If you made any changes in Pure, your changes will be visible here soon.

Fingerprint Weighted list of dominant concepts in the researcher's publications (titles and abstracts).

  • 5 Similar Profiles
Cryptanalysis Mathematics
Linear Cryptanalysis Mathematics
Attack Mathematics
Side-channel Analysis Mathematics
Zero correlation Mathematics
Recovery Engineering & Materials Science
Linear Approximation Mathematics
Hash functions Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2011 2019

  • 5 Conference contribution
  • 1 Article

Side channel analysis of SPARX-64/128: Cryptanalysis and countermeasures

Ramesh, S. M. & Alkhzaimi, H., Jan 1 2019, Progress in Cryptology – AFRICACRYPT 2019 - 11th International Conference on Cryptology in Africa, Proceedings. Nitaj, A., Rachidi, T. & Buchmann, J. (eds.). Springer-Verlag, p. 352-369 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11627 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Side-channel Analysis
Cryptanalysis
Countermeasures
Power Analysis
Field programmable gate arrays (FPGA)

Cryptanalysis of 1-round KECCAK

Kumar, R., Rajasree, M. S. & Alkhzaimi, H., Jan 1 2018, Progress in Cryptology - AFRICACRYPT 2018 - 10th International Conference on Cryptology in Africa, Proceedings. Springer-Verlag, p. 124-137 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10831 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hash functions
Cryptanalysis
Linear equations
Attack
Collision Attack

Improved linear cryptanalysis of reduced-round SIMON-32 and SIMON-48

Abdelraheem, M. A., Alizadeh, J., Alkhzaimi, H., Aref, M. R., Bagheri, N. & Gauravaram, P., Jan 1 2015, Progress in Cryptology – INDOCRYPT 2015 - 16th International Conference on Cryptology in India, Proceedings. Springer-Verlag, p. 153-179 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9462).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Linear Cryptanalysis
Linear Approximation
Hamming Weight
Recovery
Integer programming

Links among impossible differential, integral and zero correlation linear cryptanalysis

Sun, B., Liu, Z., Rijmen, V., Li, R., Cheng, L., Wang, Q., Alkhzaimi, H. & Li, C., Jan 1 2015, Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Proceedings. Springer-Verlag, p. 95-115 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9215).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Zero correlation
Linear Cryptanalysis
Cryptanalysis
Differential Cryptanalysis
Block Ciphers

Cryptanalysis of SIMON variants with connections

Alizadeh, J., Alkhzaimi, H., Aref, M. R., Bagheri, N., Gauravaram, P., Kumar, A., Lauridsen, M. M. & Sanadhya, S. K., Jan 1 2014, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8651, p. 90-107 18 p.

Research output: Contribution to journalArticle

Cryptanalysis
Attack
Key Recovery
Recovery
National security