Who Am I
Personal Information
My Name is Mohammad Abdulateef AlAhmad, I am assistant professor in Computer Science department in College of Basic Education at Public Authority for Applied Education and Training, Kuwait.
My Office is located in boys buliding #19, second floor, room #6, computer science department, Ardiyah, behind Jaber stadium of the Sixth Ring Road.
Email: malahmads@yahoo.com
Research Interests
My main research area is information security. My research focuses on cryptographic algorithms and protocols. My favourite specific research topics are designing and analysis of hash functions, and cryptography in general. My favorite hash function is Gear and Double A hash functions.
Academic Educaiton
Academic Institute: College of Electrical and Computer Engineering, University of the Pacific, Stockton, CA, USA
Major: B.S. in Computer Engineering
Graduation Date: Dec22, 2002
Academic Institute: College of Computer Science and Engineering, Gulf University, Bahrain
Major: M.S. in Computer Engineering
Graduation Date: Jan22, 2011
Academic Institute: International Islamic University of Malaysia, Malaysia
Major: PhD in Computer Science "specifically in Information Security"
Graduation Date: Feb 2014
Projects and Researches
-
Research about WIMAX vs LTE
-
Research about Femtocell
-
Research about Fuzzy Systems
-
Research about Neural Networks
-
Research about IP Security
-
Designing and Implementing IrDA wireless device as a B.S senior project
-
Master thesis Research title is "Security threats of biometric technologies in network environment systems"
-
Research about Computer parallel architectures
Supervision of Post Graduate Students
-
“Comparison of SHA-3 round-3 Finallist”, Khansa Munthir, International Islamic University of Malaysia, 2012 (Master Degree).
-
“Propose Computer Emergency Response Team (CERT) setup plan for small countries serve both government entities (GEs) and non GEs from using commercial technology, case study: state of Kuwait”, Khaled Abdulkareem Alenezi, International Islamic University of Malaysia, 2014 (PhD Degree).
-
“Web Applications Vulnerability Assessment”, Osama Alkhurafi, International Islamic University of Malaysia, 2015 (Master Degree).
Published Papers
You can access the following papers from the Internet database.
-
AlAhmad, M. A., I. Alshaikhli, Security “Threats of Finger Print Biometric in Network System Environment” JACSTR-Springer-Sep2011.
-
AlAhmad, Mohammad and Alshaikhli, Imad Fakhri Taha and Mohammad Ahmed, Hanady (2011) ― “Developed system for Quran protection using MD5 and Base64”. In: Computer applications: Theories and applications. IIUM Press, Kuala Lumpur, pp. 71-84. ISBN 978-967-418-107-9.
-
AlAhmad, M. A., A. Shaikhli, et al. (2012). "Protection of the Texts Using Base64 and MD5." Journal of Advanced Computer Science and Technology Research 2(1).
-
Mohammad A. AlAhmad, Abdulrahman Alkandari, “Interference Management in Femtocell,” Journal ofAdvanced Computer Science and Technology Research (JACSTR), pp. 10-21, March 2012. Available: http://www.significance. .co.uk/dsr/index.php/JACSTR/article/view/34/142
-
AlAhmad, M. A., I. Alshaikhli, et al. (2012). "Achieving Security for Images by LSB and MD5." Journal of Advanced Computer Science and Technology Research 2(3).
-
AlAhmad, M. A., I. Alshaikhli, “Base64 & MD5 encryption” Proceedings of ICCCS Conf-Springer-May2012 (Langkawi).
-
Alshaikhli, I. F., M. A. Alahmad, et al. (2012). ―”Comparison and Analysis Study of SHA-3 Finalists”. Advanced Computer Science Applications and Technologies (ACSAT), 2012 International Conference on, IEEE Xplore. 2013:
-
Alahmad, M. A., Al-shaikhli, I., & Najaa, A. M. (2013). “SVG and Arabic font challenges and improvements”. Paper presented at the Information and Communication Technology for the Muslim World (ICT4M), 2013 5th International Conference on, IEEE Xplore.
-
Alahmad, M. A., Al-shaikhli, “Hash Function of Finallists SHA-3: Analysis Study”, IJACSIT Elevedit Journal-223 (Paper ID), March 2013 (Switzerland).
-
Mohammad A. AlAhmad, I. F. A. S. (2013). "MOIM: A NOVEL DESIGN OF CRYPTOGRAPHIC HASH FUNCTION." International journal of Computer Engineering & Technology (IJCET) (ISI Journal) 4(4): 1-19.
-
Mohammad A. AlAhmad, I. F. A. S. (2013). "Protection of the digital Holy Quran Using SAB hash function." Proceeding of IMAN 2013 conference.
-
Al-shaikhli, I. F., M. A. Alahmad, et al. (2013). "Hash Function of Finalist SHA-3: Analysis Study." Information Technology (IJACSIT) journal 2(2).
-
Alahmad, M. A., I. Al-shaikhli, et al. (2013). ― “Cryptographic Hash Function: A High Level View”. International Conference for Informatics and Creative Multimedia (ICICM), 2013 1st International Conference on, IEEE Xplore.
