


default search action
Tariq Shah
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
 [j91]Muhammad Sajjad, Tariq Shah, Muhammad Abbas, Maha Alammari, Robinson-Julian Serna: [j91]Muhammad Sajjad, Tariq Shah, Muhammad Abbas, Maha Alammari, Robinson-Julian Serna:
 The impact of alternant codes over Eisenstein integers on modern technology. Comput. Appl. Math. 44(1): 95 (2025)
 [j90]Muhammad Umair Safdar, Tariq Shah, Asif Ali: [j90]Muhammad Umair Safdar, Tariq Shah, Asif Ali:
 The class of bivariate non-chain rings and its application to data security. Clust. Comput. 28(6): 389 (2025)
 [j89]Hafeez Ur Rehman [j89]Hafeez Ur Rehman , Tariq Shah, Dawood Shah: , Tariq Shah, Dawood Shah:
 Linear fractional transformation based S-boxes design by Galois fields over irreducible polynomials. Multim. Tools Appl. 84(5): 2485-2508 (2025)
 [j88]Hafsa, Hafeez Ur Rehman [j88]Hafsa, Hafeez Ur Rehman , Tariq Shah, Ali Yahya Hummdi: , Tariq Shah, Ali Yahya Hummdi:
 A novel technique of image encryption through projective coordinates of elliptic curve. Multim. Tools Appl. 84(5): 2651-2688 (2025)
 [j87]Attaullah, Adnan Javeed, Daud Shah, Tariq Shah: [j87]Attaullah, Adnan Javeed, Daud Shah, Tariq Shah:
 Watermarking technique for copyright protection of digital images using coupled differential equations. Multim. Tools Appl. 84(12): 11027-11039 (2025)
 [j86]Muhammad Umair Safdar, Tariq Shah, Asif Ali: [j86]Muhammad Umair Safdar, Tariq Shah, Asif Ali:
 A color image encryption scheme hybridizing two finite rings and DNA encoding. Signal Image Video Process. 19(13): 1130 (2025)
 [j85]Muhammad Umair Safdar, Tariq Shah, Asif Ali: [j85]Muhammad Umair Safdar, Tariq Shah, Asif Ali:
 Multiple-image encryption algorithm based on S-boxes and DNA sequences. Signal Process. Image Commun. 138: 117353 (2025)
- 2024
 [j84]Tanveer Qayyum [j84]Tanveer Qayyum , Tariq Shah, Ali Yahya Hummdi, Amer Aljaedi , Tariq Shah, Ali Yahya Hummdi, Amer Aljaedi , Zaid Bassfar , Zaid Bassfar : :
 An Innovative Feasible Approach for Multi-Media Security Using Both Chaotic and Elliptic Curve Structures. IEEE Access 12: 10411-10427 (2024)
 [j83]Muhammad Sajjad [j83]Muhammad Sajjad , Tariq Shah , Tariq Shah : :
 Decoding of cyclic codes over quaternion integers by modified Berlekamp-Massey algorithm. Comput. Appl. Math. 43(2): 102 (2024)
 [j82]Muhammad Umair Safdar, Tariq Shah, Asif Ali, Tanveer ul Haq [j82]Muhammad Umair Safdar, Tariq Shah, Asif Ali, Tanveer ul Haq : :
 Construction of algebraic complex 9-bit lookup tables using non-chain-ring and its applications in data security. Integr. 94: 102095 (2024)
 [j81]Adel R. Alharbi, Amer Aljaedi, Abdullah Aljuhni, Moahd K. Alghuson [j81]Adel R. Alharbi, Amer Aljaedi, Abdullah Aljuhni, Moahd K. Alghuson , Hussain Aldawood, Sajjad Shaukat Jamal, Tariq Shah: , Hussain Aldawood, Sajjad Shaukat Jamal, Tariq Shah:
 Enhancing Internet of Things communications: Development of a new S-box and multi-layer encryption framework. J. King Saud Univ. Comput. Inf. Sci. 36(10): 102265 (2024)
 [j80]Muhammad Umair Safdar, Tariq Shah, Asif Ali: [j80]Muhammad Umair Safdar, Tariq Shah, Asif Ali:
