Search Results - 24726154700
- Showing 1 - 20 results of 22
- Go to Next Page
-
1
Improved S-box construction from binomial power functions by Isa H., Jamil N., Z'aba M.R.
Published 2023Conference Paper -
2
The CiliPadi Family of Lightweight Authenticated Encryption, v1.2 by Z'aba M.R., Jamil N., Rohmad M.S., Rani H.A., Shamsuddin S.
Published 2023Other Authors: “…24726154700…”
Article -
3
S-box optimisation using heuristic methods by Isa H., Jamil N., Z'Aba M.R.
Published 2023Conference Paper -
4
Construction of Cryptographically Strong S-Boxes Inspired by Bee Waggle Dance by Isa H., Jamil N., Z�aba M.R.
Published 2023Article -
5
-
6
Implementation of lightweight cryptographic primitives by Hammad B.T., Jamil N., Rusli M.E., Z�Aba M.R., Ahmed I.T.
Published 2023Article -
7
Implementation of lightweight cryptographic primitives by Hammad B.T., Jamil N., Rusli M.E., Z�Aba M.R., Ahmed I.T.
Published 2023Article -
8
Faster multicollisions attack on sponge construction by Hammad B.T., Jamil N., Zaba M.R., Rusli M.E., Ahmed I.T.
Published 2023Article -
9
Securing electrical substation's wireless messaging with a lightweight crypto-algorithm IP core by Abbas Y.A., Jidin R., Jami N., Z'aba M.R.
Published 2023Conference Paper -
10
S-box construction from non-permutation power functions by Isa H., Jamil N., Z'aba M.R.
Published 2023Conference paper -
11
An observation of cryptographic properties of 256 one-dimensional cellular automata rules by Jamil N., Mahmood R., Z�ba M.R., Zukamaen Z.A., Udzir N.I.
Published 2023Conference paper -
12
Photon: A new mix columns architecture on FPGA by Abbas Y.A., Jidin R., Jamil N., Z'aba M.R., Mohamed M.A.
Published 2023Article -
13
Assessing the cyber-security of the IEC 60870-5-104 protocol in SCADA system by Qassim Q.S., Jamil N., Z'aba M.R., Kamarulzaman W.A.W.
Published 2023Article -
14
STITCH-256: A dedicated cryptographic hash function by Jamil N., Mahmod R., Z'aba M.R., Udzir N.I., Zukarnain Z.A.
Published 2023Article -
15
PRINCE IP-core on Field Programmable Gate Arrays (FPGA) by Abbas Y.A., Jidin R., Jamil N., Z'aba M.R., Rusli M.E.
Published 2023Article -
16
Reusable data-path architecture for encryption-then-authentication on FPGA by Abbas Y.A., Jidin R., Jamil N., Zaba M.R.
Published 2023Article -
17
Lightweight PRINCE algorithm IP core for securing GSM messaging using FPGA by Abbas Y.A., Jidin R., Jamil N., Z'aba M.R.
Published 2023Article -
18
Authenticated Encryption Schemes: A Systematic Review by Jimale M.A., Z'Aba M.R., Kiah M.L.B.M., Idris M.Y.I., Jamil N., Mohamad M.S., Rohmad M.S.
Published 2023Review -
19
Implementation of PRINCE algorithm in FPGA by Abbas Y.A., Jidin R., Jamil N., Z'aba M.R., Rusli M.E., Tariq B.
Published 2023Conference Paper -
20
Diffusion and statistical analysis of STITCH-256 by Jamil N., Mahmod R., Z'aba M.R., Udzir N.I., Zukarnain Z.A.
Published 2023Article
