Naveed Ahmed Azam

ORCID: 0000-0002-7941-3419
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Computational Drug Discovery Methods
  • Chaos-based Image/Signal Encryption
  • Cryptographic Implementations and Security
  • Coding theory and cryptography
  • Cryptography and Residue Arithmetic
  • Machine Learning in Materials Science
  • Advanced Steganography and Watermarking Techniques
  • Process Optimization and Integration
  • Protein Structure and Dynamics
  • Cholinesterase and Neurodegenerative Diseases
  • Chemistry and Chemical Engineering
  • Advanced Graph Theory Research
  • Analytical Chemistry and Chromatography
  • Fault Detection and Control Systems
  • Industrial Vision Systems and Defect Detection
  • Wireless Communication Networks Research
  • Chemical Synthesis and Analysis
  • Data Management and Algorithms
  • Machine Fault Diagnosis Techniques
  • Plant biochemistry and biosynthesis
  • Cognitive Radio Networks and Spectrum Sensing
  • Blind Source Separation Techniques
  • Graph Theory and Algorithms
  • Graph Labeling and Dimension Problems
  • semigroups and automata theory

Quaid-i-Azam University
2014-2025

Kyoto University
2018-2024

Ghulam Ishaq Khan Institute of Engineering Sciences and Technology
2014-2017

Image encryption based on elliptic curves (ECs) is emerging as a new trend in cryptography because it provides high security with relatively smaller key size when compared well-known cryptosystems. Recently, has been shown that the cryptosystems ECs over finite rings may provide better they require computational cost for solving factorization problem and discrete logarithm problem. Motivated by this fact, we proposed novel image scheme rings. There are three main steps our scheme, where,...

10.3390/e24050571 article EN cc-by Entropy 2022-04-19

Elliptic curves (ECs) are considered as one of the highly secure structures against modern computational attacks. In this paper, we present an efficient method based on ordered isomorphic EC for generation a large number distinct, mutually uncorrelated, and cryptographically strong injective S-boxes. The proposed scheme is characterized in terms time complexity distinct Furthermore, rigorous analysis comparison newly developed with some existing methods conducted. Experimental results reveal...

10.1155/2018/3421725 article EN cc-by Security and Communication Networks 2018-12-02

Recently, highly dynamic substitution box (S-box) generators are widely used in cryptosystems to improve the security against modern computational attacks. However, generating S-boxes is computationally costly, and frequently them slows down encryption process hence limits throughput. This fact necessitates developing new S-box that can provide optimal with minimum computation cost. We propose a novel generator based on deterministic algorithm over elliptic curves generate secure low...

10.1016/j.jksuci.2022.11.012 article EN cc-by-nc-nd Journal of King Saud University - Computer and Information Sciences 2022-12-01

Compound inference models are crucial for discovering novel drugs in bioinformatics and chemo-informatics. These rely heavily on useful descriptors of chemical compounds that effectively capture important information about the underlying constructing accurate prediction functions. In this article, we introduce quadratic descriptors, products two graph-theoretic to enhance learning performance a two-layered compound model. A mixed-integer linear programming formulation is designed approximate...

10.3389/fgene.2024.1483490 article EN cc-by Frontiers in Genetics 2025-01-29

The enumeration of chemical graphs is an important topic in cheminformatics and bioinformatics, particularly the discovery novel drugs. These are typically either tree-like multigraphs or composed connected to a core structure. In both cases, components play significant role determining properties activities compounds. This paper introduces method based on dynamic programming efficiently count with given number $n$ vertices $\Delta$ multiple edges. idea our consider as rooted by selecting...

10.48550/arxiv.2502.05529 preprint EN arXiv (Cornell University) 2025-02-08

Abstract Aqueous solubility (AS) is a key physiochemical property that plays crucial role in drug discovery and material design. We report novel unified approach to predict infer chemical compounds with the desired AS based on simple deterministic graph-theoretic descriptors, multiple linear regression (MLR), mixed integer programming (MILP). Selected descriptors forward stepwise procedure enabled simplest model, MLR, achieve significantly good prediction accuracy compared existing...

10.1186/s13321-025-00966-w article EN cc-by Journal of Cheminformatics 2025-03-26

Developing a substitution-box (S-box) generator that can efficiently generate highly dynamic S-box with good cryptographic properties is hot topic in the field of cryptography. Recently, elliptic curve (EC)-based generators have shown promising results. However, these use large ECs to S-boxes and thus may not be suitable for lightweight cryptography, where computational power limited. The aim this paper develop implement such an used cryptography perform better terms computation time...

10.1155/2021/3367521 article EN cc-by Security and Communication Networks 2021-12-23

This paper presents a novel image encryption technique based on multiple right translated AES Gray S-boxes (RTSs) and phase embedding technique. First of all, secret is diffused with fuzzily selected RTS. The fuzzy selection RTS variable depends upon pixels the image. Then two random masks are used to enhance confusion in spatial frequency domains These generated by applying different RTSs host decryption process proposed cryptosystem needs for generation masks. It therefore, necessary,...

10.1155/2017/5790189 article EN cc-by Security and Communication Networks 2017-01-01

Abstract This article deals with an algorithm for the generation of impregnable substitution boxes (S‐box). The proposed scheme involves application right translation and Gray codes over original Advanced Encryption Standard (AES) S‐box. Regular representation Galois field GF (2 8 ) is used to produce translational effect in AES translated S‐box then subjected enhancement their algebraic complexity. results 256 different cryptographically strong S‐boxes. Several tests such as non‐linearity,...

10.1002/sec.1110 article EN Security and Communication Networks 2014-09-11

Abstract Analysis of chemical graphs is becoming a major research topic in computational molecular biology due to its potential applications drug design. One the approaches such study inverse quantitative structure activity/property relationship (inverse QSAR/QSPR) analysis, which infer structures from given activities/properties. Recently, novel two-phase framework has been proposed for QSAR/QSPR, where first phase an artificial neural network (ANN) used construct prediction function. In...

10.1186/s13015-021-00197-2 article EN cc-by Algorithms for Molecular Biology 2021-08-14

A novel framework for inverse quantitative structure–activity relationships (inverse QSAR) has recently been proposed and developed using both artificial neural networks mixed integer linear programming. However, classes of chemical graphs treated by the are limited. In order to deal with an arbitrary graph in framework, we introduce a new model, called two-layered develop corresponding method. this each is regarded as two parts: exterior interior. The consists maximal acyclic induced...

10.3390/ijms22062847 article EN International Journal of Molecular Sciences 2021-03-11

The demand for data security schemes has increased with the significant advancement in field of computation and communication networks. We propose a novel three-step text encryption scheme that provable against attacks such as key attack statistical attack. proposed is based on Pell sequence elliptic curves, where at first step plain diffused to get meaningless by applying cyclic shift symbol set. In second step, we hide elements from attackers. For this purpose, use sequence, weight...

10.32604/cmc.2022.023685 article EN Computers, materials & continua/Computers, materials & continua (Print) 2022-01-01
Coming Soon ...