2023 - Research.com Computer Science in Egypt Leader Award
2022 - Research.com Computer Science in Egypt Leader Award
Ahmed A. Abd El-Latif spends much of his time researching Encryption, Theoretical computer science, Algorithm, Chaotic and Probabilistic encryption. His Encryption study focuses on Key space in particular. Ahmed A. Abd El-Latif combines subjects such as Key and Cipher with his study of Theoretical computer science.
His Algorithm research focuses on Quantum computer and how it connects with Quantum algorithm and Digital watermarking. His Chaotic research includes elements of Pixel and Cryptography. His studies deal with areas such as Multiple encryption and 40-bit encryption as well as Probabilistic encryption.
His primary areas of study are Encryption, Artificial intelligence, Theoretical computer science, Algorithm and Chaotic. His Encryption research incorporates themes from Image and Cryptography. His research in Artificial intelligence intersects with topics in Computer vision and Pattern recognition.
Ahmed A. Abd El-Latif interconnects Information hiding, Homomorphic secret sharing, Secret sharing, Steganography and Plaintext-aware encryption in the investigation of issues within Theoretical computer science. Ahmed A. Abd El-Latif works mostly in the field of Algorithm, limiting it down to topics relating to Pixel and, in certain cases, Polynomial, as a part of the same area of interest. As a part of the same scientific family, he mostly works in the field of Chaotic, focusing on Attractor and, on occasion, Fixed point.
His primary scientific interests are in Encryption, Cryptography, Quantum walk, Cryptosystem and Quantum computer. His studies in Encryption integrate themes in fields like Cryptographic protocol, Chaotic and Algorithm, Pseudorandom number generator. His work carried out in the field of Cryptography brings together such families of science as Computation offloading, Data security, Theoretical computer science and Server.
In most of his Theoretical computer science studies, his work intersects topics such as Quantum algorithm. His study in Cryptosystem is interdisciplinary in nature, drawing from both Computational intelligence, Random projection, Biometrics, Artificial neural network and Key. He focuses mostly in the field of Quantum computer, narrowing it down to topics relating to Steganography and, in certain cases, Information hiding, Computation and Computer engineering.
The scientist’s investigation covers issues in Encryption, Cryptographic protocol, Cryptosystem, Cryptography and Quantum walk. His Encryption research integrates issues from Chaotic, Attractor, Topology and Algorithm, Pseudorandom number generator. His primary area of study in Chaotic is in the field of Key space.
His research integrates issues of Stability, Image, Key and Hamming distance in his study of Cryptosystem. His biological study spans a wide range of topics, including Security analysis, Secure transmission, Quantum computer and Computer network. His Quantum computer study combines topics in areas such as Quantum algorithm, Theoretical computer science and Robustness.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
A novel image encryption scheme based on substitution-permutation network and chaos
Akram Belazi;Ahmed A. Abd El-Latif;Safya Belghith.
Signal Processing (2016)
Efficient cryptosystem approaches: S-boxes and permutation–substitution-based encryption
Akram Belazi;Majid Khan;Ahmed A. Abd El-Latif;Safya Belghith.
Nonlinear Dynamics (2017)
A new approach to chaotic image encryption based on quantum chaotic system, exploiting color spaces
Ahmed A. Abd El-Latif;Ahmed A. Abd El-Latif;Li Li;Ning Wang;Qi Han.
Signal Processing (2013)
Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms
Akram Belazi;Ahmed A. Abd El-Latif;Adrian-Viorel Diaconu;Rhouma Rhouma.
Optics and Lasers in Engineering (2017)
DITrust Chain: Towards Blockchain-Based Trust Models for Sustainable Healthcare IoT Systems
Eman M. Abou-Nassar;Abdullah M. Iliyasu;Passent M. El-Kafrawy;Oh-Young Song.
IEEE Access (2020)
A chaotic block cipher algorithm for image cryptosystems
Mohamed Amin;Osama S. Faragallah;Ahmed A. Abd El-Latif.
Communications in Nonlinear Science and Numerical Simulation (2010)
A simple yet efficient S-box method based on chaotic sine map
Akram Belazi;Ahmed A. Abd El-Latif.
Design and implementation of a simple dynamical 4-D chaotic circuit with applications in image encryption
Nestor Tsafack;Jacques Kengne;Bassem Abd-El-Atty;Abdullah M. Iliyasu;Abdullah M. Iliyasu;Abdullah M. Iliyasu.
Information Sciences (2020)
A dynamic watermarking scheme for quantum images using quantum wavelet transform
Xian-Hua Song;Shen Wang;Shuai Liu;Ahmed A. Abd El-Latif.
Quantum Information Processing (2013)
Elliptic curve ElGamal based homomorphic image encryption scheme for sharing secret images
Li Li;Ahmed A. Abd El-Latif;Xiamu Niu.
Signal Processing (2012)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: