Abdelmalek Azizi

Orcid: 0000-0002-0634-1995

According to our database1, Abdelmalek Azizi authored at least 28 papers between 2008 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
A Combination of BB84 Quantum Key Distribution and An Improved Scheme of NTRU Post-Quantum Cryptosystem.
J. Cyber Secur. Mobil., 2022

2021
On the maximal unramified pro-2-extension of certain cyclotomic $\mathbb {Z}_2$-extensions.
Period. Math. Hung., 2021

Rhythms of Arabic words and Fibonacci words.
J. King Saud Univ. Comput. Inf. Sci., 2021

A Key Establishment Attempt Based on Genetic Algorithms Applied to RFID Technologies.
Int. J. Inf. Secur. Priv., 2021

2020
3-rank of ambiguous class groups of cubic Kummer extensions.
Period. Math. Hung., 2020

Study on the Different Types of Neural Networks to Improve the Classification of Ransomwares.
Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020), 2020

2019
On the rank of the 2-class group of an extension of degree 8 over \(\mathbb {Q}\).
Period. Math. Hung., 2019

Capitulation of the 2-ideal classes of type (2,  2,  2) of some quartic cyclic number fields.
J. Math. Cryptol., 2019

Arabic Cryptography and Steganography in Morocco.
Proceedings of the Codes, Cryptology and Information Security, 2019

2017
Internet of Things Protocols Comparison, Architecture, Vulnerabilities and Security: State of the art.
Proceedings of the 2nd International Conference on Computing and Wireless Communication Systems, 2017

2016
A game theoretic approach to multipath traffic control in Content-Centric Networking.
Proceedings of the International Conference on Advanced Communication Systems and Information Security, 2016

2015
A Modified Secure Scheme of Quantum Key Distribution Without Public Announcement Bases.
J. Comput. Sci., 2015

Artificial neural network-based methodology for vulnerabilities detection in EMV cards.
Proceedings of the 11th International Conference on Information Assurance and Security, 2015

2014
On the rank of the \(2\) -class group of \(\mathbb {Q}(\sqrt{p}, \sqrt{q}, \sqrt{-1} )\).
Period. Math. Hung., 2014

On a Conjecture of Farhi.
J. Integer Seq., 2014

A variant of Pollard's rho Attack on Elliptic Curve Cryptosystems.
J. Comput. Sci., 2014

A key exchange system based on some bicyclic biquadratic number fields.
Proceedings of the 4th International Conference on Multimedia Computing and Systems, 2014

Substitution & transposition on images by using advanced affine cipher.
Proceedings of the 4th International Conference on Multimedia Computing and Systems, 2014

2013
Instances of Arabic Cryptography in Morocco II.
Cryptologia, 2013

Improving Miller's Algorithm Using the NAF and the Window NAF.
Proceedings of the Networked Systems - First International Conference, 2013

Video Encryption Based on the Permutation of the (ℤ/pℤ) Fields.
Proceedings of the Networked Systems - First International Conference, 2013

Affine cipher extended to (Z/pZ) and it's application in images.
Proceedings of the 20st International Conference on Telecommunications, 2013

2012
Modeling Embedded Systems with SysML.
Proceedings of the 2012 International Conference on Multimedia Computing and Systems, 2012

Improving Pollard's Rho attack on elliptic curve cryptosystems.
Proceedings of the 2012 International Conference on Multimedia Computing and Systems, 2012

2011
Instances of Arabic Cryptography in Morocco.
Cryptologia, 2011

2010
Analysis of the Security of BB84 by Model Checking
CoRR, 2010

Improving the Security of CHAP Protocol by Quantum Cryptography.
Proceedings of the Intelligent Distributed Computing IV - Proceedings of the 4th International Symposium on Intelligent Distributed Computing, 2010

2008
Security Oriented Analysis of B92 by Model Checking.
Proceedings of the NTMS 2008, 2008


  Loading...