default search action
Mohammad Mazyad Hazzazi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j23]Adel R. Alharbi, Mohammad Mazyad Hazzazi, Sajjad Shaukat Jamal, Amer Aljaedi, Abdullah Aljuhni, Dalal J. Alanazi:
DCryp-Unit: Crypto Hardware Accelerator Unit Design for Elliptic Curve Point Multiplication. IEEE Access 12: 17823-17835 (2024) - [j22]Sajjad Shaukat Jamal, Zaid Bassfar, Ouafae Lahlou, Amer Aljaedi, Mohammad Mazyad Hazzazi:
Image Encryption Based on Elliptic Curve Points and Linear Fractional Transformation. IEEE Access 12: 53335-53347 (2024) - [j21]Amer Aljaedi, Furqan Aziz Qureshi, Mohammad Mazyad Hazzazi, Malik Imran, Zaid Bassfar, Sajjad Shaukat Jamal:
FPGA Implementation of Elliptic-Curve Point Multiplication Over GF(2233) Using Booth Polynomial Multiplier for Area-Sensitive Applications. IEEE Access 12: 72847-72859 (2024) - [j20]Ali Yahya Hummdi, Amer Aljaedi, Zaid Bassfar, Sajjad Shaukat Jamal, Mohammad Mazyad Hazzazi, Mujeeb Ur Rehman:
Unif-NTT: A Unified Hardware Design of Forward and Inverse NTT for PQC Algorithms. IEEE Access 12: 94793-94804 (2024) - [j19]Mohammad Mazyad Hazzazi, Muhammad Rashid, Sajjad Shaukat Jamal, Fahad Alblehai, Sameer Nooh, Mujeeb Ur Rehman:
A Compact 3-Stage Pipelined Hardware Accelerator for Point Multiplication of Binary Elliptic Curves Over GF(2233). IEEE Access 12: 162510-162521 (2024) - [j18]Mohammad Mazyad Hazzazi, Muhammad Nadeem, Muhammad Kamran, Ismail Naci Cangül, J. Akhter:
Holomorphism and Edge Labeling: An Inner Study of Latin Squares Associated with Antiautomorphic Inverse Property Moufang Quasigroups with Applications. Complex. 2024 (2024) - [j17]Sajjad Shaukat Jamal, Mohammad Mazyad Hazzazi, Muhammad Fahad Khan, Zaid Bassfar, Amer Aljaedi, Zain Ul Islam:
Region of interest-based medical image encryption technique based on chaotic S-boxes. Expert Syst. Appl. 238(Part E): 122030 (2024) - [j16]Mohammad Mazyad Hazzazi, Souad Ahmad Baowidan, Awais Yousaf, Muhammad Adeel:
An Innovative Algorithm Based on Chaotic Maps Amalgamated with Bit-Level Permutations for Robust S-Box Construction and Its Application in Medical Image Privacy. Symmetry 16(8): 1070 (2024) - 2023
- [j15]Mohammad Mazyad Hazzazi, Nadeem Iqbal, Atif Ikram:
Digital Images Security Technique Using Hénon and Piecewise Linear Chaotic Maps. IEEE Access 11: 106299-106314 (2023) - [j14]Mujeeb Ur Rehman, Arslan Shafique, Kashif Hesham Khan, Mohammad Mazyad Hazzazi:
Efficient and secure image encryption using key substitution process with discrete wavelet transform. J. King Saud Univ. Comput. Inf. Sci. 35(7): 101613 (2023) - [j13]Lal Said Khan, Majid Khan, Mohammad Mazyad Hazzazi, Sajjad Shaukat Jamal:
A novel combination of information confidentiality and data hiding mechanism. Multim. Tools Appl. 82(5): 6917-6941 (2023) - [j12]Hamza Khan, Mohammad Mazyad Hazzazi, Sajjad Shaukat Jamal, Iqtadar Hussain, Majid Khan:
New color image encryption technique based on three-dimensional logistic map and Grey wolf optimization based generated substitution boxes. Multim. Tools Appl. 82(5): 6943-6964 (2023) - [j11]Hamza Khan, Sajjad Shaukat Jamal, Mohammad Mazyad Hazzazi, Majid Khan, Iqtadar Hussain:
