- Computational Drug Discovery Methods
- Chaos-based Image/Signal Encryption
- Cryptographic Implementations and Security
- Coding theory and cryptography
- Cryptography and Residue Arithmetic
- Machine Learning in Materials Science
- Advanced Steganography and Watermarking Techniques
- Process Optimization and Integration
- Protein Structure and Dynamics
- Cholinesterase and Neurodegenerative Diseases
- Chemistry and Chemical Engineering
- Advanced Graph Theory Research
- Analytical Chemistry and Chromatography
- Fault Detection and Control Systems
- Industrial Vision Systems and Defect Detection
- Wireless Communication Networks Research
- Chemical Synthesis and Analysis
- Data Management and Algorithms
- Machine Fault Diagnosis Techniques
- Plant biochemistry and biosynthesis
- Cognitive Radio Networks and Spectrum Sensing
- Blind Source Separation Techniques
- Graph Theory and Algorithms
- Graph Labeling and Dimension Problems
- semigroups and automata theory
Quaid-i-Azam University
2014-2025
Kyoto University
2018-2024
Ghulam Ishaq Khan Institute of Engineering Sciences and Technology
2014-2017
Image encryption based on elliptic curves (ECs) is emerging as a new trend in cryptography because it provides high security with relatively smaller key size when compared well-known cryptosystems. Recently, has been shown that the cryptosystems ECs over finite rings may provide better they require computational cost for solving factorization problem and discrete logarithm problem. Motivated by this fact, we proposed novel image scheme rings. There are three main steps our scheme, where,...
Elliptic curves (ECs) are considered as one of the highly secure structures against modern computational attacks. In this paper, we present an efficient method based on ordered isomorphic EC for generation a large number distinct, mutually uncorrelated, and cryptographically strong injective S-boxes. The proposed scheme is characterized in terms time complexity distinct Furthermore, rigorous analysis comparison newly developed with some existing methods conducted. Experimental results reveal...
Recently, highly dynamic substitution box (S-box) generators are widely used in cryptosystems to improve the security against modern computational attacks. However, generating S-boxes is computationally costly, and frequently them slows down encryption process hence limits throughput. This fact necessitates developing new S-box that can provide optimal with minimum computation cost. We propose a novel generator based on deterministic algorithm over elliptic curves generate secure low...
Compound inference models are crucial for discovering novel drugs in bioinformatics and chemo-informatics. These rely heavily on useful descriptors of chemical compounds that effectively capture important information about the underlying constructing accurate prediction functions. In this article, we introduce quadratic descriptors, products two graph-theoretic to enhance learning performance a two-layered compound model. A mixed-integer linear programming formulation is designed approximate...
The enumeration of chemical graphs is an important topic in cheminformatics and bioinformatics, particularly the discovery novel drugs. These are typically either tree-like multigraphs or composed connected to a core structure. In both cases, components play significant role determining properties activities compounds. This paper introduces method based on dynamic programming efficiently count with given number $n$ vertices $\Delta$ multiple edges. idea our consider as rooted by selecting...
Abstract Aqueous solubility (AS) is a key physiochemical property that plays crucial role in drug discovery and material design. We report novel unified approach to predict infer chemical compounds with the desired AS based on simple deterministic graph-theoretic descriptors, multiple linear regression (MLR), mixed integer programming (MILP). Selected descriptors forward stepwise procedure enabled simplest model, MLR, achieve significantly good prediction accuracy compared existing...
Developing a substitution-box (S-box) generator that can efficiently generate highly dynamic S-box with good cryptographic properties is hot topic in the field of cryptography. Recently, elliptic curve (EC)-based generators have shown promising results. However, these use large ECs to S-boxes and thus may not be suitable for lightweight cryptography, where computational power limited. The aim this paper develop implement such an used cryptography perform better terms computation time...
This paper presents a novel image encryption technique based on multiple right translated AES Gray S-boxes (RTSs) and phase embedding technique. First of all, secret is diffused with fuzzily selected RTS. The fuzzy selection RTS variable depends upon pixels the image. Then two random masks are used to enhance confusion in spatial frequency domains These generated by applying different RTSs host decryption process proposed cryptosystem needs for generation masks. It therefore, necessary,...
Abstract This article deals with an algorithm for the generation of impregnable substitution boxes (S‐box). The proposed scheme involves application right translation and Gray codes over original Advanced Encryption Standard (AES) S‐box. Regular representation Galois field GF (2 8 ) is used to produce translational effect in AES translated S‐box then subjected enhancement their algebraic complexity. results 256 different cryptographically strong S‐boxes. Several tests such as non‐linearity,...
Abstract Analysis of chemical graphs is becoming a major research topic in computational molecular biology due to its potential applications drug design. One the approaches such study inverse quantitative structure activity/property relationship (inverse QSAR/QSPR) analysis, which infer structures from given activities/properties. Recently, novel two-phase framework has been proposed for QSAR/QSPR, where first phase an artificial neural network (ANN) used construct prediction function. In...
A novel framework for inverse quantitative structure–activity relationships (inverse QSAR) has recently been proposed and developed using both artificial neural networks mixed integer linear programming. However, classes of chemical graphs treated by the are limited. In order to deal with an arbitrary graph in framework, we introduce a new model, called two-layered develop corresponding method. this each is regarded as two parts: exterior interior. The consists maximal acyclic induced...
The demand for data security schemes has increased with the significant advancement in field of computation and communication networks. We propose a novel three-step text encryption scheme that provable against attacks such as key attack statistical attack. proposed is based on Pell sequence elliptic curves, where at first step plain diffused to get meaningless by applying cyclic shift symbol set. In second step, we hide elements from attackers. For this purpose, use sequence, weight...