Tariq Shah

Orcid: 0000-0002-9145-5208

According to our database1, Tariq Shah authored at least 89 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Design of nonlinear component of block cipher using quaternion integers.
Multim. Tools Appl., March, 2024

4D- dynamical system and convolution codes based colored image encryption scheme: information security perception.
Multim. Tools Appl., March, 2024

Decoding of cyclic codes over quaternion integers by modified Berlekamp-Massey algorithm.
Comput. Appl. Math., March, 2024

Construction of 24-by-24 nonlinear layer for symmetric algorithm and its application to data encryption in parallel with DNA transform.
J. Supercomput., January, 2024

Construction of algebraic complex 9-bit lookup tables using non-chain-ring and its applications in data security.
Integr., January, 2024

An Innovative Feasible Approach for Multi-Media Security Using Both Chaotic and Elliptic Curve Structures.
IEEE Access, 2024

2023
Triple byte nonlinear component of block cipher and its application in frequency domain watermarking.
Multim. Tools Appl., November, 2023

Modified advanced encryption standard (MAES) based on non-associative inverse property loop.
Multim. Tools Appl., May, 2023

An Innovative approach towards image encryption by using novel PRNs and S-boxes Modeling techniques.
Math. Comput. Simul., 2023

Construction and Decoding of BCH-Codes Over the Gaussian Field.
IEEE Access, 2023

An Integrated Image Encryption Scheme Based on Elliptic Curve.
IEEE Access, 2023

Design of Nonlinear Component of Block Cipher Using Gravesian Octonion Integers.
IEEE Access, 2023

Redesigning the Serpent Algorithm by PA-Loop and Its Image Encryption Application.
IEEE Access, 2023

2022
Machine Learning Techniques for Spam Detection in Email and IoT Platforms: Analysis and Research Challenges.
Secur. Commun. Networks, 2022

Design of 24-by-24-replacement-matrix: a functionality to astronomical visual.
Multim. Tools Appl., 2022

Pseudo random sequences based on elliptic curve subgroups and mathematical model for its application to digital image security.
Multim. Tools Appl., 2022

Cryptographically strong S-P boxes and their application in steganography.
J. Inf. Secur. Appl., 2022

An Efficient Image Privacy-Preserving Scheme Based On Mixed Chaotic Map and Compression.
Int. J. Image Graph., 2022

Block Cipher's Substitution Box Generation Based on Natural Randomness in Underwater Acoustics and Knight's Tour Chain.
IACR Cryptol. ePrint Arch., 2022

Block Ciphers Substitution Box Generation Based on Natural Randomness in Underwater Acoustics and Knights Tour Chain.
CoRR, 2022

Fundamental Results of Cyclic Codes over Octonion Integers and Their Decoding Algorithm.
Comput., 2022

The SPN Network for Digital Audio Data Based on Elliptic Curve Over a Finite Field.
IEEE Access, 2022

2021
Asymmetric Cryptosystem on Matrix Algebra over a Chain Ring.
Symmetry, 2021

A three-dimensional chaotic map and their applications to digital audio security.
Multim. Tools Appl., 2021

Block cipher's nonlinear component design by elliptic curves: an image encryption application.
Multim. Tools Appl., 2021

A novel hybrid permutation substitution base colored image encryption scheme for multimedia data.
J. Inf. Secur. Appl., 2021

A novel multiple color image encryption scheme based on algebra <i>M</i>(2, <i>F</i><sub>2</sub>[<i>u</i>]/〈<i>u</i><sup>8</sup>〉) and chaotic map.
J. Inf. Secur. Appl., 2021

4D mixed chaotic system and its application to RGB image encryption using substitution-diffusion.
J. Inf. Secur. Appl., 2021

Cryptanalysis of nonlinear confusion component based encryption algorithm.
Integr., 2021

Multi-Images Encryption Scheme Based on 3D Chaotic Map and Substitution Box.
IEEE Access, 2021

An Efficient Audio Encryption Scheme Based on Finite Fields.
IEEE Access, 2021

Construction of S-Boxes Using Different Maps Over Elliptic Curves for Image Encryption.
IEEE Access, 2021

A Novel Scheme of Image Encryption Based on Elliptic Curves Isomorphism and Substitution Boxes.
IEEE Access, 2021

Improved Twofish Algorithm: A Digital Image Enciphering Application.
IEEE Access, 2021

2020
Galois Ring $GR\left( {2^{3} , 8} \right)$ Dependent 24 ˟ 24 S-Box Design: An RGB Image Encryption Application.
Wirel. Pers. Commun., 2020

Construction of Non-linear Component of Block Cipher by Means of Chaotic Dynamical System and Symmetric Group.
Wirel. Pers. Commun., 2020

An Improved Chaotic Cryptosystem for Image Encryption and Digital Watermarking.
Wirel. Pers. Commun., 2020

The Effect of the Primitive Irreducible Polynomial on the Quality of Cryptographic Properties of Block Ciphers.
Secur. Commun. Networks, 2020

A novel discrete image encryption algorithm based on finite algebraic structures.
Multim. Tools Appl., 2020

A color image privacy scheme established on nonlinear system of coupled differential equations.
Multim. Tools Appl., 2020

Design of an S-box using Rabinovich-Fabrikant system of differential equations perceiving third order nonlinearity.
Multim. Tools Appl., 2020

Designing S-boxes triplet over a finite chain ring and its application in RGB image encryption.
Multim. Tools Appl., 2020