 Enhancing image data security with chain and non-chain Galois ring structures. Math. Comput. Simul. 225: 659-694 (2024)
 [j79]Tariq Shah, Dilawar Abbas Khan [j79]Tariq Shah, Dilawar Abbas Khan , Asif Ali: , Asif Ali:
 Design of nonlinear component of block cipher using quaternion integers. Multim. Tools Appl. 83(9): 25657-25674 (2024)
 [j78]Dania Saleem Malik, Tariq Shah: [j78]Dania Saleem Malik, Tariq Shah:
 4D- dynamical system and convolution codes based colored image encryption scheme: information security perception. Multim. Tools Appl. 83(10): 29353-29375 (2024)
 [j77]Muhammad Aveem [j77]Muhammad Aveem , Tariq Shah , Tariq Shah : :
 Construction of S-boxes from cyclic group of residue class of noncommutative quaternion integers. Multim. Tools Appl. 83(24): 64717-64739 (2024)
 [j76]Tariq Shah, Tanveer ul Haq: [j76]Tariq Shah, Tanveer ul Haq:
 Construction of 24-by-24 nonlinear layer for symmetric algorithm and its application to data encryption in parallel with DNA transform. J. Supercomput. 80(1): 1037-1058 (2024)
- 2023
 [j75]Muhammad Irfan [j75]Muhammad Irfan , Tariq Shah , Tariq Shah , Ghazanfar Farooq Siddiqui , Ghazanfar Farooq Siddiqui , Amjad Rehman , Amjad Rehman , Tanzila Saba, Saeed Ali Bahaj , Tanzila Saba, Saeed Ali Bahaj : :
 Design of Nonlinear Component of Block Cipher Using Gravesian Octonion Integers. IEEE Access 11: 2138-2147 (2023)
 [j74]Ijaz Khalid [j74]Ijaz Khalid , Tariq Shah , Tariq Shah , Sayed M. Eldin, Dawood Shah , Sayed M. Eldin, Dawood Shah , Muhammad Asif , Muhammad Asif , Imran Saddique: , Imran Saddique:
 An Integrated Image Encryption Scheme Based on Elliptic Curve. IEEE Access 11: 5483-5501 (2023)
 [j73]Sadam Hussain [j73]Sadam Hussain , Muhammad Asif , Muhammad Asif , Tariq Shah , Tariq Shah , Abid Mahboob, Sayed M. Eldin: , Abid Mahboob, Sayed M. Eldin:
 Redesigning the Serpent Algorithm by PA-Loop and Its Image Encryption Application. IEEE Access 11: 29698-29710 (2023)
 [j72]Muhammad Sajjad [j72]Muhammad Sajjad , Tariq Shah , Tariq Shah , Maha Alammari , Maha Alammari , Huda Alsaud , Huda Alsaud : :
 Construction and Decoding of BCH-Codes Over the Gaussian Field. IEEE Access 11: 71972-71980 (2023)
 [j71]Muhammad Imran Haider, Tariq Shah, Asif Ali, Dawood Shah, Ijaz Khalid: [j71]Muhammad Imran Haider, Tariq Shah, Asif Ali, Dawood Shah, Ijaz Khalid:
 An Innovative approach towards image encryption by using novel PRNs and S-boxes Modeling techniques. Math. Comput. Simul. 209: 153-168 (2023)
 [j70]Sadam Hussain, Tariq Shah, Adnan Javeed: [j70]Sadam Hussain, Tariq Shah, Adnan Javeed:
 Modified advanced encryption standard (MAES) based on non-associative inverse property loop. Multim. Tools Appl. 82(11): 16237-16256 (2023)
 [j69]Tariq Shah, Asma Batool [j69]Tariq Shah, Asma Batool : :
 Triple byte nonlinear component of block cipher and its application in frequency domain watermarking. Multim. Tools Appl. 82(26): 40937-40952 (2023)
- 2022
 [j68]Ijaz Khalid [j68]Ijaz Khalid , Tariq Shah, Khalid Ali Almarhabi, Dawood Shah , Tariq Shah, Khalid Ali Almarhabi, Dawood Shah , Muhammad Asif , Muhammad Asif , Muhammad Usman Ashraf , Muhammad Usman Ashraf : :
