Norziana Jamil

  • Citations Per Year
Learn More
A substitution box (s-box) is a nonlinear component function used in most block ciphers. It must fulfill several cryptographic properties such as high nonlinearity, low differential uniformity and complex algebraic expression to resist against linear, differential and interpolation attacks. In this paper, we extend and improve the s-box construction method(More)
Abstract. Cryptographic hash function is a combination of several components including a compression function which is made up of a few underlying elements such as Boolean functions and permutation. Some properties of Boolean functions are very helpful for determining sufficient conditions used in modern attack for hash functions. We study these underlying(More)
In Wireless Sensor Network (WSN) communication, authentication between the communicating nodes is an important aspect and has gained intensive interest from the researcher all around the world. With the advance of the technology where the communication devices are all in small form factor, high speed and low cost authentication scheme for generating Message(More)
Indoor positioning system (IPS) allows an object to be located and tracked within an indoor environment. With the introduction of Internet of Things (IoT), the business interest in location-based application and services has also increased. Hence, the demand for accurate indoor localization services has become important. Until now, researches related to IPS(More)
This paper presents a hardware implementation of the PRINCE block cipher in Field Programmable Gate Array (FPGA). In many security applications, the software implementations of cryptographic algorithms are slow and inefficient. In order to solve the problems, a new FPGA architecture was proposed to speed up the performance and flexibility of PRINCE(More)
Zakat or better known as almsgiving is one of the major Islamic principles which is obligated to qualified Muslims. The almsgiving principle aims to assist the needy and eliminate poverty in the society whilst promoting the elimination of greed and selfishness among the Muslim community. The government also holds the responsibility of creating a zakat(More)
In this paper, we explore a heuristic method called the bee waggle dance to construct cryptographically strong S-boxes. The S-boxes exhibit good cryptographic properties such as high nonlinearity, low differential uniformity and high algebraic degree. The method involves the use of a trinomial power function as the initial S-box. The elements in the S-box(More)
The IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) was introduced as the routing standard for the Internet of Things (IoT) by the Internet Engineering Task Force (IETF) in 6LowPAN environment networks. It supports a secure version of routing control messages while providing three security support modes known as Unsecured, Pre-installed and(More)
Wireless sensor networks have received a great attention since they emerged as new ways of communicating and distributing information in wireless network. However the security aspect of wireless sensor network remains an issue, namely authentication, key management and secure localization. Since the communication of wireless sensor is on broadcast basis,(More)
  • 1