Follow
Iftekhar Salam
Iftekhar Salam
Xiamen University Malaysia
Verified email at xmu.edu.my
Title
Cited by
Cited by
Year
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage
MI Salam, WC Yau, JJ Chin, SH Heng, HC Ling, RCW Phan, GS Poh, ...
Human-centric Computing and Information Sciences 5, 1-16, 2015
592015
Investigating cube attacks on the authenticated encryption stream cipher ACORN
MI Salam, H Bartlett, E Dawson, J Pieprzyk, L Simpson, KKH Wong
International Conference on Applications and Techniques in Information†…, 2016
382016
Dental Caries Detection Using Score-Based Multi-Input Deep Convolutional Neural Network
A Imak, A Celebi, K Siddique, M Turkoglu, A Sengur, I Salam
IEEE Access 10, 18320-18329, 2022
282022
An efficient key pre-distribution scheme for wireless sensor network using public key cryptography
MI Salam, P Kumar, HJ Lee
The 6th International Conference on Networked Computing and Advanced†…, 2010
242010
Finding state collisions in the authenticated encryption stream cipher ACORN
MI Salam, KKH Wong, H Bartlett, L Simpson, E Dawson, J Pieprzyk
Proceedings of the Australasian Computer Science Week Multiconference, 1-10, 2016
202016
Cube Attacks on Round-Reduced TinyJAMBU
WL Teng, I Salam, WC Yau, J Pieprzyk, RCW Phan
Scientific Reports 12, 2022
142022
Blockchain-based healthcare management system with two-side verifiability
TL Tan, I Salam, M Singh
PloS one 17 (4), e0266916, 2022
122022
A Review of the NIST Lightweight Cryptography Finalists and Their Fault Analyses
H Madushan, I Salam, J Alawatugoda
Electronics 11 (24), 4199, 2022
122022
Investigating cube attacks on the authenticated encryption stream cipher MORUS
I Salam, L Simpson, H Bartlett, E Dawson, J Pieprzyk, KKH Wong
2017 IEEE Trustcom/BigDataSE/ICESS, 961-966, 2017
122017
Evaluation of Machine Learning Algorithms in Network-Based Intrusion Detection System
TH Chua, I Salam
arXiv preprint arXiv:2203.05232, 2022
102022
Random Differential Fault Attacks on the Lightweight Authenticated Encryption Stream Cipher Grain-128AEAD
I Salam, TH Ooi, L Xue, WC Yau, J Pieprzyk, RCW Phan
IEEE Access 9, 72568-72586, 2021
102021
Random fault attacks on a class of stream ciphers
H Bartlett, E Dawson, H Quhar al Mahri, MI Salam, L Simpson, KKH Wong
Security and Communication Networks, 2019
72019
Fault attacks on Tiaoxin-346
I Salam, HQA Mahri, L Simpson, H Bartlett, E Dawson, KKH Wong
Proceedings of the Australasian Computer Science Week Multiconference, 1-9, 2018
72018
Fault Attacks on the Authenticated Encryption Stream Cipher MORUS
I Salam, L Simpson, H Bartlett, E Dawson, K Koon-Ho Wong
Cryptography 2 (1), 4, 2018
62018
Investigating Deep Learning Approaches on the Security Analysis of Cryptographic Algorithms
BY Chong, I Salam
Cryptography 5 (4), 30, 2021
42021
Blockchain based Contact Tracing: A Solution using Bluetooth and Sound Waves for Proximity Detection
ZX Hee, I Salam
Cryptology ePrint Archive, 2022
32022
Differential fault based key recovery attacks on TRIAD
I Salam, KY Law, L Xue, WC Yau
International Conference on Information Security and Cryptology, 273-287, 2020
32020
Microswitch in 0.13 μm CMOS Process for IoT Device Transceivers
MAS Bhuiyan, KNB Minhad, KJA Ooi, MI Salam, MH Miraz, MBI Reaz
2020 International Conference on Computing, Networking, Telecommunications†…, 2020
22020
Algebraic Analysis of Shrinking Generator
MI Salam, HJ Lee
Int. Journal of Math. Analysis 6 (50), 2493-2499, 2012
22012
Addressing secure data routing scheme for heterogeneous sensor networks
P Kumar, M Iftekhar Salam, SG Lee, HJ Lee
Networked Computing and Advanced Information Management (NCM), 2010 Sixth†…, 2010
22010
The system can't perform the operation now. Try again later.
Articles 1–20