 The SPN Network for Digital Audio Data Based on Elliptic Curve Over a Finite Field. IEEE Access 10: 127939-127955 (2022)
 [j67]Muhammad Sajjad [j67]Muhammad Sajjad , Tariq Shah, Robinson-Julian Serna , Tariq Shah, Robinson-Julian Serna , Zagalo Enrique Suárez Aguilar, Omaida Sepúlveda Delgado: , Zagalo Enrique Suárez Aguilar, Omaida Sepúlveda Delgado:
 Fundamental Results of Cyclic Codes over Octonion Integers and Their Decoding Algorithm. Comput. 10(12): 219 (2022)
 [j66]Muhammad Tanveer, Tariq Shah, Asif Ali, Dawood Shah: [j66]Muhammad Tanveer, Tariq Shah, Asif Ali, Dawood Shah:
 An Efficient Image Privacy-Preserving Scheme Based On Mixed Chaotic Map and Compression. Int. J. Image Graph. 22(2): 2250020:1-2250020:17 (2022)
 [j65]Dawood Shah, Tariq Shah, Yasir Naseer, Sajjad Shaukat Jamal, Sadam Hussain: [j65]Dawood Shah, Tariq Shah, Yasir Naseer, Sajjad Shaukat Jamal, Sadam Hussain:
 Cryptographically strong S-P boxes and their application in steganography. J. Inf. Secur. Appl. 67: 103174 (2022)
 [j64]Tariq Shah, Tanveer ul Haq [j64]Tariq Shah, Tanveer ul Haq : :
 Design of 24-by-24-replacement-matrix: a functionality to astronomical visual. Multim. Tools Appl. 81(4): 5929-5955 (2022)
 [j63]Muhammad Imran Haider, Tariq Shah, Asif Ali, Dawood Shah, Ijaz Khalid: [j63]Muhammad Imran Haider, Tariq Shah, Asif Ali, Dawood Shah, Ijaz Khalid:
 Pseudo random sequences based on elliptic curve subgroups and mathematical model for its application to digital image security. Multim. Tools Appl. 81(17): 23709-23734 (2022)
 [j62]Naeem Ahmed [j62]Naeem Ahmed , Rashid Amin , Rashid Amin , Hamza Aldabbas, Deepika Koundal , Hamza Aldabbas, Deepika Koundal , Bader Alouffi, Tariq Shah , Bader Alouffi, Tariq Shah : :
 Machine Learning Techniques for Spam Detection in Email and IoT Platforms: Analysis and Research Challenges. Secur. Commun. Networks 2022: 1862888:1-1862888:19 (2022)
 [i3]Muhammad Fahad Khan, Khalid Saleem, Tariq Shah, Mohammad Mazyad Hazzazi, Ismail Bahkali [i3]Muhammad Fahad Khan, Khalid Saleem, Tariq Shah, Mohammad Mazyad Hazzazi, Ismail Bahkali , Piyush Kumar Shukla: , Piyush Kumar Shukla:
 Block Ciphers Substitution Box Generation Based on Natural Randomness in Underwater Acoustics and Knights Tour Chain. CoRR abs/2205.13593 (2022)
 [i2]Muhammad Fahad Khan, Khalid Saleem, Tariq Shah, Mohammad Mazyad Hazzazi, Ismail Bahkali, Piyush Kumar Shukla: [i2]Muhammad Fahad Khan, Khalid Saleem, Tariq Shah, Mohammad Mazyad Hazzazi, Ismail Bahkali, Piyush Kumar Shukla:
 Block Cipher's Substitution Box Generation Based on Natural Randomness in Underwater Acoustics and Knight's Tour Chain. IACR Cryptol. ePrint Arch. 2022: 787 (2022)
- 2021
 [j61]Muhammad Tanveer [j61]Muhammad Tanveer , Tariq Shah, Amjad Rehman , Tariq Shah, Amjad Rehman , Asif Ali, Ghazanfar Farooq Siddiqui , Asif Ali, Ghazanfar Farooq Siddiqui , Tanzila Saba , Tanzila Saba , Usman Tariq , Usman Tariq : :
 Multi-Images Encryption Scheme Based on 3D Chaotic Map and Substitution Box. IEEE Access 9: 73924-73937 (2021)
