Tamer Omar Diab

Tamer Omar Diab
  • PhD
  • Professor (Associate) at Benha University

About

21
Publications
2,116
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
134
Citations
Introduction
Current institution
Benha University
Current position
  • Professor (Associate)

Publications

Publications (21)
Article
This paper presents how smart contracts are based on mathematics. Smart contracts rely on mathematics to guarantee their immutability, security, and enforceability. Cryptographic procedures that are used to safeguard and confirm the contract’s implementation, including hash functions and digital signatures, might be used to illustrate this. Mathema...
Article
Full-text available
This paper presents a novel approach to digital signature by integrating the ElGamal or Schnorr digital signature algorithms, chaotic systems, and scanning techniques. Briefly, ZZBCRP is a zigzag transformation that is used firstly to construct a permuted transaction, which technique starts from any random position and intersects in both directions...
Article
Full-text available
One of the first and most used hashing algorithms in blockchains is SHA-256 so the main aim of this paper is how to increase the security level of the blockchain based on the increasing hashing algorithm security. This paper proposes to present a modified SHA-256 like hash algorithm by exploring the design principles of the two hash schemes (SHA-25...
Article
Full-text available
IoT is one of the most popular technologies in recent years due to the interconnection of various infrastructures, physical devices, and software. To guarantee the security of Internet of Things (IoT) pervasiveness, lightweight cryptographic solutions are needed and this requires lightweight cryptographic primitives. The choice of S-box in light bl...
Article
Full-text available
This research presents a survey of application of hyperchaotic map on encryption of color images. There are various researches that have introduced this application. Among these papers, one of them has presented a technique for altering and encoding color images based on S-box based on the hyperchaotic map foundation and several chaotic maps and an...
Article
Full-text available
This study contributes to creating an unbreakable S-Box based on a strong bent function expanded by DNA sequences and investigates and analyzes the strength of the proposed S-Box against major standard criteria and benchmarks, such as interpolation attacks, algebraic attacks, avalanche effect, nonlinearity, and period. The outcome of the tests show...
Article
Full-text available
This paper aims to improve SHA-512 security without increasing complexity; therefore, we focused on hash functions depending on DNA sequences and chaotic maps. After analysis of 45 various chaotic map types, only 5 types are selected in this proposal—namely, improved logistic, cosine logistic map, logistic sine system, tent sine system, and hybrid....
Article
Full-text available
A brain tumor is one of the most devastating diseases. Early detection of brain tumor is a life-saving act. Magnetic Resonance Imaging (MRI) is one of the main techniques to detect brain tumor for diagnosis and treatment. Although there are numerous methods for brain tumor segmentation, automatic and exact segmentation still confronted with some pr...
Article
Full-text available
The microstructural processes occurring in metals and alloys during hot deformation are: DRX (dynamic recrystallization), superplastic deformation, dynamic recovery, wedge cracking, void formation, inter-crystalline cracking, prior particle boundary (FFB) cracking, and flow instability processes. Deformation characteristics of materials are interpr...
Chapter
Full-text available
The processing of aluminum composites plays a significant factor in develop the usage of such composites. The analysis of microstructure of the deformed composites specimens gives a degree of understanding of the effect of deformation process conditions. In recent years, the advent of high-speed, general-purpose, digital computers and vision system...
Article
Full-text available
When a Kalman filter is applied to an image for restoration purposes, the model of the original image affects the accuracy of the restoration. The model for effective restoration depends on the correlation of the original image and the variance of the noise. If these parameters are unknown, they have to be estimated from the observed image. In this...
Conference Paper
Full-text available
How best to determine the membership function is the first question that has to be addressed in the applications of fuzzy set techniques. So one of the most challenging issues in fuzzy systems design is generating suitable membership functions for fuzzy variables. In this paper, a new method is proposed to estimate the membership function. It does...

Network

Cited By