Follow
Hoda Alkhzaimi
Hoda Alkhzaimi
NEW YORK UNIVERSITY ABU DHABI
Verified email at nyu.edu
Title
Cited by
Cited by
Year
A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack
G Leander, MA Abdelraheem, H AlKhzaimi, E Zenner
Advances in Cryptology–CRYPTO 2011: 31st Annual Cryptology Conference, Santa …, 2011
2112011
Cryptanalysis of the SIMON family of block ciphers
HA Alkhzaimi, MM Lauridsen
Cryptology ePrint Archive, 2013
1282013
Links among impossible differential, integral and zero correlation linear cryptanalysis
B Sun, Z Liu, V Rijmen, R Li, L Cheng, Q Wang, H AlKhzaimi, C Li
Annual Cryptology Conference, 95-115, 2015
932015
Blockchain applied to the construction supply chain: A case study with threat model
G Shemov, B Garcia de Soto, H Alkhzaimi
Frontiers of Engineering Management 7 (4), 564-577, 2020
702020
Cryptanalysis of SIMON variants with connections
J Alizadeh, HA Alkhzaimi, MR Aref, N Bagheri, P Gauravaram, A Kumar, ...
International Workshop on Radio Frequency Identification: Security and …, 2014
492014
Improved linear cryptanalysis of reduced-round SIMON-32 and SIMON-48
MA Abdelraheem, J Alizadeh, HA Alkhzaimi, MR Aref, N Bagheri, ...
Progress in Cryptology--INDOCRYPT 2015: 16th International Conference on …, 2015
472015
Cryptography algorithms for enhancing IoT security
F Thabit, O Can, AO Aljahdali, GH Al-Gaphari, HA Alkhzaimi
Internet of Things 22, 100759, 2023
272023
Memristor-based PUF for lightweight cryptographic randomness
HM Ibrahim, H Abunahla, B Mohammad, H AlKhzaimi
Scientific reports 12 (1), 8633, 2022
262022
Improved linear cryptanalysis of reduced-round SIMON
MA Abdelraheem, J Alizadeh, HA Alkhzaimi, MR Aref, N Bagheri, ...
Cryptology ePrint Archive, 2014
232014
Improved Linear Cryptanalysis of Round Reduced SIMON.
J Alizadeh, H AlKhzaimi, MR Aref, N Bagheri, P Gauravaram, ...
IACR Cryptol. ePrint Arch. 2014 (681), 2014
172014
Lightweight two-factor-based user authentication protocol for iot-enabled healthcare ecosystem in quantum computing
AA Al-Saggaf, T Sheltami, H Alkhzaimi, G Ahmed
Arabian Journal for Science and Engineering 48 (2), 2347-2357, 2023
162023
Data security techniques in cloud computing based on machine learning algorithms and cryptographic algorithms: Lightweight algorithms and genetics algorithms
F Thabit, O Can, RUZ Wani, MA Qasem, SB Thorat, HA Alkhzaimi
Concurrency and Computation: Practice and Experience 35 (21), e7691, 2023
112023
Cryptanalysis of selected block ciphers
HA Alkhzaimi
Technical University of Denmark, 2016
112016
A comprehensive literature of genetics cryptographic algorithms for data security in cloud computing
O Can, F Thabit, AO Aljahdali, S Al-Homdy, HA Alkhzaimi
Cybernetics and Systems, 1-35, 2023
82023
MAVPro: ADS-B message verification for aviation security with minimal numbers of on-ground sensors
A Darabseh, H AlKhzaimi, C Pöpper
Proceedings of the 13th ACM Conference on Security and Privacy in Wireless …, 2020
82020
Cryptanalysis of 1-round KECCAK
R Kumar, MS Rajasree, H AlKhzaimi
Progress in Cryptology–AFRICACRYPT 2018: 10th International Conference on …, 2018
62018
Application of a gene modular approach for clinical phenotype genotype association and sepsis prediction using machine learning in meningococcal sepsis
A Rashid, AR Anwary, F Al-Obeidat, J Brierley, M Uddin, H Alkhzaimi, ...
Informatics in Medicine Unlocked 41, 101293, 2023
52023
Blockchain applied to the construction supply chain: A case study with threat model. Frontiers of Engineering Management, 7 (4), 564–577
G Shemov, B Garcia de Soto, H Alkhzaimi
52020
Invertible secret sharing: Using meaningful shadows based on Sorted Indexed Code
SK Tripathi, S Badiya, KKS Pandian, B Gupta, H AlKhzaimi
Optik 224, 165658, 2020
42020
Side channel analysis of sparx-64/128: Cryptanalysis and countermeasures
SM Ramesh, H AlKhzaimi
Progress in Cryptology–AFRICACRYPT 2019: 11th International Conference on …, 2019
42019
The system can't perform the operation now. Try again later.
Articles 1–20