Another look at the security analysis of the modulus N = p 2 q by utilizing an approximation approach for ϕ(N)
Newly developed techniques have been recently documented, which capitalize on the security provided by prime power modulus denoted as N = p r q s where 2 ≤ s < r. Previous research primarily concentrated on the factorization of the modulus of type at minimum N = p 3 q 2 . In contrast, within the...
| Main Authors: | Aqlili Ruzai, Wan Nur, Nek Abd Rahman, Normahirah, Asbullah, Muhammad Asyraf |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Department of Mathematics, University of the Punjab
2024
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/116412/ http://psasir.upm.edu.my/id/eprint/116412/1/116412.pdf |
Similar Items
New vulnerability on system of Ni = p²iqi using good approximation of Φ(N)
by: Nek Abd Rahman, Normahirah, et al.
Published: (2018)
by: Nek Abd Rahman, Normahirah, et al.
Published: (2018)
New vulnerabilities of RSA modulus type N = p²q
by: Nek Abd Rahman, Normahirah, et al.
Published: (2016)
by: Nek Abd Rahman, Normahirah, et al.
Published: (2016)
New vulnerability of RSA modulus type N = p2q
by: Nek Abd Rahman, Normahirah, et al.
Published: (2017)
by: Nek Abd Rahman, Normahirah, et al.
Published: (2017)
Factoring the modulus of type n = p2q by finding small solutions of the equation er − (ns + t) = αp2 + βq2
by: Asbullah, Muhammad Asyraf, et al.
Published: (2021)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2021)
Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure
by: Asbullah, Muhammad Asyraf
Published: (2015)
by: Asbullah, Muhammad Asyraf
Published: (2015)
New attacks on RSA with modulus N = p2q using continued fractions
by: Asbullah, Muhammad Asyraf, et al.
Published: (2015)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2015)
New attacks on prime power N = prq using good approximation of φ(N)
by: Shehu, Sadiq, et al.
Published: (2017)
by: Shehu, Sadiq, et al.
Published: (2017)
New Jochemsz–May Cryptanalytic bound for RSA system utilizing common Modulus N = p2q
by: Adenan, Nurul Nur Hanisah, et al.
Published: (2021)
by: Adenan, Nurul Nur Hanisah, et al.
Published: (2021)
New weak findings upon RSA modulo of type N = p2 q
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2016)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2016)
Analytical cryptanalysis upon N = p2q utilizing Jochemsz-May strategy
by: Adenan, Nurul Nur Hanisah, et al.
Published: (2021)
by: Adenan, Nurul Nur Hanisah, et al.
Published: (2021)
An attack on N = p2q with partially known bits on the multiple of the prime factors
by: Wan Mohd Ruzai, Wan Nur Aqlili, et al.
Published: (2021)
by: Wan Mohd Ruzai, Wan Nur Aqlili, et al.
Published: (2021)
New cryptanalytic attack on RSA modulus N = pq using small prime difference method
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2019)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2019)
Comparative analysis of three asymmetric encryption schemes based upon the intractability of square roots modulo N = p²q
by: Asbullah, Muhammad Asyraf, et al.
Published: (2014)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2014)
A new efficient asymmetric cryptosystem based on the integer factorization problem of N=p2q
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2013)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2013)
Another proof of wiener's short secret exponent
by: Asbullah, Muhammad Asyraf, et al.
Published: (2019)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2019)
Cryptanalysis on prime power RSA modulus of the form N=prq
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2016)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2016)
Thermogravimetric analysis and dynamic young's Modulus measurement of N,N-Dimethylacetamide-impregnated wood polymer composites.
by: Rahman, Md. Rezaur, et al.
Published: (2011)
by: Rahman, Md. Rezaur, et al.
Published: (2011)
New directions in factoring the prime power RSA modulus N = prq
by: Shehu, Sadiq, et al.
Published: (2016)
by: Shehu, Sadiq, et al.
Published: (2016)
SPA on Rabin variant with public key N= p2q
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2016)
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2016)
Extending Pollard class of factorable RSA modulus
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2018)
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2018)
On q-statistical approximation of wavelets aided Kantorovich q-Baskakov operators
by: Ayman-Mursaleen, Mohammad, et al.
Published: (2024)
by: Ayman-Mursaleen, Mohammad, et al.