 [j60]Tanveer ul Haq [j60]Tanveer ul Haq , Tariq Shah , Tariq Shah , Ghazanfar Farooq Siddiqui , Ghazanfar Farooq Siddiqui , Muhammad Zafar Iqbal , Muhammad Zafar Iqbal , Ibrahim A. Hameed , Ibrahim A. Hameed , Huma Jamil , Huma Jamil : :
 Improved Twofish Algorithm: A Digital Image Enciphering Application. IEEE Access 9: 76518-76530 (2021)
 [j59]Ijaz Khalid [j59]Ijaz Khalid , Sajjad Shaukat Jamal , Sajjad Shaukat Jamal , Tariq Shah , Tariq Shah , Dawood Shah , Dawood Shah , Mohammad Mazyad Hazzazi , Mohammad Mazyad Hazzazi : :
 A Novel Scheme of Image Encryption Based on Elliptic Curves Isomorphism and Substitution Boxes. IEEE Access 9: 77798-77810 (2021)
 [j58]Dawood Shah [j58]Dawood Shah , Tariq Shah , Tariq Shah , Mohammad Mazyad Hazzazi , Mohammad Mazyad Hazzazi , Muhammad Imran Haider, Amer Aljaedi , Muhammad Imran Haider, Amer Aljaedi , Iqtadar Hussain: , Iqtadar Hussain:
 An Efficient Audio Encryption Scheme Based on Finite Fields. IEEE Access 9: 144385-144394 (2021)
 [j57]Muhammad Ramzan [j57]Muhammad Ramzan , Tariq Shah , Tariq Shah , Mohammad Mazyad Hazzazi , Mohammad Mazyad Hazzazi , Amer Aljaedi , Amer Aljaedi , Adel R. Alharbi , Adel R. Alharbi : :
 Construction of S-Boxes Using Different Maps Over Elliptic Curves for Image Encryption. IEEE Access 9: 157106-157123 (2021)
 [j56]Noor Munir, Majid Khan, Tariq Shah, Ammar S. Alanazi [j56]Noor Munir, Majid Khan, Tariq Shah, Ammar S. Alanazi , Iqtadar Hussain: , Iqtadar Hussain:
 Cryptanalysis of nonlinear confusion component based encryption algorithm. Integr. 79: 41-47 (2021)
 [j55]Yasir Naseer, Tariq Shah, Dawood Shah: [j55]Yasir Naseer, Tariq Shah, Dawood Shah:
 A novel hybrid permutation substitution base colored image encryption scheme for multimedia data. J. Inf. Secur. Appl. 59: 102829 (2021)
 [j54]Saira Jahangir [j54]Saira Jahangir , Tariq Shah: , Tariq Shah:
 A novel multiple color image encryption scheme based on algebra M(2, F2[u]/〈u8〉) and chaotic map. J. Inf. Secur. Appl. 59: 102831 (2021)
 [j53]Tanveer ul Haq, Tariq Shah: [j53]Tanveer ul Haq, Tariq Shah:
 4D mixed chaotic system and its application to RGB image encryption using substitution-diffusion. J. Inf. Secur. Appl. 61: 102931 (2021)
 [j52]Muhammad Imran Haider, Asif Ali, Dawood Shah, Tariq Shah: [j52]Muhammad Imran Haider, Asif Ali, Dawood Shah, Tariq Shah:
 Block cipher's nonlinear component design by elliptic curves: an image encryption application. Multim. Tools Appl. 80(3): 4693-4718 (2021)
 [j51]Dawood Shah, Tariq Shah, Imtiaz Ahamad [j51]Dawood Shah, Tariq Shah, Imtiaz Ahamad , Muhammad Imran Haider, Ijaz Khalid: , Muhammad Imran Haider, Ijaz Khalid:
 A three-dimensional chaotic map and their applications to digital audio security. Multim. Tools Appl. 80(14): 22251-22273 (2021)
 [j50]Muzna Yumman, Tariq Shah, Iqtadar Hussain [j50]Muzna Yumman, Tariq Shah, Iqtadar Hussain : :
 Asymmetric Cryptosystem on Matrix Algebra over a Chain Ring. Symmetry 13(1): 45 (2021)
- 2020
 [j49]Tariq Shah [j49]Tariq Shah , Tanveer ul Haq , Tanveer ul Haq , Ghazanfar F. Siddiqui , Ghazanfar F. Siddiqui : :
 Improved SERPENT Algorithm: Design to RGB Image Encryption Implementation. IEEE Access 8: 52609-52621 (2020)
