Publications

Toutes les actualités

Publications

 Publications Internationales: (Nombre: 74)

74) M. Naim,  A. Ali Pacha, « A new chaotic satellite image encryption algorithm based on a 2D flter and Fisher–Yates shufing”, The Journal of Supercomputing

https://doi.org/10.1007/s11227-023-05346-5

https://link.springer.com/article/10.1007/s11227-023-05346-5

73) A. Hadj Brahim& A. Ali Pacha& N. Hadj Said, “A new image compression-encryption scheme based on compressive sensing & classical AES algorithm”, Multimedia Tools and Applications https://doi.org/10.1007/s11042-023-15171-w, Published online 04 April 2023.

https://trebuchet.public.springernature.app/get_content/135e26ca-23aa-415b-8714-e7bad22ab3d0

72) A. Hadj Brahim, A. Ali Pacha, N. Hadj Said, “An image encryption scheme based on a modified AES algorithm by using a variable S-box”, Journal of Optics, DOI10.1007/s12596-023-01232-8

https://doi.org/10.1007/s12596-023-01232-8

https://trebuchet.public.springernature.app/get_content/a4404feb-bf0c-43d4-84a8-067419ac6afa

71)Belkacem Imine, Naima Hadj Said, Adda Ali Pacha« New McEliece cryptosystem based on non-permutation equivalent polar codes », Journal of Discrete Mathematical Sciences and Cryptography,Vol. 26 (2023), No. 1, pp. 103–114,  DOI: 10.1080/09720529.2021.1933706,

https://www.tandfonline.com/doi/abs/10.1080/09720529.2021.1933706

70) Amine Zellagui, Naima Hadj-Said & Adda Ali-Pacha (2022), “A new hash function inspired by sponge construction using chaotic maps”, Journal of Discrete Mathematical Sciences and Cryptography, DOI: 10.1080/09720529.2021.1961900.

https://doi.org/10.1080/09720529.2021.1961900

https://www.tandfonline.com/doi/abs/10.1080/09720529.2021.1961900?needAccess=true&journalCode=tdmc20

69) Saadi Abdelkader, adda Ali-Pacha,Naima Hadj-Said, “Physical layer security based on chaotic maps applied to OFDM systems”, International Journal of Advanced Studies in Computer Science & Engineering, IJASCSE, Volume12, Issue 01, 2023, Pages 51-60.

https://www.proquest.com/openview/c8f3f349893fd11f4e8ad44d1471abc0/1.pdf?pq-origsite=gscholar&cbl=2028729

68) A. Hadj Brahim, A. Ali Pacha & N. HADJ Said (2023) A new image encryption scheme based on a hyperchaotic system & multi specific S-boxes, Information Security Journal: A Global Perspective, Vol.32 N°:2, pp. 59-75, DOI: 10.1080/19393555.2021.1943572

https://doi.org/10.1080/19393555.2021.1943572

67)Merah Lahcene,Chaib Noureddine, Pascal Lorenz, Ali-Pacha Adda, « Securing information using a proposed reliable chaos-based stream cipher: with real-time FPGA-based wireless connection implementation », Nonlinear Dynamics Journal, (2023) Vol. 111: pp. 801–830 https://doi.org/10.1007/s11071-022-07824-6

https://trebuchet.public.springernature.app/get_content/0eebf759-2d6c-48fa-a5a4-126b61fb52a6

66) H. Merah, L.Merah, N. Chaib, A.Ali-Pacha, « Designing and real-time FPGA-based implementation of a Chroma-key effect system using Xilinx System Generator », DOI: 10.18178/ijfcc.2022.11.4.591, International Journal of Future Computer and Communication (IJFCC), December, 2022.

