关注
Shah Fahd
标题
引用次数
引用次数
年份
Correlation power analysis of modes of encryption in AES and its countermeasures
S Fahd, M Afzal, H Abbas, W Iqbal, S Waheed
Future Generation Computer Systems 83, 496-509, 2018
222018
Robustness of affine and extended affine equivalent surjective S-box (es) against differential cryptanalysis
S Fahd, M Afzal, D Shah, W Iqbal, A Hai
International Symposium on Foundations and Practice of Security, 461-471, 2022
22022
Integrated model: Statistical features, memory analysis for scanner and printer forensics
S Fahd, MMW Iqbal, M Arif, MI Javed
2016 4th International Symposium on Digital Forensic and Security (ISDFS), 74-77, 2016
22016
The reality of backdoored S-Boxes—An eye opener
S Fahd, M Afzal, W Iqbal, D Shah, I Khalid
Journal of Information Security and Applications 80, 103674, 2024
12024
Detection of non-trivial preservable quotient spaces in S-Box (es)
S Fahd, M Afzal, D Shah, W Iqbal, Y Abbas
Neural Computing and Applications 35 (25), 18343-18355, 2023
2023
系统目前无法执行此操作,请稍后再试。
文章 1–5