My Home Page

Professor Magdy Saeb

 

Home

Cryptography VLSI Implementation
"Expect nothing! Live frugally on surprise.", 
Alice Walker



"Opportunities multiply as they are seized.", 
Sun Tzu



"I am Thankful for all of those who said NO to me, 
It's because of them I'm doing it myself.",
Albert Einstein



"Nothing fails like sucess.",
Arnold Toynbee

          Teaching & Research Activities


Education
Ph.D.,
University of California, Irvine,
School of Engineering,
Electrical & Computer Engineering Dept.                    June, 1985
MSEE.,
University of California, Irvine,
School of Engineering, 
Electrical & Computer Engineering Dept.                   June, 1981
BSEE.,
Cairo University, Cairo
School of Engineering,
Electrical Engineering Dept.                                        July, 1974

Professional Experience
Professor, Arab Academy for Science, Tech. & Maritime Transport,
School of Engineering , Computer Engineering (CE) Dept.,
Alexandria, Egypt.                                                                             1996-to-present

Head of Computer Engineering Dept., (On sabbatical leave to Malaysian Institute of Microelectronic Systems (MIMOS), Chief Researchers Office.

Taught graduate & undergraduate courses in Computer Networks, Parallel Processing, Computer Organization, Structure of Programming Languages, System Science, Pascal & C-programming, Computing Algorithms, Discrete Mathematics and Numerical Analysis, Digital Systems Design, Computing Systems, Performance & Design of Computers.
Ph.D. and MS. Thesis advisor, BS. projects advisor, co-ordinator of CE/CS MS. Program.

Supervised Ph.D. and MS. Theses in Computer Network Security, Mobile Agents Applications and Security, NW Router Implementation, FPGA Implementation of Neural Nets, Visual Information Retrieval, Encryption Processors, FPGA Implementaions of Encryption and Steganography security techniques, Advanced Security Processor Architectures.

ORCID ID: orcid.org/0000-0001-5188-430X

Scopus ID: 6602094571

 


Magdy Saeb
Magdy Saeb
Performance Comparison Between The "Patented" Chameleon Polymorphic Cipher & AES
Document
A Brief* Performance Comparison between Chameleon Polymorphic Cipher and AES Cipher
Document
The Chameleon Polymorphic Cipher Presentation

For Information Security Consultations & Training, please visit this site:

www.great-wall-security.com


For Information Security Training, please visit this site:

http://ijcscsknowledge.com/


IJCSCSKnowledge
IJCSCS Knowledge Center
GWIS
GWiS
Cryptography Presentations
Video Presentations

Areas of Interest:

Cryptographic Engineering
 Data Communication Security
 FPGA Implementations of Data Security Algorithms
 Computational Techniques
 Applications & Security of Mobile Agents
Communication Means:

E-mail: mail@magdysaeb.net
           magdisaeb@hotmail.com
             
Tel. (work):  AAST (203) 5602366/ext. 221 


List of Selected Publications (from most recent)                           

 

 

Selected List of Publications

Number Title & Joint Authors
Location/ Date of Publication/
 Area of Research
1

Magdy Saeb, "How to Thwart Rubber Hose Attacks," The International Journal of Computer Science & Communication Security (IJCSCS), Volume 9, March, 2019.

 http://www.ijcscs.org/journal

http://www.cydef.asia

Cryptography,
IJCSCS 2019
Cyber Defense Conference 2019

2

Magdy Saeb, "A 0ne-pass Key Distribution Protocol Based on the Hamming Code," The International Journal of Computer Science & Communication Security (IJCSCS), Volume 6, March, 2016.

 http://www.ijcscs.org/journal

Cryptography,
IJCSCS 2016
3

Magdy Saeb, "Reduction of Encryption Key Search Space Based on The Min-Entropy Approach," The International Journal of Computer Science & Communication Security (IJCSCS), Volume 6, Febrauary 2016.

http://www.ijcscs.org/journal

Cryptgraphy,
IJCSCS 2016
4

R. Mahmoud, A. Baith, M. Saeb, "Enhancing Kasumi Security by Affixing a Metamorphic Function and the Ensuing Hardware Implementation," The International Journal of Computer Science & Communication Security (IJCSCS), Volume 6, January 2016.

