Articles by Kefa Rabah (11)

Secure Implementation of Message Digest, Authentication and Digital Signature

Kefa Rabah

Information Technology Journal 4 ( 3 ): 204 - 221 , 2005

Elliptic Curve Cryptography over Binary Finite Field GF(2m)

Kefa . Rabah

Information Technology Journal 5 ( 1 ): 204 - 229 , 2006

Implementation of Elliptic Curve Diffie-Hellman and EC Encryption Schemes

Kefa Rabah

Information Technology Journal 4 ( 2 ): 132 - 139 , 2005

Elliptic Curve ElGamal Encryption and Signature Schemes

Kefa Rabah

Information Technology Journal 4 ( 3 ): 299 - 306 , 2005

Steganography-The Art of Hiding Data

Kefa Rabah

Information Technology Journal 3 ( 3 ): 245 - 269 , 2004

Data Security and Cryptographic Techniques: A Review

Kefa Rabah

Information Technology Journal 3 ( 1 ): 106 - 132 , 2004

Theory and Implementation of Data Encryption Standard: A Review

Kefa Rabah

Information Technology Journal 4 ( 4 ): 307 - 325 , 2005

Theory and Implementation of Elliptic Curve Cryptography

Kefa Rabah

Journal of Applied Sciences 5 ( 4 ): 604 - 633 , 2005

Review of Methods for Integer Factorization Applied to Cryptography

Kefa Rabah

Journal of Applied Sciences 6 ( 2 ): 458 - 481 , 2006

Implementing Secure RSA Cryptosystems Using Your Own Cryptographic JCE Provider

Kefa Rabah

Journal of Applied Sciences 6 ( 3 ): 482 - 510 , 2006

Security of the Cryptographic Protocols Based on Discrete Logarithm Problem

Kefa Rabah

Journal of Applied Sciences 5 ( 9 ): 1692 - 1712 , 2005