Preferred Language
Articles
/
bsj-4033
Improved throughput of Elliptic Curve Digital Signature Algorithm (ECDSA) processor implementation over Koblitz curve k-163 on Field Programmable Gate Array (FPGA)
...Show More Authors

            The widespread use of the Internet of things (IoT) in different aspects of an individual’s life like banking, wireless intelligent devices and smartphones has led to new security and performance challenges under restricted resources. The Elliptic Curve Digital Signature Algorithm (ECDSA) is the most suitable choice for the environments due to the smaller size of the encryption key and changeable security related parameters. However, major performance metrics such as area, power, latency and throughput are still customisable and based on the design requirements of the device.

The present paper puts forward an enhancement for the throughput performance metric by proposing a more efficient design for the hardware implementation of ECDSA. The design raised the throughput to 0.08207 Mbit/s, leading to an increase of 6.95% from the existing design. It also includes the design and implementation of the Universal Asynchronous Receiver Transmitter (UART) module. The present work is based on a 163-bit key-size over Koblitz curve k-163 and secure hash function SHA-1. A serial module for the underlying modular layer, high-speed architecture of Koblitz point addition and Koblitz point multiplication have been considered in this work, in addition to utilising the carry-save-multiplier, modular adder-subtractor and Extended Euclidean module for ECDSA protocols. All modules are designed using VHDL and implemented on the platform Virtex5 xc5vlx155t-3ff1738. Signature generation requires 0.55360ms, while its validation consumes 1.10947288ms. Thus, the total time required to complete both processes is equal to 1.66ms and the maximum frequency is approximately 83.477MHZ, consuming a power of 99mW with the efficiency approaching 3.39 * 10-6.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 01 2002
Journal Name
Iraqi Journal Of Physics
Effect of the electric field on drilling Brass by Laser
...Show More Authors

The research include a pulsed Nd: YAG Laser with (300µs) pulse duration in the TEM00 mode at (1.06µm) wavelength for energies between (0.5-3) J was employed to drill Brass material which is use in industrial applications. The process of drill was assisted by an electric field. This resulted in an increase in the hole aspect ratio by the value (45%) and decrease in the hole taper by the value (25%) of its value under ordinary drilling conditions using the same input energy.

View Publication Preview PDF
Crossref
Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Electronic trading system and its refletion in the trading of stock market indices –an analytical study of the Iraqi market for securities–
...Show More Authors

The research aims at identify the role of the electronic trading system used in the Iraq stock exchange to promote trading activity for the stocks of listed companies in this market.

To prove the hypothesis of research, it was selected the main trading indicators for the market to be a main field in test the research hypothesis.it was selected as the period of time for (9)years span between the years (2005-2013) because they represent the first two articles of equal time periods represent aperiod that preceded the introduction of electronic trading system  while the second represents the period of time that followed 

The research found a number of conclusions but the mo

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Dec 29 2025
Journal Name
Al–bahith Al–a'alami
THE IDEOLOGY OF UNIVERSITY STUDENTS TOWARDS POLITICAL DISCOURSE IN SATELLITE CHANNELS: A field study on media students at Al-Mustansiriya University))
...Show More Authors

‏The speech delivered by political blocs and parties and broadcasted by satellite channels, social and communication media has different ideologies and orientations: moderate speech calling for calm or one raising crises.‏The latter is considered very challenging due to its local and international reference.‏, this paper aims at uncovering these challenges especially during the political crisis witnessed in Iraq. This paper sheds light on the most important crisis that spread in public opinion, broadcasted by satellite, and raised by politicians who are competing to gain authority leading to a lack of peoples, confidence in them.‏This matter should not be neglected at all; e

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 27 2022
Journal Name
Arab Science Heritage Journal
الشيك الالكتروني (دراسة تأصيلية فقهية)
...Show More Authors

This research examines the electronic check slip of an educational doctrinal study, in terms of explaining the truth of the electronic check and the legal organization of it and the way it is handled, and then devising the jurisprudence related to it

View Publication Preview PDF
Crossref
Publication Date
Mon Jan 30 2012
Journal Name
مجلة العلوم القانونية
حماية المستهلك في التعاقد الالكتروني
...Show More Authors

يتناول البحث حماية المستهلك في التعاقد الالكتروني

Preview PDF
Publication Date
Tue Sep 27 2022
Journal Name
Arab Science Heritage Journal
الشيك الالكتروني (دراسة تأصيلية فقهية)
...Show More Authors

This research examines the electronic check slip of an educational doctrinal study, in terms of explaining the truth of the electronic check and the legal organization of it and the way it is handled, and then devising the jurisprudence related to it.

View Publication Preview PDF
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Exploring the actual implementation of e-wallet application in Malaysia
...Show More Authors

E-wallet, also referred to as digital wallet, is a software application designed to replace physical wallets, with the primary purpose of facilitating online transactions when users wish to make virtual payments. Nowadays, E-wallets are not limited to mobile applications, but they have also been extended to wearable devices, such as smartwatches, enabling users to make payments via their watches. This research study focuses on three main E-wallet service providers in Malaysia, namely TouchNGo E-wallet, Boost, and Grab pay, as they are the top three E-wallets in the country. The aim of this paper is to explore the real-world implementation of E-wallets among mobile phone users in Malaysia, employing the Technology Adoption Model as the th

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Ieee Access
Speech Enhancement Algorithm Based on Super-Gaussian Modeling and Orthogonal Polynomials
...Show More Authors

View Publication
Scopus (44)
Crossref (43)
Scopus Clarivate Crossref
Publication Date
Sat May 24 2025
Journal Name
Iraqi Journal For Computer Science And Mathematics
Intrusion Detection System for IoT Based on Modified Random Forest Algorithm
...Show More Authors

An intrusion detection system (IDS) is key to having a comprehensive cybersecurity solution against any attack, and artificial intelligence techniques have been combined with all the features of the IoT to improve security. In response to this, in this research, an IDS technique driven by a modified random forest algorithm has been formulated to improve the system for IoT. To this end, the target is made as one-hot encoding, bootstrapping with less redundancy, adding a hybrid features selection method into the random forest algorithm, and modifying the ranking stage in the random forest algorithm. Furthermore, three datasets have been used in this research, IoTID20, UNSW-NB15, and IoT-23. The results are compared with the three datasets men

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Image encryption algorithm based on the density and 6D logistic map
...Show More Authors

One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera

... Show More
View Publication
Scopus (23)
Crossref (12)
Scopus Crossref