 [j48]Sadam Hussain [j48]Sadam Hussain , Sajjad Shaukat Jamal , Sajjad Shaukat Jamal , Tariq Shah , Tariq Shah , Iqtadar Hussain: , Iqtadar Hussain:
 A Power Associative Loop Structure for the Construction of Non-Linear Components of Block Cipher. IEEE Access 8: 123492-123506 (2020)
 [j47]Tanveer ul Haq, Tariq Shah: [j47]Tanveer ul Haq, Tariq Shah:
 Algebra-chaos amalgam and DNA transform based multiple digital image encryption. J. Inf. Secur. Appl. 54: 102592 (2020)
 [j46]Dawood Shah, Tariq Shah: [j46]Dawood Shah, Tariq Shah:
 Binary Galois field extensions dependent multimedia data security scheme. Microprocess. Microsystems 77: 103181 (2020)
 [j45]Yasir Naseer, Tariq Shah, Attaullah, Adnan Javeed: [j45]Yasir Naseer, Tariq Shah, Attaullah, Adnan Javeed:
 Advance image encryption technique utilizing compression, dynamical system and S-boxes. Math. Comput. Simul. 178: 207-217 (2020)
 [j44]Dania Saleem Malik, Tariq Shah: [j44]Dania Saleem Malik, Tariq Shah:
 Color multiple image encryption scheme based on 3D-chaotic maps. Math. Comput. Simul. 178: 646-666 (2020)
 [j43]Dawood Shah, Tariq Shah, Sajjad Shaukat Jamal: [j43]Dawood Shah, Tariq Shah, Sajjad Shaukat Jamal:
 A novel efficient image encryption algorithm based on affine transformation combine with linear fractional transformation. Multidimens. Syst. Signal Process. 31(3): 885-905 (2020)
 [j42]Adnan Javeed, Tariq Shah, Attaullah: [j42]Adnan Javeed, Tariq Shah, Attaullah:
 Design of an S-box using Rabinovich-Fabrikant system of differential equations perceiving third order nonlinearity. Multim. Tools Appl. 79(9-10): 6649-6660 (2020)
 [j41]Saira Jahangir [j41]Saira Jahangir , Tariq Shah: , Tariq Shah:
 Designing S-boxes triplet over a finite chain ring and its application in RGB image encryption. Multim. Tools Appl. 79(37-38): 26885-26911 (2020)
 [j40]Dawood Shah, Tariq Shah: [j40]Dawood Shah, Tariq Shah:
 A novel discrete image encryption algorithm based on finite algebraic structures. Multim. Tools Appl. 79(37-38): 28023-28042 (2020)
 [j39]Adnan Javeed, Tariq Shah, Atta Ullah: [j39]Adnan Javeed, Tariq Shah, Atta Ullah:
 A color image privacy scheme established on nonlinear system of coupled differential equations. Multim. Tools Appl. 79(43-44): 32487-32501 (2020)
 [j38]Sajjad Shaukat Jamal [j38]Sajjad Shaukat Jamal , Dawood Shah, Abdulaziz Deajim, Tariq Shah: , Dawood Shah, Abdulaziz Deajim, Tariq Shah:
 The Effect of the Primitive Irreducible Polynomial on the Quality of Cryptographic Properties of Block Ciphers. Secur. Commun. Networks 2020: 8883884:1-8883884:14 (2020)
 [j37]Attaullah, Tariq Shah, Sajjad Shaukat Jamal: [j37]Attaullah, Tariq Shah, Sajjad Shaukat Jamal:
 An Improved Chaotic Cryptosystem for Image Encryption and Digital Watermarking. Wirel. Pers. Commun. 110(3): 1429-1442 (2020)
 [j36]Adnan Javeed, Tariq Shah, Atta Ullah: [j36]Adnan Javeed, Tariq Shah, Atta Ullah:
 Construction of Non-linear Component of Block Cipher by Means of Chaotic Dynamical System and Symmetric Group. Wirel. Pers. Commun. 112(1): 467-480 (2020)
 [j35]Tariq Shah, Asif Ali, Majid Khan [j35]Tariq Shah, Asif Ali, Majid Khan , Ghazanfar Farooq Siddiqui, Antonio Aparecido de Andrade: , Ghazanfar Farooq Siddiqui, Antonio Aparecido de Andrade:
