default search action
Abdelmalek Azizi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j13]El Hassane Laaji, Abdelmalek Azizi:
A Combination of BB84 Quantum Key Distribution and An Improved Scheme of NTRU Post-Quantum Cryptosystem. J. Cyber Secur. Mobil. 11(5): 673-694 (2022) - 2021
- [j12]Nabil Kannouf, Mohamed Labbi, Yassine Chahid, Mohammed Benabdellah, Abdelmalek Azizi:
A Key Establishment Attempt Based on Genetic Algorithms Applied to RFID Technologies. Int. J. Inf. Secur. Priv. 15(3): 33-47 (2021) - [j11]Imad-Eddine Benkoudad, Abdelmalek Azizi, Mouhammed El Amrani:
Rhythms of Arabic words and Fibonacci words. J. King Saud Univ. Comput. Inf. Sci. 33(8): 955-962 (2021) - [j10]Abdelmalek Azizi, Mohammed Rezzougui, Abdelkader Zekhnini:
On the maximal unramified pro-2-extension of certain cyclotomic $\mathbb {Z}_2$-extensions. Period. Math. Hung. 83(1): 54-66 (2021) - 2020
- [j9]S. Aouissi, D. C. Mayer, Moulay Chrif Ismaili, Mohammed Talbi, Abdelmalek Azizi:
3-rank of ambiguous class groups of cubic Kummer extensions. Period. Math. Hung. 81(2): 250-274 (2020) - [c14]Houria Madani, Noura Ouerdi, Ahmed Boumesaoud, Abdelmalek Azizi:
Study on the Different Types of Neural Networks to Improve the Classification of Ransomwares. SoCPaR 2020: 790-798
2010 – 2019
- 2019
- [j8]Abdelmalek Azizi, Idriss Jerrari, Abdelkader Zekhnini, Mohammed Talbi:
Capitulation of the 2-ideal classes of type (2, 2, 2) of some quartic cyclic number fields. J. Math. Cryptol. 13(1): 27-46 (2019) - [j7]Abdelmalek Azizi, Idriss Jerrari, Mohammed Talbi:
On the rank of the 2-class group of an extension of degree 8 over \(\mathbb {Q}\). Period. Math. Hung. 78(1): 128-134 (2019) - [c13]Abdelmalek Azizi:
Arabic Cryptography and Steganography in Morocco. C2SI 2019: 43-54 - 2017
- [c12]Yassine Chahid, Mohammed Benabdellah, Abdelmalek Azizi:
Internet of Things Protocols Comparison, Architecture, Vulnerabilities and Security: State of the art. ICCWCS 2017: 65:1-65:6 - 2016
- [c11]Mohamed Labbi, Nabil BenSalah, Nabil Kannouf, Youssef Douzi, Mohammed Benabdellah, Abdelmalek Azizi:
A game theoretic approach to multipath traffic control in Content-Centric Networking. ACOSIS 2016: 1-7 - 2015
- [j6]Es-Said Chanigui, Abdelmalek Azizi:
A Modified Secure Scheme of Quantum Key Distribution Without Public Announcement Bases. J. Comput. Sci. 11(1): 75-81 (2015) - [c10]Noura Ouerdi, Ilhame El Farissi, Abdelmalek Azizi, Mostafa Azizi:
Artificial neural network-based methodology for vulnerabilities detection in EMV cards. IAS 2015: 85-90 - 2014
- [j5]Siham Ezzouak, Mohammed El Amrani, Abdelmalek Azizi:
A variant of Pollard's rho Attack on Elliptic Curve Cryptosystems. J. Comput. Sci. 10(8): 1575-1581 (2014) - [j4]Soufiane Mezroui, Abdelmalek Azizi, M'hammed Ziane:
On a Conjecture of Farhi. J. Integer Seq. 17(1): 14.1.8 (2014) - [j3]Abdelmalek Azizi, Mohammed Taous, Abdelkader Zekhnini:
On the rank of the \(2\) -class group of \(\mathbb {Q}(\sqrt{p}, \sqrt{q}, \sqrt{-1} )\). Period. Math. Hung. 69(2): 231-238 (2014) - [c9]Younes Benlcouiri, Moulay Chrif Ismaili, Abdelmalek Azizi:
Substitution & transposition on images by using advanced affine cipher. ICMCS 2014: 1256-1259 - [c8]Soufiane Mezroui, Abdelmalek Azizi, M'hammed Ziane:
A key exchange system based on some bicyclic biquadratic number fields. ICMCS 2014: 1260-1264 - 2013
- [j2]Abdelmalek Azizi, Mostafa Azizi:
Instances of Arabic Cryptography in Morocco II. Cryptologia 37(4): 328-337 (2013) - [c7]Younes Benlcouiri, Abdelmalek Azizi, Moulay Chrif Ismaili, Mohammed Benabdellah:
Affine cipher extended to (Z/pZ) and it's application in images. ICT 2013: 1-5 - [c6]Younes Benlcouiri, Mohammed Benabdellah, Moulay Chrif Ismaili, Abdelmalek Azizi:
Video Encryption Based on the Permutation of the (ℤ/pℤ) Fields. NETYS 2013: 135-143 - [c5]Siham Ezzouak, Mohammed El Amrani, Abdelmalek Azizi:
Improving Miller's Algorithm Using the NAF and the Window NAF. NETYS 2013: 279-283 - 2012
- [c4]Noura Ouerdi, M'hammed Ziane, Abdelmalek Azizi, Mostafa Azizi:
Modeling Embedded Systems with SysML. ICMCS 2012: 905-910 - [c3]Siham Ezzouak, Mohammed El Amrani, Abdelmalek Azizi:
Improving Pollard's Rho attack on elliptic curve cryptosystems. ICMCS 2012: 923-927 - 2011
- [j1]Abdelmalek Azizi, Mostafa Azizi:
Instances of Arabic Cryptography in Morocco. Cryptologia 35(1): 47-57 (2011) - 2010
- [c2]Mohamed Elboukhari, Mostafa Azizi, Abdelmalek Azizi:
Improving the Security of CHAP Protocol by Quantum Cryptography. IDC 2010: 241-245 - [i1]Mohamed Elboukhari, Mostafa Azizi, Abdelmalek Azizi:
Analysis of the Security of BB84 by Model Checking. CoRR abs/1005.4504 (2010)
2000 – 2009
- 2008
- [c1]Mohamed Elboukhari, Abdelmalek Azizi, Mostafa Azizi:
Security Oriented Analysis of B92 by Model Checking. NTMS 2008: 1-6
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint