Follow
Iftekhar Salam
Iftekhar Salam
Xiamen University Malaysia
Verified email at xmu.edu.my
Title
Cited by
Cited by
Year
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage
MI Salam, WC Yau, JJ Chin, SH Heng, HC Ling, RCW Phan, GS Poh, ...
Human-centric Computing and Information Sciences 5, 1-16, 2015
652015
Dental Caries Detection Using Score-Based Multi-Input Deep Convolutional Neural Network
A Imak, A Celebi, K Siddique, M Turkoglu, A Sengur, I Salam
IEEE Access 10, 18320-18329, 2022
362022
Investigating cube attacks on the authenticated encryption stream cipher ACORN
MI Salam, H Bartlett, E Dawson, J Pieprzyk, L Simpson, KKH Wong
International Conference on Applications and Techniques in Information …, 2016
342016
An efficient key pre-distribution scheme for wireless sensor network using public key cryptography
MI Salam, P Kumar, HJ Lee
The 6th International Conference on Networked Computing and Advanced …, 2010
242010
Finding state collisions in the authenticated encryption stream cipher ACORN
MI Salam, KKH Wong, H Bartlett, L Simpson, E Dawson, J Pieprzyk
Proceedings of the Australasian Computer Science Week Multiconference, 1-10, 2016
212016
Cube Attacks on Round-Reduced TinyJAMBU
WL Teng, I Salam, WC Yau, J Pieprzyk, RCW Phan
Scientific Reports 12, 2022
162022
Blockchain-based healthcare management system with two-side verifiability
TL Tan, I Salam, M Singh
PloS one 17 (4), e0266916, 2022
152022
Investigating cube attacks on the authenticated encryption stream cipher MORUS
I Salam, L Simpson, H Bartlett, E Dawson, J Pieprzyk, KKH Wong
2017 IEEE Trustcom/BigDataSE/ICESS, 961-966, 2017
142017
Evaluation of Machine Learning Algorithms in Network-Based Intrusion Detection System
TH Chua, I Salam
arXiv preprint arXiv:2203.05232, 2022
132022
A Review of the NIST Lightweight Cryptography Finalists and Their Fault Analyses
H Madushan, I Salam, J Alawatugoda
Electronics 11 (24), 4199, 2022
132022
Random Differential Fault Attacks on the Lightweight Authenticated Encryption Stream Cipher Grain-128AEAD
I Salam, TH Ooi, L Xue, WC Yau, J Pieprzyk, RCW Phan
IEEE Access 9, 72568-72586, 2021
132021
Random fault attacks on a class of stream ciphers
H Bartlett, E Dawson, H Quhar al Mahri, MI Salam, L Simpson, KKH Wong
Security and Communication Networks, 2019
82019
Fault attacks on Tiaoxin-346
I Salam, HQA Mahri, L Simpson, H Bartlett, E Dawson, KKH Wong
Proceedings of the Australasian Computer Science Week Multiconference, 1-9, 2018
82018
Investigating Deep Learning Approaches on the Security Analysis of Cryptographic Algorithms
BY Chong, I Salam
Cryptography 5 (4), 30, 2021
72021
Fault Attacks on the Authenticated Encryption Stream Cipher MORUS
I Salam, L Simpson, H Bartlett, E Dawson, K Koon-Ho Wong
Cryptography 2 (1), 4, 2018
62018
Blockchain based Contact Tracing: A Solution using Bluetooth and Sound Waves for Proximity Detection
ZX Hee, I Salam
Cryptology ePrint Archive, 2022
52022
Impact of Fuzziness for Skin Lesion Classification with Transformer-Based Model
I Yasmin, S Sultana, SJ Begum, MJA Patwary, TA Almohamad, I Salam
2023 International Conference on Computing, Electronics & Communications …, 2023
32023
Differential fault based key recovery attacks on TRIAD
I Salam, KY Law, L Xue, WC Yau
International Conference on Information Security and Cryptology, 273-287, 2020
32020
Algebraic Analysis of Shrinking Generator
MI Salam, HJ Lee
Int. Journal of Math. Analysis 6 (50), 2493-2499, 2012
32012
Blockchain-Based Multi-keyword Search on Encrypted COVID-19 Contact Tracing Data
ZY Ng, I Salam
International Conference on Information Security Practice and Experience, 75-92, 2022
22022
The system can't perform the operation now. Try again later.
Articles 1–20