Newroz Nooralddin Abdulrazaq

Newroz Nooralddin Abdulrazaq
Verified
Newroz verified their affiliation via an institutional email.
Verified
Newroz verified their affiliation via an institutional email.
  • Department of Computer Science & IT College of Science Salahaddin-Erbil
  • Lecturer at Salahaddin University-Erbil

About

5
Publications
2,392
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
4
Citations
Current institution
Salahaddin University-Erbil
Current position
  • Lecturer
Additional affiliations
January 2025 - present
Salahaddin University-Erbil
Position
  • Assistant Lecturer
Salahaddin University-Erbil
Position
  • Lecturer
January 2015 - November 2019
Salahaddin University-Erbil
Position
  • Lecturer
Education
October 2013 - January 2016
Salahaddin University-Erbil
Field of study
  • Computer Science/Cryptography & Coding Theory
October 2003 - August 2005
Salahaddin University-Erbil
Field of study
  • Information Technology
October 1996 - July 2000
Salahaddin University-Erbil
Field of study
  • Mathematics

Publications

Publications (5)
Article
Full-text available
In today's digital world, the extensive use of devices, including smartphones, tablets, IoT devices, and the internet, emphasizes the necessity for strong security measures. These measures are essential to safeguard both user data and sensitive government information. As technology advances, the enhancement of cryptographic methods becomes imperati...
Article
Full-text available
In line with the growth of the e-governate, the Kurdistan Regional Government is actively adopting digital transformation, which underscores the urgent requirement for distinct encryption methods that are practical for the Kurdish alphabet in the fields of administration and digital governance. This paper provides a new method for encrypting and de...
Article
Full-text available
Side channel attack is the most efficient attack against original McEliece cryptosystem, especially ball-collision and Bernstein et al. Stern attacks. The modified Stern attack has an ability to break original McEliece cryptosystem with parameter [1024, 524, 101] in 1400 days with personal computers. While with 200 clusters CPU breaking could be do...
Article
Full-text available
The McEliece cryptosystem is the asymmetric type of cryptography which is based on error correction code. The classical McEliece used irreducible binary Goppa code which considered unbreakable until now especially with parameter [1024, 524, 101] which is suggested by McEliece, but it is suffering from large public key matrix which leads to be diffi...
Conference Paper
Full-text available
The McEliece cryptosystem is an asymmetric type of cryptography based on error correction code. The classical McEliece used irreducible binary Goppa code which considered unbreakable until now especially with parameter [1024, 524, and 101], but it is suffering from large public key matrix which leads to be difficult to be used practically. In this...

Network

Cited By