{"id":12312,"date":"2022-05-18T10:21:46","date_gmt":"2022-05-18T10:21:46","guid":{"rendered":"https:\/\/www.univ-usto.dz\/labo\/lssd\/?p=12312"},"modified":"2023-07-02T09:01:11","modified_gmt":"2023-07-02T09:01:11","slug":"publication","status":"publish","type":"post","link":"https:\/\/www.univ-usto.dz\/labo\/lacosi\/publication\/","title":{"rendered":"Publications"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"12312\" class=\"elementor elementor-12312\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e0b1ebc elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e0b1ebc\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-a11947f\" data-id=\"a11947f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d165ad2 elementor-widget elementor-widget-text-editor\" data-id=\"d165ad2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3>Toutes les actualit\u00e9s<\/h3>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-208cd3a elementor-widget elementor-widget-wp-widget-bellows_navigation_widget\" data-id=\"208cd3a\" data-element_type=\"widget\" data-widget_type=\"wp-widget-bellows_navigation_widget.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<nav id=\"bellows-main-128\" class=\"bellows bellows-nojs bellows-main bellows-source-menu bellows-align-full bellows-skin-vanilla bellows-type-\"><ul id=\"menu-categories\" class=\"bellows-nav\" data-bellows-config=\"main\"><li id=\"menu-item-5757\" class=\"bellows-menu-item bellows-menu-item-type-taxonomy bellows-menu-item-object-category bellows-menu-item-5757 bellows-item-level-0\"><a  href=\"https:\/\/www.univ-usto.dz\/labo\/lacosi\/category\/annonces\/\" class=\"bellows-target\"><span class=\"bellows-target-title bellows-target-text\">Annonces<\/span><\/a><\/li>\n<li id=\"menu-item-5762\" class=\"bellows-menu-item bellows-menu-item-type-taxonomy bellows-menu-item-object-category bellows-menu-item-5762 bellows-item-level-0\"><a  href=\"https:\/\/www.univ-usto.dz\/labo\/lacosi\/category\/news\/\" class=\"bellows-target\"><span class=\"bellows-target-title bellows-target-text\">News<\/span><\/a><\/li>\n<\/ul><\/nav>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-21db50a\" data-id=\"21db50a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8749389 elementor-widget elementor-widget-text-editor\" data-id=\"8749389\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h1>Publications<\/h1>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-45c32a3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"45c32a3\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-89c011e\" data-id=\"89c011e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5196a72 elementor-widget elementor-widget-text-editor\" data-id=\"5196a72\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3>\u00a0Publications Internationales: (Nombre: 74)<\/h3><p>74) M.\u00a0Naim,\u00a0 A.\u00a0Ali\u00a0Pacha, \u00ab\u00a0A new chaotic satellite image encryption algorithm based on\u00a0a\u00a02D flter and\u00a0Fisher\u2013Yates shufing\u201d, The Journal of Supercomputing<\/p><p><a href=\"https:\/\/doi.org\/10.1007\/s11227-023-05346-5\">https:\/\/doi.org\/10.1007\/s11227-023-05346-5<\/a><\/p><p><a href=\"https:\/\/link.springer.com\/article\/10.1007\/s11227-023-05346-5\">https:\/\/link.springer.com\/article\/10.1007\/s11227-023-05346-5<\/a><\/p><p>73) A. Hadj Brahim&amp; A. Ali Pacha&amp; N. Hadj Said, \u201cA new image compression-encryption scheme based on compressive sensing &amp; classical AES algorithm\u201d, Multimedia Tools and Applications <a href=\"https:\/\/doi.org\/10.1007\/s11042-023-15171-w\">https:\/\/doi.org\/10.1007\/s11042-023-15171-w<\/a>, Published online 04 April 2023.<\/p><p><a href=\"https:\/\/trebuchet.public.springernature.app\/get_content\/135e26ca-23aa-415b-8714-e7bad22ab3d0\">https:\/\/trebuchet.public.springernature.app\/get_content\/135e26ca-23aa-415b-8714-e7bad22ab3d0<\/a><\/p><p>72) A.\u00a0Hadj\u00a0Brahim, A.\u00a0Ali\u00a0Pacha, N.\u00a0Hadj\u00a0Said, \u201c<strong>An image encryption scheme based on a modified AES algorithm by using a variable S-box\u201d, <\/strong>Journal of Optics,<strong> DOI<\/strong>10.1007\/s12596-023-01232-8<\/p><p><a href=\"https:\/\/doi.org\/10.1007\/s12596-023-01232-8\">https:\/\/doi.org\/10.1007\/s12596-023-01232-8<\/a><\/p><p><a href=\"https:\/\/trebuchet.public.springernature.app\/get_content\/a4404feb-bf0c-43d4-84a8-067419ac6afa\">https:\/\/trebuchet.public.springernature.app\/get_content\/a4404feb-bf0c-43d4-84a8-067419ac6afa<\/a><\/p><p>71)Belkacem Imine, Naima Hadj Said, Adda Ali Pacha\u00ab\u00a0New McEliece cryptosystem based on non-permutation equivalent polar codes\u00a0\u00bb, Journal of Discrete Mathematical Sciences and Cryptography,Vol. 26 (2023), No. 1, pp. 103\u2013114, \u00a0DOI: <a href=\"http:\/\/dx.doi.org\/10.1080\/09720529.2021.1933706\">10.1080\/09720529.2021.1933706<\/a>,<\/p><p><a href=\"https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/09720529.2021.1933706\">https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/09720529.2021.1933706<\/a><\/p><p>70) Amine Zellagui, Naima Hadj-Said &amp; Adda Ali-Pacha (2022), \u201cA new hash function inspired by sponge construction using chaotic maps\u201d, Journal of Discrete Mathematical Sciences and Cryptography, DOI: 10.1080\/09720529.2021.1961900.