-
AlAhmad, M. A. and I. F. Alshaikhli (2013). "Broad View of Cryptographic Hash Functions." International Journal of Computer Science Issues journal (ISI Journal) 10(4).
-
Alahmad, M. A., I. Al-shaikhli, et al. (2013). “Joux multicollisions attack in sponge construction”. The 6th International Conference on Security of Information and Networks (SIN), 2013 6th International Conference on, ACM.
-
Alahmad, M. A., I. Al-shaikhli, Jumaa, Bashayer (2013). “Protection of the digital Holy Quran PDF file using Combination between AES and RSA Cryptography Algorithms (CARCA)”. Advanced Computer Science Applications and Technologies (ACSAT), 2013 International Conference on, IEEE Xplore.
-
Alahmad, M. A., I. Al-shaikhli, Duwaikh, Amal (2013). “A New Fragile Digital Watermarking Technique for a PDF digital Holy Quran”. Advanced Computer Science Applications and Technologies (ACSAT), 2013 International Conference on, IEEE Xplore.
-
Alahmad, M. A., I. Al-shaikhli, AlAshram, Sarah (2013). “Achieving security by combining Huffman and SLSB algorithms”. Advanced Computer Science Applications and Technologies (ACSAT), 2013 International Conference on, IEEE Xplore.
-
Alahmad, M. A., I. Al-shaikhli, et al. (2014). "Design and Analysis of a New Hash Function Gear". The 7th International Conference on Security of Information and Networks (SIN), 2014 7th International Conference on, Glasgow, Scotland, ACM.
-
Sufyan Salim Mahmood, I. Al-shaikhli, M. A. Alahmad et al. (2014). "HISEC: A New Block Cipher Algorithm". The 7th International Conference on Security of Information and Networks (SIN), 2014 7th International Conference on, Glasgow, Scotland, ACM.
-
Khaled A. Alenezi, Imad F. Al Shaikhli, Lili M. Abdullah, Mohammad A. Alahmad (2014). "Cyber-Attacks facing Government Entities (GEs) and Non GEs". IJACT Journal.
-
Khaled A. Alenezi, Imad F. Al Shaikhli, Lili M. Abdullah, Mohammad A. Alahmad (2014). "CERT technologies". IJAIR Journal.
-
Khaled A. Alenezi, Imad F. Al Shaikhli, Lili M. Abdullah, Mohammad A. Alahmad (2014). "CERT team involving GEs and non GEs structured". IJIRMPS Journal.
-
Khaled A. Alenezi, Imad F. Al Shaikhli, Lili M. Abdullah, Mohammad A. Alahmad (2014). "Decision Support System for Selection and Ranking Security Alternatives". IJECCE Journal.
-
Mohammad AlAhmad, Abdullah Issa, Abdullah Alsaleh (2015). "Double-A - A Salsa20 like - The Design". The 4th conference of Advanced Computer Science Applications and Technologies (ACSAT), 2015 International Conference on, IEEE Xplore.
-
Mohammad AlAhmad, Abdullah Alsaleh, Abdullah Issa, Adel Alfoudery (2015). "Double-A - A Salsa20 like - The Security". The 4th conference of Advanced Computer Science Applications and Technologies (ACSAT), 2015 International Conference on, IEEE Xplore.
-
Mohammad AlAhmad, Imad Fakhri Alshaikhli, Abdulaziz M Alkandari, Khalil Alkandari (2015). "Gear Hash Function". The 4th conference of Advanced Computer Science Applications and Technologies (ACSAT), 2015 International Conference on, IEEE Xplore.
-
Mohammad AlAhmad, Osama Alkhurafi (2015). "Survey of Web Application Vulnerability Attacks". The 4th conference of Advanced Computer Science Applications and Technologies (ACSAT), 2015 International Conference on, IEEE Xplore.
-
Khaled A. Alenezi, Imad F. Al Shaikhli, Lili M. Abdullah, Mohammad A. Alahmad (2016). "Arabian Gulf Countries (AGC) CERT team Obstacles". The 18th InternationalConference on Language and Technology, San Diego, USA.
-
DOUBLE-A–A NEW CRYPTOGRAPHIC HASH FUNCTION (ITS DESIGN)
A Issa, MA Al-Ahmad, A Al-Saleh, Journal of Advanced Computer Science and Technology Research 6 (3), 52-63- 2016 -
Double-A–A New Cryptographic Hash Function Its Security, A Al-Saleh, M Al-Ahmmad, A Issa, A Al-Foudery, Journal of Advanced Computer Science and Technology Research 6 (2), 24-36- 2016
-
Al Ahmad, M. A., Al-Saleh, A., & Al Masoud, F. A. (2018). Comparison between PoW and PoS Systems Of Cryptocurrency. Indonesian Journal of Electrical Engineering and Computer Science, 10(3), 1251-1256
-
AlAhmad, M. A. (2018). Design of a New Cryptographic Hash Function–Titanium. Indonesian Journal of Electrical Engineering and Computer Science, 10(2), 827-8.