http://www.ijfcc.org/index.php?m=content&c=index&a=show&catid=101&id=978

65) Hana ALI-PACHA, Naima HADJ-SAID, Adda ALI-PACHA, ÖzenÖzer, « Numerical Methods for Differential Equations as Encryption Key”, Journal of Interdisciplinary Mathematics,.https://doi.org/10.1080/09720502.2021.1947598, Volume 25, 2022 – Numéro 8, pp.2209-2237.https://www.tandfonline.com/doi/abs/10.1080/09720502.2021.1947598

64) Meftah Mustapha, Adda Ali-Pacha , Naima Hadj-Said, (2022) « DNA Encryption Algorithm Based on Huffman Coding  Journal of Discrete Mathematical Sciences and Cryptography, DOI https://doi.org/10.1080/09720529.2020.1818450, Volume 25, No. 6, pp. 1831–1844. https://www.tandfonline.com/doi/abs/10.1080/09720529.2020.1818450

63) Asmaa Boudali, Naima Hadj Said & Adda Ali-Pacha (2022) A new symmetrical cryptosystem based cellular automata and chaotic map function, Journal of Discrete Mathematical Sciences and Cryptography, Vol.25, N°5, pp.1435-1455, DOI: 10.1080/09720529.2021.2020427. Published online: 24 May 2022

https://www.tandfonline.com/doi/abs/10.1080/09720529.2021.2020427

62) E. Iftene, A. Ali-Pacha, L. Hadj Abderrahmane, “Design of a Modified Interleaving Algorithm Based on Golden Section Theory Enhancing the Performance of Turbo Codes”, Journal of Telecommunications and Information Technology, Vol. 2/2022, pp. 35-42, https://doi.org/10.26636/jtit.2022.158721, https://www.itl.waw.pl/czasopisma/JTIT/2022/2/35.pdf

61) Zineb BouchraMadouri, Naima Hadj-Said & Adda Ali-Pacha (2022), “Image Encryption Algorithm Based on Digital Filters Controlled by 2D Robust Chaotic Map”, Optik, Volume 264,August 2022, 169382,

https://www.sciencedirect.com/science/article/pii/S0030402622007045?dgcid=coauthor

https://authors.elsevier.com/tracking/article/details.do?aid=169382&jid=IJLEO&surname=Madouri

60) Nabil Kerkacha, Naima Hadj Said, NoureddineChaib, AsmaAdnane&Adda Ali Pacha, “Enhancing QoS in Privacy Based Vehicular Communication”, AHSWN Ad Hoc & Sensor Wireless Networks, Vol. 52, 3-4, pp. 273–295, Accepted: February 2, 2022.

https://www.oldcitypublishing.com/journals/ahswn-home/ahswn-forthcoming-papers/20606-2/

59) Amine Zellagui, Naima Hadj-Said & Adda Ali-Pacha (2022), “A secure hash function based on sponge construction and chaos-maps”, Int. J. Computational Science and Engineering, DOI10.1504/IJCSE.2022.123116, Vol. 25, No. 3, pp: 285-297, 2022.

https://www.inderscience.com/info/inarticle.php?artid=123116

58) A. Hadj Brahim, A. Ali Pacha & N. HADJ Said, “A new image encryption scheme based on a hyperchaotic system & multi specific S-boxes”, Information Security Journal: A Global Perspective, DOI: 10.1080/19393555.2021.1943572.

https://doi.org/10.1080/19393555.2021.1943572

57) M. Naim, A. Ali Pacha, “New chaotic satellite image encryption by using some or all the rounds of the AES algorithm “,Journal: Information Security Journal: A Global Perspective, https://doi.org/10.1080/19393555.2021.1982082

https://www.tandfonline.com/doi/full/10.1080/19393555.2021.1982082

56) K. Tahkoubit, H. Shaiek, D. Roviras, S. Faci and A. Ali-Pacha, « Generalized Iterative Dichotomy PAPR Reduction Method for Multicarrier Waveforms, » in IEEE Access, vol. 9, pp. 114235-114245, 2021, doi: 10.1109/ACCESS.2021.3102848.

https://ieeexplore.ieee.org/abstract/document/9507501

55) Abdelkader Ghazli, Adda Alipacha, Naima Hadj Said, “Evolutionary approach to secure mobile telecommunication networks”, Indonesian Journal of Electrical Engineering and Computer Science, http://doi.org/10.11591/ijeecs.v24.i1.pp357-366, pp. 357~366, ,Vol. 24, No. 1, October 2021.

http://ijeecs.iaescore.com/index.php/IJEECS/article/view/25873/15602

54) Mohammed Amine Boudouaia, AbdelhafıdAbouaissa, Adda Ali-Pacha, Ayoub Benayache, Pascal Lorenz, “RPL rank based-attack mitigation scheme in IoT environment», International Journal of Communication Systems,  https://doi.org/10.1002/dac.4917, Volume34, Issue13: 10 September 2021

https://onlinelibrary.wiley.com/doi/10.1002/dac.4917

53) L. Merah, P. Lorenz, A. Ali-Pacha, and N. Hadj-Said, “ A Guide on Using Xilinx System Generator to Design and Implement Real-Time Audio Effects on FPGA », International Journal of Future Computer and Communication, DOI: 10.18178/ijfcc.2021.10.3.577, Vol. 10, No. 3, September 2021.http://www.ijfcc.org/list-93-1.html 

http://www.ijfcc.org/vol10/577-F10071.pdf

52) Merah, L., Adnane, A., Ali-Pacha, A. et al. Real-time implementation of a chaos based cryptosystem on low-cost hardware. Iran J SciTechnol Trans Electr Eng 45, 1127–1150 (2021). https://doi.org/10.1007/s40998-021-00433-w

51) A.Hadj-Brahim, H. Alı-pacha , A. Ali-pacha and N. Hadj-saıd , « Cohabitation of Fibonacci and Galois Modes in One Linear Feedback Shift Register « , Journal of Engineering Technology and Applied Sciences, Vol. 6, No. 2, 91-109,Published online 17 August 2021, doi.org/10.30931/jetas. 931101

https://dergipark.org.tr/en/download/article-file/1744939

50) Lahcene MERAH, Pascal LORENZ, Adda ALI-PACHA, “ A New and Efficient Scheme for Improving the Digitized Chaotic Systems From Dynamical Degradation”, IEEE Access (Multidisciplinary open access journal), VOLUME 9, 2021. DOI:10.1109/ACCESS.2021.3089913

49) M. Naim , H. Alı-pacha , A. Ali-pacha and N. Hadj-saıd , « Lengthening the period of a Linear Feedback Shift Register », Journal of Engineering Technology and Applied Sciences, Vol. 6, No. 1, 45-68,Published online 30 April 2021, https://doi.org/10.30931/jetas.778792

https://dergipark.org.tr/en/pub/jetas/article/778792

48) Abdelkader Bouguessa, Adda Ali-Pacha , Naima Hadj-Said, « Proposition of new secure data communication technique based on huffman coding, chaos and lsb», International Journal of Biometrics, ISSN online : 1755-831X, ISSN print : 1755-8301,  Vol. 13, No. 2-3, pp. 343–365,  https://doi.org/10.1504/IJBM.2021.114644

https://www.inderscienceonline.com/doi/abs/10.1504/IJBM.2021.114644

47) Abdelkader. GHAZLI , Adda. Ali-Pacha , Naima. HADJ SAID, “FuzzyAuthentication System Based Mobile Phone Sensors for Mobile Phone Communications”, International Journal on Communications Antenna and Propagation (I.Re.C.A.P.), Vol. 11, N. 2, April 2021.

46) M. Naim, A.Ali Pacha, C. Serief, « A novel satellite image encryption algorithm based on hyperchaotic systems and Josephus Problem”, Advances in Space Research, https://doi.org/10.1016/j.asr.2021.01.018,Volume 67, Issue 7, pp. 2077-2103, 1 April 2021.

https://www.sciencedirect.com/science/article/abs/pii/S0273117721000557

45) Hana Ali-Pacha, Naima Hadj-Said, Adda Ali-Pacha, Mohamad Afendee Mohamed, Mustafa Mamat, “The six-dos transposition cipher based on the rubik’s cubeInternational Journal of Advanced Technology and Engineering Exploration (IJATEE), http://dx.doi.org/10.19101/IJATEE.2020.762150,Volume 8 – Issue 75, Pages 258-273, February 2021

https://www.accentsjournals.org/paperInfo.php?journalPaperId=1266&countPaper=22

44) A. Bouguessa, N. Hadj Said, A. Ali Pacha, « NEW TECHNIQUE OF STYGANOGRAPHY BASED ON THE THEORY OF CHAOS: SURVEY », MALAYSIAN JOURNAL OF COMPUTING AND APPLIED MATHEMATICS, Vol. 4, N°1, pp. 1-12, 2021, DOI: https://doi.org/10.37231/myjcam.2021.4.1.69

https://myfik.unisza.edu.my/myjcam/index.php/myjcam/article/view/69

43)Rachid Rimani, Naima Hadj Said , Adda Ali-Pacha , Ozen Ozer, “Key exchange based on Diffie-Hellman protocol and image registration”, Indonesian Journal of Electrical Engineering and Computer Science,DOI: 10.11591/ijeecs.v21.i3.pp1751-1758, Vol. 21, No. 3,  pp1751-1758, March 2021.

http://ijeecs.iaescore.com/index.php/IJEECS/article/viewFile/22848/14749

42) K. ALI CHERIF Khalfallah N. Hadj Said, A. Ali Pacha, « Using of Multi Chaotic System For Implementing A Good Cryptosystem», MALAYSIAN JOURNAL OF COMPUTING AND APPLIED MATHEMATICS, Vol. 4, N°1, pp. 17-26, 2021, DOI: https://doi.org/10.37231/myjcam.2021.4.1.71

https://myfik.unisza.edu.my/myjcam/index.php/myjcam/article/view/71

41) Rimanai Rachid, Naima Hadj-Said, Adda Ali-Pacha, Juan Antonio López RAMOS,  « An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme », Baghdad Science Journal, http://dx.doi.org/10.21123/bsj.2021.18.3.0000, Vol. 18, No. 3,  pp 628-639, February 2021.

https://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/4882/3365

40) Amine Zellagui, Naima Hadj-Said, Adda Ali-Pacha, « SECURE MD4 HASH FUNCTION USING HENON”, MALAYSIAN JOURNAL OF COMPUTING AND APPLIED MATHEMATICS ,DOI: https://doi.org/10.37231/myjcam.2020.3.2.56, Vol. 3, Issue 2, pp, 73-80, December 2020.

https://myfik.unisza.edu.my/myjcam/index.php/myjcam/article/view/56

39) Hana Ali-Pacha, Naima Hadj-Said , Adda Ali-Pacha and ÖzenÖzer,” Significant role of the specific prime number p = 257 in the improvement of cryptosystems”, Notes on Number Theory and Discrete Mathematics, DOI: 10.7546/nntdm.2020.26.4.213-222,  Vol. 26, No. 4, pp. 213–222, December 2020.

http://nntdm.net/volume-26-2020/number-4/213-222/

38) MA Boudouaia, A Ali-Pacha, A Abouaissa, P Lorenz, « Security Against Rank Attack in RPL Protocol, IEEE Network, Volume: 34 , Issue: 4 , pp. 133-139, , July/August 2020

https://ieeexplore.ieee.org/document/9146423

37) Hana Ali-Pacha, Naima Hadj-Said, Adda Ali-Pacha, “Image encryption by using a specific adaptation of Lehmer’s algorithm Journal of Discrete Mathematical Sciences and Cryptography, DOI: 10.1080/09720529.2019.1652402, Published online: 23 Oct 2019, Vol. 23, Issue: 5, Pages: 949-971, August 2020.

