Follow
Iftekhar Salam
Iftekhar Salam
Xiamen University Malaysia
Verified email at xmu.edu.my
Title
Cited by
Cited by
Year
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage
MI Salam, WC Yau, JJ Chin, SH Heng, HC Ling, RCW Phan, GS Poh, ...
Human-centric Computing and Information Sciences 5 (1), 1-16, 2015
522015
Investigating Cube Attacks on the Authenticated Encryption Stream Cipher ACORN
MI Salam, H Bartlett, E Dawson, J Pieprzyk, L Simpson, KKH Wong
International Conference on Applications and Techniques in Information†…, 2016
332016
An efficient key pre-distribution scheme for wireless sensor network using public key cryptography
MI Salam, P Kumar, HJ Lee
The 6th International Conference on Networked Computing and Advanced†…, 2010
232010
Finding state collisions in the authenticated encryption stream cipher ACORN
MI Salam, KKH Wong, H Bartlett, L Simpson, E Dawson, J Pieprzyk
Proceedings of the Australasian Computer Science Week Multiconference, 1-10, 2016
202016
Investigating cube attacks on the authenticated encryption stream cipher MORUS
I Salam, L Simpson, H Bartlett, E Dawson, J Pieprzyk, KKH Wong
2017 IEEE Trustcom/BigDataSE/ICESS, 961-966, 2017
102017
Fault Attacks on the Authenticated Encryption Stream Cipher MORUS
I Salam, L Simpson, H Bartlett, E Dawson, K Koon-Ho Wong
Cryptography 2 (1), 4, 2018
62018
Random Differential Fault Attacks on the Lightweight Authenticated Encryption Stream Cipher Grain-128AEAD
I Salam, TH Ooi, L Xue, WC Yau, J Pieprzyk, RCW Phan
IEEE Access 9, 72568-72586, 2021
52021
Random fault attacks on a class of stream ciphers
H Bartlett, E Dawson, H Quhar al Mahri, MI Salam, L Simpson, KKH Wong
Security and Communication Networks, 2019
42019
Fault attacks on Tiaoxin-346
I Salam, HQA Mahri, L Simpson, H Bartlett, E Dawson, KKH Wong
Proceedings of the Australasian Computer Science Week Multiconference, 1-9, 2018
42018
Cube Attacks on Round-Reduced TinyJAMBU
WL Teng, I Salam, WC Yau, J Pieprzyk, RCW Phan
32021
Algebraic Analysis of Shrinking Generator
MI Salam, HJ Lee
Int. Journal of Math. Analysis 6 (50), 2493-2499, 2012
22012
Addressing secure data routing scheme for heterogeneous sensor networks
P Kumar, M Iftekhar Salam, SG Lee, HJ Lee
Networked Computing and Advanced Information Management (NCM), 2010 Sixth†…, 2010
22010
Dental Caries Detection Using Score-Based Multi-Input Deep Convolutional Neural Network
A Imak, A Celebi, K Siddique, M Turkoglu, A Sengur, I Salam
IEEE Access 10, 18320-18329, 2022
12022
Blockchain based Contact Tracing: A Solution using Bluetooth and Sound Waves for Proximity Detection
ZX Hee, I Salam
Cryptology ePrint Archive, 2022
12022
Adaptive Proof of Driving Consensus for Intelligent Vehicle Communication
M Singh, I Salam
Information Security of Intelligent Vehicles Communication, 229-237, 2021
12021
Differential Fault Based Key Recovery Attacks on TRIAD
I Salam, KY Law, L Xue, WC Yau
International Conference on Information Security and Cryptology, 273-287, 2020
12020
Analysis of authenticated encryption based on stream ciphers
MI Salam
Queensland University of Technology, 2018
12018
Algebraic countermeasure to enhance the improved summation generator with 2-bit memory
I Salam, HJ Lee
Journal of Networks 8 (5), 977-985, 2013
12013
On the algebraic attack against summation type keystream generators
MI Salam, HJ Lee
International Journal of Information and Computer Security 5 (2), 132-149, 2012
12012
A review on the PKC-based security architecture for wireless sensor networks
MI Salam, HJ Lee
5th International Conference on Computer Sciences and Convergence†…, 2010
12010
The system can't perform the operation now. Try again later.
Articles 1–20