Eng. Qasem Abu Al-Haija'

 

EMAIL:

Qalhaija@kfu.edu.sa
Eng_Qasem1982@yahoo.com

OFFICE:

Room: 1052

Tel. 5895400  

 

 

 Download CV

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

RANK: Lecturer

 

DEPARTMENT: Electrical Engineering

 

 

EDUCATION:

 

·      M.Sc. : Computer Engineering/ Cryptography & Information Security
 Jordan University for Science & Technology (JUST),2009.

       Master Thesis: “Efficient Algorithms for Elliptic Curve Cryptography Using New Coordinates systems".

 

 

·      B.Sc. : Electrical & Computer Engineering, Jordanian Mu'tah University,2005.

     Graduation Project: “Distributed Digital Image Processing Via Java and VB.Net".

 

 

RESEARCH INTERESTS:

Cryptography and Information Security, Hardware implementations for cryptography, and cryptographic co-processor design using scalable modules, FPGA design, Elliptic Curve Cryptography, computer architecture, digital arithmetic algorithms, Computer Arithmetic and Finite Fields, Design and implementation of fast algorithms and hardware structures for modular arithmetic and Galois field operations, Computer Networks and Wireless Sensor Networks.

 

Current Research Project:

" Cost Effective Design for Elliptic Curve Crypto-processor" .

 

 

Teaching Courses:

  • Microprocessors Systems and Assembly Language .

  • Digital Logic  and Hardware Design.

  • Computer and Communications Networks.

  • Computer Design and Architecture.

 

 

Selected Publications & Conferences:

 

[1]     Qasem Abu Al-Hiaja’, “Toward Secure Non-Deterministic Distributed Wireless Sensor Network Using Probabilistic Key Management Approaches,” Accepted for publication at Journal of Information Assurance and Security (JIAS), By Dynamic Publishers Inc., USA, July 2010.

Paper link:
  http://www.mirlabs.org/jias/secured/Volume6-Issue1/Paper2.pdf
Username: admin, Password: admin.

[2]    Qasem Abu Al-Haija’ and L. Tawalbeh, "Efficient Algorithms & Architectures for Elliptic Curve Crypto-Processor Over GF (P) Using New Projective Coordinates Systems,” Accepted for publication at Journal of Information Assurance and Security (JIAS), By Dynamic Publishers Inc., USA, July 2010.

Paper link:
http://www.mirlabs.org/jias/secured/Volume6-Issue1/Paper7.pdf
Username: admin, Password: admin.

[3]    Qasem Abu Al-Haija’,  et. al. "Parallel Hardware Algorithms & Designs for Elliptic Curves Cryptography to Improve  Point Operations Computations" Accepted for publication at Journal of Information Assurance and Security (JIAS), By Dynamic Publishers Inc., USA, April 2010, Vol.4, Issue 1, Paper6: (588-594).

Paper Link:
  http://www.mirlabs.org/jias/secured/Volume5-Issue1/Paper66.pdf
Username: admin, Password: admin.

[4]    Qasem Abu Al-Haija’, et. al.  , “Efficient New Design and Verification of Sign-Digit-Adder for Two Symmetric Redundant Radix-4 Numbers,Accepted for publication at International Journal of Computer Science and Engineering (IJCSE), by Engg Journals Publications, April/2010, Volume 2, Issue 4, Paper 11: (972-978).

Paper link :http://www.enggjournals.com/ijcse/doc/IJCSE10-02-04-29.pdf

 

[5] Qasem Abu Al-Haija’ et al.“Choices On Designing GF (p) Elliptic Curve Coprocessor benefiting from Mapping Homogeneous Curves in Parallel Multiplications,” Accepted for publication at  International Journal on Computer Science and Engineering (IJCSE), Vol. 3 No. 2 Feb 2011.

