Follow
Dr. Nizamud Din
Dr. Nizamud Din
Assistant Professor of Computer Science, University of Chitral
Verified email at uoch.edu.pk - Homepage
Title
Cited by
Cited by
Year
An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography
SA Ch, N Uddin, M Sher, A Ghani, H Naqvi, A Irshad
Multimedia Tools and Applications 74, 1711-1723, 2015
592015
Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey
S Ullah, J Zheng, N Din, MT Hussain, F Ullah, M Yousaf
Computer Science Review 47, 100530, 2023
512023
Efficient signcryption schemes based on hyperelliptic curve cryptosystem
SA Ch, W Nasar, Q Javaid
2011 7th International Conference on Emerging Technologies, 1-4, 2011
322011
Preventing black and gray hole attacks in AODV using optimal path routing and hash
H Khattak, F Khurshid, N ul Amin
2013 10th Ieee International Conference On Networking, Sensing And Control …, 2013
282013
Signcryption schemes with forward secrecy based on hyperelliptic curve cryptosystem
SA Ch, N Amin
8th International Conference on High-capacity Optical Networks and Emerging …, 2011
282011
Public verifiable signcryption schemes with forward secrecy based on hyperelliptic curve cryptosystem
S Ashraf Ch, Nizamuddin, M Sher
Information Systems, Technology and Management: 6th International Conference …, 2012
252012
An authenticated key agreement with rekeying for secured body sensor networks based on hybrid cryptosystem
NU Amin, M Asad, SA Chaudhry
Proceedings of 2012 9th IEEE International Conference on Networking, Sensing …, 2012
242012
A hybrid approach for preventing Black and Gray hole attacks in MANET
H Khattak
Eighth International Conference on Digital Information Management (ICDIM …, 2013
222013
An efficient key agreement with rekeying for secured body sensor networks
Z Mehmood, SA Ch, W Nasar, A Ghani
2012 Second International Conference on Digital Information Processing and …, 2012
212012
Cryptanalysis and improvement of a proxy signcryption scheme in the standard computational model
A Waheed, AI Umar, M Zareei, N Din, NU Amin, J Iqbal, Y Saeed, ...
IEEE Access 8, 131188-131201, 2020
162020
Substitution box design based on chaotic maps and cuckoo search algorithm
T Akhtar, N Din, J Uddin
2019 International conference on advanced communication technologies and …, 2019
142019
Blind signcryption scheme based on elliptic curves
R Ullah, AI Umar, N ul Amin
2014 Conference on Information Assurance and Cyber Security (CIACS), 51-54, 2014
142014
An efficient and secure mobile phone voting system
M Ullah, AI Umar, N ul Amin
Eighth International Conference on Digital Information Management (ICDIM …, 2013
142013
An improved identity-based generalized signcryption scheme for secure multi-access edge computing empowered flying ad hoc networks
N Din, A Waheed, M Zareei, F Alanazi
IEEE Access 9, 120704-120714, 2021
122021
Blind signcryption scheme based on hyper elliptic curves cryptosystem
S Ullah, N Din
Peer-to-Peer Networking and Applications 14 (2), 917-932, 2021
122021
Cryptanalysis of an authentication scheme using an identity based generalized signcryption
A Waheed, AI Umar, N Din, NU Amin, S Abdullah, P Kumam
Mathematics 7 (9), 782, 2019
122019
Authenticated key agreement and cluster head selection for Wireless Body Area Networks
J Iqbal, N ul Amin, AI Umar
2013 2nd national conference on information assurance (NCIA), 113-117, 2013
102013
Secured symmetric key cryptographic algorithm for small amount of data
AW Soomro, A Nizamudin, U Iqbal, A Noorul
3rd International Conference on Computer and Emerging Technologies (ICCET), 2013
102013
Novel blind signcryption scheme for e-voting system based on elliptic curves
A Waheed, N Din, AI Umar, R Ullah, U Amin
Mehran University Research Journal of Engineering & Technology 40 (2), 314-322, 2021
92021
Improved cryptanalysis of provable certificateless generalized signcryption
A Waheed, J Iqbal, N Din, S Ul, A Iqbal, N Ul
Int. J. Adv. Comput. Sci. Appl 10 (4), 1-7, 2019
92019
The system can't perform the operation now. Try again later.
Articles 1–20