scispace - formally typeset
E

Esam Khan

Researcher at Umm al-Qura University

Publications -  28
Citations -  498

Esam Khan is an academic researcher from Umm al-Qura University. The author has contributed to research in topics: Hash function & Hash-based message authentication code. The author has an hindex of 10, co-authored 28 publications receiving 418 citations. Previous affiliations of Esam Khan include University of Victoria & Victoria University, Australia.

Papers
More filters
Journal ArticleDOI

Counting-based secret sharing technique for multimedia applications

TL;DR: This work presented two different modeling variations that are mainly different in the secret-sharing keys generation where both are studied elaborating their pros and cons.
Proceedings ArticleDOI

A geometric-primitives-based compression scheme for testing systems-on-a-chip

TL;DR: A novel and very efficient lossless compression technique for testing systems-on-a-chip based on geometric shapes that exploits reordering of test vectors to minimize the number of shapes needed to encode the test data.
Journal ArticleDOI

Enhancing PC Data Security via Combining RSA Cryptography and Video Based Steganography

TL;DR: The study modeled the system and implemented it to be tested to explore the relation between security, capacity and data dependency, and the main outcome proved applicability to be adopting 3-LSB approach to give acceptable security with practical capacity preferred.
Journal ArticleDOI

An analytical study of mobile applications for Hajj and Umrah services

TL;DR: This paper presents an analytical study of Hajj-related mobile apps offered by Google Play, and reveals a number of repetitive apps in terms of application names and services.
Journal ArticleDOI

Design and Performance Analysis of a Unified, Reconfigurable HMAC-Hash Unit

TL;DR: This paper applied pipelining and parallelism to the design of the HMAC-hash unit to improve throughput, especially for large message sizes, and achieved higher throughput than engines that integrated three hash functions or more and comparable throughput to those integrated only two hash functions.