https://www.tandfonline.com/doi/abs/10.1080/09720529.2019.1652402

36) Abderrahmene Hadj Brahim, Adda Ali-Pacha, Naima Hadj-Said, « Image encryption based on compressive sensing”,Optics and Laser Technology, ISSN: 0030-3992, Vol. 132 (2020).Article 106489,Accepted 13 July 2020, https://doi.org/10.1016/j.optlastec.2020.106489

https://www.sciencedirect.com/science/article/abs/pii/S0030399220311221?via%3Dihub

35) Khalfallah Ali-Cherif, Naima Hadj-Said, Adda Ali-Pacha, « A new chaotic encrypted image based on the trigonometric circle », Information Security Journal: A Global Perspective, Volume 29, N : 6, Pages: 297-309, 23 May 2020.

https://www.tandfonline.com/doi/full/10.1080/19393555.2020.1767831

34) Ghazli Abdelkader, Ali-Pacha Adda, Hadj Said Naima, « Chaos Athentication and Ciphering Approach to Secure Mobile Networks », International Journal of Networks and Communications, pp. 20 – 32, Vol. 10, No. 1, 2020.

http://article.sapub.org/10.5923.j.ijnc.20201001.03.html

33) KafiKhadidja, Adda Ali-Pacha , Naima Hadj-Said, « New method for identification of persons using geometry foot outline», International Journal of Biometrics,DOI: 10.1504/IJBM.2020.107716,pp. 179-192,  Vol. 12, No.2, 2020.

https://www.inderscience.com/info/inarticle.php?artid=107716

32) Ghazli Abdelkader, Ali-Pacha Adda, Hadj Said Naima, « Neural Based Stream Cipher Design to Secure Mobile Phone Communications », International Journal of Advanced Science and Technology, IJAST, pp. 6319 – 6330, Vol. 29, No. 6, 2020.

http://sersc.org/journals/index.php/IJAST/article/view/19918

31) Abdelkader GHAZLI, Adda ALIPACHA, Naima HADJ SAID, « An Evolutionary Approach to Secure Mobile Telecommunication Networks », INFORMATICA JOURNAL, Vol. 31, N° 5, 2020.

http://www.informaticajournal.com/show.php?v=31&i=5

30) Assia Merzoug, Adda Ali-Pacha, Naima Hadj-Said, “New chaotic cryptosystemfor the image encryption”, International Journal of Information and Computer Security,ISSN online: 1744-1773, pp.450-463, Vol. 12, No. 4, 2020.

https://www.inderscience.com/info/inarticle.php?artid=107452

29) Hana Ali-Pacha, Naima Hadj-Said, Adda Ali-Pacha, “Data Security based on Homographic FunctionPattern Recognition Letters, Volume 129, January 2020, Pages 240-246. https://doi.org/10.1016/j.patrec.2019.10.032

https://www.sciencedirect.com/science/article/abs/pii/S0167865519303101

28) Rimani Rachid, Naima Hadj-Said, Adda Ali-Pacha,« Proposition of a dynamic steganography system based on the chaos properties and image registration for distributing an encryption key », International Journal of Information Privacy, Security and Integrity, DOI: 10.1504/IJIPSI.2019.106573, Vol. 4, No. 2, 2019.

https://www.inderscienceonline.com/doi/abs/10.1504/IJIPSI.2019.106573

27) Djamel Slimani, Adda Ali-Pacha & Naima Hadj-Said, “A New Method to Construct 4-Cycle-Free Parity-Check Matrices for Regular LDPC Codes”, Journal of Sciences and Technology-Pertanika,  Vol. 27 (4), pp. 1709 – 1722 ,  Oct. 2019.

