Showing
1 - 6
results of
6
Skip to content
VuFind
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Find
Advanced
Author
Sarbini, Izzatul Nabila
Search Results - Sarbini, Izzatul Nabila
Showing
1 - 6
results of
6
Refine Results
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
1
An analysis for chosen plaintext attack in elliptic curve cryptosystem based on second order lucas sequence
by
Koo, Lee Feng
,
Sarbini, Izzatul Nabila
,
Yiu, Pang Hung
,
Naning @ Zin, Fatin Hana
,
Wong, Tze Jin
Published 2019
Get full text
Get full text
QR Code
2
Security analysis of Lucas based El-Gamal Cryptosystem in the elliptic curve group over finite field using two types of GMITM attacks
by
Sarbini, Izzatul Nabila
,
Wong, Tze Jin
,
Koo, Lee Feng
,
Othman, Mohamed
,
Md Said, Mohamad Rushdan
,
Yiu, Pang Hung
Published 2018
Get full text
Get full text
QR Code
3
Garbage-man-in-the-middle (type 2) attack on the Lucas based El-Gamal cryptosystem in the elliptic curve group over finite field
by
Sarbini, Izzatul Nabila
,
Wong, Tze Jin
,
Koo, Lee Feng
,
Othman, Mohamed
,
Md. Said, Mohamad Rushdan
,
Yiu, Pang Hung
Published 2018
Get full text
Get full text
QR Code
4
Common modulus attack against Lucas based El-Gamal Cryptosystem in the elliptic curve group over finite field
by
Koo, Lee Feng
,
Sarbini, Izzatul Nabila
,
Naning @ Zin, Fatin Hana
,
Kwan, Yee Min
,
Yiu, Pang Hung
,
Wong, Tze Jin
Published 2018
Get full text
Get full text
QR Code
5
Security analysis on luc-type cryptosystems using common modulus attack
by
Sarbini, Izzatul Nabila
,
Tze, Jin Wong
,
Koo, Lee Feng
,
Rasedee, Ahmad Fadly Nurullah
,
Naning, Fatin Hana
,
Abdul Sathar, Mohammad Hasan
Published 2023
Get full text
Get full text
QR Code
6
Cryptographic attack on LUC-type cryptosystems using GMITM (Type 1)
by
Sarbini, Izzatul Nabila
,
Wong, Tze Jin
,
Othman, Mohamed
,
Koo, Lee Feng
,
Rasedee, Ahmad Fadly Nurullah
,
Yiu, Pang Hung
,
Naning @ Zin, Fatin Hana
Published 2019
Get full text
Get full text
QR Code
Search Tools:
RSS Feed
Email Search