Search Results - Udzir N.I.
- Showing 1 - 4 results of 4
-
1
An observation of cryptographic properties of 256 one-dimensional cellular automata rules by Jamil N., Mahmood R., Z�ba M.R., Zukamaen Z.A., Udzir N.I.
Published 2023Conference paper -
2
STITCH-256: A dedicated cryptographic hash function by Jamil N., Mahmod R., Z'aba M.R., Udzir N.I., Zukarnain Z.A.
Published 2023Article -
3
An empirical study of the characteristics of access control model towards secure KMS in collaborative environment by Abu Bakar A., Abdullah R., Udzir N.I., Ibrahim H.
Published 2024journal::journal article -
4
Diffusion and statistical analysis of STITCH-256 by Jamil N., Mahmod R., Z'aba M.R., Udzir N.I., Zukarnain Z.A.
Published 2023Article
