关注
Abdul Alif Zakaria
Abdul Alif Zakaria
Senior Analyst, CyberSecurity Malaysia
在 cybersecurity.my 的电子邮件经过验证
标题
引用次数
年份
A Review On Steganography Substitution System Methods
NAM Yusof, AA Zakaria, HA Rani, NAN Abdullah
http://www.cybersecurity.my/data/content_files/12/1291.pdf 36, 12-17, 2014
2014
Analysis of Steganography Substitution System Methods Using New Testing Techniques Proposed for Strict Avalanche Criterion
AA Zakaria, NAM Yusof, WZ Omar, NAN Abdullah, HA Rani
International Journal of Cryptology Research 5 (1), 61-76, 2015
22015
Audio Steganography: An Alternative Method for Secure Information Transmission
AA Zakaria, LCN Chew
http://www.cybersecurity.my/data/content_files/12/1229.pdf 35, 8-10, 2013
2013
Automated Analysis Report Generation Using CSM S-Box Evaluation Tool (CSET)
AA Zakaria, NAN Abdullah, W Zariman, NAMY Omar, HA Rani
International Journal of Cryptology Research 6 (1), 47-63, 2017
22017
Blockchain & Cyber Security
FA Ishak, AA Zakaria, SM Jawi, HA Rani
http://www.cybersecurity.my/data/content_files/12/1905.pdf 45, 68-71, 2018
2018
Blockchain Implementation (Proof-of-Concept)
AA Zakaria
http://www.cybersecurity.my/data/content_files/12/1715.pdf 42, 30-33, 2017
2017
Computer and Information Sciences
AA Zakaria, AH Azni, F Ridzuan, NH Zakaria, M Daud
Journal of King Saud University–Computer and Information Sciences 35, 101550, 2023
2023
Cryptography and Virus
AA Zakaria, INM Shah
http://www.cybersecurity.my/data/content_files/12/1715.pdf 42, 60-62, 2017
2017
CSM S-Box Evaluation Tool (CSET); tool to evaluate the strength of an S-Box
NAN Abdullah, AA Zakaria, NAM Yusof, WZ Omar, HA Rani
5th International Cryptology and Information Security Conference 2016 …, 2016
2016
Enhanced statistical analysis evaluation using csm randomness test tool
AA Zakaria, HA Rani, NA Nik
International Journal of Cryptology Research, 52-75, 2019
12019
Extended RECTANGLE algorithm using 3D bit rotation to propose a new lightweight block cipher for IoT
AA Zakaria, AH Azni, F Ridzuan, NH Zakaria, M Daud
IEEE Access 8, 198646-198658, 2020
132020
High-capacity image steganography with minimum modified bits based on data mapping and LSB substitution
AA Zakaria, M Hussain, AWA Wahab, MYI Idris, NA Abdullah, KH Jung
Applied Sciences 8 (11), 2199, 2018
662018
Keselamatan Rangkaian Komputer
LCN Chew, AA Zakaria
http://www.cybersecurity.my/data/content_files/12/1078.pdf 32, 7-9, 2012
2012
Kriptografi di Sekeliling Kita
AA Zakaria, LCN Chew
http://www.cybersecurity.my/data/content_files/12/1043.pdf 31, 13-17, 2012
2012
LAO-3D: a symmetric lightweight block cipher based on 3d permutation for mobile encryption application
AA Zakaria, AH Ab Halim, F Ridzuan, NH Zakaria, M Daud
Symmetry 14 (10), 2042, 2022
72022
Legal Restriction on Cryptography
LCN Chew, AA Zakaria
http://www.cybersecurity.my/data/content_files/12/997.pdf 28, 8-12, 2011
2011
Mathematics Operations in Binary Numeral System
AA Zakaria
http://www.cybersecurity.my/data/content_files/12/997.pdf 28, 27-31, 2011
2011
Modifications of key schedule algorithm on RECTANGLE block cipher
AA Zakaria, AH Azni, F Ridzuan, NH Zakaria, M Daud
Advances in Cyber Security: Second International Conference, ACeS 2020 …, 2021
42021
Nik Azura Nik Abdullah, Norul Hidayah Ahmad Zawawi, Hazlin Abdul Rani, Abdul Alif Zakaria. Randomness Analysis on Speck Family Of Lightweight Block Cipher
LCN Chew, INM Shah
International Journal of Cryptology Research 5 (1), 44-60, 2015
22015
Pengenalan kepada Bitcoin
WZ Omar, WMM Isa, AA Zakaria
http://www.cybersecurity.my/data/content_files/12/1632.pdf 41, 151-152, 2016
2016
系统目前无法执行此操作,请稍后再试。
文章 1–20