default search action
Md. Iftekhar Salam
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Qi Wen Gan, Wei-Chuen Yau, Yee Siang Gan, Iftekhar Salam, Shihui Guo, Chinchen Chang, Yubing Wu, Luchen Zhou:
DSteganoM: Deep steganography for motion capture data. Expert Syst. Appl. 238(Part C): 121955 (2024) - 2023
- [j11]Iftekhar Salam, Wei-Chuen Yau, Raphaël C.-W. Phan, Josef Pieprzyk:
Differential fault attacks on the lightweight authenticated encryption algorithm CLX-128. J. Cryptogr. Eng. 13(3): 265-281 (2023) - [j10]Tuan-Hong Chua, Iftekhar Salam:
Evaluation of Machine Learning Algorithms in Network-Based Intrusion Detection Using Progressive Dataset. Symmetry 15(6): 1251 (2023) - 2022
- [j9]Andac Imak, Adalet Celebi, Kamran Siddique, Muammer Turkoglu, Abdulkadir Sengür, Iftekhar Salam:
Dental Caries Detection Using Score-Based Multi-Input Deep Convolutional Neural Network. IEEE Access 10: 18320-18329 (2022) - [c9]Wenyu Zhang, Burra Venkata Durga Kumar, Kelvin Jian Aun Ooi, Jia Yew Teh, Iftekhar Salam, Mohammad Arif Sobhan Bhuiyan:
An Analysis on Face Recognition using Principal Component Analysis Approach. ICIGP 2022: 150-158 - [c8]Zheng Yao Ng, Iftekhar Salam:
Blockchain-Based Multi-keyword Search on Encrypted COVID-19 Contact Tracing Data. ISPEC 2022: 75-92 - [i7]Tuan-Hong Chua, Iftekhar Salam:
Evaluation of Machine Learning Algorithms in Network-Based Intrusion Detection System. CoRR abs/2203.05232 (2022) - [i6]ZiXi Hee, Iftekhar Salam:
Blockchain based Contact Tracing: A Solution using Bluetooth and Sound Waves for Proximity Detection. IACR Cryptol. ePrint Arch. 2022: 209 (2022) - [i5]Tuan-Hong Chua, Iftekhar Salam:
Evaluation of Machine Learning Algorithms in Network-Based Intrusion Detection System. IACR Cryptol. ePrint Arch. 2022: 335 (2022) - 2021
- [j8]Md. Iftekhar Salam, Thian Hooi Ooi, Luxin Xue, Wei-Chuen Yau, Josef Pieprzyk, Raphaël C.-W. Phan:
Random Differential Fault Attacks on the Lightweight Authenticated Encryption Stream Cipher Grain-128AEAD. IEEE Access 9: 72568-72586 (2021) - [j7]Bang Yuan Chong, Iftekhar Salam:
Investigating Deep Learning Approaches on the Security Analysis of Cryptographic Algorithms. Cryptogr. 5(4): 30 (2021) - [j6]Md. Iftekhar Salam:
Rotational Cryptanalysis of MORUS. Symmetry 13(12): 2426 (2021) - [i4]Wil Liam Teng, Md. Iftekhar Salam, Wei-Chuen Yau, Josef Pieprzyk, Raphaël C.-W. Phan:
Cube Attacks on Round-Reduced TinyJAMBU. IACR Cryptol. ePrint Arch. 2021: 1164 (2021) - 2020
- [c7]Md. Iftekhar Salam, Kim Young Law, Luxin Xue, Wei-Chuen Yau:
Differential Fault Based Key Recovery Attacks on TRIAD. ICISC 2020: 273-287
2010 – 2019
- 2019
- [j5]Harry Bartlett, Ed Dawson, Hassan Qahur Al Mahri, Md. Iftekhar Salam, Leonie Simpson, Kenneth Koon-Ho Wong:
Random Fault Attacks on a Class of Stream Ciphers. Secur. Commun. Networks 2019: 1680263:1-1680263:12 (2019) - 2018
- [j4]Md. Iftekhar Salam, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
Fault Attacks on the Authenticated Encryption Stream Cipher MORUS. Cryptogr. 2(1): 4 (2018) - [c6]Md. Iftekhar Salam, Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
Fault attacks on Tiaoxin-346. ACSW 2018: 5:1-5:9 - 2017
- [c5]Md. Iftekhar Salam, Leonie Simpson, Harry Bartlett, Ed Dawson, Josef Pieprzyk, Kenneth Koon-Ho Wong:
Investigating Cube Attacks on the Authenticated Encryption Stream Cipher MORUS. TrustCom/BigDataSE/ICESS 2017: 961-966 - 2016
- [c4]Md. Iftekhar Salam, Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Ruth Simpson, Ed Dawson, Josef Pieprzyk:
Finding state collisions in the authenticated encryption stream cipher ACORN. ACSW 2016: 36 - [c3]Md. Iftekhar Salam, Harry Bartlett, Ed Dawson, Josef Pieprzyk, Leonie Simpson, Kenneth Koon-Ho Wong:
Investigating Cube Attacks on the Authenticated Encryption Stream Cipher ACORN. ATIS 2016: 15-26 - [i3]Md. Iftekhar Salam, Harry Bartlett, Ed Dawson, Josef Pieprzyk, Leonie Simpson, Kenneth Koon-Ho Wong:
Investigating Cube Attacks on the Authenticated Encryption Stream Cipher ACORN. IACR Cryptol. ePrint Arch. 2016: 743 (2016) - 2015
- [j3]Md. Iftekhar Salam, Wei-Chuen Yau, Ji-Jian Chin, Swee-Huay Heng, Huo-Chong Ling, Raphael C.-W. Phan, Geong Sen Poh, Syh-Yuan Tan, Wun-She Yap:
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage. Hum. centric Comput. Inf. Sci. 5: 19 (2015) - [i2]Md. Iftekhar Salam, Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson, Josef Pieprzyk:
Finding State Collisions in the Authenticated Encryption Stream Cipher ACORN. IACR Cryptol. ePrint Arch. 2015: 918 (2015) - 2013
- [j2]Md. Iftekhar Salam, Hoon-Jae Lee:
Algebraic Countermeasure to Enhance the Improved Summation Generator with 2-Bit Memory. J. Networks 8(5): 977-984 (2013) - 2012
- [j1]Md. Iftekhar Salam, Hoon-Jae Lee:
On the algebraic attack against summation type keystream generators. Int. J. Inf. Comput. Secur. 5(2): 132-149 (2012) - [i1]Md. Iftekhar Salam, Hoon-Jae Lee:
Algebraic Countermeasure to Enhance the Improved Summation Generator with 2-Bit Memory. IACR Cryptol. ePrint Arch. 2012: 282 (2012) - 2010
- [c2]Pardeep Kumar, Md. Iftekhar Salam, Sanggon Lee, Hoon-Jae Lee:
Addressing secure data routing scheme for heterogeneous sensor networks. NCM 2010: 86-90 - [c1]Md. Iftekhar Salam, Pardeep Kumar, Hoon-Jae Lee:
An efficient key pre-distribution scheme for wireless sensor network using public key cryptography. NCM 2010: 402-407
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:10 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint