Follow
Shekh Faisal Abdul-Latip
Title
Cited by
Cited by
Year
Extended cubes: enhancing the cube attack by extracting low-degree non-linear equations
SF Abdul-Latip, MR Reyhanitabar, W Susilo, J Seberry
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
372011
On the security of NOEKEON against side channel cube attacks
SF Abdul-Latip, MR Reyhanitabar, W Susilo, J Seberry
Information Security, Practice and Experience: 6th International Conference …, 2010
332010
A Systematic Literature Review on the Security and Privacy of the Blockchain and Cryptocurrency
A Hassan, MZ Mas'ud, W Md. Shah, SF Abdul-Latip, R Ahmad, A Ariffin, ...
OIC-CERT Journal of Cyber Security 2 (1), 1-17, 2020
212020
A Review of Digital Forensics Framework for Blockchain in Cryptocurrency Technology
MZ Mas'Ud, A Hassan, WM Shah, SF Abdul-Latip
The 3rd International Cyber Resilience Conference 2021 (CRC2021), 2021
122021
Fault analysis of the KATAN family of block ciphers
SF Abdul-Latip, MR Reyhanitabar, W Susilo, J Seberry
Information Security Practice and Experience: 8th International Conference …, 2012
102012
The Direction of Lightweight Ciphers in Mobile Big Data Computing
AG Buja, SF Abdul-Latip
Procedia Computer Science, ISSN: 1877-0509, 72, 469-476, 2015
82015
A Security Analysis of IoT Encryption: Side-channel Cube Attack on Simeck32/64
AG Buja, SF Abdul-Latip, R Ahmad
International Journal of Computer Networks & Communications (IJCNC) 10 (4 …, 2018
72018
Key-dependent Side-Channel Cube Attack on CRAFT
KA Pang, SF Abdul-Latip
ETRI Journal 43 (2), 344-356, 2021
32021
A Light Review on Cyber Security Awareness Models for the Elderly
NA Azam, AG Buja, NM Sahri, R Ahmad, NF Habidin, SFA Latip, ...
Journal of Advanced Research in Applied Sciences and Engineering Technology …, 2025
22025
Repeated Differential Properties of PRESENT Key Schedules
AG Buja, SF Abdul-Latip, R Ahmad
ICINS 2016, 24-28, 2016
22016
Slid Pairs of the Fruit-80 Stream Cipher
KA Pang, SF Abdul-Latip, H Abdul Rani
International Journal of Communication Networks and Information Security …, 2020
12020
A Comparative Study for Risk Analysis Tools in Information Security
AY Zabawi, R Ahmad, SF Abdul-Latip
ARPN Journal of Engineering and Applied Sciences 10 (No. 23, December 2015 …, 2015
1*2015
Algebraic and Side-channel Analysis of Lightweight Block Ciphers
A Latip, S Faisal
12012
Development of a New Synergistic Cyber Security Awareness Model for The Elderly in Malaysia (SCSAM-Elderly)
N Alieyah, AG Buja, NM Sahri, R Ahmad, SFA Latip, NF Habidin, ...
2023 IEEE 8th International Conference on Recent Advances and Innovations in …, 2023
2023
Synergistic Cyber Security Awareness Model for the elderly (SCSAM-Elderly)
AG Buja, NA Azam, NM Sahri, R Ahmad, NF Habidin, SF Abdul Latip
Faculty of Computer and Mathematical Sciences, 2023
2023
A New Design of Substitution Box with Ideal Strict Avalanche Criterion
NF Mohd Esa, SF Abdul-Latip, NA Abu
Malaysian Journal of Mathematical Sciences 16 (4), 697-715, 2022
2022
A New Design of Substitution Box with Ideal Strict Avalanche Criterion.
NF Esa, SF Abdul-Latip, NA Abu
Malaysian Journal of Mathematical Sciences 16 (4), 2022
2022
Pelaksanaan Akta Enkripsi Tangani Ketirisan Data, Maklumat
SF Abdul-Latip
Berita Harian, 7 January 2022, page 12, https://gallery.utem.edu.my …, 2022
2022
Algoritma Kriptografi Benteng Pengurusan Sistem Digital
SF Abdul-Latip
Berita Harian, 29 September 2021, page 12, https://www.facebook.com/myftmk …, 2021
2021
A Survey of ARX-based Symmetric-Key Primitives
NF Mohd Esa, SF Abdul-Latip, MR Baharon
International Journal of Communication Networks and Information Security …, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–20