An authenticated image encryption scheme based on chaotic maps and memory cellular automata A Bakhshandeh, Z Eslami Optics and Lasers in Engineering 51 (6), 665-673, 2013 | 170 | 2013 |
Secret image sharing based on cellular automata and steganography Z Eslami, SH Razzaghi, JZ Ahmadabadi Pattern Recognition 43 (1), 397-404, 2010 | 123 | 2010 |
A verifiable multi-secret sharing scheme based on cellular automata Z Eslami, JZ Ahmadabadi Information Sciences 180 (15), 2889-2894, 2010 | 96 | 2010 |
A new untraceable off-line electronic cash system Z Eslami, M Talebi Electronic Commerce Research and Applications 10 (1), 59-66, 2011 | 91 | 2011 |
An improvement over an image encryption method based on total shuffling Z Eslami, A Bakhshandeh Optics Communications 286, 51-55, 2013 | 75 | 2013 |
Certificateless aggregate signcryption: Security model and a concrete construction secure in the random oracle model Z Eslami, N Pakniat Journal of King Saud University-Computer and Information Sciences 26 (3 …, 2014 | 71 | 2014 |
Secret image sharing with authentication-chaining and dynamic embedding Z Eslami, JZ Ahmadabadi Journal of Systems and Software 84 (5), 803-809, 2011 | 67 | 2011 |
Public key authenticated encryption with keyword search: revisited M Noroozi, Z Eslami IET Information Security 13 (4), 336-342, 2019 | 64 | 2019 |
Certificateless authenticated encryption with keyword search: Enhanced security model and a concrete construction for industrial IoT N Pakniat, D Shiraly, Z Eslami Journal of Information Security and Applications 53, 102525, 2020 | 53 | 2020 |
Secret image sharing scheme with hierarchical threshold access structure N Pakniat, M Noroozi, Z Eslami Journal of Visual Communication and Image Representation 25 (5), 1093-1101, 2014 | 51 | 2014 |
Improvement of (n, n)-multi-secret image sharing schemes based on Boolean operations S Kabirirad, Z Eslami Journal of Information Security and Applications 47, 16-27, 2019 | 40 | 2019 |
A new verifiable multi-secret sharing scheme based on bilinear maps Z Eslami, S Kabiri Rad Wireless Personal Communications 63 (2), 459-467, 2012 | 39 | 2012 |
Public-key encryption with keyword search: a generic construction secure against online and offline keyword guessing attacks M Noroozi, Z Eslami Journal of Ambient Intelligence and Humanized Computing 11 (2), 879-890, 2020 | 32 | 2020 |
Pairing-free certificateless authenticated encryption with keyword search D Shiraly, N Pakniat, M Noroozi, Z Eslami Journal of Systems Architecture 124, 102390, 2022 | 30 | 2022 |
A verifiable threshold secret sharing scheme based on lattices B Rajabi, Z Eslami Information Sciences 501, 655-661, 2019 | 29 | 2019 |
A (t, n)-multi secret image sharing scheme based on Boolean operations S Kabirirad, Z Eslami Journal of Visual Communication and Image Representation 57, 39-47, 2018 | 28 | 2018 |
Distributed key generation protocol with hierarchical threshold access structure N Pakniat, M Noroozi, Z Eslami IET Information Security 9 (4), 248-255, 2015 | 21 | 2015 |
Cryptanalysis of a multiparty quantum key agreement protocol based on commutative encryption R Mohajer, Z Eslami Quantum Information Processing 16, 1-9, 2017 | 18 | 2017 |
Designing a secure designated server identity-based encryption with keyword search scheme: still unsolved M Noroozi, I Karoubi, Z Eslami Annals of Telecommunications 73 (11), 769-776, 2018 | 16 | 2018 |
Comments on a chaos-based public key encryption with keyword search scheme M Noroozi, Z Eslami, N Pakniat Nonlinear Dynamics 94, 1127-1132, 2018 | 16 | 2018 |