<\/p><p><a href=\"https:\/\/doi.org\/10.1080\/09720529.2021.1961900\">https:\/\/doi.org\/10.1080\/09720529.2021.1961900<\/a><\/p><p><a href=\"https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/09720529.2021.1961900?needAccess=true&amp;journalCode=tdmc20\">https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/09720529.2021.1961900?needAccess=true&amp;journalCode=tdmc20<\/a><\/p><p>69) <em>Saadi Abdelkader, a<\/em><em>dda Ali-Pacha,Naima Hadj-Said, \u201c<\/em>Physical layer security based on chaotic maps applied to OFDM systems\u201d, International Journal of Advanced Studies in Computer Science &amp; Engineering, IJASCSE, Volume12, Issue 01, 2023, Pages 51-60.<\/p><p><a href=\"https:\/\/www.proquest.com\/openview\/c8f3f349893fd11f4e8ad44d1471abc0\/1.pdf?pq-origsite=gscholar&amp;cbl=2028729\">https:\/\/www.proquest.com\/openview\/c8f3f349893fd11f4e8ad44d1471abc0\/1.pdf?pq-origsite=gscholar&amp;cbl=2028729<\/a><\/p><p>68) A. Hadj Brahim, A. Ali Pacha &amp; N. HADJ Said (2023) A new image encryption scheme based on a hyperchaotic system &amp; multi specific S-boxes, Information Security Journal: A Global Perspective, Vol.32 N\u00b0:2, pp. 59-75, DOI: 10.1080\/19393555.2021.1943572<\/p><p><a href=\"https:\/\/doi.org\/10.1080\/19393555.2021.1943572\">https:\/\/doi.org\/10.1080\/19393555.2021.1943572<\/a><\/p><p>67)Merah Lahcene,Chaib Noureddine, Pascal Lorenz, Ali-Pacha Adda, \u00ab\u00a0Securing information using a proposed reliable chaos-based stream cipher: with real-time FPGA-based wireless connection implementation\u00a0\u00bb, Nonlinear Dynamics Journal, (2023) Vol. 111: pp. 801\u2013830 <a href=\"https:\/\/doi.org\/10.1007\/s11071-022-07824-6\">https:\/\/doi.org\/10.1007\/s11071-022-07824-6<\/a><\/p><p><a href=\"https:\/\/trebuchet.public.springernature.app\/get_content\/0eebf759-2d6c-48fa-a5a4-126b61fb52a6\">https:\/\/trebuchet.public.springernature.app\/get_content\/0eebf759-2d6c-48fa-a5a4-126b61fb52a6<\/a><\/p><p>66) H. Merah, L.Merah, N. Chaib, A.Ali-Pacha, \u00ab\u00a0Designing and real-time FPGA-based implementation of a Chroma-key effect system using Xilinx System Generator\u00a0\u00bb, DOI: 10.18178\/ijfcc.2022.11.4.591, International Journal of Future Computer and Communication (IJFCC), December, 2022.<\/p><p><a href=\"http:\/\/www.ijfcc.org\/index.php?m=content&amp;c=index&amp;a=show&amp;catid=101&amp;id=978\">http:\/\/www.ijfcc.org\/index.php?m=content&amp;c=index&amp;a=show&amp;catid=101&amp;id=978<\/a><\/p><p>65) Hana ALI-PACHA, Naima HADJ-SAID, Adda ALI-PACHA, \u00d6zen\u00d6zer, \u00ab\u00a0Numerical Methods for Differential Equations as Encryption Key\u201d, Journal of Interdisciplinary Mathematics,.<a href=\"https:\/\/doi.org\/10.1080\/09720502.2021.1947598\">https:\/\/doi.org\/10.1080\/09720502.2021.1947598<\/a>, Volume 25, 2022 &#8211; Num\u00e9ro 8, pp.2209-2237.<a href=\"https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/09720502.2021.1947598\">https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/09720502.2021.1947598<\/a><\/p><p>64) Meftah Mustapha<strong>,<\/strong> Adda Ali-Pacha , Naima Hadj-Said, (2022) \u00ab\u00a0<strong>DNA Encryption Algorithm Based on Huffman Coding\u00a0<em>\u201d<\/em><\/strong> Journal of Discrete Mathematical Sciences and Cryptography<strong>, <\/strong>DOI <a href=\"https:\/\/doi.org\/10.1080\/09720529.2020.1818450\">https:\/\/doi.org\/10.1080\/09720529.2020.1818450<\/a>, <strong>V<\/strong>olume 25, No. 6, pp. 1831\u20131844. <a href=\"https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/09720529.2020.1818450\">https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/09720529.2020.1818450<\/a><\/p><p>63) Asmaa Boudali, Naima Hadj Said &amp; Adda Ali-Pacha (2022) A new symmetrical cryptosystem based cellular automata and chaotic map function, Journal of Discrete Mathematical Sciences and Cryptography, Vol.25, N\u00b05, pp.1435-1455, DOI: 10.1080\/09720529.2021.2020427. Published online: 24 May 2022<\/p><p><a href=\"https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/09720529.2021.2020427\">https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/09720529.2021.2020427<\/a><\/p><p>62) E. Iftene, A. Ali-Pacha, L. Hadj Abderrahmane, \u201cDesign of a Modified Interleaving Algorithm Based on Golden Section Theory Enhancing the Performance of Turbo Codes\u201d, Journal of Telecommunications and Information Technology, Vol. 2\/2022, pp. 35-42, <a href=\"https:\/\/doi.org\/10.26636\/jtit.2022.158721\">https:\/\/doi.org\/10.26636\/jtit.2022.158721<\/a>, <a href=\"https:\/\/www.itl.waw.pl\/czasopisma\/JTIT\/2022\/2\/35.pdf\">https:\/\/www.itl.waw.pl\/czasopisma\/JTIT\/2022\/2\/35.pdf<\/a><\/p><p>61) Zineb BouchraMadouri, Naima Hadj-Said &amp; Adda Ali-Pacha (2022), \u201cImage Encryption Algorithm Based on Digital Filters Controlled by 2D Robust Chaotic Map\u201d, Optik, <a href=\"https:\/\/www.sciencedirect.com\/journal\/optik\/vol\/264\/suppl\/C\">Volume 264<\/a>,August 2022, 169382,<\/p><p><a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0030402622007045?dgcid=coauthor\">https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0030402622007045?dgcid=coauthor<\/a><\/p><p><a href=\"https:\/\/authors.elsevier.com\/tracking\/article\/details.do?aid=169382&amp;jid=IJLEO&amp;surname=Madouri\">https:\/\/authors.elsevier.com\/tracking\/article\/details.do?aid=169382&amp;jid=IJLEO&amp;surname=Madouri<\/a><\/p><p>60) Nabil Kerkacha, Naima Hadj Said, NoureddineChaib, AsmaAdnane&amp;Adda Ali Pacha, \u201cEnhancing QoS in Privacy Based Vehicular Communication\u201d, AHSWN Ad Hoc &amp; Sensor Wireless Networks, Vol. 52, 3-4, pp. 273\u2013295, Accepted: February 2, 2022.