http://www.ijcscs.org/journal

Cryptgraphy, IJCSCS 2016
5

Magdy Saeb, "Security Analysis of the Power Based Key Hopping (PBKH) Technique," The International Journal of Computer Science & Communication Security (IJCSCS), Volume 5, August 2015.

http://www.ijcscs.org/journal

Cryptography, IJCSCS, 2015
6

 Magdy Saeb, "Metamorphic Feistel Networks," The International Journal of Computer Science & Communication Security (IJCSCS), Volume 5, July 2015.

http://www.ijcscs.org/journal

Cryptography, IJCSCS, 2015
7

 Magdy Saeb, "Encryption Key Distribution Applying Key Embedding and Environmental Initiation," The International Journal of Computer Science & Communication Security (IJCSCS), Volume 5, Feb. 2015.

http://www.ijcscs.org/journal

Cryptography, IJCSCS, 2015
8

 Magdy Saeb, "Encryption Key Distribution Applying Steganographic Techniques," The International Journal of Computer Science & Communication Security (IJCSCS), Volume 4, August 2014.

http://www.ijcscs.org/journal

Cryptography, IJCSCS, 2014
9

Rabie Mahmoud, Magdy Saeb, "A Generalized Cryptologic Unit and Its Hardware and Software Implementations," The International Journal of Computer Science & Communication Security (IJCSCS), Volume 4, March 2014.

http://www.ijcscs.org/journal

 Cryptography, FPGA Implemetation, 2014
10

 Rabie Mahmoud, Magdy Saeb, " Metamorphic Key-Hopping GOST Cipher & Its FPGA Implementation," The International Journal of Computer Science & Communication Security (IJCSCS), Volume 3, October 2013

http://www.ijcscs.org/journal

 Cryptography, FPGA Implemetation, 2013
11

 Magdy Saeb, " An Alternative Permuting Function for the Enhanced Sponge Funcion (ESP)," The International Journal of Computer Science & Communication Security (IJCSCS), Volume 3, September 2013

http://www.ijcscs.org/journal

 Cryptography, IJCSCS, 2013
12

Ahmed Helmy, Magdy Saeb, A. Baith, "A Metamorphic-Enhanced MARS Block Cipher," The International Journal of Computer Science & Communication Security (IJCSCS), Volume 3, July 2013

http://www.ijcscs.org/journal

Cryptography, IJCSCS,  2013
13

Ab. Kader Magdy, Ahmed Khadragi, Magdy Saeb, A. Baith Mohamed, "Analysis of DNA Signal Representation Applying Dynamic Time Warping (DTW) and Derivative Dynamic Time Warping (DDTW)," IJCSCS, Volume 3, January 2013.  

http://www.ijcscs.org/journal

Bioinformatics, IJCSCS,Volume3, Jan, 2013
14

A. Magdy, Magdy Saeb, A. Baith M., A. Khadragi, "The Haar Wavelet Transform of The DNA Signal Representation," World Academy of Science, Engineering & Technology, Bioinformatics Conference, Zurich, Switzerland, January 2013.

Bioinformatics, WASET, Zurich, Switzerland, 2013
15

Tim Ritchings, Ahmed Khadragi, Magdy Saeb, "An Intelligent Computer-Based System for Sign Language Tutoring," 
Assistive Technology: The Official Journal of RESNA, Volume 24, Issue 4, April, 2012.    

http://www.tandfonline.com/doi/abs/10.1080/10400435.2012.680662?journalCode=uaty20

 Assistive Tech., RESNA Journal, US, 2012
16 Magdy Saeb, "An Enhanced Sponge Function (ESP)," International Journal of Computer Science & Communications Security IJCSCS, July 2012.
http://www.ijcscs.org/journal
Cryptography, Sponge Functions, IJCSCS, 2012
17 MOHAMED EL-ZANATY, MAGDY SAEB, A. BAITH MOHAMED, SHAWKAT K. GUIRGUIS, EMAN EL-ABD, " Virus Classifications Based on the Haar Wavelet Transform of Signal Representation of DNA Sequences," The International Journal of Computer Science & Communication Security (IJCSCS), Volume 2, January, 2012

http://www.ijcscs.org/journal

Bioinformatics, Signal Analysis, (IJCSCS) 2012
18 Rabie Mahmoud, Magdy Saeb, "A Metamorphic-Enhanced TwoFish Block Cipher & Associated FPGA Implementation," The International Journal of Computer Science & Communication Security (IJCSCS), Volume 2, January 2012

http://www.ijcscs.org/journal

 Cryptography 2012
 19  Magdy Saeb, "A Key Distribution Protocol Applying a Haar-like Transform (KDPH)," The International Journal of Computer Science & Communication Security (IJCSCS), Volume 1, December 2011.

http://www.ijcscs.org/journal

Cryptography, 2011
20  Magdy Saeb, "The Expeditious Cipher: A lightweight Cipher," The International Journal of Computer Science & Communication Security (IJCSCS), Volume 1, October, 2011.

http://www.ijcscs.org/journal

 Cryptography, 2011
21
Mohamed El-Zanaty, Magdy Saeb, A. Baith Mohamed, Shawkat K. Guirguis, "Haar Wavelet Transform of The Signal Representation of DNA Sequences," International Journal of Computer Science & Communication Security, IJCSCS, July 2011.
 

http://www.ijcscs.org/journal

 Bioinformatics, Signal Analysis, (IJCSCS) 2011
 22  Rabie Mahmoud, Magdy Saeb, "Power-based Key Hopping (PBKH) and Associated Hardware  Implementation," International Journal of Computer Science & Information Security (IJCSIS), VOL.8 No.9, Dec. 2010. http://sites.google.com/site/ijcsis/vol-8-no-9-dec-2010
 Cryptography, Digital design FPGA, 2010
23  
Rabie Mahmoud, Magdy Saeb, "Hardware Implementation of the Message Digest Procedure MDP-384," International Journal of Computer Science & Network Security, VOL 10, No. 12, pp. 5-14, Dec., 2010.
http://search.ijcsns.org/02_search/02_search_03.php?number=201012002
 Cryptography, Digital design FPGA, 2010
 24  Rabie Mahmoud, Magdy Saeb, "Hardware Implementation of the Stone Metamorphic Cipher," International Journal of Computer Science & Network Security VOL.10 No.8, pp.54-60, 2010.
http://search.ijcsns.org/02_search/02_search_03.php?number=201008009
 Cryptography, Digital design FPGA, 2010
 25 Mohammed Munther A. Majeed, Khalid A.S. Al-Khateeb, Mohamed R. Wahiddin and Magdy M. Saeb, "A Protocol of Secure Key Distribution Using Hash Functions and Quantum-Authenticated Channels Six-State Quantum Protocol," Journal of Computer Science 6 (10), 2010. ISSN 1549-3636.

http://www.sciencegate.ch/all-articles?field=dc.creator&query=Saeb%2C+Magdy+M.&mode=mode.exact
 

Journal of Computer Science, 2010

Quantum-authenticated channels, Cryptography

 26  M. Wahhidin, Noor Sham, M. Saeb, M. Hamdan, "A Protocol for Secret Key Infusion From Satellite Transmissions," International Journal On Computers & Network Security (IJCNS), Vol. 2, No. 7, July 2010.  Cryptography (IJCNS), 2010
 27 Magdy Saeb, " The Stone Cipher: A Metamorphic Cipher," The International Journal On Computers & Network Security (IJCNS), Vol1 Mo. 2, pp. 1-7, Nov., 2009. http://www.ijcns.org/papers/Vol.1_No.2/  Cryptography (IJCNS), 2009
28  Magdy Saeb, "Hardware Implementation of The Chameleon Polymorphic Cipher,"  The International Journal On Computer Science & Network Security, Vol.9, No. 11, pp. 240-249, November 2009. http://www.ijcsns.org/  Cryptography (IJCSNS) 2009
29  Magdy Saeb,
" The Chameleon Cipher-192(CC192): A Polymorphic Cipher," SECRYPT2009, International Conference on Security & Cryptography, Milan,  Italy; 7-10 July 2009
http://secrypt.icete.org/Abstracts/2009/SECRYPT_2009_Abstracts.htm
 Cryptography,
Milan, Italy, 2009
30  Magdy Saeb,
"Design & Implementation of the Message Digest Procedures MDP-192 and MDP-384," ICCCIS2009 Interntional Conference on Cryptography, Coding and Information Security, Paris June24-26 2009.
http://www.waset.org/programs/Paris09.pdf
 Cryptography,
Paris, France, 2009
31   Reham Mahdy, Magdy Saeb,
"Design and implementation of an anomaly-based network intrusion detection system utilizing the DNA model,"
Proceedings of the 9th WSEAS International Conference on Data Networks, Communications,
Pages 470-476  
Year of Publication: 2007
ISBN ~ ISSN:1790-5117 , 978-960-6766-12-1
 
Publisher
World Scientific and Engineering Academy and Society (WSEAS)  Stevens Point, Wisconsin, USA
Data Communication Security,
Intrusion Detection
DNA
2007
32 Sharaf El-Din El-Nahas, Ammar Mottie Al Hosainy, Magdy M. Saeb,  "Design and Implementation of Cosine Transforms Employing a CORDIC Processor,"

24th NATIONAL RADIO SCIENCE CONFERENCE (NRSC 2007), Faculty of Engineering, Ain shams Univ., Egypt, March 13-15, 2007

 FPGA-based special processor design,  Cairo,Egypt
 33 Sherif. T. Amin, Magdy. A. Saeb,
M. M. Mohamed,  
"Identity Detection
of Typist relying on image  Processing
 Techniques," GVIP Journal, Volume 7,
Issue 2, 2007.

http://www.icgst.com/gvip
/Volume7/Issue3/P1150733007.html
  
ICGST International
Journal on Graphics,
Vision and
Image Processing
(GVIP),
2007

 

34   Yousry El-Gamal, Khaled Ghazzar, Magdy Saeb, 
“A Comparative Performance Evaluation
Model of Mobile Agent versus Remote Method
 Invocation for Information Retrieval
,"  
INTERNATIONAL JOURNAL OF COMPUTER
SCIENCE AND ENGINEERING, VOLUME 1, 
 NUMBER 2,  ISSN 1307-3699,  pp. 82-87, 2007.
 
 http://www.waset.org/ijcse/current.html
Mobile Agents,
 Information Retrieval,
Vienna, Austria, 2007
35 Magdy Saeb ,  Eman El-Abd, Mohamed El-Zanaty, "On Covert Data Communication Channels Employing
DNA Recombinant and Mutagenesis-based steganographic Techniques,"
 
WSEAS  RANSACTIONS on Computer Research, Issue 1, Volume 2, ISSN    1991-8755, January 2007.
  www.wseas.org
Communication
Security,
2007
36 Magdy Saeb, Meer Hamza, and Ahmed EL-Shikh  " IPLess Stochastic Anonymous Routing Algorithm Using Multi-Agent Systems," International Journal of Network Security, Vol.4, No.2, PP.212-226, Mar. 2007.

 http://isrc.nchu.edu.tw/ijns/
Communication Security,
2007
37 Sherif T. Amin, Magdy Saeb, Salah El-Gindi, "A DNA-based Implementation of  YAEA Encryption Algorithm," IASTED International Conference on Computational Intelligence (CI 2006), San Francisco, Nov. 20, 2006.
http://www.actapress.com/PaperInfo.aspx?PaperID=29058
San Francisco, US.,  2006,
Data Communication Security
38 A. AlKalbany, Magdy Saeb, H.A. AlHassan, "FPGA Implementation of the Pyramids Block Cipher," System on Chip Conference (SOCC2005), Washington, US, Sept.25-28, 2005.
Washington, US, 2005,
Data Communication Security,
FPGA Implementation
39 H.A AlHassan, Magdy Saeb, H.D. Hamed, " The Pyramids Block Cipher," International Journal on Network Security (IJNS), Vol. 1, No. 1, July issue, pp.52-60, 2005.

 http://ijns.femto.com.tw/contents/ijns-v1-n1/ijns-v1-n1.html
Data Communication Security,
2005
40 Hala Farouk and Magdy Saeb, "An Improved FPGA Implementation of The Hybrid Hiding Encryption Algorithm (HHEA) for Data Communication Security," DATE, ICM, MEESE, Munich, Germany,7-11 March 2005.
Munich, Germany,2005
Data Communication Security
41 A. Elsafi, R. Zewail, Magdy Saeb, N. Hamdy, " Combining Fingerprint and Iris for Identity Verification,"  First URSI Egypt Workshop in Signal Processing, Egypt, May 2004.
Egypt, 2004
Security, signal processing
42 R. Zewail, A. Elsafi, Magdy Saeb, N. Hamdy, " Combining Soft and Hard Biometrics for Improved Identity Verification,"  The 47th IEEE Midwest Symposium on   Circuits and Systems, Hiroshima, Japan, July. 2004.
Hiroshima, Japan, 2004
Security, signal processing
43 Khaled Al_Sultan, Magdy Saeb, Medhat Elmessiery , and Usama Abd El-Raouf Badaw, "A new two-pass key agreement protocol,"  Proceedings of the IEEE Midwest2003 Symposium on Circuits, Systems, & Computers, Dec. 2003
Cairo, Egypt, 2003
Data Communication Security
44 Magdy Saeb, H. Farouk, "Design and implementation of a Secret Key Steganographic Micro-Architecture Employing FPGA," DATE2004, Designer Forum C-lab, Paris, France, 2004
Paris, France, 2004
Data Communication Security,
FPGA Implementation,
Steganography


45
 "A Hybrid Hiding Encryption Algorithm (HHEA) For Data Communication Security," Mahmoud Shaar, Magdy Saeb, Usama Badawi, Proceedings of the IEEE Midwest2003 Symposium on Circuits, Systems, & Computers, Dec. 2003.
Cairo, Egypt, 2003
Data Communication Security

 46 Mahmoud Shaar, Magdy Saeb, Usama Badawi, "A Multi-bit Replacement Algorithm (TSF) for Steganography," Proceedings of the IEEE Midwest2003 Symposium on Circuits, Systems, & Computers, Dec. 2003.
Cairo, Egypt, 2003
Data Communication Securit
y
47 Ahmed Seif, Ramy Zewail, Nadder Hamdy, Magdy Saeb, " Iris Identification Based on Log-Gabor Filtering,"  Proceedings of the IEEE Midwest Symposium on Circuits, Systems, & Computers, Dec. 2003.
Cairo, Egypt, 2003
Data Communication Secu
rity
48 Ramy Zewail, Ahmed Seif, Nadder Hamdy, and Magdy Saeb, "Fingerprint Recognition Based on Spectral Feature Extraction,"  Proceedings of the IEEE Midwest Symposium on Circuits, Systems, & Computers, Dec. 2003.
Cairo, Egypt, 2003
Data Communication Security

49 Magdy Saeb, Hala Farouk, "An FPGA implementation of a special purpose processor for steganography",  IEEE conference on Field Programmbale Technology,FPT2003 conference proceedings, University of Tokyo, Japan, 2003.
Tokyo, Japan, 2003
FPGA Implementation,
Data Security, Steganography

50 "Performance Evaluation of Mobile Agent-based Dynamic Load Balancing Algorithm,"  Magdy Saeb, Cherine Fathy, 9th International Conference on Distributed Multimedia Systems, DMS_Conference, Miami, Florida, USA, 2003.
 
Miami, Florida, USA, 2003
Data Communication Security,
Mobile Agent Paradigm

51  " An Implementation of a Pipelined Encryption Multi-Processing Unit Utilizing VHDL and Field Programmable Gate Arrays, " Magdy Saeb, Samy Salamah, WSEAS,” Multi-conference, Katerina Tsironi , Crete, October 2003.
Rethymna Beach, Crete, 2003
FPGA
Implementation/Encryption,
 Data Communication Security.

