedded Systems CHES’2002, August 13-15, 2002, San Francisco Bay (Redwood City), USA.

(2003) High Radix Parallel Architecture For GF(p) Elliptic Curve Processor. In: IEEE Conference on Acoustics, Speech, and Signal Processing, ICASSP 2003, April 6-10, 2003, Hong Kong.

(2007) A Novel Arabic Text Steganography Method Using Letter Points and Extensions. In: WASET International Conference on Computer, Information and Systems Science and Engineering (ICCISSE), May 25-27, 2007, Vienna, Austria.

(2008) Efficient Adders to Speedup Modular Multiplication for Cryptography. In: WoSPA 2008 - International Workshop on Signal Processing and its Applications, 18 – 20 March 2008, University of Sharjah, Sharjah, U.A.E..

(2008) Arabic Text Steganography Using Multiple Diacritics. In: WoSPA 2008 - International Workshop on Signal Processing and its Applications, 18 – 20 March 2008, University of Sharjah, Sharjah, U.A.E..

(2008) Pixel Indicator High Capacity Technique for RGB Image Based Steganography. In: WoSPA 2008 - International Workshop on Signal Processing and its Applications, 18 – 20 March 2008, University of Sharjah, Sharjah, U.A.E..

(1999) An Expandable Montgomery Modular Multiplication Processor. In: ICM '99: The Eleventh International Conference on Microelectronics, 22-24 Nov. 1999, Kuwait.

(2007) Arabic Diacritics Based Steganography. In: IEEE International Conference on Signal Processing and Communications (ICSPC 2007), 24-27 November 2007, Dubai, UAE.

(2007) Message Concealment Techniques using Image based Steganography. In: The 4th IEEE GCC Conference, 11-14 Nov. 2007, Gulf International Convention Centre, Bahrain.

Monograph

(2000) A Modulo Multiplication Hardware Design. Project Report. Professor C. Koc, Oregon State University, ECE 575 Project Report.

(2005) Speeding Up a Scalable Modular Inversion Hardware Architecture. Project Report. KFUPM, Bio-Inspired Intelligent System (BIIS) research group.

(2003) High Speed Low Power GF(2k) Elliptic Curve Cryptography Processor Architecture. Technical Report. IEEE 10th Annual Technical Exchange Meeting, KFUPM, Dhahran 31261, Saudi Arabia.

This list was generated on Sat Apr 20 01:21:36 2024 +03.