ID: JST-1422-2018: http://www.pertanika.upm.edu.my/regular_issues.php?jtype=2

26)Khaled Tahkoubit , Adda Ali-Pacha, HmaiedShaiek , and Daniel Roviras, “Iterative Dichotomy PAPR Reduction Method for Multicarrier Waveforms”, IEEE Communications Letters, On page(s): 1-4, Print ISSN: 1089-7798, Digital Object Identifier: 10.1109/LCOMM.2019.2935439.Page(s): 2073 – 2076, Vol. 23, Issue 11 • Nov.-2019

https://ieeexplore.ieee.org/document/8801891

25) Hana Ali-Pacha, Naima Hadj-Said, Adda Ali-Pacha, Mohamad Afendee Mohamed, Mustafa Mamat, “Cryptographic adaptation of the middle square generatorInternational Journal of Electrical and Computer Engineering (IJECE) Vol. 9, No. 6, December 2019, pp. 5615~5627 ISSN: 2088-8708, DOI: 10.11591/ijece.v9i6.pp5615-5627

http://ijece.iaescore.com/index.php/IJECE/article/view/20707/13296

24)NabilaBenmessaoud, N. Hadj-Said, A. Ali-Pacha and M. Benmessaoud, 2019. A New Random Sequence using Descriptor of Fourier for Image Encryption. Journal of Engineering and Applied Sciences, Vol. 14, Issue 22, pp: 8168-8179.Year:2019, DOI:10.3923/jeasci.2019.8168.8179, URL:http://medwelljournals.com/abstract/?doi=jeasci.2019.8168.8179

23) Hana Ali-Pacha, Adda Ali-Pacha, Naima Hadj-Said, “Proposition of a New Vernam Chaotic Cipher”, Malaysian Journal of Computing and Applied Mathematics, Vol 2(2): 32-43, 2019.

https://myfik.unisza.edu.my/myjcam/index.php/myjcam/article/view/34/21

22) R. RIMANI, N. HADJ SAID, A. ALI-PACHA, J.A. López RAMOS, “Image encryption by AES algorithm based on Chaos-Permutation”, Malaysian Journal of Computing and Applied Mathematics, Vol 2(2): 14-24, 2019.

https://myfik.unisza.edu.my/myjcam/index.php/myjcam/article/view/32/23

21) Assia Merzoug, Adda Ali-Pacha, Naima Hadj-Said, Hana Ali-Pacha, “Production of a Super-Increasing Sequence based on the Fibonaci Sequence”, Malaysian Journal of Computing and Applied Mathematics, Vol 2(1): 16-24, 2019.

https://myfik.unisza.edu.my/myjcam/index.php/myjcam/article/view/25

20) Hana Ali-Pacha, Adda Ali-Pacha, Naima Hadj-Said, “Dynamic Generalization of the Vigénère Table based on the Logistics Map”, Malaysian Journal of Computing and Applied Mathematics, Vol 2(1): 25-33, 2019.

https://myfik.unisza.edu.my/myjcam/index.php/myjcam/article/view/26

19) KafiKhadidja, Adda Ali-Pacha, Naima Hadj-Said, « Estimation of Stature by Measuring Dimensions of the Main Part of Foot Outline » Journal of Forensic Identification (“JFI”): Vol. 69, N°2, pp. 222-236, 2019.

https://www.theiai.org/jfi_abstracts.php

17) Hana Ali-Pacha, Naima Hadj-Said, Adda Ali-Pacha, Mustafa Mamat, Mohamad Afendee Mohamed, “An Efficient Schema of a Special Permutation Inside of Each Pixel of an Image for its Encryption”, IJEECS : Indonesian Journal of Electrical Engineering and Computer Science, DOI: http://doi.org/10.11591/ijeecs.v11.i2.pp%25p, Vol. 11, No. 2, August 2018.

http://ijeecs.iaescore.com/index.php/IJEECS/article/view/12885

16) Lahcene Merah, Adda Ali-Pacha, Naima Hadj-Said, MecheriBelkacem, “New and Efficient Method for Extending Cycle Length of Digital Chaotic Systems”, DOI 10.1007/s40998-018-0122-0, Iranian Journal of Science and Technology, Transactions of Electrical Engineering, 1-10. July 2018.

