Follow
Muhammad Reza Z'aba
Title
Cited by
Cited by
Year
Bit-pattern based integral attack
MR Z’aba, H Raddum, M Henricksen, E Dawson
Fast Software Encryption: 15th International Workshop, FSE 2008, Lausanne …, 2008
992008
Comprehensive survey of machine learning approaches in cognitive radio-based vehicular ad hoc networks
MA Hossain, RM Noor, KLA Yau, SR Azzuhri, MR Z’aba, I Ahmedy
IEEE Access 8, 78054-78108, 2020
612020
Construction of cryptographically strong S-boxes inspired by bee waggle dance
H Isa, N Jamil, MR Z’aba
New generation computing 34, 221-238, 2016
432016
Threat modeling approaches for securing cloud computin
A Amini, N Jamil, AR Ahmad, MR Zaba
Journal of Applied Sciences 15 (7), 953-967, 2015
372015
A survey of lightweight cryptographic hash function
BT Hammad, N Jamil, ME Rusli, MR Z’aba
Inter. J. Sci. Eng. Res 8, 806-814, 2017
322017
Capacity and frequency optimization of wireless backhaul network using traffic forecasting
A Mahmood, MLM Kiah, MR Z’aba, AN Qureshi, MSS Kassim, ZHA Hasan, ...
IEEE Access 8, 23264-23276, 2020
272020
Analysis of linear relationships in block ciphers
MR Z'aba
Queensland University of Technology, 2010
272010
I-PRESENTTM: An Involutive Lightweight Block Cipher
MR Z’aba, N Jamil, ME Rusli, MZ Jamaludin, AAM Yasir
Journal of Information Security 2014, 2014
262014
Machine learning-based cooperative spectrum sensing in dynamic segmentation enabled cognitive radio vehicular network
MA Hossain, R Md Noor, KLA Yau, SR Azzuhri, MR Z’aba, I Ahmedy, ...
Energies 14 (4), 1169, 2021
252021
Implementation of PRINCE algorithm in FPGA
YA Abbas, R Jidin, N Jamil, MR Z'aba, ME Rusli, B Tariq
Proceedings of the 6th International Conference on Information Technology …, 2014
232014
Adapted stream region for packet marking based on DDoS attack detection in vehicular ad hoc networks
R Kolandaisamy, RM Noor, MR Z’aba, I Ahmedy, I Kolandaisamy
The Journal of Supercomputing 76 (8), 5948-5970, 2020
202020
AES: Current security and efficiency analysis of its alternatives
H Isa, I Bahari, H Sufian, MR Z'aba
2011 7th International Conference on Information Assurance and Security (IAS …, 2011
192011
Authenticated encryption schemes: A systematic review
MA Jimale, MR Z’aba, MLBM Kiah, MYI Idris, N Jamil, MS Mohamad, ...
IEEE Access 10, 14739-14766, 2022
182022
Spectrum sensing challenges & their solutions in cognitive radio based vehicular networks
MA Hossain, R Md Noor, SR Azzuhri, MR Z'aba, I Ahmedy, KLA Yau, ...
International Journal of Communication Systems 34 (7), e4748, 2021
182021
S-box construction from non-permutation power functions
H Isa, N Jamil, MR Z'aba
Proceedings of the 6th International Conference on Security of Information …, 2013
182013
Structured encryption for conceptual graphs
GS Poh, MS Mohamad, MR Z’aba
International Workshop on Security, 105-122, 2012
152012
IMPLEMENTATION OF LIGHTWEIGHT CRYPTOGRAPHIC PRIMITIVES.
BT Hammad, N Jamil, ME Rusli, MR Z'ABA, IT Ahmed
Journal of Theoretical & Applied Information Technology 95 (19), 2017
132017
Hybrid heuristic methods in constructing cryptographically strong S-boxes
H Isa, N Jamil, M Z’aba
Int. J. Cryptol. Res 6 (1), 1-15, 2016
122016
PRINCE IP-core on field programmable gate arrays (FPGA)
YA Abbas, R Jidin, N Jamil, ME Rusli
Research Journal of Applied Sciences, Engineering and Technology 10 (8), 914-922, 2015
102015
A survey on the cryptanalysis of the advanced encryption standard
MR Z’aba, MA Maarof
Proceedings of the postgraduate annual research seminar, 97-102, 2006
102006
The system can't perform the operation now. Try again later.
Articles 1–20