 Galois Ring $GR\left( {2^{3} , 8} \right)$ Dependent 24 ˟ 24 S-Box Design: An RGB Image Encryption Application. Wirel. Pers. Commun. 113(2): 1201-1224 (2020)
2010 – 2019
- 2019
 [j34]Muhammad Fahad Khan [j34]Muhammad Fahad Khan , Adeel Ahmed, Khalid Saleem, Tariq Shah: , Adeel Ahmed, Khalid Saleem, Tariq Shah:
 A Novel Design of Cryptographic SP-Network Based on Gold Sequences and Chaotic Logistic Tent System. IEEE Access 7: 84980-84991 (2019)
 [j33]Yasir Naseer, Tariq Shah, Dawood Shah, Sadam Hussain: [j33]Yasir Naseer, Tariq Shah, Dawood Shah, Sadam Hussain:
 A Novel Algorithm of Constructing Highly Nonlinear S-p-boxes. Cryptogr. 3(1): 6 (2019)
 [j32]Tariq Shah, Ayesha Qureshi: [j32]Tariq Shah, Ayesha Qureshi:
 S-Box on Subgroup of Galois Field. Cryptogr. 3(2): 13 (2019)
 [j31]Muhammad Asif [j31]Muhammad Asif , Tariq Shah: , Tariq Shah:
 BCH Codes with computational approach and its applications in image encryption. J. Intell. Fuzzy Syst. 37(3): 3925-3939 (2019)
 [j30]Yasir Naseer, Dawood Shah, Tariq Shah: [j30]Yasir Naseer, Dawood Shah, Tariq Shah:
 A novel approach to improve multimedia security utilizing 3D mixed chaotic map. Microprocess. Microsystems 65: 1-6 (2019)
 [j29]Tariq Shah, Dawood Shah: [j29]Tariq Shah, Dawood Shah:
 Construction of highly nonlinear S-boxes for degree 8 primitive irreducible polynomials over ℤ2. Multim. Tools Appl. 78(2): 1219-1234 (2019)
 [j28]Attaullah, Adnan Javeed, Tariq Shah: [j28]Attaullah, Adnan Javeed, Tariq Shah:
 Cryptosystem techniques based on the improved Chebyshev map: an application in image encryption. Multim. Tools Appl. 78(22): 31467-31484 (2019)
 [j27]Atta Ullah, Adnan Javeed, Tariq Shah: [j27]Atta Ullah, Adnan Javeed, Tariq Shah:
 A scheme based on algebraic and chaotic structures for the construction of substitution box. Multim. Tools Appl. 78(22): 32467-32484 (2019)
 [j26]Sajjad Shaukat Jamal, Tariq Shah, Shabieh Farwa, Muhammad Usman Khan [j26]Sajjad Shaukat Jamal, Tariq Shah, Shabieh Farwa, Muhammad Usman Khan : :
 A new technique of frequency domain watermarking based on a local ring. Wirel. Networks 25(4): 1491-1503 (2019)
 [j25]Yasir Naseer, Tariq Shah, Sadam Hussain, Asif Ali: [j25]Yasir Naseer, Tariq Shah, Sadam Hussain, Asif Ali:
 Steps Towards Redesigning Cryptosystems by a Non-associative Algebra of IP-Loops. Wirel. Pers. Commun. 108(3): 1379-1392 (2019)
- 2018
 [j24]Hafiz Muhammad Waseem [j24]Hafiz Muhammad Waseem , Majid Khan , Majid Khan , Tariq Shah: , Tariq Shah:
 Image privacy scheme using quantum spinning and rotation. J. Electronic Imaging 27(06): 063022 (2018)
 [j23]Shahid Mahmood [j23]Shahid Mahmood , Shabieh Farwa , Shabieh Farwa , Muhammad Rafiq, Syed Muhammad Jawwad Riaz, Tariq Shah, Sajjad Shaukat Jamal: , Muhammad Rafiq, Syed Muhammad Jawwad Riaz, Tariq Shah, Sajjad Shaukat Jamal:
 To Study the Effect of the Generating Polynomial on the Quality of Nonlinear Components in Block Ciphers. Secur. Commun. Networks 2018: 5823230:1-5823230:8 (2018)
 [j22]Attaullah, Sajjad Shaukat Jamal, Tariq Shah: [j22]Attaullah, Sajjad Shaukat Jamal, Tariq Shah:
