default search action
Tariq Shah
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j83]Tanveer Qayyum, Tariq Shah, Ali Yahya Hummdi, Amer Aljaedi, Zaid Bassfar:
An Innovative Feasible Approach for Multi-Media Security Using Both Chaotic and Elliptic Curve Structures. IEEE Access 12: 10411-10427 (2024) - [j82]Muhammad Sajjad, Tariq Shah:
Decoding of cyclic codes over quaternion integers by modified Berlekamp-Massey algorithm. Comput. Appl. Math. 43(2): 102 (2024) - [j81]Muhammad Umair Safdar, Tariq Shah, Asif Ali, Tanveer ul Haq:
Construction of algebraic complex 9-bit lookup tables using non-chain-ring and its applications in data security. Integr. 94: 102095 (2024) - [j80]Muhammad Umair Safdar, Tariq Shah, Asif Ali:
Enhancing image data security with chain and non-chain Galois ring structures. Math. Comput. Simul. 225: 659-694 (2024) - [j79]Tariq Shah, Dilawar Abbas Khan, Asif Ali:
Design of nonlinear component of block cipher using quaternion integers. Multim. Tools Appl. 83(9): 25657-25674 (2024) - [j78]Dania Saleem Malik, Tariq Shah:
4D- dynamical system and convolution codes based colored image encryption scheme: information security perception. Multim. Tools Appl. 83(10): 29353-29375 (2024) - [j77]Muhammad Aveem, Tariq Shah:
Construction of S-boxes from cyclic group of residue class of noncommutative quaternion integers. Multim. Tools Appl. 83(24): 64717-64739 (2024) - [j76]Tariq Shah, Tanveer ul Haq:
Construction of 24-by-24 nonlinear layer for symmetric algorithm and its application to data encryption in parallel with DNA transform. J. Supercomput. 80(1): 1037-1058 (2024) - 2023
- [j75]Muhammad Irfan, Tariq Shah, Ghazanfar Farooq Siddiqui, Amjad Rehman, Tanzila Saba, Saeed Ali Bahaj:
Design of Nonlinear Component of Block Cipher Using Gravesian Octonion Integers. IEEE Access 11: 2138-2147 (2023) - [j74]Ijaz Khalid, Tariq Shah, Sayed M. Eldin, Dawood Shah, Muhammad Asif, Imran Saddique:
An Integrated Image Encryption Scheme Based on Elliptic Curve. IEEE Access 11: 5483-5501 (2023) - [j73]Sadam Hussain, Muhammad Asif, Tariq Shah, Abid Mahboob, Sayed M. Eldin:
Redesigning the Serpent Algorithm by PA-Loop and Its Image Encryption Application. IEEE Access 11: 29698-29710 (2023) - [j72]Muhammad Sajjad, Tariq Shah, Maha Alammari, Huda Alsaud:
Construction and Decoding of BCH-Codes Over the Gaussian Field. IEEE Access 11: 71972-71980 (2023) - [j71]Muhammad Imran Haider, Tariq Shah, Asif Ali, Dawood Shah, Ijaz Khalid:
An Innovative approach towards image encryption by using novel PRNs and S-boxes Modeling techniques. Math. Comput. Simul. 209: 153-168 (2023) - [j70]Sadam Hussain, Tariq Shah, Adnan Javeed:
Modified advanced encryption standard (MAES) based on non-associative inverse property loop. Multim. Tools Appl. 82(11): 16237-16256 (2023) - [j69]Tariq Shah, Asma Batool:
Triple byte nonlinear component of block cipher and its application in frequency domain watermarking. Multim. Tools Appl. 82(26): 40937-40952 (2023) - 2022
- [j68]Ijaz Khalid, Tariq Shah, Khalid Ali Almarhabi, Dawood Shah, Muhammad Asif, Muhammad Usman Ashraf:
The SPN Network for Digital Audio Data Based on Elliptic Curve Over a Finite Field. IEEE Access 10: 127939-127955 (2022) - [j67]Muhammad Sajjad, Tariq Shah, Robinson-Julian Serna, Zagalo Enrique Suárez Aguilar, Omaida Sepúlveda Delgado:
