Muhammad Saqib Niaz

Learn More
One of the problems associated with outsourcing data to cloud service providers is the data integrity of outsourced data. In this paper we present data integrity techniques for the outsourced data. Data integrity encompasses the completeness, correctness and freshness of the data. This paper focuses on the Merkle Hash Tree based data integrity techniques.(More)
A key schedule is an algorithm that expands a relatively short master key to a relatively long key for later use in an encryption/decryption algorithm. In contrast to the serious efforts applied to algorithm design, the aspect of key schedules for block ciphers has received comparatively little attention. This is despite to the fact that published block(More)
  • 1