 A Novel Algebraic Technique for the Construction of Strong Substitution Box. Wirel. Pers. Commun. 99(1): 213-226 (2018)
- 2017
 [j21]Tariq Shah, Naveed Ahmed Azam: [j21]Tariq Shah, Naveed Ahmed Azam:
 Characterization of cyclic codes over {ℬ[X;(1/m)Z0]}m > 1 and efficient encoding decoding algorithm for cyclic codes. Int. J. Comput. Math. 94(5): 1015-1027 (2017)
 [j20]Mahwish Bano, Tariq Shah, Romana Talat, T. M. Shah: [j20]Mahwish Bano, Tariq Shah, Romana Talat, T. M. Shah:
 Image reconstruction and text embedding using scan patterns with XOR in graph cut technique. J. Intell. Fuzzy Syst. 33(2): 1097-1104 (2017)
 [j19]Majid Khan [j19]Majid Khan , Tariq Shah, Syeda Iram Batool: , Tariq Shah, Syeda Iram Batool:
 A new approach for image encryption and watermarking based on substitution box over the classes of chain rings. Multim. Tools Appl. 76(22): 24027-24062 (2017)
 [j18]Inayatur Rehman, Asima Razzaque, Tariq Shah: [j18]Inayatur Rehman, Asima Razzaque, Tariq Shah:
 A Novel Approach to Analyze S-boxes in Image Encryption Using Fuzzy Soft Set Aggregation Operator. J. Multiple Valued Log. Soft Comput. 28(4-5): 495-510 (2017)
- 2016
 [j17]Asma Shaheen Ansari, Tariq Shah: [j17]Asma Shaheen Ansari, Tariq Shah:
 An association between primitive and non-primitive BCH codes using monoid rings. EURASIP J. Wirel. Commun. Netw. 2016: 38 (2016)
 [j16]Tariq Shah, Asima Razzaque [j16]Tariq Shah, Asima Razzaque , Inayatur Rehman , Inayatur Rehman : :
 Application of soft sets to non-associative rings. J. Intell. Fuzzy Syst. 30(3): 1537-1546 (2016)
 [j15]Majid Khan [j15]Majid Khan , Tariq Shah, Syeda Iram Batool: , Tariq Shah, Syeda Iram Batool:
 A new implementation of chaotic S-boxes in CAPTCHA. Signal Image Video Process. 10(2): 293-300 (2016)
 [j14]Sajjad Shaukat Jamal, Muhammad Usman Khan [j14]Sajjad Shaukat Jamal, Muhammad Usman Khan , Tariq Shah: , Tariq Shah:
 A Watermarking Technique with Chaotic Fractional S-Box Transformation. Wirel. Pers. Commun. 90(4): 2033-2049 (2016)
- 2015
 [j13]Majid Khan [j13]Majid Khan , Tariq Shah: , Tariq Shah:
 A novel construction of substitution box with Zaslavskii chaotic map and symmetric group. J. Intell. Fuzzy Syst. 28(4): 1509-1517 (2015)
 [j12]Majid Khan [j12]Majid Khan , Tariq Shah: , Tariq Shah:
 An efficient construction of substitution box with fractional chaotic system. Signal Image Video Process. 9(6): 1335-1338 (2015)
- 2014
 [j11]Naveed Ahmed Azam, Tariq Shah, Antonio Aparecido de Andrade: [j11]Naveed Ahmed Azam, Tariq Shah, Antonio Aparecido de Andrade:
 A new transmission model in cognitive radio based on cyclic generalized polynomial codes for bandwidth reduction. Discret. Math. Algorithms Appl. 6(4) (2014)
 [j10]Syed Azmat Hussain, Tariq Shah, Naveed Ahmed Azam, Antonio Aparecido de Andrade, Aqdas Naveed Malik: [j10]Syed Azmat Hussain, Tariq Shah, Naveed Ahmed Azam, Antonio Aparecido de Andrade, Aqdas Naveed Malik:
 Spectrum Distribution in Cognitive Radio: Error Correcting Codes Perspective. Int. J. Distributed Sens. Networks 10 (2014)
 [j9]Tariq Shah, Nasreen Kausar [j9]Tariq Shah, Nasreen Kausar : :