Fundamental Results of Cyclic Codes over Octonion Integers and Their Decoding Algorithm. Comput. 10(12): 219 (2022) - [j66]Muhammad Tanveer, Tariq Shah, Asif Ali, Dawood Shah:
An Efficient Image Privacy-Preserving Scheme Based On Mixed Chaotic Map and Compression. Int. J. Image Graph. 22(2): 2250020:1-2250020:17 (2022) - [j65]Dawood Shah, Tariq Shah, Yasir Naseer, Sajjad Shaukat Jamal, Sadam Hussain:
Cryptographically strong S-P boxes and their application in steganography. J. Inf. Secur. Appl. 67: 103174 (2022) - [j64]Tariq Shah, Tanveer ul Haq:
Design of 24-by-24-replacement-matrix: a functionality to astronomical visual. Multim. Tools Appl. 81(4): 5929-5955 (2022) - [j63]Muhammad Imran Haider, Tariq Shah, Asif Ali, Dawood Shah, Ijaz Khalid:
Pseudo random sequences based on elliptic curve subgroups and mathematical model for its application to digital image security. Multim. Tools Appl. 81(17): 23709-23734 (2022) - [j62]Naeem Ahmed, Rashid Amin, Hamza Aldabbas, Deepika Koundal, Bader Alouffi, Tariq Shah:
Machine Learning Techniques for Spam Detection in Email and IoT Platforms: Analysis and Research Challenges. Secur. Commun. Networks 2022: 1862888:1-1862888:19 (2022) - [i3]Muhammad Fahad Khan, Khalid Saleem, Tariq Shah, Mohammad Mazyad Hazzazi, Ismail Bahkali, Piyush Kumar Shukla:
Block Ciphers Substitution Box Generation Based on Natural Randomness in Underwater Acoustics and Knights Tour Chain. CoRR abs/2205.13593 (2022) - [i2]Muhammad Fahad Khan, Khalid Saleem, Tariq Shah, Mohammad Mazyad Hazzazi, Ismail Bahkali, Piyush Kumar Shukla:
Block Cipher's Substitution Box Generation Based on Natural Randomness in Underwater Acoustics and Knight's Tour Chain. IACR Cryptol. ePrint Arch. 2022: 787 (2022) - 2021
- [j61]Muhammad Tanveer, Tariq Shah, Amjad Rehman, Asif Ali, Ghazanfar Farooq Siddiqui, Tanzila Saba, Usman Tariq:
Multi-Images Encryption Scheme Based on 3D Chaotic Map and Substitution Box. IEEE Access 9: 73924-73937 (2021) - [j60]Tanveer ul Haq, Tariq Shah, Ghazanfar Farooq Siddiqui, Muhammad Zafar Iqbal, Ibrahim A. Hameed, Huma Jamil:
Improved Twofish Algorithm: A Digital Image Enciphering Application. IEEE Access 9: 76518-76530 (2021) - [j59]Ijaz Khalid, Sajjad Shaukat Jamal, Tariq Shah, Dawood Shah, Mohammad Mazyad Hazzazi:
A Novel Scheme of Image Encryption Based on Elliptic Curves Isomorphism and Substitution Boxes. IEEE Access 9: 77798-77810 (2021) - [j58]Dawood Shah, Tariq Shah, Mohammad Mazyad Hazzazi, Muhammad Imran Haider, Amer Aljaedi, Iqtadar Hussain:
An Efficient Audio Encryption Scheme Based on Finite Fields. IEEE Access 9: 144385-144394 (2021) - [j57]Muhammad Ramzan, Tariq Shah, Mohammad Mazyad Hazzazi, Amer Aljaedi, Adel R. Alharbi:
Construction of S-Boxes Using Different Maps Over Elliptic Curves for Image Encryption. IEEE Access 9: 157106-157123 (2021) - [j56]Noor Munir, Majid Khan, Tariq Shah, Ammar S. Alanazi, Iqtadar Hussain:
Cryptanalysis of nonlinear confusion component based encryption algorithm. Integr. 79: 41-47 (2021) - [j55]Yasir Naseer, Tariq Shah, Dawood Shah:
A novel hybrid permutation substitution base colored image encryption scheme for multimedia data. J. Inf. Secur. Appl. 59: 102829 (2021) - [j54]Saira Jahangir, Tariq Shah:
A novel multiple color image encryption scheme based on algebra M(2, F2[u]/〈u8〉) and chaotic map. J. Inf. Secur. Appl. 59: 102831 (2021) - [j53]Tanveer ul Haq, Tariq Shah:
