A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack G Leander, MA Abdelraheem, H AlKhzaimi, E Zenner Advances in Cryptology–CRYPTO 2011: 31st Annual Cryptology Conference, Santa …, 2011 | 205 | 2011 |
Cryptanalysis of the SIMON family of block ciphers HA Alkhzaimi, MM Lauridsen Cryptology ePrint Archive, 2013 | 129 | 2013 |
Links among impossible differential, integral and zero correlation linear cryptanalysis B Sun, Z Liu, V Rijmen, R Li, L Cheng, Q Wang, H AlKhzaimi, C Li Annual Cryptology Conference, 95-115, 2015 | 90 | 2015 |
Blockchain applied to the construction supply chain: A case study with threat model G Shemov, B Garcia de Soto, H Alkhzaimi Frontiers of Engineering Management 7 (4), 564-577, 2020 | 62 | 2020 |
Cryptanalysis of SIMON variants with connections J Alizadeh, HA Alkhzaimi, MR Aref, N Bagheri, P Gauravaram, A Kumar, ... International Workshop on Radio Frequency Identification: Security and …, 2014 | 49 | 2014 |
Improved linear cryptanalysis of reduced-round SIMON-32 and SIMON-48 MA Abdelraheem, J Alizadeh, HA Alkhzaimi, MR Aref, N Bagheri, ... Progress in Cryptology--INDOCRYPT 2015: 16th International Conference on …, 2015 | 46 | 2015 |
Improved linear cryptanalysis of reduced-round SIMON MA Abdelraheem, J Alizadeh, HA Alkhzaimi, MR Aref, N Bagheri, ... Cryptology ePrint Archive, 2014 | 24 | 2014 |
Memristor-based PUF for lightweight cryptographic randomness HM Ibrahim, H Abunahla, B Mohammad, H AlKhzaimi Scientific reports 12 (1), 8633, 2022 | 23 | 2022 |
Improved Linear Cryptanalysis of Round Reduced SIMON. J Alizadeh, H AlKhzaimi, MR Aref, N Bagheri, P Gauravaram, ... IACR Cryptol. ePrint Arch. 2014 (681), 2014 | 17 | 2014 |
A comprehensive literature survey of cryptography algorithms for improving the iot security F Thabit, O Can, AO Aljahdali, GH Al-Gaphari, HA Alkhzaimi Internet of Things, 100759, 2023 | 15 | 2023 |
Lightweight two-factor-based user authentication protocol for iot-enabled healthcare ecosystem in quantum computing AA Al-Saggaf, T Sheltami, H Alkhzaimi, G Ahmed Arabian Journal for Science and Engineering 48 (2), 2347-2357, 2023 | 14 | 2023 |
Cryptanalysis of selected block ciphers HA Alkhzaimi Technical University of Denmark, 2016 | 11 | 2016 |
Data security techniques in cloud computing based on machine learning algorithms and cryptographic algorithms: Lightweight algorithms and genetics algorithms F Thabit, O Can, RUZ Wani, MA Qasem, SB Thorat, HA Alkhzaimi Concurrency and Computation: Practice and Experience 35 (21), e7691, 2023 | 8 | 2023 |
MAVPro: ADS-B message verification for aviation security with minimal numbers of on-ground sensors A Darabseh, H AlKhzaimi, C Pöpper Proceedings of the 13th ACM Conference on Security and Privacy in Wireless …, 2020 | 8 | 2020 |
A comprehensive literature of genetics cryptographic algorithms for data security in cloud computing O Can, F Thabit, AO Aljahdali, S Al-Homdy, HA Alkhzaimi Cybernetics and Systems, 1-35, 2023 | 7 | 2023 |
Cryptanalysis of 1-round KECCAK R Kumar, MS Rajasree, H AlKhzaimi Progress in Cryptology–AFRICACRYPT 2018: 10th International Conference on …, 2018 | 6 | 2018 |
Application of a gene modular approach for clinical phenotype genotype association and sepsis prediction using machine learning in meningococcal sepsis A Rashid, AR Anwary, F Al-Obeidat, J Brierley, M Uddin, H Alkhzaimi, ... Informatics in Medicine Unlocked 41, 101293, 2023 | 5 | 2023 |
ADVANCING THE UNDERSTANDING OF CLINICAL SEPSIS USING GENE EXPRESSION–DRIVEN MACHINE LEARNING TO IMPROVE PATIENT OUTCOMES A Rashid, F Al-Obeidat, W Hafez, G Benakatti, RA Malik, C Koutentis, ... Shock 61 (1), 4-18, 2024 | 3 | 2024 |
Invertible secret sharing: Using meaningful shadows based on Sorted Indexed Code SK Tripathi, S Badiya, KKS Pandian, B Gupta, H AlKhzaimi Optik 224, 165658, 2020 | 3 | 2020 |
Side channel analysis of sparx-64/128: Cryptanalysis and countermeasures SM Ramesh, H AlKhzaimi Progress in Cryptology–AFRICACRYPT 2019: 11th International Conference on …, 2019 | 3 | 2019 |