Mohammad Umar Siddiqi
Mohammad Umar Siddiqi
Professor, Faculty of Engineering, International Islamic University Malaysia
Verified email at iium.edu.my
Title
Cited by
Cited by
Year
Optimal large linear complexity frequency hopping patterns derived from polynomial residue class rings
P Udaya, MU Siddiqi
IEEE Transactions on Information Theory 44 (4), 1492-1503, 1998
1291998
Multiple error detection and correction based on redundant residue number systems
VT Goh, MU Siddiqi
IEEE Transactions on Communications 56 (3), 325-330, 2008
1232008
Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity
BM Goi, RCW Phan, Y Yang, F Bao, RH Deng, MU Siddiqi
International Conference on Applied Cryptography and Network Security, 369-382, 2004
552004
Optimal biphase sequences with large linear complexity derived from sequences over Z/sub 4
P Udaya, MU Siddiqi
IEEE Transactions on Information Theory 42 (1), 206-216, 1996
541996
Optimal and Suboptimal Quadriphase Sequences Derived from Maximal Length Sequences over Z _ {{\bf 4}}
P Udaya, MU Siddiqi
Applicable Algebra in Engineering, Communication and Computing 9 (2), 161-191, 1998
491998
Transform domain characterization of cyclic codes overZ m
BS Rajan, MU Siddiqi
Applicable Algebra in Engineering, Communication and Computing 5 (5), 261-275, 1994
321994
Transform domain characterization of abelian codes
BS Rajan, MU Siddiqi
IEEE transactions on information theory 38 (6), 1817-1821, 1992
321992
A generalized DFT for Abelian codes over Z/sub m
BS Rajan, MU Siddiqi
IEEE transactions on information theory 40 (6), 2082-2090, 1994
291994
Generalised impossible differentials of advanced encryption standard
RCW Phan, MU Siddiqi
Electronics Letters 37 (14), 896-898, 2001
272001
Generalized GMW quadriphase sequences satisfying the Welch bound with equality
P Udaya, MU Siddiqi
Applicable Algebra in Engineering, Communication and Computing 10 (3), 203-225, 2000
222000
Cryptographically generated addresses (CGAs): A survey and an analysis of performance for use in mobile environment
S Qadir, MU Siddiqi
IJCSNS Int. J. Comput. Sci. Netw. Secur 11 (2), 24-31, 2011
212011
Intelligent keystroke pressure-based typing biometrics authentication system using radial basis function network
A Sulong, MU Siddiqi
2009 5th International Colloquium on Signal Processing & Its Applications …, 2009
202009
Incremental hash function based on pair chaining & modular arithmetic combining
G Bok-Min, MU Siddiqi, C Hean-Teik
International Conference on Cryptology in India, 50-61, 2001
202001
Large Linear Complexity Sequences Over Z/sub 4/For Quadriphase Modulated Communication Systems Having Good Correlation Properties
P Udaya, MU Siddiqi
Proceedings. 1991 IEEE International Symposium on Information Theory, 386-386, 1991
181991
A framework for describing block cipher cryptanalysis
RCW Phan, MU Siddiqi
IEEE Transactions on Computers 55 (11), 1402-1409, 2006
152006
Wireless physical layer security using encryption and channel pre-compensation
M Tahir, SPW Jarot, MU Siddiqi
2010 International Conference on Computer Applications and Industrial …, 2010
142010
A new class of asymmetric turbo code for 3G systems
K Ramasamy, MU Siddiqi
AEU-International Journal of Electronics and Communications 60 (6), 447-458, 2006
142006
Computational complexity and implementation aspects of the incremental hash function
BM Goi, MU Siddiqi, HT Chuah
IEEE Transactions on Consumer Electronics 49 (4), 1249-1255, 2003
122003
Haar transformation of linear boolean function
HM Rafiq, MU Siddiqi
2009 International Conference on Signal Processing Systems, 802-805, 2009
112009
Wireless physical layer security using channel state information
M Tahir, SPW Jarot, MU Siddiqi
International Conference on Computer and Communication Engineering (ICCCE'10 …, 2010
102010
The system can't perform the operation now. Try again later.
Articles 1–20