<\/p><p><a href=\"https:\/\/www.oldcitypublishing.com\/journals\/ahswn-home\/ahswn-forthcoming-papers\/20606-2\/\">https:\/\/www.oldcitypublishing.com\/journals\/ahswn-home\/ahswn-forthcoming-papers\/20606-2\/<\/a><\/p><p>59) Amine Zellagui, Naima Hadj-Said &amp; Adda Ali-Pacha (2022), \u201cA secure hash function based on sponge construction and chaos-maps\u201d, Int. J. Computational Science and Engineering, <strong>DOI<\/strong>:\u00a0<a href=\"https:\/\/dx.doi.org\/10.1504\/IJCSE.2022.123116\">10.1504\/IJCSE.2022.123116<\/a>, Vol. 25, No. 3, pp: 285-297, 2022.<\/p><p><a href=\"https:\/\/www.inderscience.com\/info\/inarticle.php?artid=123116\">https:\/\/www.inderscience.com\/info\/inarticle.php?artid=123116<\/a><\/p><p>58) A. Hadj Brahim, A. Ali Pacha &amp; N. HADJ Said, \u201cA new image encryption scheme based on a hyperchaotic system &amp; multi specific S-boxes\u201d, Information Security Journal: A Global Perspective, DOI: 10.1080\/19393555.2021.1943572.<\/p><p><a href=\"https:\/\/doi.org\/10.1080\/19393555.2021.1943572\">https:\/\/doi.org\/10.1080\/19393555.2021.1943572<\/a><\/p><p>57) <a href=\"https:\/\/www.tandfonline.com\/author\/Naim%2C+M\">M. Naim<\/a>, <a href=\"https:\/\/www.tandfonline.com\/author\/Ali+Pacha%2C+A\">A. Ali Pacha<\/a>, \u201cNew chaotic satellite image encryption by using some or all the rounds of the AES algorithm\u00a0\u201c,Journal: Information Security Journal: A Global Perspective, <a href=\"https:\/\/doi.org\/10.1080\/19393555.2021.1982082\">https:\/\/doi.org\/10.1080\/19393555.2021.1982082<\/a><\/p><p><a href=\"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/19393555.2021.1982082\">https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/19393555.2021.1982082<\/a><\/p><p>56) K. Tahkoubit, H. Shaiek, D. Roviras, S. Faci and A. Ali-Pacha, \u00ab\u00a0Generalized Iterative Dichotomy PAPR Reduction Method for Multicarrier Waveforms,\u00a0\u00bb in IEEE Access, vol. 9, pp. 114235-114245, 2021, doi: 10.1109\/ACCESS.2021.3102848.<\/p><p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/9507501\">https:\/\/ieeexplore.ieee.org\/abstract\/document\/9507501<\/a><\/p><p>55) Abdelkader Ghazli, Adda Alipacha, Naima Hadj Said, \u201cEvolutionary approach to secure mobile telecommunication networks\u201d, Indonesian Journal of Electrical Engineering and Computer Science, <a href=\"http:\/\/doi.org\/10.11591\/ijeecs.v24.i1.pp357-366\">http:\/\/doi.org\/10.11591\/ijeecs.v24.i1.pp357-366<\/a>, pp. 357~366, ,Vol. 24, No. 1, October 2021.<\/p><p><a href=\"http:\/\/ijeecs.iaescore.com\/index.php\/IJEECS\/article\/view\/25873\/15602\">http:\/\/ijeecs.iaescore.com\/index.php\/IJEECS\/article\/view\/25873\/15602<\/a><\/p><p>54) Mohammed Amine Boudouaia,\u00a0Abdelhaf\u0131dAbouaissa,\u00a0Adda Ali-Pacha,\u00a0Ayoub Benayache,\u00a0Pascal Lorenz,\u00a0\u201cRPL rank based-attack mitigation scheme in IoT environment\u00bb, International Journal of Communication Systems,\u00a0 <a href=\"https:\/\/doi.org\/10.1002\/dac.4917\">https:\/\/doi.org\/10.1002\/dac.4917<\/a>, Volume34,\u00a0Issue13: 10 September 2021<\/p><p><a href=\"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/dac.4917\">https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/dac.4917<\/a><\/p><p>53) L. Merah, P. Lorenz, A. Ali-Pacha, and N. Hadj-Said, \u201c A Guide on Using Xilinx System Generator to Design and Implement Real-Time Audio Effects on FPGA\u00a0\u00bb, International Journal of Future Computer and Communication, DOI: 10.18178\/ijfcc.2021.10.3.577, Vol. 10, No. 3, September 2021.<a href=\"http:\/\/www.ijfcc.org\/list-93-1.html\">http:\/\/www.ijfcc.org\/list-93-1.html<\/a>\u00a0<\/p><p><a href=\"http:\/\/www.ijfcc.org\/vol10\/577-F10071.pdf\">http:\/\/www.ijfcc.org\/vol10\/577-F10071.pdf<\/a><\/p><p>52) Merah, L., Adnane, A., Ali-Pacha, A.\u00a0et al.\u00a0Real-time implementation of a chaos based cryptosystem on low-cost hardware.\u00a0Iran J SciTechnol Trans Electr Eng\u00a045,\u00a01127\u20131150 (2021). <a href=\"https:\/\/doi.org\/10.1007\/s40998-021-00433-w\">https:\/\/doi.org\/10.1007\/s40998-021-00433-w<\/a><\/p><p>51) A.Hadj-Brahim, H. Al\u0131-pacha , A. Ali-pacha and N. Hadj-sa\u0131d , \u00ab\u00a0Cohabitation of Fibonacci and Galois Modes in One Linear Feedback Shift Register \u00ab\u00a0,\u00a0Journal of Engineering Technology and Applied Sciences, Vol. 6, No. 2, 91-109,Published online 17 August 2021, doi.org\/10.30931\/jetas. 931101<\/p><p><a href=\"https:\/\/dergipark.org.tr\/en\/download\/article-file\/1744939\">https:\/\/dergipark.org.tr\/en\/download\/article-file\/1744939<\/a><\/p><p>50) Lahcene MERAH, Pascal LORENZ, Adda ALI-PACHA, \u201c A New and Efficient Scheme for Improving the Digitized Chaotic Systems From Dynamical Degradation\u201d, IEEE Access (<a href=\"https:\/\/ieeeaccess.ieee.org\/\"><strong>Multidisciplinary open access journal<\/strong><\/a>), VOLUME 9, 2021. DOI:<a href=\"http:\/\/dx.doi.org\/10.1109\/ACCESS.2021.3089913\">10.1109\/ACCESS.2021.3089913<\/a><\/p><p>49) M. Naim , H. Al\u0131-pacha , A. Ali-pacha and N. Hadj-sa\u0131d , \u00ab\u00a0Lengthening the period of a Linear Feedback Shift Register\u00a0\u00bb,\u00a0Journal of Engineering Technology and Applied Sciences, Vol. 6, No. 1, 45-68,Published online 30 April 2021, <a