Iftekhar Salam
Iftekhar Salam
Xiamen University Malaysia
Vahvistettu sähköpostiosoite verkkotunnuksessa xmu.edu.my
Nimike
Viittaukset
Viittaukset
Vuosi
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage
MI Salam, WC Yau, JJ Chin, SH Heng, HC Ling, RCW Phan, GS Poh, ...
Human-centric Computing and Information Sciences 5 (1), 1-16, 2015
472015
Investigating Cube Attacks on the Authenticated Encryption Stream Cipher ACORN
MI Salam, H Bartlett, E Dawson, J Pieprzyk, L Simpson, KKH Wong
International Conference on Applications and Techniques in Information …, 2016
262016
An efficient key pre-distribution scheme for wireless sensor network using public key cryptography
MI Salam, P Kumar, HJ Lee
The 6th International Conference on Networked Computing and Advanced …, 2010
222010
Finding state collisions in the authenticated encryption stream cipher ACORN
MI Salam, KKH Wong, H Bartlett, L Simpson, E Dawson, J Pieprzyk
Proceedings of the Australasian Computer Science Week Multiconference, 1-10, 2016
202016
Investigating cube attacks on the authenticated encryption stream cipher MORUS
I Salam, L Simpson, H Bartlett, E Dawson, J Pieprzyk, KKH Wong
2017 IEEE Trustcom/BigDataSE/ICESS, 961-966, 2017
72017
Fault Attacks on the Authenticated Encryption Stream Cipher MORUS
I Salam, L Simpson, H Bartlett, E Dawson, K Koon-Ho Wong
Cryptography 2 (1), 4, 2018
42018
Fault attacks on Tiaoxin-346
I Salam, HQA Mahri, L Simpson, H Bartlett, E Dawson, KKH Wong
Proceedings of the Australasian Computer Science Week Multiconference, 1-9, 2018
42018
Algebraic Analysis of Shrinking Generator
MI Salam, HJ Lee
Int. Journal of Math. Analysis 6 (50), 2493-2499, 2012
22012
Addressing secure data routing scheme for heterogeneous sensor networks
P Kumar, M Iftekhar Salam, SG Lee, HJ Lee
Networked Computing and Advanced Information Management (NCM), 2010 Sixth …, 2010
22010
Differential Fault Based Key Recovery Attacks on TRIAD
I Salam, KY Law, L Xue, WC Yau
International Conference on Information Security and Cryptology, 273-287, 2020
12020
Random fault attacks on a class of stream ciphers
H Bartlett, E Dawson, H Quhar al Mahri, MI Salam, L Simpson, KKH Wong
Security and Communication Networks, 2019
12019
Analysis of authenticated encryption based on stream ciphers
MI Salam
Queensland University of Technology, 2018
12018
Algebraic countermeasure to enhance the improved summation generator with 2-bit memory
I Salam, HJ Lee
Journal of Networks 8 (5), 977-985, 2013
12013
On the algebraic attack against summation type keystream generators
MI Salam, HJ Lee
International Journal of Information and Computer Security 5 (2), 132-149, 2012
12012
A review on the PKC-based security architecture for wireless sensor networks
MI Salam, HJ Lee
5th International Conference on Computer Sciences and Convergence …, 2010
12010
Random Differential Fault Attacks on the Lightweight Authenticated Encryption Stream Cipher Grain-128AEAD
I Salam, TH Ooi, L Xue, WC Yau, J Pieprzyk, RCW Phan
IEEE Access, 2021
2021
Secure and Efficient Key Management Scheme for Wireless Mesh Network
MI Salam, M Singh, SG Lee, HJ Lee
Proceedings of the Korea Information Processing Society Conference, 844-847, 2011
2011
Performance analysis of PingPong-128 keystream generator for wireless sensor networks
P Kumar, MI Salam, AG Reza, HT Lim, HJ Lee
5th International Conference on Computer Sciences and Convergence …, 2010
2010
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–18