52  "A Micro-architecture For IP Datagram Packet Encryption," Magdy Saeb, Ramy Zewail, Ahmed Seif, Proceedings of the 13th International Conference on Computer Theory & Applications ICCTA2003, Aug. 26-28, 2003.
Alexandria, Egypt,
Aug., 2003
FPGA Implementation/Encryption,
53  "A modified Diffusion Load BalanceAlgorithm Employing Mobile Agents," Magdy Saeb,  Cherine Fathy,WSEAS International Conference onCircuit, Systems & Computers,  Corfu, Greece, July 2003
      Corfu, Greece, 2003
      Data Communication Security,
      Mobile Agent Paradigm

54  "Protecting Mobile Agents against Malicious Host Attacks Using Threat Diagnostic AND/OR Tree," Magdy Saeb, Meer Hamza, Ashraf Soliman,Smart Objects Conference, SOC2003, Grenoble, France, May15-17th, 2003
 
Grenoble, France, 2003
Data Communication Security,
 Mobile Agent Paradigm

55
 "Content-based Image Retrieval using the Finite Element Technique,"  Magdy Saeb, S. Hegazy 2002 WSEAS International Conference. on ELECTRONICS, CONTROL & SIGNAL PROCESSING, Singapore, Jan 9-12, 2003
 
Singapore, 2003
Visual Information Retrieval
56  "A UML Extensions to Support Swarm Intelligent Communication Network Models," M. Hamza, Magdy Saeb, A. El-Sheikh, Proceeding of 12th International Conference on Computer Theory and Applications ICCTA’2002), Alexandria, Egypt, August 2002.
Alexandria, Egypt,
August 2002
Data Communication Security

57  "Shape Recognition using the Galerkin Finite Element Method,"  Y. El-Gamal, Magdy Saeb, S. Hegazy, Proceeding of 12th International Conference on Computer Theory and Applications ICCTA’2002), Alexandria, Egypt, August 2002.
 
Alexandria, Egypt,
August 2002

Visual Inform Retrieval/Finite Element
58  "Finger Print Identification Employing the Galerkin Finite Element Technique (FIFE)," Magdy Saeb, S. Hegazy, Proceedings of WSEAS, Cadiz, Spain, June 2002.
Cadiz, Spain, June 2002
Visual Inform Retrieval/Finite Element
59  "A Micro-architecture Implementation of YAEA Encryption Algorithm Utilizing VHDL and Field Programmable Gate Arrays,"  Magdy Saeb, Ramy Zewail, Ahmed Seif , Proceedings of the 3rd International Conference on Electrical Engineering ICEENG 2002, Military Technical College, Cairo, Egypt, May 2002.
 
Cairo, Egypt,
May 2002
FPGA Implementation/DataSecurity
60  "of an Artificial Neural Network Employing Field Programmable Gate Array Technology," Magdy Saeb, N. El-Mekky, Third WSEAS NNA, Interlaken Third WSEAS NNA, FSFS, EC, Intelaken Switzerland, Jan., 2003.
Interlaken, Switzerland, Jnauary, 2002
FPGA Implementation/ANN
61  "Disjoint Boolean Algebra In Packet Switching Networks," Magdy Saeb,  Proceeding of 11th International Conference on Computer Theory and Applications ICCTA’2001, Alexandria, Egypt, August 2001. 
 
Alexandria, Egypt,
August 2001.

Reliability/Data Communication
62  "The Design of Computer Networks for Optimum Reliability Subject to Criticality Constraints," Magdy Saeb, N. El-Hassan, Recent Advances in Signal Processing & Communications, N. E. Mastorakis (editor), World Scientific Series PTE ltd., pp. 330-338, 1999.
Greece,
1999
Reliability/Data Communication

63  "Link Capacity Considerations in Computer Communications Reliability Analysis," A. El-Abd, Magdy Saeb, N. El-Hassan,  Proceedings of 9th International Conference on Computer Theory and Applications ICCTA’, Alexandria, Egypt, August 1999.
 
Alexandria, Egypt,
August 1999
Reliability/Data Communication

64  " An Encryption Algortihm For Data Security YAEA," Magdy Saeb, A. Baith, Recent Advances in Information Science & Technology, N. E. Mastorakis (editor), World Scientific Series PTE ltd., pp. 350-354, 1998.
 
Athens, Greece,
1998.
Encryption/Data Security
65 “The Hybrid Finite Element Boundary Element Technique on SIMD Parallel Architectures Using least Squares Formulation,” Magdy Saeb, Y. Hannafy,  Proceedings of 7th International Conference on Computer Theory and Applications ICCTA’, Alexandria, Egypt, pp.4-21 to 4-29,August 1997. 
 
Alexandria, Egypt,
August 1997 
Finite Element/Parallel Processing
66  "On Flow Reliability Models of Information Systems," M. Saeb, International Federation for Information Processing IFIP WG 8.1 Working Conference On Information Systems Concepts ISCO2, Alexandria, Egypt, 1992.
Alexandria, Egypt,
1992.
Reliability/Information Systems
67  " The Finite Element Technique Employing Distributed Array Processors," M. Saeb,  2nd.International Conference on Parallel Processing, California State University, Fullereton, pp.232-241,1988.
Fullerton, California, USA.
1988
Finite Element/Parallel Processing
68 “ The Hybrid Finite Element Boundary Element in Computational Electromagentics,” M. Saeb, Proceedings of the International Conference on the FE technique, NASTRAN MacNeal-Schwindler Corporation , Los Angeles California, Vol.II, paper47, 1988.
Los Angeles California,
USA 1988.
Finite Element
Computational Techniques

69
 "The Finite Element Analysis of Devices with Anisotropic Materials," M.Saeb, Robert Saunders, IEEE. Transactions on Magnetics, vol.MAG-23 number 5,pp. 3860-3865, 1987.


 
California, USA, 1987
Finite Element
Computational Techniq
ues
70  "On Measures of Computer Network Reliability and Critical Components," M. Saeb, Roland Schinzinger, D. Nyrienda, Proceedings of the 18th Asilomar Conference on Circuits, Systems and Computers,pp.287-292, Asilomar, California, USA, 1985
Asilomar, California, USA,
1985
DataCommunication/Reliability

Patents
http://www.sumobrain.com/result.html?p=1&from_ss=&srch_id=&search_name=&srch=xprtsrch&search=Search&query_txt=Cipher+Saeb&uspat=on&pct=on&date_range=all&stemming=on&sort=chron

IP Disclosure/ Title
D09Y0672/ Protocol produces
a Secure Key Distribution
Based on Hash function
& Utilizing 6DP Quantum
-authenticated Channel 
(KDP-6DP)
Filing Number/date
PI 20094827/
13-Nov-2009

http://www.wipo.int/patentscope/search/en/detail.jsf?
docId=WO2011059306&recNum=1&docAn=
MY2010000190&queryString=
FP:(Saeb%20Magdy%20)&maxRec=1

IP Disclosure/Title  
   
 D09Y0540/
A Polymorphic Cipher
Filing Number /Date
PI 20092762/
28-june-2009

http://www.wipo.int/pctdb/en/wo.jsp?WO=2011002274
 

IP Disclosure/Title  
 
 D09Y0541/
Cryptographic Hash Function
Filing Number/Date
PCT/MY2009/000075/
22-june-2009


http://www.wipo.int/pctdb/en/wo.jsp?WO=2010151098
   


IP Disclosure/Title
The Stone Cipher-192 (SC-192): 
A metamorphic Cipher
IP Disclosure D09Y0705
Filing Number/Date 
PI 201004950
20 October 2010


http://www.wipo.int/patentscope/search/en/
detail.jsf?docId=WO2012053882&recNum=1&docAn=MY2010000271
&queryString=ALLNAMES:(Magdy%20Saeb)&maxRec=1

IP Disclosure/Title
D09Y0546
Making AES stronger
by introducing key-dependent factor which introduces non-deterministic operations
in each rounding stage
Filing Number/Date
PI 20093553, 
26-August-2009

http://www.wipo.int/pctdb/en/wo.jsp?WO=2011025361

 
Down Load Recent Papers
Document
How to Thwart Rubber Hose Attacks
Document
A 0ne-pass Key Distribution Protocol Based on the Hamming Code
 