href=\"https:\/\/doi.org\/10.30931\/jetas.778792\">https:\/\/doi.org\/10.30931\/jetas.778792<\/a><\/p><p><a href=\"https:\/\/dergipark.org.tr\/en\/pub\/jetas\/article\/778792\">https:\/\/dergipark.org.tr\/en\/pub\/jetas\/article\/778792<\/a><\/p><p>48) Abdelkader Bouguessa<strong>,<\/strong> Adda Ali-Pacha , Naima Hadj-Said, \u00ab\u00a0<strong>Proposition of new secure data communication technique based on hu\ufb00man coding, chaos and lsb<\/strong>\u00bb, International Journal of Biometrics, ISSN online\u00a0: 1755-831X, ISSN print\u00a0: 1755-8301,\u00a0 Vol. 13, No. 2-3, pp. 343\u2013365,\u00a0 <a href=\"https:\/\/doi.org\/10.1504\/IJBM.2021.114644\">https:\/\/doi.org\/10.1504\/IJBM.2021.114644<\/a><\/p><p><a href=\"https:\/\/www.inderscienceonline.com\/doi\/abs\/10.1504\/IJBM.2021.114644\">https:\/\/www.inderscienceonline.com\/doi\/abs\/10.1504\/IJBM.2021.114644<\/a><\/p><p>47) Abdelkader. GHAZLI , Adda. Ali-Pacha , Naima. HADJ SAID, \u201cFuzzyAuthentication System Based Mobile Phone Sensors for Mobile Phone Communications\u201d, International Journal on Communications Antenna and Propagation (I.Re.C.A.P.), Vol. 11, N. 2, April 2021.<\/p><p>46) M. Naim, <a href=\"https:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S0273117721000557#!\">A.Ali Pacha, <\/a>C. Serief<a href=\"https:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S0273117721000557#!\">,<\/a> \u00ab\u00a0<strong>A novel satellite image encryption algorithm based on hyperchaotic systems and Josephus Problem<\/strong>\u201d, Advances in Space Research, https:\/\/doi.org\/10.1016\/j.asr.2021.01.018,Volume 67, Issue 7, pp. 2077-2103, 1 April 2021.<\/p><p><a href=\"https:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S0273117721000557\">https:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S0273117721000557<\/a><\/p><p>45) <em>Hana Ali-Pacha, Naima Hadj-Said, Adda Ali-Pacha, Mohamad Afendee Mohamed, Mustafa Mamat, \u201c<\/em><strong>The six-dos transposition cipher based on the rubik\u2019s cube<em>\u201d <\/em>International Journal of Advanced Technology and Engineering Exploration (IJATEE), <\/strong>http:\/\/dx.doi.org\/10.19101\/IJATEE.2020.762150,Volume 8 &#8211; Issue 75, Pages 258-273, February 2021<\/p><p><a href=\"https:\/\/www.accentsjournals.org\/paperInfo.php?journalPaperId=1266&amp;countPaper=22\">https:\/\/www.accentsjournals.org\/paperInfo.php?journalPaperId=1266&amp;countPaper=22<\/a><\/p><p>44) A. Bouguessa, N. Hadj Said, A. Ali Pacha, \u00ab\u00a0NEW TECHNIQUE OF STYGANOGRAPHY BASED ON THE THEORY OF CHAOS: SURVEY\u00a0\u00bb, MALAYSIAN JOURNAL OF COMPUTING AND APPLIED MATHEMATICS, Vol. 4, N\u00b01, pp. 1-12, 2021, DOI: <a href=\"https:\/\/doi.org\/10.37231\/myjcam.2021.4.1.69\">https:\/\/doi.org\/10.37231\/myjcam.2021.4.1.69<\/a><\/p><p><a href=\"https:\/\/myfik.unisza.edu.my\/myjcam\/index.php\/myjcam\/article\/view\/69\">https:\/\/myfik.unisza.edu.my\/myjcam\/index.php\/myjcam\/article\/view\/69<\/a><\/p><p>43)Rachid Rimani, Naima Hadj Said , Adda Ali-Pacha , Ozen Ozer, \u201cKey exchange based on Diffie-Hellman protocol and image registration\u201d, Indonesian Journal of Electrical Engineering and Computer Science,DOI: 10.11591\/ijeecs.v21.i3.pp1751-1758, Vol. 21, No. 3,\u00a0 pp1751-1758, March 2021.<\/p><p><a href=\"http:\/\/ijeecs.iaescore.com\/index.php\/IJEECS\/article\/viewFile\/22848\/14749\">http:\/\/ijeecs.iaescore.com\/index.php\/IJEECS\/article\/viewFile\/22848\/14749<\/a><\/p><p>42) K. ALI CHERIF Khalfallah N. Hadj Said, A. Ali Pacha, \u00ab\u00a0Using of Multi Chaotic System For Implementing A Good Cryptosystem\u00bb, MALAYSIAN JOURNAL OF COMPUTING AND APPLIED MATHEMATICS, Vol. 4, N\u00b01, pp. 17-26, 2021, DOI: <a href=\"https:\/\/doi.org\/10.37231\/myjcam.2021.4.1.71\">https:\/\/doi.org\/10.37231\/myjcam.2021.4.1.71<\/a><\/p><p><a href=\"https:\/\/myfik.unisza.edu.my\/myjcam\/index.php\/myjcam\/article\/view\/71\">https:\/\/myfik.unisza.edu.my\/myjcam\/index.php\/myjcam\/article\/view\/71<\/a><\/p><p>41) Rimanai Rachid, Naima Hadj-Said, Adda Ali-Pacha, Juan Antonio L\u00f3pez RAMOS, \u00a0\u00ab\u00a0<strong>An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme<\/strong>\u00a0\u00bb, Baghdad Science Journal, <a href=\"http:\/\/dx.doi.org\/10.21123\/bsj.2021.18.3.0000\">http:\/\/dx.doi.org\/10.21123\/bsj.2021.18.3.0000<\/a>, Vol. 18, No. 3,\u00a0 pp 628-639, February 2021.<\/p><p><a href=\"https:\/\/bsj.uobaghdad.edu.iq\/index.php\/BSJ\/article\/view\/4882\/3365\">https:\/\/bsj.uobaghdad.edu.iq\/index.php\/BSJ\/article\/view\/4882\/3365<\/a><\/p><p>40) Amine Zellagui, Naima Hadj-Said, Adda Ali-Pacha, \u00ab\u00a0SECURE MD4 HASH FUNCTION USING HENON\u201d, MALAYSIAN JOURNAL OF COMPUTING AND APPLIED MATHEMATICS ,DOI: https:\/\/doi.org\/10.37231\/myjcam.2020.3.2.56, Vol. 3, Issue 2, pp, 73-80, December 2020.<\/p><p><a href=\"https:\/\/myfik.unisza.edu.my\/myjcam\/index.php\/myjcam\/article\/view\/56\">https:\/\/myfik.unisza.edu.my\/myjcam\/index.php\/myjcam\/article\/view\/56<\/a><\/p><p>39) Hana Ali-Pacha, Naima Hadj-Said , Adda Ali-Pacha and \u00d6zen\u00d6zer,\u201d Significant role of the specific prime number p = 257 in the improvement of cryptosystems\u201d, Notes on Number Theory and Discrete Mathematics, DOI: 10.7546\/nntdm.2020.26.4.213-222, \u00a0Vol. 26, No. 4, pp. 213\u2013222, December 2020.