Muhammad Reza Z'aba
Muhammad Reza Z'aba
Verified email at um.edu.my - Homepage
Title
Cited by
Cited by
Year
Bit-pattern based integral attack
MR Z’aba, H Raddum, M Henricksen, E Dawson
International Workshop on Fast Software Encryption, 363-381, 2008
782008
Analysis of linear relationships in block ciphers
MR Z'aba
Queensland University of Technology, 2010
222010
Construction of cryptographically strong S-boxes inspired by bee waggle dance
H Isa, N Jamil, MR Z’aba
New generation computing 34 (3), 221-238, 2016
202016
Threat modeling approaches for securing cloud computin
A Amini, N Jamil, AR Ahmad, MR Zaba
JApSc 15 (7), 953-967, 2015
142015
AES: Current security and efficiency analysis of its alternatives
H Isa, I Bahari, H Sufian, MR Z'aba
2011 7th International Conference on Information Assurance and Security (IAS …, 2011
132011
I-PRESENTTM: An Involutive Lightweight Block Cipher
MR Z’aba, N Jamil, ME Rusli, MZ Jamaludin, AAM Yasir
Journal of Information Security 2014, 2014
122014
S-box construction from non-permutation power functions
H Isa, N Jamil, MR Z'aba
Proceedings of the 6th International Conference on Security of Information …, 2013
92013
Structured encryption for conceptual graphs
GS Poh, MS Mohamad, MR Z’aba
International Workshop on Security, 105-122, 2012
82012
Implementation of PRINCE algorithm in FPGA
YA Abbas, R Jidin, N Jamil, MR Z'aba, ME Rusli, B Tariq
Proceedings of the 6th International Conference on Information Technology …, 2014
72014
Hybrid heuristic methods in constructing cryptographically strong S-boxes
H Isa, N Jamil, M Z’aba
Int. J. Cryptol. Res 6 (1), 1-15, 2016
52016
Improved S-box construction from binomial power functions
H Isa, N Jamil, MR Z'aba
Malaysian Journal of Mathematical Sciences 9, 21-35, 2015
52015
KEY-DEPENDENT S-BOX IN LIGHTWEIGHT BLOCK CIPHERS.
SSM Aldabbagh, IFT Al Shaikhli, MR ZABA
Journal of Theoretical & Applied Information Technology 62 (2), 2014
52014
Randomness analysis on LED block ciphers
H Isa, MR Z'aba
Proceedings of the Fifth International Conference on Security of Information …, 2012
42012
Reasoning of collaborative human behaviour in security-criticalwork practices: A framework
GS Poh, NN Abdullah, MR Z’aba, MR Wahiddin
Trustworthy Ubiquitous Computing, 99-106, 2012
42012
An observation of cryptographic properties of 256 one-dimensional cellular automata rules
N Jamil, R Mahmood, MR Zába, ZA Zukamaen, NI Udzir
International Conference on Informatics Engineering and Information Science …, 2011
42011
Algebraic analysis of LEX
MR Z'aba, H Raddum, L Simpson, E Dawson, M Henricksen, K Wong
Australian Computer Society, Inc. 98, 33-45, 2009
42009
IMPLEMENTATION OF LIGHTWEIGHT CRYPTOGRAPHIC PRIMITIVES.
BT Hammad, N Jamil, ME Rusli, MR Z'ABA, IT Ahmed
Journal of Theoretical & Applied Information Technology 95 (19), 2017
32017
PRINCE IP-core on Field Programmable Gate Arrays (FPGA)
YA Abbas, R Jidin, N Jamil, ME Rusli
Research Journal of Applied Sciences, Engineering and Technology 10 (8), 914-922, 2015
32015
Algebraic analysis of small scale LEX-BES
MR Z'aba, K Wong, E Dawson, L Simpson
Proceeding of the 2nd International Cryptology Conference 2010, 77-82, 2010
32010
A survey on the cryptanalysis of the advanced encryption standard
MR Z’aba, MA Maarof
Proceedings of the Postgraduate Annual Research Seminar, 97-102, 2006
32006
The system can't perform the operation now. Try again later.
Articles 1–20