Multiple error detection and correction based on redundant residue number systems VT Goh, MU Siddiqi IEEE Transactions on Communications 56 (3), 325-330, 2008 | 143 | 2008 |

Optimal large linear complexity frequency hopping patterns derived from polynomial residue class rings P Udaya, MU Siddiqi IEEE Transactions on Information Theory 44 (4), 1492-1503, 1998 | 134 | 1998 |

Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity BM Goi, RCW Phan, Y Yang, F Bao, RH Deng, MU Siddiqi International Conference on Applied Cryptography and Network Security, 369-382, 2004 | 56 | 2004 |

Optimal biphase sequences with large linear complexity derived from sequences over Z/sub 4 P Udaya, MU Siddiqi IEEE Transactions on Information Theory 42 (1), 206-216, 1996 | 56 | 1996 |

Optimal and Suboptimal Quadriphase Sequences Derived from Maximal Length Sequences over Z _ {{\bf 4}} P Udaya, MU Siddiqi Applicable Algebra in Engineering, Communication and Computing 9 (2), 161-191, 1998 | 50 | 1998 |

Transform domain characterization of cyclic codes over*Z* _{ m }BS Rajan, MU Siddiqi Applicable Algebra in Engineering, Communication and Computing 5 (5), 261-275, 1994 | 34 | 1994 |

Transform domain characterization of abelian codes BS Rajan, MU Siddiqi IEEE transactions on information theory 38 (6), 1817-1821, 1992 | 34 | 1992 |

A generalized DFT for Abelian codes over Z/sub m BS Rajan, MU Siddiqi IEEE transactions on information theory 40 (6), 2082-2090, 1994 | 31 | 1994 |

Generalised impossible differentials of advanced encryption standard RCW Phan, MU Siddiqi Electronics Letters 37 (14), 896-898, 2001 | 27 | 2001 |

Intelligent keystroke pressure-based typing biometrics authentication system using radial basis function network A Sulong, MU Siddiqi 2009 5th International Colloquium on Signal Processing & Its Applications …, 2009 | 22 | 2009 |

Generalized GMW quadriphase sequences satisfying the Welch bound with equality P Udaya, MU Siddiqi Applicable Algebra in Engineering, Communication and Computing 10 (3), 203-225, 2000 | 22 | 2000 |

Cryptographically generated addresses (CGAs): A survey and an analysis of performance for use in mobile environment S Qadir, MU Siddiqi IJCSNS Int. J. Comput. Sci. Netw. Secur 11 (2), 24-31, 2011 | 21 | 2011 |

Incremental hash function based on pair chaining & modular arithmetic combining G Bok-Min, MU Siddiqi, C Hean-Teik International Conference on Cryptology in India, 50-61, 2001 | 21 | 2001 |

Large Linear Complexity Sequences Over Z/sub 4/For Quadriphase Modulated Communication Systems Having Good Correlation Properties P Udaya, MU Siddiqi Proceedings. 1991 IEEE International Symposium on Information Theory, 386-386, 1991 | 18 | 1991 |

A framework for describing block cipher cryptanalysis RCW Phan, MU Siddiqi IEEE transactions on computers 55 (11), 1402-1409, 2006 | 15 | 2006 |

Wireless physical layer security using encryption and channel pre-compensation M Tahir, SPW Jarot, MU Siddiqi 2010 International Conference on Computer Applications and Industrial …, 2010 | 14 | 2010 |

Haar transformation of linear boolean function HM Rafiq, MU Siddiqi 2009 International Conference on Signal Processing Systems, 802-805, 2009 | 13 | 2009 |

A new class of asymmetric turbo code for 3G systems K Ramasamy, MU Siddiqi AEU-International Journal of Electronics and Communications 60 (6), 447-458, 2006 | 13 | 2006 |

Computational complexity and implementation aspects of the incremental hash function BM Goi, MU Siddiqi, HT Chuah IEEE Transactions on Consumer Electronics 49 (4), 1249-1255, 2003 | 13 | 2003 |

Wireless physical layer security using channel state information M Tahir, SPW Jarot, MU Siddiqi International Conference on Computer and Communication Engineering (ICCCE'10 …, 2010 | 10 | 2010 |