Follow
Hoda Alkhzaimi
Hoda Alkhzaimi
NEW YORK UNIVERSITY ABU DHABI
Verified email at nyu.edu
Title
Cited by
Cited by
Year
A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack
G Leander, MA Abdelraheem, H AlKhzaimi, E Zenner
Advances in Cryptology–CRYPTO 2011: 31st Annual Cryptology Conference, Santa …, 2011
2052011
Cryptanalysis of the SIMON family of block ciphers
HA Alkhzaimi, MM Lauridsen
Cryptology ePrint Archive, 2013
1272013
Links among impossible differential, integral and zero correlation linear cryptanalysis
B Sun, Z Liu, V Rijmen, R Li, L Cheng, Q Wang, H AlKhzaimi, C Li
Annual Cryptology Conference, 95-115, 2015
902015
Blockchain applied to the construction supply chain: A case study with threat model
G Shemov, B Garcia de Soto, H Alkhzaimi
Frontiers of Engineering Management 7 (4), 564-577, 2020
602020
Cryptanalysis of SIMON variants with connections
J Alizadeh, HA Alkhzaimi, MR Aref, N Bagheri, P Gauravaram, A Kumar, ...
International Workshop on Radio Frequency Identification: Security and …, 2014
502014
Improved linear cryptanalysis of reduced-round SIMON-32 and SIMON-48
MA Abdelraheem, J Alizadeh, HA Alkhzaimi, MR Aref, N Bagheri, ...
Progress in Cryptology--INDOCRYPT 2015: 16th International Conference on …, 2015
462015
Improved linear cryptanalysis of reduced-round SIMON
MA Abdelraheem, J Alizadeh, HA Alkhzaimi, MR Aref, N Bagheri, ...
Cryptology ePrint Archive, 2014
252014
Memristor-based PUF for lightweight cryptographic randomness
HM Ibrahim, H Abunahla, B Mohammad, H AlKhzaimi
Scientific reports 12 (1), 8633, 2022
232022
Improved Linear Cryptanalysis of Round Reduced SIMON.
J Alizadeh, H AlKhzaimi, MR Aref, N Bagheri, P Gauravaram, ...
IACR Cryptol. ePrint Arch. 2014 (681), 2014
172014
A comprehensive literature survey of cryptography algorithms for improving the iot security
F Thabit, O Can, AO Aljahdali, GH Al-Gaphari, HA Alkhzaimi
Internet of Things, 100759, 2023
142023
Cryptanalysis of selected block ciphers
HA Alkhzaimi
Technical University of Denmark, 2016
112016
Lightweight two-factor-based user authentication protocol for iot-enabled healthcare ecosystem in quantum computing
AA Al-Saggaf, T Sheltami, H Alkhzaimi, G Ahmed
Arabian Journal for Science and Engineering 48 (2), 2347-2357, 2023
92023
MAVPro: ADS-B message verification for aviation security with minimal numbers of on-ground sensors
A Darabseh, H AlKhzaimi, C Pöpper
Proceedings of the 13th ACM Conference on Security and Privacy in Wireless …, 2020
82020
Data security techniques in cloud computing based on machine learning algorithms and cryptographic algorithms: Lightweight algorithms and genetics algorithms
F Thabit, O Can, RUZ Wani, MA Qasem, SB Thorat, HA Alkhzaimi
Concurrency and Computation: Practice and Experience 35 (21), e7691, 2023
62023
A comprehensive literature of genetics cryptographic algorithms for data security in cloud computing
O Can, F Thabit, AO Aljahdali, S Al-Homdy, HA Alkhzaimi
Cybernetics and Systems, 1-35, 2023
62023
Cryptanalysis of 1-round KECCAK
R Kumar, MS Rajasree, H AlKhzaimi
Progress in Cryptology–AFRICACRYPT 2018: 10th International Conference on …, 2018
62018
Application of a gene modular approach for clinical phenotype genotype association and sepsis prediction using machine learning in meningococcal sepsis
A Rashid, AR Anwary, F Al-Obeidat, J Brierley, M Uddin, H Alkhzaimi, ...
Informatics in Medicine Unlocked 41, 101293, 2023
52023
ADVANCING THE UNDERSTANDING OF CLINICAL SEPSIS USING GENE EXPRESSION–DRIVEN MACHINE LEARNING TO IMPROVE PATIENT OUTCOMES
A Rashid, F Al-Obeidat, W Hafez, G Benakatti, RA Malik, C Koutentis, ...
Shock 61 (1), 4-18, 2024
32024
Side channel analysis of sparx-64/128: Cryptanalysis and countermeasures
SM Ramesh, H AlKhzaimi
Progress in Cryptology–AFRICACRYPT 2019: 11th International Conference on …, 2019
32019
Differential and linear cryptanalysis of reduced-round simon
H Alkhzaimi, M Lauridsen
Cryptology ePrint Archive, Report 2013/543, 2013
32013
The system can't perform the operation now. Try again later.
Articles 1–20