Iftekhar Salam
Iftekhar Salam
Xiamen University Malaysia
Verified email at xmu.edu.my
Title
Cited by
Cited by
Year
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage
MI Salam, WC Yau, JJ Chin, SH Heng, HC Ling, RCW Phan, GS Poh, ...
Human-centric Computing and Information Sciences 5 (1), 19, 2015
422015
Investigating Cube Attacks on the Authenticated Encryption Stream Cipher ACORN
MI Salam, H Bartlett, E Dawson, J Pieprzyk, L Simpson, KKH Wong
International Conference on Applications and Techniques in Information†…, 2016
252016
An efficient key pre-distribution scheme for wireless sensor network using public key cryptography
MI Salam, P Kumar, HJ Lee
The 6th International Conference on Networked Computing and Advanced†…, 2010
212010
Finding state collisions in the authenticated encryption stream cipher ACORN
MI Salam, KKH Wong, H Bartlett, L Simpson, E Dawson, J Pieprzyk
Proceedings of the Australasian Computer Science Week Multiconference, 1-10, 2016
182016
Investigating cube attacks on the authenticated encryption stream cipher MORUS
I Salam, L Simpson, H Bartlett, E Dawson, J Pieprzyk, KKH Wong
2017 IEEE Trustcom/BigDataSE/ICESS, 961-966, 2017
62017
Fault attacks on Tiaoxin-346
I Salam, HQA Mahri, L Simpson, H Bartlett, E Dawson, KKH Wong
Proceedings of the Australasian Computer Science Week Multiconference, 1-9, 2018
22018
Algebraic Analysis of Shrinking Generator
MI Salam, HJ Lee
Int. Journal of Math. Analysis 6 (50), 2493-2499, 2012
22012
Addressing secure data routing scheme for heterogeneous sensor networks
P Kumar, M Iftekhar Salam, SG Lee, HJ Lee
Networked Computing and Advanced Information Management (NCM), 2010 Sixth†…, 2010
22010
Fault Attacks on the Authenticated Encryption Stream Cipher MORUS
I Salam, L Simpson, H Bartlett, E Dawson, K Koon-Ho Wong
Cryptography 2 (1), 4, 2018
12018
Analysis of authenticated encryption based on stream ciphers
MI Salam
Queensland University of Technology, 2018
12018
Algebraic countermeasure to enhance the improved summation generator with 2-bit memory
I Salam, HJ Lee
Journal of Networks 8 (5), 977-985, 2013
12013
On the algebraic attack against summation type keystream generators
MI Salam, HJ Lee
International Journal of Information and Computer Security 5 (2), 132-149, 2012
12012
A review on the PKC-based security architecture for wireless sensor networks
MI Salam, HJ Lee
5th International Conference on Computer Sciences and Convergence†…, 2010
12010
Random fault attacks on a class of stream ciphers
H Bartlett, E Dawson, H Quhar al Mahri, MI Salam, L Simpson, KKH Wong
Security and Communication Networks, 2019
2019
Secure and Efficient Key Management Scheme for Wireless Mesh Network
MI Salam, M Singh, SG Lee, HJ Lee
Proceedings of the Korea Information Processing Society Conference, 844-847, 2011
2011
Performance analysis of PingPong-128 keystream generator for wireless sensor networks
P Kumar, MI Salam, AG Reza, HT Lim, HJ Lee
5th International Conference on Computer Sciences and Convergence†…, 2010
2010
The system can't perform the operation now. Try again later.
Articles 1–16