-
Saleh, A. N., & Al-Ahmad, M. A. (2018). Security of a New Cryptographic Hash Function-Titanium. Indonesian Journal of Electrical Engineering and Computer Science, 10(3), 1244-1250.
-
Design of a New Cryptocurrency—MiCoin, MA AlAhmad, Journal of Computational and Theoretical Nanoscience 16 (3), 813-817- 2019
-
Comparison Between Bitcoin and Quarkchain, JS Aldakheel, MA AlAhmad, A Al Foudery, Journal of Computational and Theoretical Nanoscience 16 (3), 818-822 2019
-
Multi-Sensor Leakage Detector Robot for Nuclear Radiation and Chemicals
A Alkandari, NM Almutairi, S Aldabbagh, MA AlAhmad, Journal of Computational and Theoretical Nanoscience 16 (3), 1134-1137-2019
Textbooks and Edited Textbooks
-
Author of Chapter 10, “Cryptographic Hash Function: A High Level View”, in “Threat Counter” edited book, Edited by: Alaa Alhammami, Published in the United State of America by Information Science Reference (an imprint of IGIGlobal), ISBN 978-1-4666-0191-8, 2012, Web-site: http://www.igi-global.com
-
Basic of Classical and Modern Cryptography textbook for Information Security course at Computer Science Department, College of Basic Education
-
Computer Maintenance for Computer Maintenance course at Computer Science Department, College of Basic Education
Special and Training and Qualifications
-
NETWORK+
-
A+
-
ICDL Certificate
-
CCNA
-
UNIX Essentials Featuring the Solaris Operating System
Work Experiences
-
Full time: Ministry of Finance from July 2003 till end of Septemper 2006. Network Administrator between Ministry of Finance and:
-
Ministry of Health
-
Customs Department
-
Ministry of Transportation
-
Ministry of Justice
-
Public Authority for Applied Education and Training
-
Public Authority for Civil Identification
-
Public Authority of Agriculture Affairs & Fish Resources
-
Legal Advice & Legislation.Al-Diwan Al-Amiri
-
-
Full time: Instructor at the Public Authority for Applied Education & Training (Telecommunication & Navigation Institute) on computer department from September 2006 till September 2008.
-
Full time: Instructor at the Public Authority for Applied Education & Training (College of Basic Education) on computer science department from September 16 2008 till today.
-
Part time: Instructors’ assistant in University of the Pacific, Stockton, California. Instructors’ assistant in full equipped Cisco Lab designed by Cisco Corp in 2002.
-
Part time: Instructor at the Public Authority for Applied Education & Training (Telecommunication & Navigation Institute) (2004-now).
-
Part time: General Consultant and Wifi project manager at Alodailiyah Co-op from October 2010 till 2013.
Courses Taught
-
Information Security
-
Cryptography
-
Programming Language C++
-
Computer Networks
-
Computer Maintenance
-
Operating Systems
-
Internet Programming
-
C++
-
ICDL
-
Algorithms
-
Microprocessor
-
Digital Fundamental
-
Mobile Telecommunication and GSM Network
-
Graduation Projects for Computer Science Department on College of Basic Education
Skills
-
Software Skills:
-
Operating systems : Windows XP/Vista/7/8/10 , UNIX, Mac OS
-
Program Packages : Microsoft Office " Access, Excel , Word, Power Point, Project, Visio"
-
Simulation Packages: Packet Tracer by Cisco
-
Programming Skills:C++, JAVA, C, Assembly, HTML and PHP
-
Language Comprehension: English - Arabic
-
Speeches and Workshops
-
More than 20 Lectures on Introduction of Networks in Kuwaiti High Schools
-
Workshop on "how to design you home network", January 2011
-
Workshop on "how to build your PC from scratch", February 2011
-
Speech on “Special Workshop for Teachers, Challenges for Educators” in Kuwait, Jan 2016
Honors and Distinctions
-
Dean's National Deans List for all students in USA for the terms 1999, 2000, 2001 in Bachelor Degree.
-
Certificate of participation in Cisco Labs implemented by Cisco company at the University of The Pacific, Stockton California in 2002.
-
Gold medal for the Best PhD topic presentation held in IIUM Research, Invention and Innovation Exhibtion 2013, International Islamic University of Malaysia.
-
Selected to be recongnized in Marquis Who's Who in the World scientists and researchers published list in 2014.
-
Best student award for Doctor of Philosophy (Computer Science) at International Islamic University of Malaysia in 2014.
-
Best paper in ACSAT 2015 conference titled "Double-A - A Salsa20 like - The Design".
-
Second Best paper in ACSAT 2015 conference titled "Double-A - A Salsa20 like - The Security".
-
Fourth Best paper in ACSAT 2015 conference titled "Survey of Web Application Vulnerability Attacks".
Professional Societies
-
Member of International Association for Cryptologic Research (IACR)
-
Member of Institute of Electrical and Electronics Engineering (IEEE)
-
Member of Kuwait Society of Engineers
-
Member of Kuwait Information Technology Society
Hobbies and Interests
Football, Arabic calligraphy, “Hejamah” (by prophet Mohammad peace be upon him), Horse riding, Workout and Travelling.