Follow
Herman Isa
Herman Isa
Researcher at MIMOS Berhad
Verified email at mimos.my
Title
Cited by
Cited by
Year
Construction of Cryptographically Strong S-Boxes Inspired by Bee Waggle Dance
H Isa, N Jamil, MR Z'aba
New Generation Computing 34 (3), 221-238, 2016
432016
Practical bijective S-box design
A Mamadolimov, H Isa, MS Mohamad
arXiv preprint arXiv:1301.4723, 2013
202013
AES: Current Security and Efficiency Analysis of its Alternatives
H Isa, I Bahari, MR Z'aba
Journal of Information Assurance and Security 7 (1), 52-59, 2012
192012
S-box construction from non-permutation power functions
H Isa, N Jamil, MR Z'aba
Proceedings of the 6th International Conference on Security of Information …, 2013
182013
Hybrid heuristic methods in constructing cryptographically strong S-boxes
H Isa, N Jamil, M Z’aba
Int. J. Cryptol. Res 6 (1), 1-15, 2016
122016
Selection of a subset of EEG channels of epileptic patient during seizure using PCA
T Ahmad, RA Fairuz, F Zakaria, H Isa
Proceedings of the 7th WSEAS International Conference on Signal Processing …, 2008
112008
Improved S-Box Construction from Binomial Power Functions
H Isa, N Jamil, MR Z'aba
4th International Cryptology and Information Security Conference 2014 …, 2014
72014
Randomness analysis on LED block ciphers
H Isa, MR Z'aba
Proceedings of the Fifth International Conference on Security of Information …, 2012
72012
Enhancement of Non-Permutation Binomial Power Functions to Construct Cryptographically Strong S-Boxes
H Isa, SAA Syed Junid, MR Z’aba, R Endut, SM Ammar, N Ali
Mathematics 11 (2), 446, 2023
52023
Randomness of the PRINCE block cipher
H Isa, MR Z'aba
International Conference on Frontiers of Communications, Networks and …, 2014
32014
Nonlinear Boolean Permutations
A Mamadolimov, H Isa, MM Ahmad, MS Mohamad
Pertanika J. Sci. Technol 19, 1-9, 2011
12011
Development of a new direct AND (D-AND) detection technique for SAC-OCDMA systems using flexible double weight (FDW) code
SM Ammar, N Ali, MA Anuar, MN Saad, SA Aljunid, R Endut, H Isa, ...
Optical and Quantum Electronics 56 (5), 711, 2024
2024
S-box Optimisation using Heuristic Methods
H Isa, N Jamil, MR Z'aba
5th International Cryptology and Information Security Conference 2016 …, 2016
2016
The system can't perform the operation now. Try again later.
Articles 1–13