Security Analysis of a Public Key Cryptosystem for Synchronized Chaotic Systems
| Main Authors: | Mahad, Zahari, Asbullah, Muhammad Asyraf, Kamal Ariffin, Muhammad Rezal, Mandangan, Arif |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
2022
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/103147/ http://psasir.upm.edu.my/id/eprint/103147/1/103147.pdf |
Similar Items
Analysis on the Rabin-p cryptosystem
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
AAβ public key cryptosystem - a comparative analysis against RSA and ECC
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2012)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2012)
AAβ public-key cryptosystem - a practical implementation of the new asymmetric
by: Mahad, Zahari, et al.
Published: (2013)
by: Mahad, Zahari, et al.
Published: (2013)
A security upgrade on the GGH lattice-based cryptosystem
by: Arif Mandangan,, et al.
Published: (2020)
by: Arif Mandangan,, et al.
Published: (2020)
Enhanced AAβ cryptosystem - a comparative analysis
by: Mahad, Zahari, et al.
Published: (2019)
by: Mahad, Zahari, et al.
Published: (2019)
Enhanced AAβ cryptosystem: the design
by: Asbullah, Muhammad Asyraf, et al.
Published: (2018)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2018)
Provably secure randomized AAβ cryptosystem
by: Asbullah, Muhammad Asyraf, et al.
Published: (2015)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2015)
Efficient methods to overcome Rabin cryptosystem decryption failure
by: Mahad, Zahari, et al.
Published: (2017)
by: Mahad, Zahari, et al.
Published: (2017)
AAβ public key cryptosystem - a new practical asymmetric implementation based on the square root problem
by: Mahad, Zahari, et al.
Published: (2012)
by: Mahad, Zahari, et al.
Published: (2012)
Provably secure Rabin-p cryptosystem in hybrid setting
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
Design and analysis of Rabin-p key encapsulation mechanism for CyberSecurity Malaysia MySEAL initiative
by: Asbullah, Muhammad Asyraf, et al.
Published: (2019)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2019)
Analysis on the AAβ cryptosystem
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
AAβ-Cryptosystem: a chaos based public key cryptosystem
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2009)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2009)
Chaotic pseudorandom sequences and the security of cryptosystems
by: Hina, Aliyu Danladi, et al.
Published: (2015)
by: Hina, Aliyu Danladi, et al.
Published: (2015)
A new direction in utilization of chaotic fractal functions for cryptosystems.
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2012)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2012)
On the smallest-basis problem underlying the GGH lattice-based cryptosystem
by: Mandangan, Arif, et al.
Published: (2019)
by: Mandangan, Arif, et al.
Published: (2019)
Algebraic analysis of a rabin-like cryptosystem and its countermeasures
by: Asbullah, Muhammad Asyraf, et al.
Published: (2017)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2017)
Algebraic cryptanalysis on the AAβ cryptosystem
by: Asbullah, Muhammad Asyraf, et al.
Published: (2017)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2017)
A survey of partial key exposure attacks on RSA cryptosystem
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2019)
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2019)
A new efficient asymmetric cryptosystem based on the integer factorization problem of N=p2q
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2013)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2013)
Design of Rabin-like cryptosystem without decryption failure
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
Fast decryption method for a Rabin primitive-based cryptosystem
by: Asbullah, Muhammad Asyraf, et al.
Published: (2014)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2014)
Rabin-RZ: a new efficient method to overcome Rabin cryptosystem decryption failure problem
by: Mahad, Zahari, et al.
Published: (2015)
by: Mahad, Zahari, et al.
Published: (2015)
Rabin-RZ: a new efficient method to overcome Rabin cryptosystem decryption failure problem
by: Mahad, Zahari, et al.
Published: (2014)
by: Mahad, Zahari, et al.
Published: (2014)
Chaotic map based key agreement with/out clock synchronization
by: Han, Song, et al.
Published: (2007)
by: Han, Song, et al.
Published: (2007)
Visual Public-Key Cryptosystems.
by: Samsudin, Azman
Published: (2012)
by: Samsudin, Azman
Published: (2012)
Cryptanalysis of El-Gamal AAs cryptosystem
by: Mandangan, Arif
Published: (2011)
by: Mandangan, Arif
Published: (2011)
A new class of efficient piecewise nonlinear chaotic maps for secure cryptosystems
by: Li, Y., et al.
Published: (2009)
by: Li, Y., et al.
Published: (2009)
On the variants of RSA cryptosystem and its related algebraic cryptanalysis
by: Ruzai, Wan Nur Aqlili, et al.
Published: (2019)
by: Ruzai, Wan Nur Aqlili, et al.
Published: (2019)
Comparative of Rivest-Shamir-Adleman cryptosystem and its four variants using running time and memory consumption analysis
by: Mandangan, Arif, et al.
Published: (2024)
by: Mandangan, Arif, et al.
Published: (2024)
Chaotic asymmetric encryption process for data security.
by: Kamel Arrifin, Muhammad Rezal, et al.
Published: (2008)
by: Kamel Arrifin, Muhammad Rezal, et al.
Published: (2008)
Performance analysis and improvement of rabin primitive based cryptosystems
by: Mahad, Zahari
Published: (2014)
by: Mahad, Zahari
Published: (2014)
Modified Baptista type cryptosystem via matrix secret key.
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2008)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2008)
Synchronization between two discrete chaotic systems for secure communications
by: Abdul Fataf, Nur Aisyah, et al.
Published: (2016)
by: Abdul Fataf, Nur Aisyah, et al.
Published: (2016)
An upgrade on the key generation algorithm of the GGH-MKA lattice-based encryption scheme
by: Arif, Mandangan, et al.
Published: (2021)
by: Arif, Mandangan, et al.
Published: (2021)
Application adaptive exponential synchronization of chaotic dynamical systems in secure communications
by: Maheri, Mahmoud, et al.
Published: (2017)
by: Maheri, Mahmoud, et al.
Published: (2017)
Reconstructing applicable chaotic Baptista-type symmetric cryptosystem
by: Daud, Muhamad Azlan
Published: (2014)
by: Daud, Muhamad Azlan
Published: (2014)
The efficiency of embedding-based attacks on the GGH lattice-based cryptosystem
by: Mandangan,, A., et al.
Published: (2023)
by: Mandangan,, A., et al.
Published: (2023)
Fast Public-Key Cryptosystems: Design And Cryptanalyses
by: Go, Bok Min
Published: (2006)
by: Go, Bok Min
Published: (2006)
Security of a key agreement protocol based on chaotic maps
by: Han, Song
Published: (2008)
by: Han, Song
Published: (2008)
Similar Items
-
Analysis on the Rabin-p cryptosystem
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016) -
AAβ public key cryptosystem - a comparative analysis against RSA and ECC
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2012) -
AAβ public-key cryptosystem - a practical implementation of the new asymmetric
by: Mahad, Zahari, et al.
Published: (2013) -
A security upgrade on the GGH lattice-based cryptosystem
by: Arif Mandangan,, et al.
Published: (2020) -
Enhanced AAβ cryptosystem - a comparative analysis
by: Mahad, Zahari, et al.
Published: (2019)