A novel technique for the construction of strong S-boxes based on chaotic Lorenz systems M Khan, T Shah, H Mahmood, MA Gondal, I Hussain Nonlinear Dynamics 70, 2303-2311, 2012 | 174 | 2012 |
A projective general linear group based algorithm for the construction of substitution box for block ciphers I Hussain, T Shah, H Mahmood, MA Gondal Neural Computing and Applications 22, 1085-1093, 2013 | 168 | 2013 |
A group theoretic approach to construct cryptographically strong substitution boxes I Hussain, T Shah, MA Gondal, WA Khan, H Mahmood Neural Computing and Applications 23, 97-104, 2013 | 137 | 2013 |
An efficient method for the construction of block cipher with multi-chaotic systems M Khan, T Shah, H Mahmood, MA Gondal Nonlinear Dynamics 71, 489-492, 2013 | 137 | 2013 |
Routing protocols for underwater wireless sensor networks: Taxonomy, research challenges, routing strategies and future directions A Khan, I Ali, A Ghani, N Khan, M Alsaqer, AU Rahman, H Mahmood Sensors 18 (5), 1619, 2018 | 100 | 2018 |
An efficient approach for the construction of LFT S-boxes using chaotic logistic map I Hussain, T Shah, MA Gondal, H Mahmood Nonlinear Dynamics 71, 133-140, 2013 | 95 | 2013 |
Statistical analysis of S-box in image encryption applications based on majority logic criterion T Shah, I Hussain, MA Gondal, H Mahmood International Journal of the Physical Sciences 6 (16), 4110-4127, 2011 | 92 | 2011 |
A New Algorithm to Construct Secure Keys for AES I Hussain, T Shah, H Mahmood International Journal of Contemporary Mathematical Sciences 5 (26), 1263-1270, 2010 | 92 | 2010 |
Construction of S_8 Liu J S-boxes and their applications I Hussain, T Shah, H Mahmood, MA Gondal Computers & Mathematics with Applications, 2012 | 80 | 2012 |
Co-EEORS: Cooperative energy efficient optimal relay selection protocol for underwater wireless sensor networks A Khan, I Ali, AU Rahman, M Imran, H Mahmood IEEE Access 6, 28777-28789, 2018 | 75 | 2018 |
Some Analysis of S-box based on Residue of Prime Number I Hussain, T Shah, H Mahmood, SIA Shah International Journal of Computer Science and Network Security, 2010 | 71 | 2010 |
A localization-free interference and energy holes minimization routing for underwater wireless sensor networks A Khan, I Ahmedy, MH Anisi, N Javaid, I Ali, N Khan, M Alsaqer, ... Sensors 18 (1), 165, 2018 | 60 | 2018 |
Generalized majority logic criterion to analyze the statistical strength of S-boxes I Hussain, T Shah, MA Gondal, H Mahmood Zeitschrift für Naturforschung A 67 (5), 282-288, 2012 | 58 | 2012 |
A novel image encryption algorithm based on chaotic maps and GF(28) exponent transformation I Hussain, T Shah, MA Gondal, H Mahmood Nonlinear Dynamics 72, 399-406, 2013 | 55 | 2013 |
An ant colony optimization based approach for minimum cost coverage on 3-D grid in wireless sensor networks T Qasim, M Zia, QA Minhas, N Bhatti, K Saleem, T Qasim, H Mahmood IEEE Communications Letters 22 (6), 1140-1143, 2018 | 53 | 2018 |
The Retinex based improved underwater image enhancement N Hassan, S Ullah, N Bhatti, H Mahmood, M Zia Multimedia Tools and Applications 80, 1839-1857, 2021 | 45 | 2021 |
Efficient method for designing chaotic S-boxes based on generalized Baker’s map and TDERC chaotic sequence I Hussain, T Shah, MA Gondal, H Mahmood Nonlinear Dynamics 74, 271-275, 2013 | 43 | 2013 |
Protocol-aware radio frequency jamming in Wi-Fi and commercial wireless networks A Hussain, NA Saqib, U Qamar, M Zia, H Mahmood Journal of communications and networks 16 (4), 397-406, 2014 | 40 | 2014 |
A novel method for designing nonlinear component for block cipher based on TD-ERCS chaotic sequence I Hussain, T Shah, MA Gondal, H Mahmood Nonlinear Dynamics 73, 633-637, 2013 | 38 | 2013 |
Towards mobile edge computing: Taxonomy, challenges, applications and future realms J Qadir, B Sainz-De-Abajo, A Khan, B Garcia-Zapirain, I De La Torre-Diez, ... Ieee Access 8, 189129-189162, 2020 | 35 | 2020 |