https://link.springer.com/article/10.1007/s40998-018-0122-0

 

15) Assia Merzoug,Adda Ali-Pacha, Naima Hadj-Said, Mustafa Mamat, Mohamad Afendee Mohamed, “Generating a random sequence based on PWLCM map applicated to RC4 algorithm”, International Journal of Engineering & Technology, DOI: 10.14419/ijet.v7i2.14.12821, pp182-185, Vol. 7, N°:2.14,  April 2018.

https://www.semanticscholar.org/paper/Generating-a-random-sequence-based-on-PWLCM-map-to-Merzoug-Ali-Pacha/8689b84e7513858256240da375c441a6f3fe833c

14) Mohamed Krim,Adda Ali Pacha, Naima Hadj Said, “The Quality of a New Generator Sequence Improvent for Spreading the Color Image Transmission System”, TELKOMNIKA (Telecommunication Computing Electronics and Control), DOI: http://dx.doi.org/10.12928/telkomnika.v15i4.6583, pp. 407~419, Vol 16, No 1: February 2018.

http://journal.uad.ac.id/index.php/TELKOMNIKA/article/view/6583

13) L. Merah, Adda Ali-Pacha, Naima Hadj-Said, B. Mecheri, and M. Dellassi, “ FPGA Hardware Co-simulation of New Chaos-Based Stream Cipher Based on Lozi Map”, International Journal of Engineering and Technology, (DOI: 10.7763/IJET.2017.V9.1010), Vol. 9, No. 5, pp. 420 ~ 425,  October 2017.

http://www.ijetch.org/vol9/1010-ED031.pdf

12) Abdelkader Ghazli Naima Hadj Said, Adda Ali-Pacha, ”Mobile Phone Security Based New Strong Genetic Stream Cipher Design”, International Journal on Communications Antenna and Propagation (IRECAP), DOI: https://doi.org/10.15866/irecap.v7i4.10693, pp. 334-341, Vol 7, No 4, August (2017).

https://www.praiseworthyprize.org/jsm/index.php?journal=irecap&page=article&op=view&path%5B%5D=19669

11) Assia Merzoug, Adda Ali Pacha, Naima Hadj Said, “New Approach of the Playfair’s Cipher with a Numerical Value of the Keyword”, IJEECS : Indonesian Journal of Electrical Engineering and Computer Science, ISSN: 2502-4752, pp. 695 ~ 703 DOI: 10.11591/ijeecs.v6.i3.pp695-703, Vol. 6, No. 3, June 2017.

http://ijeecs.iaescore.com/index.php/IJEECS/article/view/7409

10) M. Mesri, K. Tahkoubit, H. Merah Adda Ali-Pacha, “ Partial Transition Sequence Algorithms for Reducing Peak to Average Power Ratio in the Next Generation Wireless Communications Systems”, Journal of Electrical Systems ,Vol. 13-1, pp.169~182, February 2017.

https://search.proquest.com/openview/d17930985e95af684e720a8ecfbfee11/1?pq-origsite=gscholar&cbl=4433095

09) Ghazli Abdelkader, Naima Hadj Said, Adda Ali-PachaSecure Authentication Approach Based New Mobility Management schemes for Mobile Communication”, JIPS Journal of Information Processing Systems, (https://doi.org/10.3745/JIPS.03.0064), J Inf Process Syst, Vol.13, No.1, pp.152~173, February 2017

http://jips-k.org/q.jips?cp=pp&pn=439

08) Mohamed Krim, Adda Ali-Pacha, Naima Hadj-Said, “ New Binary Code Combined with New Chaotic Map and Gold Code to Ameliorate the Quality of the Transmission”, Indonesian Journal of Electrical Engineering and Computer Science, (DOI: 10.11591/ijeecs.v5.i1.pp 166-180), Vol. 5, No. 1, pp. 166 ~ 180 , January 2017.

file:///C:/Users/MonHP/Downloads/New_Binary_Code_Combined_with_New_Chaotic_Map_and_.pdf

