Publications

Refined By:
Date Issued:  [2010 TO 2018]

Results 1-11 of 11 (Search time: 0.0 seconds).

Issue DateTitleAuthor(s)
12012STITCH-256: A dedicated cryptographic hash functionJamil, N. ; Mahmod, R. ; Z'aba, M.R. ; Udzir, N.I. ; Zukarnain, Z.A. 
22016S-box optimisation using heuristic methodsIsa, H. ; Jamil, N. ; Z'Aba, M.R. 
32013S-box construction from non-permutation power functionsIsa, H. ; Jamil, N. ; Z'aba, M.R. 
42010Quantum key distribution in terms of the Greenberger-Horne-Zeilinger state: Multi-key generationEl-Orany, F.A.A. ; Wahiddin, M.R.B. ; Mat-Nor, M.-A. ; Jamil, N. ; Bahari, I. 
52014Improved S-box construction from binomial power functionsIsa, H. ; Jamil, N. ; Z'aba, M.R. 
62015Implementation of PRINCE algorithm in FPGAAbbas, Y.A. ; Jidin, R. ; Jamil, N. ; Z'aba, M.R. ; Rusli, M.E. ; Tariq, B. 
72013Diffusion and statistical analysis of STITCH-256Jamil, N. ; Mahmod, R. ; Z'aba, M.R. ; Udzir, N.I. ; Zukarnain, Z.A. 
82016Construction of Cryptographically Strong S-Boxes Inspired by Bee Waggle DanceIsa, H. ; Jamil, N. ; Z’aba, M.R. 
92011Cellular automata based user authentication scheme using identity-bits commitment for Wireless Sensor NetworkJamil, N. ; Mahmood, R. 
102018Can convolution neural network (CNN) triumph in ear recognition of uniform illumination invariant?Jamil, N. ; Almisreb, A.A. ; Ariffin, S.M.Z.S.Z. ; Md Din, N. ; Hamzah, R. 
112011An observation of cryptographic properties of 256 one-dimensional cellular automata rulesJamil, N. ; Mahmood, R. ; Zába, M.R. ; Zukamaen, Z.A. ; Udzir, N.I. 

Loading... 2 0 5 0 false
Norz.jpg picture
Credit Name
Norziana Jamil Dr.
Full Name
Jamil, N.
Email
Norziana@uniten.edu.my
 
Loading... 3 0 5 0 false