 Characterizations of non-associative ordered semigroups by their fuzzy bi-ideals. Theor. Comput. Sci. 529: 96-110 (2014)
- 2013
 [j8]Tariq Shah, Summera Said Rasool: [j8]Tariq Shah, Summera Said Rasool:
 On codes over quaternion integers. Appl. Algebra Eng. Commun. Comput. 24(6): 477-496 (2013)
 [j7]Iqtadar Hussain [j7]Iqtadar Hussain , Tariq Shah, Muhammad Asif Gondal , Tariq Shah, Muhammad Asif Gondal : :
 Application of S-box and chaotic map for image encryption. Math. Comput. Model. 57(9-10): 2576-2579 (2013)
 [j6]Iqtadar Hussain [j6]Iqtadar Hussain , Tariq Shah , Tariq Shah , Hasan Mahmood, Muhammad Asif Gondal , Hasan Mahmood, Muhammad Asif Gondal : :
 A projective general linear group based algorithm for the construction of substitution box for block ciphers. Neural Comput. Appl. 22(6): 1085-1093 (2013)
 [j5]Iqtadar Hussain [j5]Iqtadar Hussain , Tariq Shah, Muhammad Asif Gondal , Tariq Shah, Muhammad Asif Gondal , Waqar Ahmad Khan, Hasan Mahmood: , Waqar Ahmad Khan, Hasan Mahmood:
 A group theoretic approach to construct cryptographically strong substitution boxes. Neural Comput. Appl. 23(1): 97-104 (2013)
 [i1]Tariq Shah, Sayed Azmat Hussain, Antonio Aparecido de Andrade: [i1]Tariq Shah, Sayed Azmat Hussain, Antonio Aparecido de Andrade:
 Bandwidth reduction in cognitive radio. CoRR abs/1304.1459 (2013)
- 2012
 [j4]Iqtadar Hussain [j4]Iqtadar Hussain , Tariq Shah, Hasan Mahmood, Muhammad Asif Gondal , Tariq Shah, Hasan Mahmood, Muhammad Asif Gondal : :
 Construction of S8 Liu J S-boxes and their applications. Comput. Math. Appl. 64(8): 2450-2458 (2012)
 [j3]Tariq Shah, Antonio Aparecido de Andrade: [j3]Tariq Shah, Antonio Aparecido de Andrade:
 Cyclic Codes through , with and B = A+1, and Encoding. Discret. Math. Algorithms Appl. 4(4) (2012)
 [j2]Iqtadar Hussain [j2]Iqtadar Hussain , Tariq Shah, Muhammad Asif Gondal , Tariq Shah, Muhammad Asif Gondal , Hasan Mahmood: , Hasan Mahmood:
 S8 affine-power-affine S-boxes and their applications. Neural Comput. Appl. 21(Supplement-1): 377-383 (2012)
- 2011
 [j1]Tariq Shah, Atlas Khan, Antonio Aparecido de Andrade: [j1]Tariq Shah, Atlas Khan, Antonio Aparecido de Andrade:
 Constructions of codes through the semigroup ring B[X; (1/22)Z2] and encoding. Comput. Math. Appl. 62(4): 1645-1654 (2011)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from  to the list of external document links (if available).
 to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the  of the Internet Archive (if available).
 of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from  ,
,  , and
, and  to record detail pages.
 to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from  and
 and  to record detail pages.
 to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from  .
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-10-28 23:36 CET by the dblp team
 all metadata released as open data under CC0 1.0 license
 all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


 Google
Google Google Scholar
Google Scholar Semantic Scholar
Semantic Scholar Internet Archive Scholar
Internet Archive Scholar CiteSeerX
CiteSeerX ORCID
ORCID