Paper link:
http://www.enggjournals.com/ijcse/doc/IJCSE11-03-02-056.pdf

[6]    O. B.Melhem, Qasem Abu Al-Haija’ , and A. Badawi, “Performance Evaluation of Probabilistic Key Management Approaches for Wireless Sensor Networks,” Accepted for publication at First International Conference in Information & Communication Systems (ICICS), Ses.3: Networks and Communications, paper 495, Dec/2009: (91: 96).

Paper link:
http://wsn-security.blogspot.com/

[7]    L. Tawalbeh, Qasem Abu Al-Haija’, Adnan Gutub and Fahed Bin Mehaya, “Speeding up Elliptic Curve Cryptography Computations by Adopting Edwards Curves over GF (P),” Accepted for publication at International Journal of Security (IJS), CSC Journals, Malaysia, Vol.3, Issue.4, IJS-19 Aug/2009.

paper link:
http://pmc.ksu.edu.sa/JournalsPapers.aspx

[8]    F. B. Mehaya, Qasem Abu Al-Haija’ and L. Tawalbeh "Applying Hessian Curves in Parallel to Improve Elliptic Curve Scalar Multiplication Hardware" Accepted for publication at International Journal of Security and Its Applications (IJSIA), By SERSC (Science & Engineering Research Support Center), Vol.4, No.2. April 2010.

Paper link:
 http://www.sersc.org/journals/IJSIA/vol4_no2_2010/3.pdf

[9]    M. Khatib, Qasem Abu Al-Haija’ “Performance Evaluation of Projective Binary Edwards Elliptic Curve Computations with Parallel Architectures,” Accepted for publication at Journal of Information Assurance and Security (JIAS), By Dynamic Publishers Inc., USA, July 2010.

paper link:
http://www.mirlabs.org/jias/secured/Volume6-Issue1/Paper1.pdf
Username: admin, Password: admin.

[10] L. Tawalbeh and Qasem Abu Al-Haija’ “Enhanced FPGA Implementations for Doubling Oriented and Jacobi-Quartics Elliptic Curves Cryptography,” Accepted for publication at Journal of Information Assurance and Security (JIAS), By Dynamic Publishers Inc., USA, July 2010.

paper link:
http://www.mirlabs.org/jias/secured/Volume6-Issue3/Paper19.pdf
Username: admin, Password: admin.

[11] M. Khatib, Qasem Abu Al-Haija’ and A. Jaafar, “Hardware Architectures & Designs for Projective Elliptic Curves Point Addition Operation Using Variable Levels of Parallelism,” Accepted for publication at International Review on Computers and Software, By Praise Worthy Prize, March 2011, Vol. 6. n. 2, pp. 227-236.

Paper link:
http://www.praiseworthyprize.com/IRECOS-latest/IRECOS_vol_6_n_2.html

[12] A. Q. Al-Badawi, A. M. Baset, and Qasem S. Abu Al-Haija’ , "A Novel Digital Adder Design Based on Residue Number System with Special Set of Moduli {2n+1, 2n, 2n–1}”, Accepted for publication at International Journal of Research and Review in Applied Science (IJRRAS), By Academic Research Publishing Agency, July 2010, Vol.4, Issue 1, Paper 6: (55:62).

Paper link:
  http://www.arpapress.com/Volumes/Vol4Issue1/IJRRAS_4_1_06.pdf

 

My Blogs:

1. "On The Security Of Wireless Sensor Networks"
 Link: http://wsn-security.blogspot.com/
 

         2."Information security"
http://qasem-abu-alhaija.blogspot.com/2010_08_01_archive.html


 

ACHIEVEMENTS & AWARDS:

During my research and studying life, I got 2 important awards: the first one is due to my superiority at the department during the master degree that’s why I was employed as TA/RA and the second one is due to the huge success in my master thesis research results that’s why we (me & My Supervisor) got the fund to design and implement our efficient solutions and algorithms.


IMPORTANT Committees
:

• Member of Jordanian Institute for Engineering – From Feb/2005.
• IEEE (Institute of Electrical & Electronic Engineering) fellow.