Extended cubes: enhancing the cube attack by extracting low-degree non-linear equations SF Abdul-Latip, MR Reyhanitabar, W Susilo, J Seberry Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011 | 37 | 2011 |
On the security of NOEKEON against side channel cube attacks SF Abdul-Latip, MR Reyhanitabar, W Susilo, J Seberry Information Security, Practice and Experience: 6th International Conference …, 2010 | 33 | 2010 |
A Systematic Literature Review on the Security and Privacy of the Blockchain and Cryptocurrency A Hassan, MZ Mas'ud, W Md. Shah, SF Abdul-Latip, R Ahmad, A Ariffin, ... OIC-CERT Journal of Cyber Security 2 (1), 1-17, 2020 | 21 | 2020 |
A Review of Digital Forensics Framework for Blockchain in Cryptocurrency Technology MZ Mas'Ud, A Hassan, WM Shah, SF Abdul-Latip The 3rd International Cyber Resilience Conference 2021 (CRC2021), 2021 | 12 | 2021 |
Fault analysis of the KATAN family of block ciphers SF Abdul-Latip, MR Reyhanitabar, W Susilo, J Seberry Information Security Practice and Experience: 8th International Conference …, 2012 | 10 | 2012 |
The Direction of Lightweight Ciphers in Mobile Big Data Computing AG Buja, SF Abdul-Latip Procedia Computer Science, ISSN: 1877-0509, 72, 469-476, 2015 | 8 | 2015 |
A Security Analysis of IoT Encryption: Side-channel Cube Attack on Simeck32/64 AG Buja, SF Abdul-Latip, R Ahmad International Journal of Computer Networks & Communications (IJCNC) 10 (4 …, 2018 | 7 | 2018 |
Key-dependent Side-Channel Cube Attack on CRAFT KA Pang, SF Abdul-Latip ETRI Journal 43 (2), 344-356, 2021 | 2 | 2021 |
Repeated Differential Properties of PRESENT Key Schedules AG Buja, SF Abdul-Latip, R Ahmad ICINS 2016, 24-28, 2016 | 2 | 2016 |
A Light Review on Cyber Security Awareness Models for the Elderly NA Azam, AG Buja, NM Sahri, R Ahmad, NF Habidin, SFA Latip, ... Journal of Advanced Research in Applied Sciences and Engineering Technology …, 2025 | 1 | 2025 |
Slid Pairs of the Fruit-80 Stream Cipher KA Pang, SF Abdul-Latip, H Abdul Rani International Journal of Communication Networks and Information Security …, 2020 | 1 | 2020 |
A Comparative Study for Risk Analysis Tools in Information Security AY Zabawi, R Ahmad, SF Abdul-Latip ARPN Journal of Engineering and Applied Sciences 10 (No. 23, December 2015 …, 2015 | 1* | 2015 |
Algebraic and Side-channel Analysis of Lightweight Block Ciphers A Latip, S Faisal | 1 | 2012 |
Development of a New Synergistic Cyber Security Awareness Model for The Elderly in Malaysia (SCSAM-Elderly) N Alieyah, AG Buja, NM Sahri, R Ahmad, SFA Latip, NF Habidin, ... 2023 IEEE 8th International Conference on Recent Advances and Innovations in …, 2023 | | 2023 |
Synergistic Cyber Security Awareness Model for the elderly (SCSAM-Elderly) AG Buja, NA Azam, NM Sahri, R Ahmad, NF Habidin, SF Abdul Latip Faculty of Computer and Mathematical Sciences, 2023 | | 2023 |
A New Design of Substitution Box with Ideal Strict Avalanche Criterion NF Mohd Esa, SF Abdul-Latip, NA Abu Malaysian Journal of Mathematical Sciences 16 (4), 697-715, 2022 | | 2022 |
A New Design of Substitution Box with Ideal Strict Avalanche Criterion. NF Esa, SF Abdul-Latip, NA Abu Malaysian Journal of Mathematical Sciences 16 (4), 2022 | | 2022 |
Pelaksanaan Akta Enkripsi Tangani Ketirisan Data, Maklumat SF Abdul-Latip Berita Harian, 7 January 2022, page 12, https://gallery.utem.edu.my …, 2022 | | 2022 |
Algoritma Kriptografi Benteng Pengurusan Sistem Digital SF Abdul-Latip Berita Harian, 29 September 2021, page 12, https://www.facebook.com/myftmk …, 2021 | | 2021 |
A Survey of ARX-based Symmetric-Key Primitives NF Mohd Esa, SF Abdul-Latip, MR Baharon International Journal of Communication Networks and Information Security …, 2019 | | 2019 |