Follow
imad El Hanouti
imad El Hanouti
Verified email at usmba.ac.ma
Title
Cited by
Cited by
Year
Security analysis of an audio data encryption scheme based on key chaining and DNA encoding
I El Hanouti, H El Fadili
Multimedia Tools and Applications 80 (8), 12077-12099, 2021
162021
Cryptanalysis of an embedded systems’ image encryption
I El Hanouti, H El Fadili, K Zenkouar
Multimedia Tools and Applications 80 (9), 13801-13820, 2021
142021
A Lightweight Pseudo-Random Number Generator Based on a Robust Chaotic Map
I El Hanouti, H El Fadili, W Souhail, F Masood
2020 Fourth International Conference On Intelligent Computing in Data …, 2020
142020
Breaking an image encryption scheme based on Arnold map and Lucas series
I El Hanouti, H El Fadili, K Zenkouar
Multimedia Tools and Applications 80 (4), 4975-4997, 2021
112021
A lightweight hash function for cryptographic and pseudo-cryptographic applications
I El Hanouti, H El Fadili, S Hraoui, A Jarjar
WITS 2020: Proceedings of the 6th International Conference on Wireless …, 2022
52022
An Improved Lossy-Encryption System for Still-Image Data Based on the Quaternion Multiplication and Robust Chaos
I El Hanouti, H El Fadili, M Boussif
Proceedings of the 4th International Conference on Networking, Information …, 2021
12021
On the Inadequacy of Multimodal Maps for Cryptographic Hash Applications with Phase-Space Modulation
I El Hanouti, H El Fadili, F Ahmed, J Ahmad
Proceedings of the Seventh International Conference on Mathematics and …, 2022
2022
Cyber-Security Track Committee
J Ahmad, SU Jan, U Iqbal, A Ali, A Abbas, MZ Khan, F Alfouzan, JS Khan, ...
The system can't perform the operation now. Try again later.
Articles 1–8