07) Lahcene Merah, Adda Ali-Pacha,·Naima Hadj Said, “Real-time cryptosystem based on synchronized chaotic systems”, Nonlinear Dynamic journal, https://doi.org/10.1007/s11071-015-2202-2, Volume 82, Issue 1–2, pp 877–890, October 2015

https://link.springer.com/article/10.1007/s11071-015-2202-2

06) Lahcene Merah, Adda Ali-Pacha, Naima Hadj Said, “Coupling Two Chaotic Systems in Order to Increasing the security of a Communication System – Study and Real Time FPGA Implementation” Paper ID: 4-10_948,International Journal of  Computer Science and Telecommunications  (ISSN: 2047-3338), http://www.ijcst.org,pp.47-53, Volume 4, Issue 10, October 2013.

https://pdfs.semanticscholar.org/5b35/2c52f6ffb12b7b27d7ed0be4d7a0a27c95e9.pdf

05) Lahcene Merah, Adda Ali-Pacha, Naima Hadj Said, Mustafa Mamat, « A Pseudo Random Number Generator Based on the Chaotic System of Chua’s Circuit, and its Real Time FPGA Implementation», Applied Mathematical Sciences,ISSN 1312-885X, Hikari Ltd Editor, Vol. 7, no. 55, 2719-2734, 2013.

http://www.m-hikari.com/ams/ams-2013/ams-53-56-2013/13242.html

04) Lahcene Merah, Adda Ali-Pacha, Naima Hadj Said, Mustafa Mamat, « Design and FPGA Implementation of Lorenz Chaotic System for Information Security Issues», Applied Mathematical Sciences,ISSN 1312-885X, Hikari Ltd Editor, Vol. 7, no. 5, 237 – 246, 2013.

http://www.m-hikari.com/ams/ams-2013/ams-5-8-2013/mamatAMS5-8-2013-1.pdf

03) Adda Ali-Pacha – Naima Hadj-Said- Mohamed Sadek Ali-Pacha- Abdallah M’Hamed, “New Construction of a Chaotic Generator on the Lorenz Attractor”, Journal for Pure Science of university of anbar : ISSN: 1991-8941,  Vol.6:N°.2 : 2012.

https://www.iasj.net/iasj?func=article&aId=63243

02) Adda ALI-PACHA, N. HADJ-SAID, A. M’HAMED, A. BELGHORAF ,« Lorenz’s attractor applied to the stream cipher (ALI PACHA generator) », doi:10.1016/j.chaos.2006.03.009, Revue Elsevier Science : Chaos, Solitons & Fractals. Volume 33/5 pp. 1762-1766, ISSN 0960-0779, Pergamon,, Accepted 7 March 2006.  Available online, August 2007.

https://www.sciencedirect.com/science/article/abs/pii/S0960077906002360

01) Adda ALI-PACHA, N. HADJ-SAID, B. BELMEKKI, A. BELGHORAF, :«  Chaotic Behaviour for the Secrete key of Cryptographic System », doi:10.1016/j.chaos.2004.05.015 , Revue Elsevier Science : Chaos, Solitons & Fractals ( The Interdisciplinary Journal of Nonlinear Science Nano and Quantum Technology), Volume 23/5 pp. 1549-1552, ISSN 0960-0779, Pergamon,, Accepted 5 May 2004.  Available online, 22 October 2004.

https://www.sciencedirect.com/science/article/abs/pii/S0960077904002978?via%3Dihub

 Merah HOCINE, Merah LAHCENE, Talbi LARBI, Ali-Pacha ADDA, ”A PRNG based on an improved chaotic map using a self-perturbation mechanism”, Romanian Journal of Information Technology and Automatic Control, Vol. 33, No. 2, pp.47-60, 2023.

https://doi.org/10.33436/v33i2y202304

https://rria.ici.ro/wp-content/uploads/2023/06/art._Hocine_Lahcene_Larbi_Adda.pdf