M
Mohammad Mazyad Hazzazi
Researcher at King Khalid University
Publications - 24
Citations - 161
Mohammad Mazyad Hazzazi is an academic researcher from King Khalid University. The author has contributed to research in topics: Encryption & Computer science. The author has an hindex of 2, co-authored 11 publications receiving 10 citations.
Papers
More filters
Journal ArticleDOI
Noise-Resistant Image Encryption Scheme for Medical Images in the Chaos and Wavelet Domain
TL;DR: The proposed algorithm can decrypt the plaintext image with little loss of information, but the content of the original image is visible, and the number of pixel change rate (NPCR) and unified average change intensity (UACI) for the proposed encryption scheme is higher than 99.4% and 33, respectively.
Journal ArticleDOI
Cryptanalysis of hybrid secure image encryption based on Julia set fractals and three-dimensional Lorenz chaotic map
TL;DR: A practical chosen-plaintext attack is performed which reveals that the cryptosystem depending on only multiplication and bitwise XOR operation can be effortlessly attacked.
Journal ArticleDOI
Cryptanalysis of Internet of Health Things Encryption Scheme Based on Chaotic Maps
Noor Munir,Majid Khan,Mohammad Mazyad Hazzazi,Amer Aijaedi,Abd Al Karim Haj Ismail,Adel R. Alharbi,Iqtadar Hussain +6 more
TL;DR: In this article, the authors reported security flaws in the recently offered encryption technique based on a chaotic map for Internet of Health Things (IoHT) security and proposed some improvements to enhance the security of the understudy cryptographic algorithm.
Journal ArticleDOI
A novel image encryption based on rossler map diffusion and particle swarm optimization generated highly non-linear substitution boxes
TL;DR: In this paper, an efficient methodology of creating highly non-linear cryptographic substitution boxes as an alternate to chaotic, or algebraic construction methods is introduced. But, the construction of the S-boxes is performed using particle swarm optimization (PSO).
Journal ArticleDOI
A Novel Scheme of Image Encryption Based on Elliptic Curves Isomorphism and Substitution Boxes
TL;DR: In this paper, an image encryption technique by using isomorphic elliptic curves which are proved to be effective against side-channel attacks and have efficient key size as compared to other public-key structures was proposed.