Document
Kasumi Metamorphic Cipher
Document
Security Analysis of PBKH
Document
Reduction of Encryption Key Search Space Based on The Min-Entropy Approach
Document
Encryption Key Distribution Applying Key Embedding and Environmental Initiation
Document
Key Distribution Applying Steganography
Document
A Metamorphic Feistel Cipher
Document
An Alternative Permuting Function
Document
A Metamorphic Key-Hopping GOST Cipher
Document
Generalized Crypto-Logic Unit
Document
Analysis of DNA Signal Representation Applying Dynamic Time Warping (DTW) and Derivative Dynamic Time Warping (DDTW)
Document
The Haar Wavelet of DNA Signal Representation
Document
A Metamorphic-Enhanced MARS Cipher
Document
An Enhanced Sponge Function (ESP)
Document
Virus Classification using Haar Transform
Document
An Intelligent Computer-Based System for Sign Language Tutoring
Document
A Key Dist. Protocol Applying Haar-like Transfor
Document
The_Expeditious_Cipher_X_Cipher
Document
A Metamorphic-Enhanced Twofish Block Cipher And Associated FPGA ImplementationIJCSCS
Document
Power-based Key Hopping & Associated Hardware Implementation
Document
Hardware Implementation of MDP-384
Document
Haar Transform of DNA Signal Representation
Document
Hardware Implem.of the Stone Metamorphic Cipher
Document
A Protocol for Key Infusion from Satellite Transmissions
Document
6DP Quantum-authenticated Key Distribution Protocol
Document
Chameleon Cipher-192: A Polymorphic Cipher
Document
DNA-based Intrusion Detection System
Document
CORDIC-based Cosine Tranform FPGA Implementation
Document
Hardware Implementation Chameleon Polymorphic Cipher
Document
MDP-192/384 Message Digest Proced. (Hash Function)
Document
The Stone Cipher: A Metamorphic Cipher
Document
A DNA-based Implementation of YAEA Encryption Algorithm
Document
On Covert Comm Channels Empl DNA
Document
IPLess Stochastic Anonymous Routing Algorithm Using Multi-Agent Systems
Document
FPGA Implementation of "Pyramids" Block Cipher
Document
AN IMPROVED FPGA IMPLEMENTATION OF THE MODIFIED HYBRID HIDING ENCRYPTION ALGORITHM (MHHEA) FOR DATA COMMUNICATION SECURITY
Document
The "Pyramids" Block Cipher
Document
A NEW TWO-PASS KEY AGREEMENT PROTOCOL
Document
Design and Implementation of a Secret Key Steganographic Micro-architecture
Document
An Implementation of a Pipelined Encryption Multi-Processing Unit Utilizing VHDL and Field Programmable Gate Arrays
Document
FINGERPRINT RECOGNITION BASED ON SPECTRAL FEATURE EXTRACTION
Document
IRIS IDENTIFICATION BASED ON LOG-GABOR FILTERING
Document
A Hybrid Hiding Encryption Algorithm (HHEA)
Document
Performance Eval. of Mobile Agent-based Load Balancing Algorithm
Document
Fingerprint Identification using the Finite Element Tech.
Document
Protecting Mobile Agents Using Threat Diagnostic Tree
Document
Diffusion Load Balancing Algorithm Employing Mobile Agents
Document
Implementation of a secret key Steganographic Microarchitecture using FPGA
Document
A Microarchitecture for YAEA Encryption Algorithm Using FPGA
Document
A Comparative Performance Evaluation Mob Agent vs. Remote Message Invoc.
Document
Visual Information Retrieval Employing the Finite Element Technique
Document
Identity of Typist
  Document
Design of Computer Nets for Optimum Reliability S.T. Criticality Constraints
 
Book Chapter
Document
Steganographic Micro-architectures
Interesting Sites
 *Visit the Computer Engieering Department Site  *Visit the International Journal of Computer Science & Communication Security Site  *Visit Great Wall Security Site
Presentation Videos on YouTube                                                                

http://www.youtube.com/channel/UCD0U7txFTZiazUEU2xdziyw/videos
https://plus.google.com/u/0/107911573067702895239/palette

My Book Reviews

http://www.amazon.com/gp/cdp/member-reviews/A3C3B2UC564DAX/ref=cm_cr_pr_auth_rev?ie=UTF8&sort_by=MostRecentReview

Sample Exams
Document
CC514 Sample Midterm2 Exam
Document
CC514 Computer Networks 2 Midterm2 Sample Exam
Document
CC514 Sample Final Exam
Document
Final CC513 Computing Systems
Document
Sample Final Exam CC512 Computer Communication Nets
Document
Sample Final Exam CC514 Computer Communications Nets

Visitor Map
Create your own visitor map!

  

 

  

(c) Magdy Saeb