Mohammad A. Al-Ahmad

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
Web applications have become an essential part of our daily life. Since web applications contain valuable sensitive information, hackers try to find vulnerabilities and exploit them in order to impersonate the user, steal information, or sabotage the application. This paper illustrates in detail the most prevailing and harmful web application vulnerability(More)
This paper discusses the design choices of the sponge constructed cryptographic hash function Double-A. Firstly, the relative advantages of why a stream mode cipher is used rather than a block mode cipher are given. Secondly, a description of what a sponge function is, how it is designed and what are its main components. Finally, after a brief recall of the(More)
  • 1