An efficient identification scheme based on Bivariate function hard problem
Symmetric cryptography allows faster and more secure communication between two entities using the identical pre-established secret key. However, identifying the honest entity with the same secret key before initiating symmetric encryption is vital since the communication may be impersonated. Tea and...
| Main Authors: | Boon, Chian Tea, Kamel Ariffin, Muhammad Rezal, Abd Ghafar, Amir Hamzah, Sapar, Siti Hasana, Mohamat Johari, Mohamat Aidil |
|---|---|
| Format: | Article |
| Published: |
Multidisciplinary Digital Publishing Institute
2022
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/100234/ |
Similar Items
An identification scheme based on bivariate function hard problem
by: Tea, Boon Chian, et al.
Published: (2014)
by: Tea, Boon Chian, et al.
Published: (2014)
Efficient identification scheme in standard model based on bivariate function hard problem
by: Tea, Boon Chian
Published: (2014)
by: Tea, Boon Chian
Published: (2014)
An efficient identification scheme in standard model based on the diophantine equation hard problem
by: Tea, Boon Chian, et al.
Published: (2013)
by: Tea, Boon Chian, et al.
Published: (2013)
The development of deniable authentication protocol based on the bivariate function hard problem
by: Nek Abdul Rahman, Normahirah, et al.
Published: (2016)
by: Nek Abdul Rahman, Normahirah, et al.
Published: (2016)
The development of deniable authentication protocol based on the bivariate function hard problem
by: Nek Abd Rahman, Normahirah, et al.
Published: (2014)
by: Nek Abd Rahman, Normahirah, et al.
Published: (2014)
Side channel analysis on AAᵝ cryptosystem and a signing scheme based on bivariate function hard problem and discrete logarithm problem
by: Abd Ghafar, Amir Hamzah
Published: (2015)
by: Abd Ghafar, Amir Hamzah
Published: (2015)
Relation between sum of 2mth powers and polynomials of triangular numbers
by: Mohamat Johari, Mohamat Aidil, et al.
Published: (2014)
by: Mohamat Johari, Mohamat Aidil, et al.
Published: (2014)
Relation between square and centered pentagonal numbers
by: Mohamat Johari, Mohamat Aidil, et al.
Published: (2012)
by: Mohamat Johari, Mohamat Aidil, et al.
Published: (2012)
A combinatorial proof for a relation between certain types of integers
by: Mohamat Johari, Mohamat Aidil, et al.
Published: (2013)
by: Mohamat Johari, Mohamat Aidil, et al.
Published: (2013)
A general relation between sums of cubes and triangular pyramidal numbers
by: Mohamat Johari, Mohamat Aidil, et al.
Published: (2011)
by: Mohamat Johari, Mohamat Aidil, et al.
Published: (2011)
Identity-based encryption schemes - a review
by: Tea, Boon Chian, et al.
Published: (2019)
by: Tea, Boon Chian, et al.
Published: (2019)
On the cardinality of twelfth degree polynomial
by: Lasaraiya, Suriana, et al.
Published: (2016)
by: Lasaraiya, Suriana, et al.
Published: (2016)
Cardinality of sets associated to certain degree seven polynomials
by: Lasaraiya, Suriana, et al.
Published: (2015)
by: Lasaraiya, Suriana, et al.
Published: (2015)
On the cardinality of the set of solutions to congruence equation associated with polynomial of degree eleven
by: Lasaraiya, Suriana, et al.
Published: (2015)
by: Lasaraiya, Suriana, et al.
Published: (2015)
A survey of partial key exposure attacks on RSA cryptosystem
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2019)
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2019)
Exponential sums for eighth degree polynomial
by: Low, Chee Wai, et al.
Published: (2020)
by: Low, Chee Wai, et al.
Published: (2020)
The diophantine equation hard problem (DEHP) as an asymmetric primitive - is it possible?
by: Kamel Ariffin, Muhammad Rezal
Published: (2013)
by: Kamel Ariffin, Muhammad Rezal
Published: (2013)
Predictor-corrector scheme for solving second order ordinary differential equations
by: Mohamat Johari, Mohamat Aidil, et al.
Published: (2022)
by: Mohamat Johari, Mohamat Aidil, et al.
Published: (2022)
A failure in decryption process for bivariate polynomial reconstruction problem cryptosystem
by: Yusof, Siti Nabilah, et al.
Published: (2024)
by: Yusof, Siti Nabilah, et al.
