A Review On Steganography Substitution System Methods NAM Yusof, AA Zakaria, HA Rani, NAN Abdullah http://www.cybersecurity.my/data/content_files/12/1291.pdf 36, 12-17, 2014 | | 2014 |
Analysis of Steganography Substitution System Methods Using New Testing Techniques Proposed for Strict Avalanche Criterion AA Zakaria, NAM Yusof, WZ Omar, NAN Abdullah, HA Rani International Journal of Cryptology Research 5 (1), 61-76, 2015 | 2 | 2015 |
Audio Steganography: An Alternative Method for Secure Information Transmission AA Zakaria, LCN Chew http://www.cybersecurity.my/data/content_files/12/1229.pdf 35, 8-10, 2013 | | 2013 |
Automated Analysis Report Generation Using CSM S-Box Evaluation Tool (CSET) AA Zakaria, NAN Abdullah, W Zariman, NAMY Omar, HA Rani International Journal of Cryptology Research 6 (1), 47-63, 2017 | 2 | 2017 |
Blockchain & Cyber Security FA Ishak, AA Zakaria, SM Jawi, HA Rani http://www.cybersecurity.my/data/content_files/12/1905.pdf 45, 68-71, 2018 | | 2018 |
Blockchain Implementation (Proof-of-Concept) AA Zakaria http://www.cybersecurity.my/data/content_files/12/1715.pdf 42, 30-33, 2017 | | 2017 |
Computer and Information Sciences AA Zakaria, AH Azni, F Ridzuan, NH Zakaria, M Daud Journal of King Saud University–Computer and Information Sciences 35, 101550, 2023 | | 2023 |
Cryptography and Virus AA Zakaria, INM Shah http://www.cybersecurity.my/data/content_files/12/1715.pdf 42, 60-62, 2017 | | 2017 |
CSM S-Box Evaluation Tool (CSET); tool to evaluate the strength of an S-Box NAN Abdullah, AA Zakaria, NAM Yusof, WZ Omar, HA Rani 5th International Cryptology and Information Security Conference 2016 …, 2016 | | 2016 |
Enhanced statistical analysis evaluation using csm randomness test tool AA Zakaria, HA Rani, NA Nik International Journal of Cryptology Research, 52-75, 2019 | 1 | 2019 |
Extended RECTANGLE algorithm using 3D bit rotation to propose a new lightweight block cipher for IoT AA Zakaria, AH Azni, F Ridzuan, NH Zakaria, M Daud IEEE Access 8, 198646-198658, 2020 | 13 | 2020 |
High-capacity image steganography with minimum modified bits based on data mapping and LSB substitution AA Zakaria, M Hussain, AWA Wahab, MYI Idris, NA Abdullah, KH Jung Applied Sciences 8 (11), 2199, 2018 | 66 | 2018 |
Keselamatan Rangkaian Komputer LCN Chew, AA Zakaria http://www.cybersecurity.my/data/content_files/12/1078.pdf 32, 7-9, 2012 | | 2012 |
Kriptografi di Sekeliling Kita AA Zakaria, LCN Chew http://www.cybersecurity.my/data/content_files/12/1043.pdf 31, 13-17, 2012 | | 2012 |
LAO-3D: a symmetric lightweight block cipher based on 3d permutation for mobile encryption application AA Zakaria, AH Ab Halim, F Ridzuan, NH Zakaria, M Daud Symmetry 14 (10), 2042, 2022 | 7 | 2022 |
Legal Restriction on Cryptography LCN Chew, AA Zakaria http://www.cybersecurity.my/data/content_files/12/997.pdf 28, 8-12, 2011 | | 2011 |
Mathematics Operations in Binary Numeral System AA Zakaria http://www.cybersecurity.my/data/content_files/12/997.pdf 28, 27-31, 2011 | | 2011 |
Modifications of key schedule algorithm on RECTANGLE block cipher AA Zakaria, AH Azni, F Ridzuan, NH Zakaria, M Daud Advances in Cyber Security: Second International Conference, ACeS 2020 …, 2021 | 4 | 2021 |
Nik Azura Nik Abdullah, Norul Hidayah Ahmad Zawawi, Hazlin Abdul Rani, Abdul Alif Zakaria. Randomness Analysis on Speck Family Of Lightweight Block Cipher LCN Chew, INM Shah International Journal of Cryptology Research 5 (1), 44-60, 2015 | 2 | 2015 |
Pengenalan kepada Bitcoin WZ Omar, WMM Isa, AA Zakaria http://www.cybersecurity.my/data/content_files/12/1632.pdf 41, 151-152, 2016 | | 2016 |