<\/p><p><a href=\"http:\/\/nntdm.net\/volume-26-2020\/number-4\/213-222\/\">http:\/\/nntdm.net\/volume-26-2020\/number-4\/213-222\/<\/a><\/p><p>38) MA Boudouaia, A Ali-Pacha, A Abouaissa, P Lorenz, \u00ab\u00a0Security Against Rank Attack in RPL Protocol, IEEE Network, Volume: 34\u00a0,\u00a0Issue: 4\u00a0, pp. 133-139, , July\/August 2020<\/p><p>https:\/\/ieeexplore.ieee.org\/document\/9146423<\/p><h2>37) <em>Hana Ali-Pacha, Naima Hadj-Said, Adda Ali-Pacha, \u201c<\/em><strong>Image encryption by using a specific adaptation of Lehmer\u2019s algorithm<em>\u201d<\/em><\/strong> Journal of Discrete Mathematical Sciences and Cryptography, DOI: 10.1080\/09720529.2019.1652402, Published online: 23 Oct 2019, Vol. 23, Issue: 5, Pages: 949-971, August 2020.<\/h2><p><a href=\"https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/09720529.2019.1652402\">https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/09720529.2019.1652402<\/a><\/p><p>36) Abderrahmene Hadj Brahim, Adda Ali-Pacha, Naima Hadj-Said, \u00ab\u00a0<strong>Image encryption based on compressive sensing<em>\u201d,<\/em><\/strong>Optics and Laser Technology, ISSN:\u00a00030-3992, Vol. 132 (2020).Article 106489,Accepted 13 July 2020, <a href=\"https:\/\/doi.org\/10.1016\/j.optlastec.2020.106489\">https:\/\/doi.org\/10.1016\/j.optlastec.2020.106489<\/a><\/p><p><a href=\"https:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S0030399220311221?via%3Dihub\">https:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S0030399220311221?via%3Dihub<\/a><\/p><p>35) Khalfallah Ali-Cherif, Naima Hadj-Said, Adda Ali-Pacha, \u00ab\u00a0<strong>A new chaotic encrypted image based on the trigonometric circle\u00a0<\/strong>\u00bb, Information Security Journal: A Global Perspective, Volume 29, N\u00a0: 6, Pages: 297-309, 23 May 2020.<\/p><p><a href=\"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/19393555.2020.1767831\">https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/19393555.2020.1767831<\/a><\/p><p>34) Ghazli Abdelkader, Ali-Pacha Adda, Hadj Said Naima, \u00ab\u00a0Chaos Athentication and Ciphering Approach to Secure Mobile Networks\u00a0\u00bb, International Journal of Networks and Communications, pp. 20 &#8211; 32, Vol. 10, No. 1, 2020.<\/p><p><a href=\"http:\/\/article.sapub.org\/10.5923.j.ijnc.20201001.03.html\">http:\/\/article.sapub.org\/10.5923.j.ijnc.20201001.03.html<\/a><\/p><p>33) KafiKhadidja<strong>,<\/strong> Adda Ali-Pacha , Naima Hadj-Said, \u00ab\u00a0<strong>New method for identification of persons using geometry foot outline<\/strong>\u00bb, <em>International Journal of Biometrics,DOI: 10.1504\/IJBM.2020.107716,pp.<\/em> 179-192, <em>\u00a0Vol. 12, <\/em>No.<em>2, 2020.<\/em><\/p><p><a href=\"https:\/\/www.inderscience.com\/info\/inarticle.php?artid=107716\">https:\/\/www.inderscience.com\/info\/inarticle.php?artid=107716<\/a><\/p><p>32) Ghazli Abdelkader, Ali-Pacha Adda, Hadj Said Naima, \u00ab\u00a0Neural Based Stream Cipher Design to Secure Mobile Phone Communications\u00a0\u00bb, International Journal of Advanced Science and Technology, IJAST, pp. 6319 &#8211; 6330, Vol. 29, No. 6, 2020.<\/p><p><a href=\"http:\/\/sersc.org\/journals\/index.php\/IJAST\/article\/view\/19918\">http:\/\/sersc.org\/journals\/index.php\/IJAST\/article\/view\/19918<\/a><\/p><p>31) Abdelkader GHAZLI, Adda ALIPACHA, Naima HADJ SAID, \u00ab\u00a0An Evolutionary Approach to Secure Mobile Telecommunication Networks\u00a0\u00bb, INFORMATICA JOURNAL, Vol. 31, N\u00b0 5, 2020.<\/p><p><a href=\"http:\/\/www.informaticajournal.com\/show.php?v=31&amp;i=5\">http:\/\/www.informaticajournal.com\/show.php?v=31&amp;i=5<\/a><\/p><p>30) Assia Merzoug<strong>,<\/strong> Adda Ali-Pacha, Naima Hadj-Said, \u201cNew chaotic cryptosystemfor the image encryption\u201d, International Journal of Information and Computer Security,ISSN online: 1744-1773, pp.450-463, Vol. 12, No. 4, 2020.<\/p><p><a href=\"https:\/\/www.inderscience.com\/info\/inarticle.php?artid=107452\">https:\/\/www.inderscience.com\/info\/inarticle.php?artid=107452<\/a><\/p><h2>29) <em>Hana Ali-Pacha, Naima Hadj-Said, Adda Ali-Pacha, \u201c<\/em><strong>Data Security based on Homographic Function<em>\u201d <\/em>Pattern Recognition Letters, <\/strong>Volume 129, January 2020, Pages 240-246. <a href=\"https:\/\/doi.org\/10.1016\/j.patrec.2019.10.032\">https:\/\/doi.org\/10.1016\/j.patrec.2019.10.032<\/a><\/h2><p><a href=\"https:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S0167865519303101\">https:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S0167865519303101<\/a><\/p><p>28) Rimani Rachid, Naima Hadj-Said, Adda Ali-Pacha,\u00ab\u00a0<strong>Proposition of a dynamic steganography system based on the chaos properties and image registration for distributing an encryption key<\/strong> \u00bb, <em>International Journal of Information Privacy, Security and Integrity, DOI: 10.1504\/IJIPSI.2019.<\/em>106573, <em>Vol. 4, No. 2, 2019.<\/em><\/p><p><a href=\"https:\/\/www.inderscienceonline.com\/doi\/abs\/10.1504\/IJIPSI.2019.106573\">https:\/\/www.inderscienceonline.com\/doi\/abs\/10.1504\/IJIPSI.2019.106573<\/a><\/p><p>27) Djamel Slimani, Adda Ali-Pacha &amp; Naima Hadj-Said, \u201cA New Method to Construct 4-Cycle-Free Parity-Check Matrices for Regular LDPC Codes\u201d, Journal of Sciences and Technology-Pertanika,\u00a0 Vol. 27 (4), pp. 1709 &#8211; 1722 , \u00a0Oct. 2019.