Published: (2024)
A new arbitrated signing scheme based on BFHP
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2015)
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2015)
A new arbitrated signing scheme based on BFHP
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2014)
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2014)
New identified strategies to forge multivariate signature schemes
by: Abdul Jamal, Nurul Amiera Sakinah, et al.
Published: (2022)
by: Abdul Jamal, Nurul Amiera Sakinah, et al.
Published: (2022)
General relation between sums of figurate numbers
by: Mohamat Johari, Mohamat Aidil
Published: (2013)
by: Mohamat Johari, Mohamat Aidil
Published: (2013)
An attack on N = p2q with partially known bits on the multiple of the prime factors
by: Wan Mohd Ruzai, Wan Nur Aqlili, et al.
Published: (2021)
by: Wan Mohd Ruzai, Wan Nur Aqlili, et al.
Published: (2021)
Extended bounds of beatty sequence associated with primes
by: Deraman, Fatanah, et al.
Published: (2019)
by: Deraman, Fatanah, et al.
Published: (2019)
Design optimization for the two-stage bivariate pattern recognition scheme
by: Mokhtar, Mohd Shukri
Published: (2015)
by: Mokhtar, Mohd Shukri
Published: (2015)
On the underlying hard lattice problems of GGH encryption scheme
by: Mandangan, Arif, et al.
Published: (2018)
by: Mandangan, Arif, et al.
Published: (2018)
Partial key attack given MSBs of CRT-RSA private keys
by: Abd Ghafar, Amir Hamzah Abd, et al.
Published: (2020)
by: Abd Ghafar, Amir Hamzah Abd, et al.
Published: (2020)
Ergodicity of power series-maps on the simplexes of group algebras of finite groups
by: Bekbaev, Ural, et al.
Published: (2017)
by: Bekbaev, Ural, et al.
Published: (2017)
An updated cryptanalysis on the BFHP-DLP signing scheme
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2022)
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2022)
Rank AGS identification scheme and signature scheme
by: Nagaraja, Vaishnavi, et al.
Published: (2023)
by: Nagaraja, Vaishnavi, et al.
Published: (2023)
A new efficient Rabin-like signature scheme
by: Mahad, Zahari, et al.
Published: (2016)
by: Mahad, Zahari, et al.
Published: (2016)
Bivariate quality control using two-stage intelligent monitoring scheme
by: Masood, Ibrahim, et al.
Published: (2014)
by: Masood, Ibrahim, et al.
Published: (2014)
Diagnosis of bivariate process variation using an integrated mspc-ann scheme
by: Masood, Ibrahim, et al.
Published: (2016)
by: Masood, Ibrahim, et al.
Published: (2016)
Simultaneous pell equations x²-my² = 1 and y²-pz² = 1
by: Sihabudin, Nurul Amirah, et al.
Published: (2017)
by: Sihabudin, Nurul Amirah, et al.
Published: (2017)
A scheme for balanced monitoring and accurate diagnosis of bivariate process mean shifts
by: Masood, Ibrahim
Published: (2012)
by: Masood, Ibrahim
Published: (2012)
Identification of shift variation in bivariate process using pattern recognition technique
by: Mohd Haizan, Mohamad Azrul Azhad
Published: (2019)
by: Mohd Haizan, Mohamad Azrul Azhad
Published: (2019)
New Jochemsz–May Cryptanalytic bound for RSA system utilizing common Modulus N = p2q
by: Adenan, Nurul Nur Hanisah, et al.
Published: (2021)
by: Adenan, Nurul Nur Hanisah, et al.
Published: (2021)
Timing attack analysis on AAβ cryptosystem
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2014)
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2014)
SPA on Rabin variant with public key N= p2q
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2016)
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2016)
Similar Items
-
An identification scheme based on bivariate function hard problem
by: Tea, Boon Chian, et al.
Published: (2014) -
Efficient identification scheme in standard model based on bivariate function hard problem
by: Tea, Boon Chian
Published: (2014) -
An efficient identification scheme in standard model based on the diophantine equation hard problem
by: Tea, Boon Chian, et al.
Published: (2013) -
The development of deniable authentication protocol based on the bivariate function hard problem
by: Nek Abdul Rahman, Normahirah, et al.
Published: (2016) -
The development of deniable authentication protocol based on the bivariate function hard problem
by: Nek Abd Rahman, Normahirah, et al.
Published: (2014)