No photo of Hoda Alkhzaimi
20112022

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • 2011

    A cryptanalysis of PRINTcipher: The invariant subspace attack

    Leander, G., Abdelraheem, M. A., Alkhzaimi, H. & Zenner, E., 2011, Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference, Proceedings. Springer Verlag, p. 206-221 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6841 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • 2015

    Improved linear cryptanalysis of reduced-round SIMON-32 and SIMON-48

    Abdelraheem, M. A., Alizadeh, J., Alkhzaimi, H. A., Aref, M. R., Bagheri, N. & Gauravaram, P., 2015, Progress in Cryptology – INDOCRYPT 2015 - 16th International Conference on Cryptology in India, Proceedings. Biryukov, A. & Goyal, V. (eds.). Springer Verlag, p. 153-179 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9462).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Links among impossible differential, integral and zero correlation linear cryptanalysis

    Sun, B., Liu, Z., Rijmen, V., Li, R., Cheng, L., Wang, Q., Alkhzaimi, H. & Li, C., 2015, Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Proceedings. Robshaw, M. & Gennaro, R. (eds.). Springer Verlag, p. 95-115 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9215).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2018

    Cryptanalysis of 1-round KECCAK

    Kumar, R., Rajasree, M. S. & AlKhzaimi, H., 2018, Progress in Cryptology - AFRICACRYPT 2018 - 10th International Conference on Cryptology in Africa, Proceedings. Nitaj, A., Rachidi, T. & Joux, A. (eds.). Springer Verlag, p. 124-137 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10831 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2019

    Side channel analysis of SPARX-64/128: Cryptanalysis and countermeasures

    Ramesh, S. M. & AlKhzaimi, H., 2019, Progress in Cryptology – AFRICACRYPT 2019 - 11th International Conference on Cryptology in Africa, Proceedings. Buchmann, J., Nitaj, A. & Rachidi, T. (eds.). Springer Verlag, p. 352-369 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11627 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2020

    MAVPro: ADS-B message verification for aviation security with minimal numbers of on-ground sensors

    Darabseh, A., Alkhzaimi, H. & Pöpper, C., Jul 8 2020, WiSec 2020 - Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks. Association for Computing Machinery, p. 53-64 12 p. (WiSec 2020 - Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Your message has successfully been sent.
Your message was not sent due to an error.