Mehreen Afzal

Orcid: 0000-0002-2179-9259

According to our database1, Mehreen Afzal authored at least 24 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
The reality of backdoored S-Boxes - An eye opener.
J. Inf. Secur. Appl., February, 2024

PQCAIE: Post quantum cryptographic authentication scheme for IoT-based e-health systems.
Internet Things, 2024

2023
Detection of non-trivial preservable quotient spaces in S-Box(es).
Neural Comput. Appl., September, 2023

A systematic threat analysis and defense strategies for the metaverse and extended reality systems.
Comput. Secur., May, 2023

2022
A game model design using test bed for Malware analysis training.
Inf. Comput. Secur., 2022

Robustness of Affine and Extended Affine Equivalent Surjective S-Box(es) against Differential Cryptanalysis.
IACR Cryptol. ePrint Arch., 2022

FBASHI: Fuzzy and Blockchain-Based Adaptive Security for Healthcare IoTs.
IEEE Access, 2022

2021
Behavioral Based Insider Threat Detection Using Deep Learning.
IEEE Access, 2021

Enhanced Metamorphic Techniques-A Case Study Against Havex Malware.
IEEE Access, 2021

Encryption and Re-Randomization Techniques for Malware Propagation.
IEEE Access, 2021

Is Blockchain Overrated?
Proceedings of the 19th IEEE International Conference on Embedded and Ubiquitous Computing, 2021

2020
On the efficiency of software implementations of lightweight block ciphers from the perspective of programming languages.
Future Gener. Comput. Syst., 2020

Kleptographic Attack on Elliptic Curve Based Cryptographic Protocols.
IEEE Access, 2020

2018
Correlation power analysis of modes of encryption in AES and its countermeasures.
Future Gener. Comput. Syst., 2018

2017
Algebraic Side Channel Attack on Trivium and Grain Ciphers.
IEEE Access, 2017

2014
An ICMetric based key generation scheme for controlled group communication.
Proceedings of the 5th International Conference on Information, 2014

2013
On the Security of LBlock against the Cube Attack and Side Channel Cube Attack.
Proceedings of the Security Engineering and Intelligence Informatics, 2013

2011
A Compact S-Box Design for SMS4 Block Cipher.
IACR Cryptol. ePrint Arch., 2011

2010
Think Before Your LFSRs Jump.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
An extended secret sharing scheme for colour images with fixed pixel expansion.
Int. J. Electron. Secur. Digit. Forensics, 2009

2008
Algebraic analysis of Trivium and Trivium/128.
Int. J. Electron. Secur. Digit. Forensics, 2008

Improved Data Hiding Technique for Shares in Extended Visual Secret Sharing Schemes.
Proceedings of the Information and Communications Security, 10th International Conference, 2008

2007
Algebraic Attack on A5-type Irregularly Clocked Key Stream Generator.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007

A Review of Cryptanalytic Attacks on E-STREAM Submitted Stream Ciphers.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007


  Loading...