4D mixed chaotic system and its application to RGB image encryption using substitution-diffusion. J. Inf. Secur. Appl. 61: 102931 (2021) - [j52]Muhammad Imran Haider, Asif Ali, Dawood Shah, Tariq Shah:
Block cipher's nonlinear component design by elliptic curves: an image encryption application. Multim. Tools Appl. 80(3): 4693-4718 (2021) - [j51]Dawood Shah, Tariq Shah, Imtiaz Ahamad, Muhammad Imran Haider, Ijaz Khalid:
A three-dimensional chaotic map and their applications to digital audio security. Multim. Tools Appl. 80(14): 22251-22273 (2021) - [j50]Muzna Yumman, Tariq Shah, Iqtadar Hussain:
Asymmetric Cryptosystem on Matrix Algebra over a Chain Ring. Symmetry 13(1): 45 (2021) - 2020
- [j49]Tariq Shah, Tanveer ul Haq, Ghazanfar F. Siddiqui:
Improved SERPENT Algorithm: Design to RGB Image Encryption Implementation. IEEE Access 8: 52609-52621 (2020) - [j48]Sadam Hussain, Sajjad Shaukat Jamal, Tariq Shah, Iqtadar Hussain:
A Power Associative Loop Structure for the Construction of Non-Linear Components of Block Cipher. IEEE Access 8: 123492-123506 (2020) - [j47]Tanveer ul Haq, Tariq Shah:
Algebra-chaos amalgam and DNA transform based multiple digital image encryption. J. Inf. Secur. Appl. 54: 102592 (2020) - [j46]Dawood Shah, Tariq Shah:
Binary Galois field extensions dependent multimedia data security scheme. Microprocess. Microsystems 77: 103181 (2020) - [j45]Yasir Naseer, Tariq Shah, Attaullah, Adnan Javeed:
Advance image encryption technique utilizing compression, dynamical system and S-boxes. Math. Comput. Simul. 178: 207-217 (2020) - [j44]Dania Saleem Malik, Tariq Shah:
Color multiple image encryption scheme based on 3D-chaotic maps. Math. Comput. Simul. 178: 646-666 (2020) - [j43]Dawood Shah, Tariq Shah, Sajjad Shaukat Jamal:
A novel efficient image encryption algorithm based on affine transformation combine with linear fractional transformation. Multidimens. Syst. Signal Process. 31(3): 885-905 (2020) - [j42]Adnan Javeed, Tariq Shah, Attaullah:
Design of an S-box using Rabinovich-Fabrikant system of differential equations perceiving third order nonlinearity. Multim. Tools Appl. 79(9-10): 6649-6660 (2020) - [j41]Saira Jahangir, Tariq Shah:
Designing S-boxes triplet over a finite chain ring and its application in RGB image encryption. Multim. Tools Appl. 79(37-38): 26885-26911 (2020) - [j40]Dawood Shah, Tariq Shah:
A novel discrete image encryption algorithm based on finite algebraic structures. Multim. Tools Appl. 79(37-38): 28023-28042 (2020) - [j39]Adnan Javeed, Tariq Shah, Atta Ullah:
A color image privacy scheme established on nonlinear system of coupled differential equations. Multim. Tools Appl. 79(43-44): 32487-32501 (2020) - [j38]Sajjad Shaukat Jamal, Dawood Shah, Abdulaziz Deajim, Tariq Shah:
The Effect of the Primitive Irreducible Polynomial on the Quality of Cryptographic Properties of Block Ciphers. Secur. Commun. Networks 2020: 8883884:1-8883884:14 (2020) - [j37]Attaullah, Tariq Shah, Sajjad Shaukat Jamal:
An Improved Chaotic Cryptosystem for Image Encryption and Digital Watermarking. Wirel. Pers. Commun. 110(3): 1429-1442 (2020) - [j36]Adnan Javeed, Tariq Shah, Atta Ullah:
Construction of Non-linear Component of Block Cipher by Means of Chaotic Dynamical System and Symmetric Group. Wirel. Pers. Commun. 112(1): 467-480 (2020) - [j35]Tariq Shah, Asif Ali, Majid Khan, Ghazanfar Farooq Siddiqui, Antonio Aparecido de Andrade:
Galois Ring $GR\left( {2^{3} , 8} \right)$ Dependent 24 ˟ 24 S-Box Design: An RGB Image Encryption Application. Wirel. Pers. Commun. 113(2): 1201-1224 (2020)
2010 – 2019
- 2019
- [j34]Muhammad Fahad Khan, Adeel Ahmed, Khalid Saleem, Tariq Shah:
A Novel Design of Cryptographic SP-Network Based on Gold Sequences and Chaotic Logistic Tent System. IEEE Access 7: 84980-84991 (2019) - [j33]Yasir Naseer, Tariq Shah, Dawood Shah, Sadam Hussain:
A Novel Algorithm of Constructing Highly Nonlinear S-p-boxes. Cryptogr. 3(1): 6 (2019) - [j32]Tariq Shah, Ayesha Qureshi:
S-Box on Subgroup of Galois Field. Cryptogr. 3(2): 13 (2019) - [j31]Muhammad Asif, Tariq Shah:
BCH Codes with computational approach and its applications in image encryption. J. Intell. Fuzzy Syst. 37(3): 3925-3939 (2019) - [j30]Yasir Naseer, Dawood Shah, Tariq Shah:
A novel approach to improve multimedia security utilizing 3D mixed chaotic map. Microprocess. Microsystems 65: 1-6 (2019) - [j29]Tariq Shah, Dawood Shah:
Construction of highly nonlinear S-boxes for degree 8 primitive irreducible polynomials over ℤ2. Multim. Tools Appl. 78(2): 1219-1234 (2019) - [j28]Attaullah, Adnan Javeed, Tariq Shah:
Cryptosystem techniques based on the improved Chebyshev map: an application in image encryption. Multim. Tools Appl. 78(22): 31467-31484 (2019) - [j27]Atta Ullah, Adnan Javeed, Tariq Shah:
A scheme based on algebraic and chaotic structures for the construction of substitution box. Multim. Tools Appl. 78(22): 32467-32484 (2019) - [j26]Sajjad Shaukat Jamal, Tariq Shah, Shabieh Farwa, Muhammad Usman Khan:
A new technique of frequency domain watermarking based on a local ring. Wirel. Networks 25(4): 1491-1503 (2019) - [j25]Yasir Naseer, Tariq Shah, Sadam Hussain, Asif Ali:
Steps Towards Redesigning Cryptosystems by a Non-associative Algebra of IP-Loops. Wirel. Pers. Commun. 108(3): 1379-1392 (2019) - 2018
- [j24]Hafiz Muhammad Waseem, Majid Khan, Tariq Shah:
Image privacy scheme using quantum spinning and rotation. J. Electronic Imaging 27(06): 063022 (2018) - [j23]Shahid Mahmood, Shabieh Farwa, Muhammad Rafiq, Syed Muhammad Jawwad Riaz, Tariq Shah, Sajjad Shaukat Jamal:
To Study the Effect of the Generating Polynomial on the Quality of Nonlinear Components in Block Ciphers. Secur. Commun. Networks 2018: 5823230:1-5823230:8 (2018) - [j22]Attaullah, Sajjad Shaukat Jamal, Tariq Shah:
A Novel Algebraic Technique for the Construction of Strong Substitution Box. Wirel. Pers. Commun. 99(1): 213-226 (2018) - 2017
- [j21]Tariq Shah, Naveed Ahmed Azam:
Characterization of cyclic codes over {ℬ[X;(1/m)Z0]}m > 1 and efficient encoding decoding algorithm for cyclic codes. Int. J. Comput. Math. 94(5): 1015-1027 (2017) - [j20]Mahwish Bano, Tariq Shah, Romana Talat, T. M. Shah:
Image reconstruction and text embedding using scan patterns with XOR in graph cut technique. J. Intell. Fuzzy Syst. 33(2): 1097-1104 (2017) - [j19]Majid Khan, Tariq Shah, Syeda Iram Batool:
A new approach for image encryption and watermarking based on substitution box over the classes of chain rings. Multim. Tools Appl. 76(22): 24027-24062 (2017) - [j18]Inayatur Rehman, Asima Razzaque, Tariq Shah:
A Novel Approach to Analyze S-boxes in Image Encryption Using Fuzzy Soft Set Aggregation Operator. J. Multiple Valued Log. Soft Comput. 28(4-5): 495-510 (2017) - 2016