<\/p><p>ID: JST-1422-2018: <a href=\"http:\/\/www.pertanika.upm.edu.my\/regular_issues.php?jtype=2\">http:\/\/www.pertanika.upm.edu.my\/regular_issues.php?jtype=2<\/a><\/p><p>26)Khaled Tahkoubit , Adda Ali-Pacha, HmaiedShaiek , and Daniel Roviras, \u201cIterative Dichotomy PAPR Reduction Method for Multicarrier Waveforms\u201d, IEEE Communications Letters, On page(s): 1-4, Print ISSN: 1089-7798, Digital Object Identifier: 10.1109\/LCOMM.2019.2935439.Page(s):\u00a02073\u00a0\u2013\u00a02076, Vol. 23, Issue 11 \u2022 Nov.-2019<\/p><p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/8801891\">https:\/\/ieeexplore.ieee.org\/document\/8801891<\/a><\/p><p>25) <em>Hana Ali-Pacha, Naima Hadj-Said, Adda Ali-Pacha, Mohamad Afendee Mohamed, Mustafa Mamat, \u201c<\/em><strong>Cryptographic adaptation of the middle square generator<\/strong><em>\u201d <\/em><strong>International Journal of Electrical and Computer Engineering (IJECE) <\/strong>Vol. 9, No. 6, December 2019, pp. 5615~5627 ISSN: 2088-8708, DOI: 10.11591\/ijece.v9i6.pp5615-5627<\/p><p><a href=\"http:\/\/ijece.iaescore.com\/index.php\/IJECE\/article\/view\/20707\/13296\">http:\/\/ijece.iaescore.com\/index.php\/IJECE\/article\/view\/20707\/13296<\/a><\/p><p>24)NabilaBenmessaoud, N. Hadj-Said, A. Ali-Pacha and M. Benmessaoud, 2019. A New Random Sequence using Descriptor of Fourier for Image Encryption. <em>Journal of Engineering and Applied Sciences, <\/em>Vol. 14, Issue 22, pp: 8168-8179.Year:2019<strong>, <\/strong><strong>DOI:<\/strong><a href=\"http:\/\/dx.doi.org\/10.3923\/jeasci.2019.8168.8179\">10.3923\/jeasci.2019.8168.8179<\/a>, <strong>URL:<\/strong><a href=\"http:\/\/medwelljournals.com\/abstract\/?doi=jeasci.2019.8168.8179\">http:\/\/medwelljournals.com\/abstract\/?doi=jeasci.2019.8168.8179<\/a><\/p><p>23) Hana Ali-Pacha, Adda Ali-Pacha, Naima Hadj-Said, \u201c<strong>Proposition of a New Vernam Chaotic Cipher<\/strong>\u201d, Malaysian Journal of Computing and Applied Mathematics, Vol 2(2): 32-43, 2019.<\/p><p><a href=\"https:\/\/myfik.unisza.edu.my\/myjcam\/index.php\/myjcam\/article\/view\/34\/21\">https:\/\/myfik.unisza.edu.my\/myjcam\/index.php\/myjcam\/article\/view\/34\/21<\/a><\/p><p>22) R. RIMANI, N. HADJ SAID, A. ALI-PACHA, J.A. L\u00f3pez RAMOS, \u201c<strong>Image encryption by AES algorithm based on Chaos-Permutation<\/strong>\u201d, Malaysian Journal of Computing and Applied Mathematics, Vol 2(2): 14-24, 2019.<\/p><p><a href=\"https:\/\/myfik.unisza.edu.my\/myjcam\/index.php\/myjcam\/article\/view\/32\/23\">https:\/\/myfik.unisza.edu.my\/myjcam\/index.php\/myjcam\/article\/view\/32\/23<\/a><\/p><p>21) Assia Merzoug, Adda Ali-Pacha, Naima Hadj-Said, Hana Ali-Pacha, \u201cProduction of a Super-Increasing Sequence based on the Fibonaci Sequence\u201d, Malaysian Journal of Computing and Applied Mathematics, Vol 2(1): 16-24, 2019.<\/p><p><a href=\"https:\/\/myfik.unisza.edu.my\/myjcam\/index.php\/myjcam\/article\/view\/25\">https:\/\/myfik.unisza.edu.my\/myjcam\/index.php\/myjcam\/article\/view\/25<\/a><\/p><p>20) Hana Ali-Pacha, Adda Ali-Pacha, Naima Hadj-Said, \u201cDynamic Generalization of the Vig\u00e9n\u00e8re Table based on the Logistics Map\u201d, Malaysian Journal of Computing and Applied Mathematics, Vol 2(1): 25-33, 2019.<\/p><p><a href=\"https:\/\/myfik.unisza.edu.my\/myjcam\/index.php\/myjcam\/article\/view\/26\">https:\/\/myfik.unisza.edu.my\/myjcam\/index.php\/myjcam\/article\/view\/26<\/a><\/p><p>19) KafiKhadidja<strong>,<\/strong> Adda Ali-Pacha, Naima Hadj-Said, \u00ab\u00a0<strong>Estimation of Stature by Measuring Dimensions of the Main Part of Foot Outline<\/strong> \u00bb Journal of Forensic Identification (\u201cJFI\u201d): Vol. 69, N\u00b02, pp. 222-236, 2019.<\/p><p><a href=\"https:\/\/www.theiai.org\/jfi_abstracts.php\">https:\/\/www.theiai.org\/jfi_abstracts.php<\/a><\/p><p>17) <em>Hana Ali-Pacha, Naima Hadj-Said, <strong><u>Adda Ali-Pacha<\/u><\/strong>, Mustafa Mamat, Mohamad Afendee Mohamed, \u201c<\/em>An Efficient Schema of a Special Permutation Inside of Each Pixel of an Image for its Encryption<em>\u201d, <\/em><strong>IJEECS\u00a0: Indonesian Journal of Electrical Engineering and Computer Science, <\/strong>DOI: http:\/\/doi.org\/10.11591\/ijeecs.v11.i2.pp%25p, Vol. 11, No. 2, August 2018.<\/p><p><a href=\"http:\/\/ijeecs.iaescore.com\/index.php\/IJEECS\/article\/view\/12885\">http:\/\/ijeecs.iaescore.com\/index.php\/IJEECS\/article\/view\/12885<\/a><\/p><p>16) <em>Lahcene Merah, <strong><u>Adda Ali-Pacha<\/u><\/strong>, Naima Hadj-Said, MecheriBelkacem<\/em>, \u201cNew and Efficient Method for Extending Cycle Length of Digital Chaotic Systems\u201d, <strong>DOI<\/strong> 10.1007\/s40998-018-0122-0, Iranian Journal of Science and Technology, Transactions of Electrical Engineering, 1-10. July 2018.<\/p><p><a href=\"https:\/\/link.springer.com\/article\/10.1007\/s40998-018-0122-0\">https:\/\/link.springer.com\/article\/10.1007\/s40998-018-0122-0<\/a><\/p><p><em>\u00a0<\/em><\/p><p>15) <em>Assia Merzoug<\/em><em>,<strong><u>Adda Ali-Pacha<\/u><\/strong>, Naima Hadj-Said, Mustafa Mamat<\/em><em>, Mohamad Afendee Mohamed<\/em><em>, \u201c<\/em>Generating a random sequence based on PWLCM map applicated to RC4 algorithm\u201d, International Journal of Engineering &amp; Technology, DOI: 10.14419\/ijet.v7i2.14.12821<strong>, <\/strong>pp182-185, Vol. 7, N\u00b0:2.14,\u00a0 April 2018.