Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey S Ullah, J Zheng, N Din, MT Hussain, F Ullah, M Yousaf Computer Science Review 47, 100530, 2023 | 72 | 2023 |
An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography SA Ch, N Uddin, M Sher, A Ghani, H Naqvi, A Irshad Multimedia Tools and Applications 74, 1711-1723, 2015 | 58 | 2015 |
Efficient signcryption schemes based on hyperelliptic curve cryptosystem SA Ch, W Nasar, Q Javaid 2011 7th International Conference on Emerging Technologies, 1-4, 2011 | 32 | 2011 |
Signcryption schemes with forward secrecy based on hyperelliptic curve cryptosystem SA Ch, N Amin 8th International Conference on High-capacity Optical Networks and Emerging …, 2011 | 28 | 2011 |
Preventing black and gray hole attacks in AODV using optimal path routing and hash H Khattak, F Khurshid, N ul Amin 2013 10th Ieee International Conference On Networking, Sensing And Control …, 2013 | 27 | 2013 |
Public verifiable signcryption schemes with forward secrecy based on hyperelliptic curve cryptosystem S Ashraf Ch, Nizamuddin, M Sher Information Systems, Technology and Management: 6th International Conference …, 2012 | 27 | 2012 |
An authenticated key agreement with rekeying for secured body sensor networks based on hybrid cryptosystem NU Amin, M Asad, SA Chaudhry Proceedings of 2012 9th IEEE International Conference on Networking, Sensing …, 2012 | 23 | 2012 |
A hybrid approach for preventing Black and Gray hole attacks in MANET H Khattak Eighth International Conference on Digital Information Management (ICDIM …, 2013 | 21 | 2013 |
An efficient key agreement with rekeying for secured body sensor networks Z Mehmood, SA Ch, W Nasar, A Ghani 2012 Second International Conference on Digital Information Processing and …, 2012 | 21 | 2012 |
An improved identity-based generalized signcryption scheme for secure multi-access edge computing empowered flying ad hoc networks N Din, A Waheed, M Zareei, F Alanazi IEEE Access 9, 120704-120714, 2021 | 15 | 2021 |
Cryptanalysis and improvement of a proxy signcryption scheme in the standard computational model A Waheed, AI Umar, M Zareei, N Din, NU Amin, J Iqbal, Y Saeed, ... IEEE Access 8, 131188-131201, 2020 | 15 | 2020 |
Substitution box design based on chaotic maps and cuckoo search algorithm T Akhtar, N Din, J Uddin 2019 International conference on advanced communication technologies and …, 2019 | 14 | 2019 |
Blind signcryption scheme based on elliptic curves R Ullah, AI Umar, N ul Amin 2014 Conference on Information Assurance and Cyber Security (CIACS), 51-54, 2014 | 14 | 2014 |
Blind signcryption scheme based on hyper elliptic curves cryptosystem S Ullah, N Din Peer-to-Peer Networking and Applications 14 (2), 917-932, 2021 | 13 | 2021 |
An efficient and secure mobile phone voting system M Ullah, AI Umar, N ul Amin Eighth International Conference on Digital Information Management (ICDIM …, 2013 | 13 | 2013 |
Cryptanalysis of an authentication scheme using an identity based generalized signcryption A Waheed, AI Umar, N Din, NU Amin, S Abdullah, P Kumam Mathematics 7 (9), 782, 2019 | 12 | 2019 |
Novel blind signcryption scheme for E-voting system based on elliptic curves A Waheed, N Din, AI Umar, R Ullah, U Amin Mehran University Research Journal of Engineering & Technology 40 (2), 314-322, 2021 | 11 | 2021 |
Authenticated key agreement and cluster head selection for Wireless Body Area Networks J Iqbal, N ul Amin, AI Umar 2013 2nd national conference on information assurance (NCIA), 113-117, 2013 | 11 | 2013 |
Improved cryptanalysis of provable certificateless generalized signcryption A Waheed, J Iqbal, N Din, S Ul, A Iqbal, N Ul Int. J. Adv. Comput. Sci. Appl 10 (4), 1-7, 2019 | 10 | 2019 |
Secured symmetric key cryptographic algorithm for small amount of data AW Soomro, A Nizamudin, U Iqbal, A Noorul 3rd International Conference on Computer and Emerging Technologies (ICCET), 2013 | 10 | 2013 |