A novel efficient image encryption algorithm based on affine transformation combine with linear fractional transformation.
Multidimens. Syst. Signal Process., 2020

Advance image encryption technique utilizing compression, dynamical system and S-boxes.
Math. Comput. Simul., 2020

Color multiple image encryption scheme based on 3D-chaotic maps.
Math. Comput. Simul., 2020

Binary Galois field extensions dependent multimedia data security scheme.
Microprocess. Microsystems, 2020

Algebra-chaos amalgam and DNA transform based multiple digital image encryption.
J. Inf. Secur. Appl., 2020

Improved SERPENT Algorithm: Design to RGB Image Encryption Implementation.
IEEE Access, 2020

A Power Associative Loop Structure for the Construction of Non-Linear Components of Block Cipher.
IEEE Access, 2020

2019
Steps Towards Redesigning Cryptosystems by a Non-associative Algebra of IP-Loops.
Wirel. Pers. Commun., 2019

A new technique of frequency domain watermarking based on a local ring.
Wirel. Networks, 2019

A scheme based on algebraic and chaotic structures for the construction of substitution box.
Multim. Tools Appl., 2019

Construction of highly nonlinear S-boxes for degree 8 primitive irreducible polynomials over ℤ2.
Multim. Tools Appl., 2019

Cryptosystem techniques based on the improved Chebyshev map: an application in image encryption.
Multim. Tools Appl., 2019

A novel approach to improve multimedia security utilizing 3D mixed chaotic map.
Microprocess. Microsystems, 2019

BCH Codes with computational approach and its applications in image encryption.
J. Intell. Fuzzy Syst., 2019

S-Box on Subgroup of Galois Field.
Cryptogr., 2019

A Novel Algorithm of Constructing Highly Nonlinear S-p-boxes.
Cryptogr., 2019

A Novel Design of Cryptographic SP-Network Based on Gold Sequences and Chaotic Logistic Tent System.
IEEE Access, 2019

2018
A Novel Algebraic Technique for the Construction of Strong Substitution Box.
Wirel. Pers. Commun., 2018

To Study the Effect of the Generating Polynomial on the Quality of Nonlinear Components in Block Ciphers.
Secur. Commun. Networks, 2018

Image privacy scheme using quantum spinning and rotation.
J. Electronic Imaging, 2018

2017
A Novel Approach to Analyze S-boxes in Image Encryption Using Fuzzy Soft Set Aggregation Operator.
J. Multiple Valued Log. Soft Comput., 2017

A new approach for image encryption and watermarking based on substitution box over the classes of chain rings.
Multim. Tools Appl., 2017

Image reconstruction and text embedding using scan patterns with XOR in graph cut technique.
J. Intell. Fuzzy Syst., 2017

Characterization of cyclic codes over {ℬ[X;(1/m)Z0]}m > 1 and efficient encoding decoding algorithm for cyclic codes.
Int. J. Comput. Math., 2017

2016
A Watermarking Technique with Chaotic Fractional S-Box Transformation.
Wirel. Pers. Commun., 2016

A new implementation of chaotic S-boxes in CAPTCHA.
Signal Image Video Process., 2016

Construction of S-box based on chaotic Boolean functions and its application in image encryption.
Neural Comput. Appl., 2016

Application of soft sets to non-associative rings.
J. Intell. Fuzzy Syst., 2016

An association between primitive and non-primitive BCH codes using monoid rings.
EURASIP J. Wirel. Commun. Netw., 2016

2015
An efficient construction of substitution box with fractional chaotic system.
Signal Image Video Process., 2015

An efficient chaotic image encryption scheme.
Neural Comput. Appl., 2015

A copyright protection using watermarking scheme based on nonlinear permutation and its quality metrics.
Neural Comput. Appl., 2015

A novel construction of substitution box with Zaslavskii chaotic map and symmetric group.
J. Intell. Fuzzy Syst., 2015

2014
Characterizations of non-associative ordered semigroups by their fuzzy bi-ideals.
Theor. Comput. Sci., 2014

A novel image encryption technique based on Hénon chaotic map and S8 symmetric group.
Neural Comput. Appl., 2014

A color image watermarking scheme based on affine transformation and S 4 permutation.
Neural Comput. Appl., 2014

Spectrum Distribution in Cognitive Radio: Error Correcting Codes Perspective.
Int. J. Distributed Sens. Networks, 2014

A new transmission model in cognitive radio based on cyclic generalized polynomial codes for bandwidth reduction.
Discret. Math. Algorithms Appl., 2014

2013
A projective general linear group based algorithm for the construction of substitution box for block ciphers.
Neural Comput. Appl., 2013

A group theoretic approach to construct cryptographically strong substitution boxes.
Neural Comput. Appl., 2013

Application of <i>S</i>-box and chaotic map for image encryption.
Math. Comput. Model., 2013

Bandwidth reduction in cognitive radio
CoRR, 2013

On codes over quaternion integers.
Appl. Algebra Eng. Commun. Comput., 2013

2012
S<sub>8</sub> affine-power-affine S-boxes and their applications.
Neural Comput. Appl., 2012

Cyclic Codes through , with and B = A+1, and Encoding.
Discret. Math. Algorithms Appl., 2012

Construction of S<sub>8</sub> Liu J S-boxes and their applications.
Comput. Math. Appl., 2012

2011
Constructions of codes through the semigroup ring B[X; (1/2<sup>2</sup>)Z<sub>2</sub>] and encoding.
Comput. Math. Appl., 2011


  Loading...