<\/p><p><a href=\"https:\/\/www.semanticscholar.org\/paper\/Generating-a-random-sequence-based-on-PWLCM-map-to-Merzoug-Ali-Pacha\/8689b84e7513858256240da375c441a6f3fe833c\">https:\/\/www.semanticscholar.org\/paper\/Generating-a-random-sequence-based-on-PWLCM-map-to-Merzoug-Ali-Pacha\/8689b84e7513858256240da375c441a6f3fe833c<\/a><\/p><p>14) Mohamed Krim,<strong><u>Adda Ali Pacha<\/u><\/strong>, Naima Hadj Said, \u201cThe Quality of a New Generator Sequence Improvent for Spreading the Color Image Transmission System\u201d, TELKOMNIKA (Telecommunication Computing Electronics and Control), DOI: http:\/\/dx.doi.org\/10.12928\/telkomnika.v15i4.6583, pp. 407~419, Vol 16, No 1: February 2018.<\/p><p><a href=\"http:\/\/journal.uad.ac.id\/index.php\/TELKOMNIKA\/article\/view\/6583\">http:\/\/journal.uad.ac.id\/index.php\/TELKOMNIKA\/article\/view\/6583<\/a><\/p><p>13) L. Merah, <strong><u>Adda Ali-Pacha<\/u><\/strong>, Naima Hadj-Said, B. Mecheri, and M. Dellassi, \u201c <strong>FPGA Hardware Co-simulation of New Chaos-Based Stream Cipher Based on Lozi Map<\/strong>\u201d, International Journal of Engineering and Technology, (DOI: 10.7763\/IJET.2017.V9.1010), Vol. 9, No. 5, pp. 420 ~ 425,\u00a0 October 2017.<\/p><p><a href=\"http:\/\/www.ijetch.org\/vol9\/1010-ED031.pdf\">http:\/\/www.ijetch.org\/vol9\/1010-ED031.pdf<\/a><\/p><p>12) Abdelkader Ghazli Naima Hadj Said, <strong><u>Adda Ali-Pacha<\/u><\/strong>, \u201dMobile Phone Security Based New Strong Genetic Stream Cipher Design\u201d, International Journal on Communications Antenna and Propagation (IRECAP), DOI: https:\/\/doi.org\/10.15866\/irecap.v7i4.10693, pp. 334-341, Vol 7, No 4, August (2017).<\/p><p><a href=\"https:\/\/www.praiseworthyprize.org\/jsm\/index.php?journal=irecap&amp;page=article&amp;op=view&amp;path%5B%5D=19669\">https:\/\/www.praiseworthyprize.org\/jsm\/index.php?journal=irecap&amp;page=article&amp;op=view&amp;path%5B%5D=19669<\/a><\/p><p>11) Assia Merzoug, <strong><u>Adda Ali Pacha<\/u><\/strong>, Naima Hadj Said, \u201cNew Approach of the Playfair&rsquo;s Cipher with a Numerical Value of the Keyword\u201d, <strong>IJEECS\u00a0: Indonesian Journal of Electrical Engineering and Computer Science, <\/strong>ISSN: 2502-4752, pp. 695 ~ 703 DOI: 10.11591\/ijeecs.v6.i3.pp695-703, Vol. 6, No. 3, June 2017.<\/p><p><a href=\"http:\/\/ijeecs.iaescore.com\/index.php\/IJEECS\/article\/view\/7409\">http:\/\/ijeecs.iaescore.com\/index.php\/IJEECS\/article\/view\/7409<\/a><\/p><p>10) M. Mesri, K. Tahkoubit, H. Merah <strong><u>Adda Ali-Pacha<\/u><\/strong>, \u201c <strong>Partial Transition Sequence Algorithms for Reducing Peak to Average Power Ratio in the Next Generation Wireless Communications Systems<\/strong>\u201d, Journal of Electrical Systems ,Vol. 13-1, pp.169~182, February 2017.<\/p><p><a href=\"https:\/\/search.proquest.com\/openview\/d17930985e95af684e720a8ecfbfee11\/1?pq-origsite=gscholar&amp;cbl=4433095\">https:\/\/search.proquest.com\/openview\/d17930985e95af684e720a8ecfbfee11\/1?pq-origsite=gscholar&amp;cbl=4433095<\/a><\/p><p>09) Ghazli Abdelkader, Naima Hadj Said, <strong><u>Adda Ali-Pacha<\/u><\/strong> \u201c<strong>Secure Authentication Approach Based New Mobility Management schemes for Mobile Communication<\/strong>\u201d, JIPS Journal of Information Processing Systems, (https:\/\/doi.org\/10.3745\/JIPS.03.0064), J Inf Process Syst, Vol.13, No.1, pp.152~173, February 2017<\/p><p><a href=\"http:\/\/jips-k.org\/q.jips?cp=pp&amp;pn=439\">http:\/\/jips-k.org\/q.jips?cp=pp&amp;pn=439<\/a><\/p><p>08) Mohamed Krim, <strong><u>Adda Ali-Pacha<\/u><\/strong>, Naima Hadj-Said, \u201c <strong>New Binary Code Combined with New Chaotic Map and Gold Code to Ameliorate the Quality of the Transmission<\/strong>\u201d,<strong> Indonesian Journal of Electrical Engineering and Computer Science, (<\/strong>DOI: 10.11591\/ijeecs.v5.i1.pp 166-180<strong>), <\/strong>Vol. 5, No. 1, pp. 166 ~ 180 , January 2017.<\/p><p>file:\/\/\/C:\/Users\/MonHP\/Downloads\/New_Binary_Code_Combined_with_New_Chaotic_Map_and_.pdf<\/p><p>07) Lahcene Merah, <strong><u>Adda Ali-Pacha<\/u><\/strong>,\u00b7Naima Hadj Said, \u201c<strong>Real-time cryptosystem based on synchronized chaotic systems<\/strong>\u201d, Nonlinear Dynamic journal, https:\/\/doi.org\/10.1007\/s11071-015-2202-2, Volume 82, Issue\u00a01\u20132, pp 877\u2013890, October 2015<\/p><p><a href=\"https:\/\/link.springer.com\/article\/10.1007\/s11071-015-2202-2\">https:\/\/link.springer.com\/article\/10.1007\/s11071-015-2202-2<\/a><\/p><p>06) Lahcene Merah, <strong><u>Adda Ali-Pacha<\/u><\/strong>, Naima Hadj Said, \u201c<strong>Coupling Two Chaotic Systems in Order to Increasing the security of a Communication System &#8211; Study and Real Time FPGA Implementation<\/strong>\u201d Paper ID: 4-10_948,International Journal of\u00a0 Computer Science and Telecommunications\u00a0 (ISSN: 2047-3338), http:\/\/www.ijcst.org,pp.47-53, Volume 4, Issue 10, October 2013.<\/p><p><a href=\"https:\/\/pdfs.semanticscholar.org\/5b35\/2c52f6ffb12b7b27d7ed0be4d7a0a27c95e9.pdf\">https:\/\/pdfs.semanticscholar.org\/5b35\/2c52f6ffb12b7b27d7ed0be4d7a0a27c95e9.pdf<\/a><\/p><p>05) Lahcene Merah, <strong>Adda Ali-Pacha<\/strong>, Naima Hadj Said, Mustafa Mamat, \u00ab\u00a0<strong>A Pseudo Random Number Generator Based on the Chaotic System of Chua\u2019s Circuit, and its Real Time FPGA Implementation<\/strong>\u00bb, Applied Mathematical Sciences,ISSN 1312-885X<strong>,<\/strong> Hikari Ltd Editor, Vol. 7, no. 55, 2719-2734, 2013.