1. Efficient scalable vlsi architecture for montgomery inversion in GF(p);Gutub;Integr. VLSI J.,2004
2. 3-Layer PC text security via combining compression, AES cryptography 2LSB image steganography;Alanizy;J. Res. Eng. Appl. Sci. (JREAS),2018
3. Engineering graphical captcha and AES crypto hash functions for secure online authentication;Kheshaifaty;J. Eng. Res.,2021
4. Securing matrix counting-based secret-sharing involving crypto steganography;Al-Shaarani;J. King Saud. Univ. Comput. Inf. Sci.,2022
5. Secure mobile computing authentication utilizing hash, cryptography and steganography combination;Alotaibi;J. Inf. Secur. Cyber Res. (JISCR),2019