Safwan El Assad

Orcid: 0000-0002-4026-7346

According to our database1, Safwan El Assad authored at least 61 papers between 2008 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Selective Encryption of the Versatile Video Coding Standard.
IEEE Access, 2022

Lightweight Stream Ciphers based on Chaos for Time and Energy Constrained IoT Applications.
Proceedings of the 11th Mediterranean Conference on Embedded Computing, 2022

2021
Authenticated Encryption Based on Chaotic Neural Networks and Duplex Construction.
Symmetry, 2021

2020
Design and security analysis of two robust keyed hash functions based on chaotic neural networks.
J. Ambient Intell. Humaniz. Comput., 2020

Novel Models of Image Permutation and Diffusion Based on Perturbed Digital Chaos.
Entropy, 2020

Designing Two Secure Keyed Hash Functions Based on Sponge Construction and the Chaotic Neural Network.
Entropy, 2020

Privacy Protection in Real Time HEVC Standard Using Chaotic System.
Cryptogr., 2020

A Stream Cipher Based on Fractional Pseudo Chaotic Random Number Generator.
Proceedings of the 15th International Conference for Internet Technology and Secured Transactions, 2020

A Reliable Encryption Oriented Pseudo-chaotic Number Generator Using a Key Space Expandable Strategy.
Proceedings of the 15th International Conference for Internet Technology and Secured Transactions, 2020

Design and Implementation on FPGA Board of a Chaos-based Stream Cipher.
Proceedings of the 15th International Conference for Internet Technology and Secured Transactions, 2020

2019
Speed-up of SCA attacks on 32-bit multiplications.
IACR Cryptol. ePrint Arch., 2019

Comparative Study of Three Steganographic Methods Using a Chaotic System and Their Universal Steganalysis Based on Three Feature Vectors.
Entropy, 2019

FPGA Implementation of a Pseudo-Chaotic Number Generator and Evaluation of its Performance.
Proceedings of the International Conference on Internet of Things, 2019

Image-Based Ciphering of Video Streams and Object Recognition for Urban and Vehicular Surveillance Services.
Proceedings of the Fourth International Congress on Information and Communication Technology, 2019

2018
Design and analysis of two stream ciphers based on chaotic coupling and multiplexing techniques.
Multim. Tools Appl., 2018

Cryptanalyzing an image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion.
Multim. Tools Appl., 2018

Parallel Generator of Discrete Chaotic Sequences Using Multi-threading Approach.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2018

2017
Real-time selective video encryption based on the chaos system in scalable HEVC extension.
Signal Process. Image Commun., 2017

New keyed chaotic neural network hash function based on sponge construction.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

2016
A new chaos-based image encryption system.
Signal Process. Image Commun., 2016

Fast and Secure Chaos-Based Cryptosystem for Images.
Int. J. Bifurc. Chaos, 2016

Robust chaos-based stream-cipher for secure public communication channels.
Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, 2016

Design of a pseudo-chaotic number generator as a random number generator.
Proceedings of the International Conference on Communications, 2016

Secure Hash Algorithm based on Efficient Chaotic Neural Network.
Proceedings of the International Conference on Communications, 2016

Comparative study of two pseudo chaotic number generators for securing the IoT.
Proceedings of the 2016 International Conference on Advances in Computing, 2016

2015
A novel chaotic generator based on weakly-coupled discrete skewtent maps.
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015

Chaos-based cryptosystems using dependent diffusion: An overview.
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015

Hash function based on efficient Chaotic Neural Network.
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015

ROI encryption for the HEVC coded video contents.
Proceedings of the 2015 IEEE International Conference on Image Processing, 2015

Selective video encryption using chaotic system in the SHVC extension.
Proceedings of the 2015 IEEE International Conference on Acoustics, 2015

Enhancement using chaos of a steganography method in DCT domain.
Proceedings of the 2015 Fifth International Conference on Digital Information and Communication Technology and its Applications, 2015

2014
Improvement of the Security of ZigBee by a New Chaotic Algorithm.
IEEE Syst. J., 2014

Confidential initial identification and other improvements for UMTS security.
Secur. Commun. Networks, 2014

Efficient multicore implementation of an advanced generator of discrete chaotic sequences.
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014

Survey of network access security in UMTS/LTE networks.
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014

Steganalysis of a chaos-based steganographic method.
Proceedings of the 10th International Conference on Communications, 2014

Chaos-based block ciphers: An overview.
Proceedings of the 10th International Conference on Communications, 2014

2013
Lightweight chaos-based cryptosystem for secure images.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013

Enhancement of two spatial steganography algorithms by using a chaotic system: Comparative analysis.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013

Dynamic Adjustment of the Chaos-Based Security in Real-Time Energy Harvesting Sensors.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

2012
Efficient classification algorithm and a new training mode for the adaptive radial basis function neural network equaliser.
IET Commun., 2012

Enhanced Adaptive Data Hiding in Spatial LSB Domain by using Chaotic Sequences.
Proceedings of the Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012

Improved blind DCT watermarking by using chaotic sequences.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

Chaotic generator synthesis: Dynamical and statistical analysis.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

How to guarantee secured transactions with QoS and real-time constraints.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

Chaos Based Information Hiding and Security.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

2011
Security of mobile Internet access with UMTS/HSDPA/LTE.
Proceedings of the 2011 World Congress on Internet Security, 2011

Enhancement of ZigBee and Wi-Fi security by a robust and fast chaotic algorithm.
Proceedings of the 5th International Conference on Network and System Security, 2011

An efficient and secure SPN cryptosystem based on chaotic control parameters.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

UMTS security: Enhancement of identification, authentication and key agreement protocols.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

Multicast security protocol over satellite DVB based on chaotic sequences.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

Punctured 8-PSK Turbo-TCM transmissions using recursive systematic convolutional GF(2<sup>N</sup>) encoders.
Proceedings of the 19th European Signal Processing Conference, 2011

2010
Recursive GF(2<sup>N</sup>) encoders using left-circulate function for optimum PSK-TCM schemes.
Signal Process., 2010

Chaos based fragile watermarking algorithm for JPEG images.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010

On the QAM parallel turbo-TCM schemes using recursive convolutional GF(2<sup>N</sup>) encoders.
Proceedings of the 18th European Signal Processing Conference, 2010

New Recursive Convolutional GF(2N) Encoders for Parallel Turbo-TCM Schemes.
Proceedings of the Sixth Advanced International Conference on Telecommunications, 2010

2009
Improved Frey Chaotic Digital Encoder for Trellis-Coded Modulation.
IEEE Trans. Circuits Syst. II Express Briefs, 2009

Secure TCP/IP communications over DVB-S/DVB-RCS using chaotic sequences.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009

Optimum GF(2<sup>N</sup>) encoders using left-circulate function for PSK-TCM schemes.
Proceedings of the 17th European Signal Processing Conference, 2009

Chaotic Digital Encoding for 2D Trellis-Coded Modulation.
Proceedings of the Fifth Advanced International Conference on Telecommunications, 2009

2008
Coherent Synchronization of a Chaotic Communication System Based on a QAM-4 Transmitter.
Proceedings of the Image and Signal Processing - 3rd International Conference, 2008


  Loading...