- [j17]Asma Shaheen Ansari, Tariq Shah:
An association between primitive and non-primitive BCH codes using monoid rings. EURASIP J. Wirel. Commun. Netw. 2016: 38 (2016) - [j16]Tariq Shah, Asima Razzaque, Inayatur Rehman:
Application of soft sets to non-associative rings. J. Intell. Fuzzy Syst. 30(3): 1537-1546 (2016) - [j15]Majid Khan, Tariq Shah, Syeda Iram Batool:
A new implementation of chaotic S-boxes in CAPTCHA. Signal Image Video Process. 10(2): 293-300 (2016) - [j14]Sajjad Shaukat Jamal, Muhammad Usman Khan, Tariq Shah:
A Watermarking Technique with Chaotic Fractional S-Box Transformation. Wirel. Pers. Commun. 90(4): 2033-2049 (2016) - 2015
- [j13]Majid Khan, Tariq Shah:
A novel construction of substitution box with Zaslavskii chaotic map and symmetric group. J. Intell. Fuzzy Syst. 28(4): 1509-1517 (2015) - [j12]Majid Khan, Tariq Shah:
An efficient construction of substitution box with fractional chaotic system. Signal Image Video Process. 9(6): 1335-1338 (2015) - 2014
- [j11]Naveed Ahmed Azam, Tariq Shah, Antonio Aparecido de Andrade:
A new transmission model in cognitive radio based on cyclic generalized polynomial codes for bandwidth reduction. Discret. Math. Algorithms Appl. 6(4) (2014) - [j10]Syed Azmat Hussain, Tariq Shah, Naveed Ahmed Azam, Antonio Aparecido de Andrade, Aqdas Naveed Malik:
Spectrum Distribution in Cognitive Radio: Error Correcting Codes Perspective. Int. J. Distributed Sens. Networks 10 (2014) - [j9]Tariq Shah, Nasreen Kausar:
Characterizations of non-associative ordered semigroups by their fuzzy bi-ideals. Theor. Comput. Sci. 529: 96-110 (2014) - 2013
- [j8]Tariq Shah, Summera Said Rasool:
On codes over quaternion integers. Appl. Algebra Eng. Commun. Comput. 24(6): 477-496 (2013) - [j7]Iqtadar Hussain, Tariq Shah, Muhammad Asif Gondal:
Application of S-box and chaotic map for image encryption. Math. Comput. Model. 57(9-10): 2576-2579 (2013) - [j6]Iqtadar Hussain, Tariq Shah, Hasan Mahmood, Muhammad Asif Gondal:
A projective general linear group based algorithm for the construction of substitution box for block ciphers. Neural Comput. Appl. 22(6): 1085-1093 (2013) - [j5]Iqtadar Hussain, Tariq Shah, Muhammad Asif Gondal, Waqar Ahmad Khan, Hasan Mahmood:
A group theoretic approach to construct cryptographically strong substitution boxes. Neural Comput. Appl. 23(1): 97-104 (2013) - [i1]Tariq Shah, Sayed Azmat Hussain, Antonio Aparecido de Andrade:
Bandwidth reduction in cognitive radio. CoRR abs/1304.1459 (2013) - 2012
- [j4]Iqtadar Hussain, Tariq Shah, Hasan Mahmood, Muhammad Asif Gondal:
Construction of S8 Liu J S-boxes and their applications. Comput. Math. Appl. 64(8): 2450-2458 (2012) - [j3]Tariq Shah, Antonio Aparecido de Andrade:
Cyclic Codes through , with and B = A+1, and Encoding. Discret. Math. Algorithms Appl. 4(4) (2012) - [j2]Iqtadar Hussain, Tariq Shah, Muhammad Asif Gondal, Hasan Mahmood:
S8 affine-power-affine S-boxes and their applications. Neural Comput. Appl. 21(Supplement-1): 377-383 (2012) - 2011
- [j1]Tariq Shah, Atlas Khan, Antonio Aparecido de Andrade:
Constructions of codes through the semigroup ring B[X; (1/22)Z2] and encoding. Comput. Math. Appl. 62(4): 1645-1654 (2011)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-20 22:00 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint