Multiple error detection and correction based on redundant residue number systems VT Goh, MU Siddiqi IEEE Transactions on Communications 56 (3), 325-330, 2008 | 163 | 2008 |
Optimal large linear complexity frequency hopping patterns derived from polynomial residue class rings P Udaya, MU Siddiqi IEEE Transactions on Information Theory 44 (4), 1492-1503, 1998 | 142 | 1998 |
Optimal biphase sequences with large linear complexity derived from sequences over Z/sub 4 P Udaya, MU Siddiqi IEEE Transactions on Information Theory 42 (1), 206-216, 1996 | 64 | 1996 |
Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity BM Goi, RCW Phan, Y Yang, F Bao, RH Deng, MU Siddiqi Applied Cryptography and Network Security: Second International Conference …, 2004 | 57 | 2004 |
Optimal and Suboptimal Quadriphase Sequences Derived from Maximal Length Sequences over Z _ {{\bf 4}} P Udaya, MU Siddiqi Applicable Algebra in Engineering, Communication and Computing 9 (2), 161-191, 1998 | 53 | 1998 |
Transform domain characterization of abelian codes BS Rajan, MU Siddiqi IEEE transactions on information theory 38 (6), 1817-1821, 1992 | 40 | 1992 |
Transform domain characterization of cyclic codes overZ m BS Rajan, MU Siddiqi Applicable Algebra in Engineering, Communication and Computing 5, 261-275, 1994 | 37 | 1994 |
A generalized DFT for Abelian codes over Z/sub m BS Rajan, MU Siddiqi IEEE transactions on information theory 40 (6), 2082-2090, 1994 | 32 | 1994 |
Generalized GMW quadriphase sequences satisfying the Welch bound with equality P Udaya, MU Siddiqi Applicable Algebra in Engineering, Communication and Computing 10 (3), 203-225, 2000 | 31 | 2000 |
Generalised impossible differentials of advanced encryption standard RCW Phan, MU Siddiqi Electronics Letters 37 (14), 1, 2001 | 29 | 2001 |
Cryptographically generated addresses (CGAs): A survey and an analysis of performance for use in mobile environment S Qadir, MU Siddiqi IJCSNS Int. J. Comput. Sci. Netw. Secur 11 (2), 24-31, 2011 | 28 | 2011 |
Intelligent keystroke pressure-based typing biometrics authentication system using radial basis function network A Sulong, MU Siddiqi 2009 5th International Colloquium on Signal Processing & Its Applications …, 2009 | 25 | 2009 |
A framework for describing block cipher cryptanalysis RCW Phan, MU Siddiqi IEEE Transactions on Computers 55 (11), 1402-1409, 2006 | 23 | 2006 |
Incremental hash function based on pair chaining & modular arithmetic combining G Bok-Min, MU Siddiqi, C Hean-Teik Progress in Cryptology—INDOCRYPT 2001: Second International Conference on …, 2001 | 22 | 2001 |
Wireless physical layer security using encryption and channel pre-compensation M Tahir, SPW Jarot, MU Siddiqi 2010 International Conference on Computer Applications and Industrial …, 2010 | 21 | 2010 |
Large Linear Complexity Sequences Over Z/sub 4/For Quadriphase Modulated Communication Systems Having Good Correlation Properties P Udaya, MU Siddiqi Proceedings. 1991 IEEE International Symposium on Information Theory, 386-386, 1991 | 21 | 1991 |
A new class of asymmetric turbo code for 3G systems K Ramasamy, MU Siddiqi AEU-International Journal of Electronics and Communications 60 (6), 447-458, 2006 | 17 | 2006 |
Wireless physical layer security using channel state information M Tahir, SPW Jarot, MU Siddiqi International Conference on Computer and Communication Engineering (ICCCE'10 …, 2010 | 15 | 2010 |
Computational complexity and implementation aspects of the incremental hash function BM Goi, MU Siddiqi, HT Chuah IEEE Transactions on Consumer Electronics 49 (4), 1249-1255, 2003 | 14 | 2003 |
Haar transformation of linear boolean function HM Rafiq, MU Siddiqi 2009 International Conference on Signal Processing Systems, 802-805, 2009 | 13 | 2009 |