New image encryption scheme based on Arnold map and cuckoo search optimization algorithm. Multim. Tools Appl. 82(5): 7419-7441 (2023) - [j10]Mohammad Mazyad Hazzazi, Sasidhar Attuluri, Zaid Bassfar, Kireet Joshi:
A Novel Cipher-Based Data Encryption with Galois Field Theory. Sensors 23(6): 3287 (2023) - 2022
- [j9]Majid Khan, Lal Said Khan, Mohammad Mazyad Hazzazi, Sajjad Shaukat Jamal, Iqtadar Hussain:
Image encryption scheme for multi-focus images for visual sensors network. Multim. Tools Appl. 81(12): 16353-16370 (2022) - [i3]Muhammad Fahad Khan, Khalid Saleem, Tariq Shah, Mohammad Mazyad Hazzazi, Ismail Bahkali, Piyush Kumar Shukla:
Block Ciphers Substitution Box Generation Based on Natural Randomness in Underwater Acoustics and Knights Tour Chain. CoRR abs/2205.13593 (2022) - [i2]Muhammad Fahad Khan, Khalid Saleem, Mohammed Alotaibi, Mohammad Mazyad Hazzazi, Eid Rehman, Aaqif Afzaal Abbasi, Muhammad Asif Gondal:
Construction and Optimization of TRNG Based Substitution Boxes for Block Encryption Algorithms. CoRR abs/2206.09424 (2022) - [i1]Muhammad Fahad Khan, Khalid Saleem, Tariq Shah, Mohammad Mazyad Hazzazi, Ismail Bahkali, Piyush Kumar Shukla:
Block Cipher's Substitution Box Generation Based on Natural Randomness in Underwater Acoustics and Knight's Tour Chain. IACR Cryptol. ePrint Arch. 2022: 787 (2022) - 2021
- [j8]Arslan Shafique, Jameel Ahmed, Mujeeb Ur Rehman, Mohammad Mazyad Hazzazi:
Noise-Resistant Image Encryption Scheme for Medical Images in the Chaos and Wavelet Domain. IEEE Access 9: 59108-59130 (2021) - [j7]Ijaz Khalid, Sajjad Shaukat Jamal, Tariq Shah, Dawood Shah, Mohammad Mazyad Hazzazi:
A Novel Scheme of Image Encryption Based on Elliptic Curves Isomorphism and Substitution Boxes. IEEE Access 9: 77798-77810 (2021) - [j6]Noor Munir, Majid Khan, Mohammad Mazyad Hazzazi, Amer Aljaedi, Abd Al Karim Haj Ismail, Adel R. Alharbi, Iqtadar Hussain:
Cryptanalysis of Internet of Health Things Encryption Scheme Based on Chaotic Maps. IEEE Access 9: 105678-105685 (2021) - [j5]Dawood Shah, Tariq Shah, Mohammad Mazyad Hazzazi, Muhammad Imran Haider, Amer Aljaedi, Iqtadar Hussain:
An Efficient Audio Encryption Scheme Based on Finite Fields. IEEE Access 9: 144385-144394 (2021) - [j4]Arslan Shafique, Mohammad Mazyad Hazzazi, Adel R. Alharbi, Iqtadar Hussain:
Integration of Spatial and Frequency Domain Encryption for Digital Images. IEEE Access 9: 149943-149954 (2021) - [j3]Muhammad Ramzan, Tariq Shah, Mohammad Mazyad Hazzazi, Amer Aljaedi, Adel R. Alharbi:
Construction of S-Boxes Using Different Maps Over Elliptic Curves for Image Encryption. IEEE Access 9: 157106-157123 (2021) - [j2]Majid Khan, Sajjad Shaukat Jamal, Mohammad Mazyad Hazzazi, Khawaja Muhammad Ali, Iqtadar Hussain, Muhammad Asif:
An efficient image encryption scheme based on double affine substitution box and chaotic system. Integr. 81: 108-122 (2021) - [j1]Noor Munir, Majid Khan, Sajjad Shaukat Jamal, Mohammad Mazyad Hazzazi, Iqtadar Hussain:
Cryptanalysis of hybrid secure image encryption based on Julia set fractals and three-dimensional Lorenz chaotic map. Math. Comput. Simul. 190: 826-836 (2021)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint