Preferred Language
Articles
/
bsj-4033
Improved throughput of Elliptic Curve Digital Signature Algorithm (ECDSA) processor implementation over Koblitz curve k-163 on Field Programmable Gate Array (FPGA)
...Show More Authors

            The widespread use of the Internet of things (IoT) in different aspects of an individual’s life like banking, wireless intelligent devices and smartphones has led to new security and performance challenges under restricted resources. The Elliptic Curve Digital Signature Algorithm (ECDSA) is the most suitable choice for the environments due to the smaller size of the encryption key and changeable security related parameters. However, major performance metrics such as area, power, latency and throughput are still customisable and based on the design requirements of the device.

The present paper puts forward an enhancement for the throughput performance metric by proposing a more efficient design for the hardware implementation of ECDSA. The design raised the throughput to 0.08207 Mbit/s, leading to an increase of 6.95% from the existing design. It also includes the design and implementation of the Universal Asynchronous Receiver Transmitter (UART) module. The present work is based on a 163-bit key-size over Koblitz curve k-163 and secure hash function SHA-1. A serial module for the underlying modular layer, high-speed architecture of Koblitz point addition and Koblitz point multiplication have been considered in this work, in addition to utilising the carry-save-multiplier, modular adder-subtractor and Extended Euclidean module for ECDSA protocols. All modules are designed using VHDL and implemented on the platform Virtex5 xc5vlx155t-3ff1738. Signature generation requires 0.55360ms, while its validation consumes 1.10947288ms. Thus, the total time required to complete both processes is equal to 1.66ms and the maximum frequency is approximately 83.477MHZ, consuming a power of 99mW with the efficiency approaching 3.39 * 10-6.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Nov 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Evaluation of internal control system over according misleading accounting information
...Show More Authors

Abstract

The economic and financial crises in the world economy series led to increased awareness of the importance of the internal control system, because it is one of the main pillars of any economic unit, as it works to verify the application of policies, regulations and laws and verification of asset protection from theft and embezzlement procedures, it is also working on trust accounting information imparted through the validation of accounting information, analyze and detect the misleading.

The existence the internal control system a factor in many of the accounting practices that limit the ability of the administration to produce misleading financial reporting

The

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Performance Evaluation of Mobility Models over UDP Traffic Pattern for MANET Using NS-2
...Show More Authors

  The current study presents the simulative study and evaluation of MANET mobility models over UDP traffic pattern to determine the effects of this traffic pattern on mobility models in MANET which is implemented in NS-2.35 according to various performance metri (Throughput, AED (Average End-2-end Delay), drop packets, NRL (Normalize Routing Load) and PDF (Packet Delivery Fraction)) with various parameters such as different velocities, different environment areas, different number of nodes,  different traffic rates, different traffic sources, different pause times and different simulation times .  A routing protocol.…was exploited AODV(Adhoc On demand Distance Vector) and RWP (Random Waypoint), GMM (Gauss Markov Model), RPGM (Refere

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
International Journal Of Neutrosophic Science
A New Paradigm for Decision Making under Uncertainty in Signature Forensics Applications based on Neutrosophic Rule Engine
...Show More Authors

One of the most popular and legally recognized behavioral biometrics is the individual's signature, which is used for verification and identification in many different industries, including business, law, and finance. The purpose of the signature verification method is to distinguish genuine from forged signatures, a task complicated by cultural and personal variances. Analysis, comparison, and evaluation of handwriting features are performed in forensic handwriting analysis to establish whether or not the writing was produced by a known writer. In contrast to other languages, Arabic makes use of diacritics, ligatures, and overlaps that are unique to it. Due to the absence of dynamic information in the writing of Arabic signatures,

... Show More
View Publication Preview PDF
Scopus (6)
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sun Sep 01 2019
Journal Name
Baghdad Science Journal
PWRR Algorithm for Video Streaming Process Using Fog Computing
...Show More Authors

       The most popular medium that being used by people on the internet nowadays is video streaming.  Nevertheless, streaming a video consumes much of the internet traffics. The massive quantity of internet usage goes for video streaming that disburses nearly 70% of the internet. Some constraints of interactive media might be detached; such as augmented bandwidth usage and lateness. The need for real-time transmission of video streaming while live leads to employing of Fog computing technologies which is an intermediary layer between the cloud and end user. The latter technology has been introduced to alleviate those problems by providing high real-time response and computational resources near to the

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Jul 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Productive role in the financial performance of the banking: An Empirical Study in a sample of Iraqi banks
...Show More Authors

Abstract :

The research aims to study the basic concepts of banking productivity and discuss different approaches to study what ends to identify the most important possible standards applied to measured within the Iraqi banking environment as well as research into the causes of low and high Iraqi banking productivity and identify possible treatments to curb those reasons as to ensure the rise. And in line with the research problem, which states what is the level of productivity and what are the causes of decline and the rise in private banking research sample individually. And what the Iraqi private banks and what is the relationship between performance and the impact of productivity change in the perform

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
The Impact Of Knowledge Innovation On Strategic Empowerment (Comparative Field Research)
...Show More Authors

The Innovation Of Knowledge Is An Important And A Key Element In The Progress And Business Excellence Organizations, Therefore Requires Several Elements To Help Create And Implement And Move The Innovation Process Of Knowledge, Including The Strategic Empowerment Associated With The Element Of The Process Of Strategic Momentum Engine Driven Wheel Continuous Dynamic Innovation, And Focused Research Problem By Measuring The Availability Of Strategic Empowerment When Individuals From By Senior Departments And Ways To Help Organizations To Provide Empowerment Commensurate With The Requirements Of Achieving The Goals Of Time And Place Appropriate For The Individual, And The Importance Of Research Stems From The Importance Of The Varia

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Nov 05 2019
Journal Name
Cardiff University
Technology development for nanoscale InSb quantum split-gate structures
...Show More Authors

Publication Date
Wed Sep 15 2021
Journal Name
Al-academy
The impact of e-learning on the cognitive level in the Corona crisis: أسماء غازي عبد
...Show More Authors

E-learning is a necessity imposed by the Corona pandemic, which has disrupted various educational institutions in the world, but some of these institutions have not been affected and education has continued with them, due to their flexible educational system that was able to employ technology in the continuity of the educational process in the so-called e-learning, because It has characteristics that make it the most suitable alternative to avoid the consequences of the Corona pandemic and its damage to the educational process, as e-learning is one of the modern methods that contribute to enhancing the effectiveness of the learner, and enabling him to assume greater responsibility compared to traditional education, so the learner becomes

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu May 11 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Construction and Reverse Construction of the Complete Arcs in the Projective 3-Space Over Galois Field GF(2)
...Show More Authors

  The main purpose of this work is to find the complete arcs in the projective 3-space over Galois field GF(2), which is denoted by PG(3,2), by two methods and then we compare between the two methods

View Publication Preview PDF