Search

Your search keyword '"Muhammad Rezal Kamel Ariffin"' showing total 133 results

Search Constraints

Start Over You searched for: Author "Muhammad Rezal Kamel Ariffin" Remove constraint Author: "Muhammad Rezal Kamel Ariffin"
133 results on '"Muhammad Rezal Kamel Ariffin"'

Search Results

1. Concurrent factorization of RSA moduli via weak key equations

2. New simultaneous Diophantine attacks on generalized RSA key equations

3. A failure in decryption process for bivariate polynomial reconstruction problem cryptosystem

4. Cryptanalysis of the SHMW signature scheme

5. Mathematical epidemiologic and simulation modelling of first wave COVID-19 in Malaysia

6. On the Improvement Attack Upon Some Variants of RSA Cryptosystem via the Continued Fractions Method

7. An IND-CPA Analysis of a Cryptosystem Based on Bivariate Polynomial Reconstruction Problem

8. Rank AGS Identification Scheme and Signature Scheme

9. New Identified Strategies to Forge Multivariate Signature Schemes

10. On (Unknowingly) Using Near-Square RSA Primes

11. An Efficient Identification Scheme Based on Bivariate Function Hard Problem

12. Cryptanalysis of RSA-Variant Cryptosystem Generated by Potential Rogue CA Methodology

13. Analytical cryptanalysis upon N = p2q utilizing Jochemsz-May strategy.

14. Factoring the Modulus of Type N = p2q by Finding Small Solutions of the Equation er − (Ns + t) = αp2 + βq2

15. A Security-Mediated Encryption Scheme Based on ElGamal Variant

16. Determination of a Good Indicator for Estimated Prime Factor and Its Modification in Fermat’s Factoring Algorithm

17. New Jochemsz–May Cryptanalytic Bound for RSA System Utilizing Common Modulus N = p2q

18. Partial Key Attack Given MSBs of CRT-RSA Private Keys

19. Enhancing Chaos Complexity of a Plasma Model through Power Input with Desirable Random Features

20. A New LSB Attack on Special-Structured RSA Primes

21. Commuting Graphs, C(G, X) in Symmetric Groups Sym(n) and Its Connectivity

23. New Cryptanalytic Attack on RSA Modulus N = pq Using Small Prime Difference Method

42. Rank AGS Identification Scheme and Signature Scheme

45. Exponential increment of RSA attack range via lattice based cryptanalysis

46. URASP: An ultralightweight RFID authentication scheme using permutation operation

48. CRYPTANALYSIS OF RSA KEY EQUATION OF N=p^2q FOR SMALL |2q – p| USING CONTINUED FRACTION

49. Findings Annihilator(s) via Fault Injection Analysis (FIA) on Boolean Function of LILI-128

50. Enhancing Chaos Complexity of a Plasma Model through Power Input with Desirable Random Features

Catalog

Books, media, physical & digital resources