
Topic
- Computing and Processing
- Components, Circuits, Devices and Systems
- Communication, Networking and Broadcast Technologies
- Power, Energy and Industry Applications
- Signal Processing and Analysis
- Robotics and Control Systems
- General Topics for Engineers
- Fields, Waves and Electromagnetics
- Engineered Materials, Dielectrics and Plasmas
- Bioengineering
- Transportation
- Photonics and Electrooptics
- Engineering Profession
- Aerospace
- Geoscience
- Nuclear Engineering
- Career Development
- Emerging Technologies
- Telecommunications
- English for Technical Professionals
Roayat I. Abdelfatah
Also published under:Roayat Ismail Abdelfatah
Affiliation
Electronics and Electrical Communications Engineering Department, Faculty of Engineering, Tanta University, Tanta, Egypt
Topic
Secret Key,Brute-force Attacks,Chaotic System,Control Parameters,Key Space,Differential Attacks,Digital Signature,Encryption Scheme,Hash Function,Key Generation,Logistic Map,Lyapunov Exponent,Message Authentication Code,Pseudo-random,Pseudo-random Sequence,Public Key,Symmetric Encryption,Types Of Attacks,Wolfram Mathematica,Audio Data,Audio Files,Audio Stream,Authentication,Authentication Protocol,Authentication Scheme,Binary Bits,Bitstream,Blockchain Technology,Chebyshev Chaotic Map,Chebyshev Polynomials,Chosen-plaintext,Collision-resistant,Communication Cost,Computational Cost,Correlation Coefficient,Cryptosystem,Cyclic Shift,DNA Encoding,DNA Sequencing,Diamond Lattice,Dimensional Map,Discrete Logarithm,Distribution Problem,Elliptic Curve,Emergency Services,Encrypted File,Fast Computation,Gaussian Kernel,Grayscale Images,Group Of Pixels,
Biography
Roayat I. Abdelfatah received the B.Sc. degree in electronics and electrical communications engineering and the M.Sc. and Ph.D. degrees from Tanta University, Egypt, in 2000, 2005, and 2011, respectively. She was an Associate Professor from Tanta University, in 2020. The M.Sc. is dedicated to encryption algorithms and their applications. The Ph.D. is devoted to introducing new encryption, digital signature, and hash function algorithms for securing the digital data over communication networks. Her research interests include network security and multimedia applications.