Md. Iftekhar Salam

Orcid: 0000-0003-1395-4623

According to our database1, Md. Iftekhar Salam authored at least 24 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
DSteganoM: Deep steganography for motion capture data.
Expert Syst. Appl., March, 2024

2023
Differential fault attacks on the lightweight authenticated encryption algorithm CLX-128.
J. Cryptogr. Eng., September, 2023

Evaluation of Machine Learning Algorithms in Network-Based Intrusion Detection Using Progressive Dataset.
Symmetry, 2023

2022
Blockchain based Contact Tracing: A Solution using Bluetooth and Sound Waves for Proximity Detection.
IACR Cryptol. ePrint Arch., 2022

Evaluation of Machine Learning Algorithms in Network-Based Intrusion Detection System.
IACR Cryptol. ePrint Arch., 2022

Dental Caries Detection Using Score-Based Multi-Input Deep Convolutional Neural Network.
IEEE Access, 2022

Blockchain-Based Multi-keyword Search on Encrypted COVID-19 Contact Tracing Data.
Proceedings of the Information Security Practice and Experience, 2022

An Analysis on Face Recognition using Principal Component Analysis Approach.
Proceedings of the ICIGP 2022: The 5th International Conference on Image and Graphics Processing, Beijing, China, January 7, 2022

2021
Rotational Cryptanalysis of MORUS.
Symmetry, 2021

Cube Attacks on Round-Reduced TinyJAMBU.
IACR Cryptol. ePrint Arch., 2021

Investigating Deep Learning Approaches on the Security Analysis of Cryptographic Algorithms.
Cryptogr., 2021

Random Differential Fault Attacks on the Lightweight Authenticated Encryption Stream Cipher Grain-128AEAD.
IEEE Access, 2021

2020
Differential Fault Based Key Recovery Attacks on TRIAD.
Proceedings of the Information Security and Cryptology - ICISC 2020, 2020

2019
Random Fault Attacks on a Class of Stream Ciphers.
Secur. Commun. Networks, 2019

2018
Fault Attacks on the Authenticated Encryption Stream Cipher MORUS.
Cryptogr., 2018

Fault attacks on Tiaoxin-346.
Proceedings of the Australasian Computer Science Week Multiconference, 2018

2017
Investigating Cube Attacks on the Authenticated Encryption Stream Cipher MORUS.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

2016
Investigating Cube Attacks on the Authenticated Encryption Stream Cipher ACORN.
IACR Cryptol. ePrint Arch., 2016

2015
Finding State Collisions in the Authenticated Encryption Stream Cipher ACORN.
IACR Cryptol. ePrint Arch., 2015

Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage.
Hum. centric Comput. Inf. Sci., 2015

2013
Algebraic Countermeasure to Enhance the Improved Summation Generator with 2-Bit Memory.
J. Networks, 2013

2012
On the algebraic attack against summation type keystream generators.
Int. J. Inf. Comput. Secur., 2012

2010
An efficient key pre-distribution scheme for wireless sensor network using public key cryptography.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010

Addressing secure data routing scheme for heterogeneous sensor networks.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010


  Loading...