Comparative of Rivest-Shamir-Adleman cryptosystem and its four variants using running time and memory consumption analysis
The Rivest-Shamir-Adleman (RSA) algorithm, known for its slow single-precision multiplication (spm) and overall running time, is not commonly employed to encrypt user data directly. As a result, several researchers have developed various RSA-based cryptosystems to enhance the algorithm's perfor...
| Main Authors: | Mandangan, Arif, Asbullah, Muhammad Asyraf, Adnan, Syed Farid Syed, Budiman, Mohammad Andri |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Penerbit UTM Press
2024
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/116341/ http://psasir.upm.edu.my/id/eprint/116341/1/116341.pdf |
Similar Items
On the insecurity of generalized (Rivest-Shamir-Adleman) - advance and adaptable cryptosystem
by: Isa, M.A.M., et al.
Published: (2019)
by: Isa, M.A.M., et al.
Published: (2019)
Rivest-Shamir-Adleman (RSA)
by: Mohammed Hayek, Iqram, et al.
Published: (2011)
by: Mohammed Hayek, Iqram, et al.
Published: (2011)
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
by: Abubakar, Adamu, et al.
Published: (2014)
by: Abubakar, Adamu, et al.
Published: (2014)
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
by: Paniandi, Arul
Published: (2006)
by: Paniandi, Arul
Published: (2006)
A lightweight identity-based Rivest-Shamir-Adleman authentication scheme for mobile ad hoc networks
by: Eissa, Tameem
Published: (2011)
by: Eissa, Tameem
Published: (2011)
On the variants of RSA cryptosystem and its related algebraic cryptanalysis
by: Ruzai, Wan Nur Aqlili, et al.
Published: (2019)
by: Ruzai, Wan Nur Aqlili, et al.
Published: (2019)
A security upgrade on the GGH lattice-based cryptosystem
by: Arif Mandangan,, et al.
Published: (2020)
by: Arif Mandangan,, et al.
Published: (2020)
A genetic algorithm for the cryptanalysis of Chor-Rivest knapsack public key cryptosystem (PKC)
by: Taha, Imad, et al.
Published: (1999)
by: Taha, Imad, et al.
Published: (1999)
On the smallest-basis problem underlying the GGH lattice-based cryptosystem
by: Mandangan, Arif, et al.
Published: (2019)
by: Mandangan, Arif, et al.
Published: (2019)
The efficiency of embedding-based attacks on the GGH lattice-based cryptosystem
by: Mandangan,, A., et al.
Published: (2023)
by: Mandangan,, A., et al.
Published: (2023)
Security Analysis of a Public Key Cryptosystem for Synchronized Chaotic Systems
by: Mahad, Zahari, et al.
Published: (2022)
by: Mahad, Zahari, et al.
Published: (2022)
Shamir’s threshold scheme
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
Cryptanalysis of El-Gamal AAs cryptosystem
by: Mandangan, Arif
Published: (2011)
by: Mandangan, Arif
Published: (2011)
Analysis on the AAβ cryptosystem
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
Algebraic cryptanalysis on the AAβ cryptosystem
by: Asbullah, Muhammad Asyraf, et al.
Published: (2017)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2017)
Analysis on the Rabin-p cryptosystem
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
Feige-Fiat-Shamir identification scheme
by: Makarin, Rusydi Hasan, et al.
Published: (2011)
by: Makarin, Rusydi Hasan, et al.
Published: (2011)
Provably secure randomized AAβ cryptosystem
by: Asbullah, Muhammad Asyraf, et al.
Published: (2015)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2015)
Fast decryption methods for the Somsuk-RSA cryptosystem.
by: Asbullah, Muhammad Asyraf, et al.
Published: (2024)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2024)
Enhanced AAβ cryptosystem: the design
by: Asbullah, Muhammad Asyraf, et al.
Published: (2018)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2018)
Provably secure Rabin-p cryptosystem in hybrid setting
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
Design of Rabin-like cryptosystem without decryption failure
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure
by: Asbullah, Muhammad Asyraf
Published: (2015)
by: Asbullah, Muhammad Asyraf
Published: (2015)
A new countermeasure to combat the embedding-based attacks on the Goldreich-Goldwasser-Halevi lattice-based cryptosystem
by: Mandangan, Arif, et al.
Published: (2024)
by: Mandangan, Arif, et al.
Published: (2024)
Fast decryption method for a Rabin primitive-based cryptosystem
by: Asbullah, Muhammad Asyraf, et al.
Published: (2014)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2014)
Algebraic analysis of a rabin-like cryptosystem and its countermeasures
by: Asbullah, Muhammad Asyraf, et al.
Published: (2017)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2017)
Efficient methods to overcome Rabin cryptosystem decryption failure
by: Mahad, Zahari, et al.
Published: (2017)
by: Mahad, Zahari, et al.
Published: (2017)
Enhanced AAβ cryptosystem - a comparative analysis
by: Mahad, Zahari, et al.
Published: (2019)
by: Mahad, Zahari, et al.
Published: (2019)
On the mathematical complexity and the time implementation
of proposed variants of elliptic curves cryptosystems
by: Al-Saffar, Najlae F. Hameed, et al.
Published: (2013)
by: Al-Saffar, Najlae F. Hameed, et al.
Published: (2013)
An Analysis of Four Variants of Splicing Systems
by: Yuhani, Yusof, et al.
Published: (2013)
by: Yuhani, Yusof, et al.
Published: (2013)
A study on the validity of a four-variant diagnostic learning styles questionnaire
by: Goulding, J.S., et al.
Published: (2014)
by: Goulding, J.S., et al.
Published: (2014)
A survey of partial key exposure attacks on RSA cryptosystem
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2019)
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2019)
A proposed CCA-secure encryption on an ElGamal variant
by: Asbullah, Muhammad Asyraf, et al.
Published: (2012)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2012)
A lucas based cryptosystem analog to the ElGamal cryptosystem and elliptic curve cryptosystem
by: Wong, Tze Jin, et al.
Published: (2014)
by: Wong, Tze Jin, et al.
Published: (2014)
A new efficient asymmetric cryptosystem based on the integer factorization problem of N=p2q
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2013)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2013)
On the underlying hard lattice problems of GGH encryption scheme
by: Mandangan, Arif, et al.
Published: (2018)
by: Mandangan, Arif, et al.
Published: (2018)
Square integer matrix with a single non-integer entry in its inverse
by: Mandangan, Arif, et al.
Published: (2021)
by: Mandangan, Arif, et al.
Published: (2021)
An upgrade on the key generation algorithm of the GGH-MKA lattice-based encryption scheme
by: Arif, Mandangan, et al.
Published: (2021)
by: Arif, Mandangan, et al.
Published: (2021)
AAβ-Cryptosystem: a chaos based public key cryptosystem
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2009)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2009)
On the security of golden cryptosystems
by: Tahghighi, Muhammad, et al.
Published: (2012)
by: Tahghighi, Muhammad, et al.
Published: (2012)
Similar Items
-
On the insecurity of generalized (Rivest-Shamir-Adleman) - advance and adaptable cryptosystem
by: Isa, M.A.M., et al.
Published: (2019) -
Rivest-Shamir-Adleman (RSA)
by: Mohammed Hayek, Iqram, et al.
Published: (2011) -
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
by: Abubakar, Adamu, et al.
Published: (2014) -
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
by: Paniandi, Arul
Published: (2006) -
A lightweight identity-based Rivest-Shamir-Adleman authentication scheme for mobile ad hoc networks
by: Eissa, Tameem
Published: (2011)