<\/p><p><a href=\"http:\/\/www.m-hikari.com\/ams\/ams-2013\/ams-53-56-2013\/13242.html\">http:\/\/www.m-hikari.com\/ams\/ams-2013\/ams-53-56-2013\/13242.html<\/a><\/p><p>04) Lahcene Merah, <strong>Adda Ali-Pacha<\/strong>, Naima Hadj Said, Mustafa Mamat, \u00ab\u00a0<strong>Design and FPGA Implementation of Lorenz Chaotic System for Information Security Issues<\/strong>\u00bb, Applied Mathematical Sciences,ISSN 1312-885X<strong>,<\/strong> Hikari Ltd Editor, Vol. 7, no. 5, 237 \u2013 246, 2013.<\/p><p><a href=\"http:\/\/www.m-hikari.com\/ams\/ams-2013\/ams-5-8-2013\/mamatAMS5-8-2013-1.pdf\">http:\/\/www.m-hikari.com\/ams\/ams-2013\/ams-5-8-2013\/mamatAMS5-8-2013-1.pdf<\/a><\/p><p>03) <strong>Adda Ali-Pacha<\/strong> &#8211; Naima Hadj-Said- Mohamed Sadek Ali-Pacha- Abdallah M\u2019Hamed, \u201c<strong>New Construction of a Chaotic Generator on the Lorenz Attractor<\/strong>\u201d, Journal for Pure Science of university of anbar : ISSN: 1991-8941,\u00a0 Vol.6:N\u00b0.2 : 2012.<\/p><p><a href=\"https:\/\/www.iasj.net\/iasj?func=article&amp;aId=63243\">https:\/\/www.iasj.net\/iasj?func=article&amp;aId=63243<\/a><\/p><p>02) <strong>Adda ALI-PACHA<\/strong>, N. HADJ-SAID, A. M\u2019HAMED, A. BELGHORAF ,\u00ab\u00a0<strong>Lorenz\u2019s attractor applied to the stream cipher (ALI PACHA generator) <\/strong>\u00bb, doi:10.1016\/j.chaos.2006.03.009, Revue Elsevier Science\u00a0: Chaos, Solitons &amp; Fractals. Volume 33\/5 pp. 1762-1766, ISSN 0960-0779, Pergamon,, Accepted 7 March 2006.\u00a0 Available online, August 2007.<\/p><p><a href=\"https:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S0960077906002360\">https:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S0960077906002360<\/a><\/p><p>01) <strong>Adda ALI-PACHA<\/strong>, N. HADJ-SAID, B. BELMEKKI, A. BELGHORAF, :\u00ab\u00a0 <strong>Chaotic Behaviour for the Secrete key of Cryptographic System<\/strong>\u00a0\u00bb, <a href=\"http:\/\/dx.doi.org\/10.1016\/j.chaos.2004.05.015\">doi:10.1016\/j.chaos.2004.05.015<\/a>\u00a0, Revue Elsevier Science\u00a0: Chaos, Solitons &amp; Fractals ( The Interdisciplinary Journal of Nonlinear Science Nano and Quantum Technology), Volume 23\/5 pp. 1549-1552, ISSN 0960-0779, Pergamon,, Accepted 5 May 2004.\u00a0 Available online, 22 October 2004.<\/p><p><a href=\"https:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S0960077904002978?via%3Dihub\">https:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S0960077904002978?via%3Dihub<\/a><\/p><p><span lang=\"EN-GB\">\u00a0Merah HOCINE, Merah LAHCENE, Talbi LARBI, Ali-Pacha ADDA,\u00a0\u201dA PRNG based on an improved chaotic map using a self-perturbation mechanism\u201d, Romanian Journal of Information Technology and Automatic Control, Vol. 33, No. 2, pp.47-60, 2023.<\/span><\/p><p><span lang=\"EN-GB\"><a href=\"https:\/\/doi.org\/10.33436\/v33i2y202304\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/doi.org\/10.33436\/v33i2y202304&amp;source=gmail&amp;ust=1688372710120000&amp;usg=AOvVaw0lZ5HFK4TsgKLZXL5iCAth\">https:\/\/doi.org\/10.33436\/<wbr \/>v33i2y202304<\/a><\/span><\/p><p><span lang=\"EN-GB\"><a href=\"https:\/\/rria.ici.ro\/wp-content\/uploads\/2023\/06\/art._Hocine_Lahcene_Larbi_Adda.pdf\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/rria.ici.ro\/wp-content\/uploads\/2023\/06\/art._Hocine_Lahcene_Larbi_Adda.pdf&amp;source=gmail&amp;ust=1688372710120000&amp;usg=AOvVaw0lj7q9UKJTeTpGJ40J-RpK\">https:\/\/rria.ici.ro\/wp-<wbr \/>content\/uploads\/2023\/06\/art._<wbr \/>Hocine_Lahcene_Larbi_Adda.pdf<\/a><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Toutes les actualit\u00e9s Publications \u00a0Publications Internationales: (Nombre: 74) 74) M.\u00a0Naim,\u00a0 A.\u00a0Ali\u00a0Pacha, \u00ab\u00a0A new chaotic satellite image encryption algorithm based on\u00a0a\u00a02D flter and\u00a0Fisher\u2013Yates shufing\u201d, The Journal of Supercomputing https:\/\/doi.org\/10.1007\/s11227-023-05346-5 https:\/\/link.springer.com\/article\/10.1007\/s11227-023-05346-5 73) <a href=\"https:\/\/www.univ-usto.dz\/labo\/lacosi\/publication\/\" class=\"read-more\">Lire la suite &#8230;<\/a><\/p>\n","protected":false},"author":28,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[123],"tags":[],"class_list":["post-12312","post","type-post","status-publish","format-standard","hentry","category-annonces"],"_links":{"self":[{"href":"https:\/\/www.univ-usto.dz\/labo\/lacosi\/wp-json\/wp\/v2\/posts\/12312","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.univ-usto.dz\/labo\/lacosi\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.univ-usto.dz\/labo\/lacosi\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.univ-usto.dz\/labo\/lacosi\/wp-json\/wp\/v2\/users\/28"}],"replies":[{"embeddable":true,"href":"https:\/\/www.univ-usto.dz\/labo\/lacosi\/wp-json\/wp\/v2\/comments?post=12312"}],"version-history":[{"count":11,"href":"https:\/\/www.univ-usto.dz\/labo\/lacosi\/wp-json\/wp\/v2\/posts\/12312\/revisions"}],"predecessor-version":[{"id":12483,"href":"https:\/\/www.univ-usto.dz\/labo\/lacosi\/wp-json\/wp\/v2\/posts\/12312\/revisions\/12483"}],"wp:attachment":[{"href":"https:\/\/www.univ-usto.dz\/labo\/lacosi\/wp-json\/wp\/v2\/media?parent=12312"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.univ-usto.dz\/labo\/lacosi\/wp-json\/wp\/v2\/categories?post=12312"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.univ-usto.dz\/labo\/lacosi\/wp-json\/wp\/v2\/tags?post=12312"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}