Published: (2024)
Human rights, transnational actors and the Chinese government: Another look at the spiral model
by: Fleay, Caroline
Published: (2006)
by: Fleay, Caroline
Published: (2006)
On the variants of RSA cryptosystem and its related algebraic cryptanalysis
by: Ruzai, Wan Nur Aqlili, et al.
Published: (2019)
by: Ruzai, Wan Nur Aqlili, et al.
Published: (2019)
Text structure awareness : another look at reading comprehension strategy in L2 Classes.
by: Heydari, Maryam, et al.
Published: (2009)
by: Heydari, Maryam, et al.
Published: (2009)
Some approximation properties of bivariate q-Stancu-Beta operators
by: Mohammad Mursaleen,, et al.
Published: (2014)
by: Mohammad Mursaleen,, et al.
Published: (2014)
Successful cryptanalytic attacks upon RSA moduli N = pq
by: Abubakar, Saidu Isah, et al.
Published: (2019)
by: Abubakar, Saidu Isah, et al.
Published: (2019)
Financial development and economic growth nexus: another look at the panel evidence from different geographical regions
by: Eng, Yoke Kee, et al.
Published: (2011)
by: Eng, Yoke Kee, et al.
Published: (2011)
PLL-based 3φ inverter circuit for microgrid system operated by electrostatic generator
by: Rahman, Tawfikur, et al.
Published: (2019)
by: Rahman, Tawfikur, et al.
Published: (2019)
Statistical approximation properties of Stancu type q-Baskakov-Kantorovich operators
by: Kilicman, Adem, et al.
Published: (2016)
by: Kilicman, Adem, et al.
Published: (2016)
Optimal spectral approximation of 2n-order differential operators by mixed isogeometric analysis
by: Deng, Quanling, et al.
Published: (2019)
by: Deng, Quanling, et al.
Published: (2019)
Who gains from class size reduction? Another look at Malaysia’s “Lost Boys Phenomenon” in student achievement
by: Sarimah Surianshah,
Published: (2022)
by: Sarimah Surianshah,
Published: (2022)
A new simultaneous diophantine attack upon RSA moduli N = pq
by: Abubakar, Saidu Isah, et al.
Published: (2018)
by: Abubakar, Saidu Isah, et al.
Published: (2018)
Another Journey
by: Little, Trish
Published: (2011)
by: Little, Trish
Published: (2011)
Provably secure Rabin-p cryptosystem in hybrid setting
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
Development of bacteriophage ΦKAZ14 loaded chitosan nanoparticles for biological control of colibacillosis in chickens
by: Kaikabo, Adamu Ahmad
Published: (2016)
by: Kaikabo, Adamu Ahmad
Published: (2016)
Security analysis on luc-type cryptosystems using common modulus attack
by: Sarbini, Izzatul Nabila, et al.
Published: (2023)
by: Sarbini, Izzatul Nabila, et al.
Published: (2023)
Approximation by q-Bernstein-Stancu-Kantorovich operators with shifted knots of real parameters
by: Mursaleen, Mohammad Ayman, et al.
Published: (2022)
by: Mursaleen, Mohammad Ayman, et al.
Published: (2022)
Another look at risk-based capital regime, capital structure, insurer's risk profile and performance: a conceptual paper
by: Akpan, Sunday Sunday, et al.
Published: (2017)
by: Akpan, Sunday Sunday, et al.
Published: (2017)
New simultaneous Diophantine attacks on generalized RSA key equations
by: Ruzai, Wan Nur Aqlili, et al.
Published: (2024)
by: Ruzai, Wan Nur Aqlili, et al.
Published: (2024)
Evaluation of a lytic bacteriophage, Φ st1, for biocontrol of Salmonella enterica serovar Typhimurium in chickens
by: Wong, Chuan Loo, et al.
Published: (2014)
by: Wong, Chuan Loo, et al.
Published: (2014)
Similar Items
-
New vulnerability on system of Ni = p²iqi using good approximation of Φ(N)
by: Nek Abd Rahman, Normahirah, et al.
Published: (2018) -
New vulnerabilities of RSA modulus type N = p²q
by: Nek Abd Rahman, Normahirah, et al.
Published: (2016) -
New vulnerability of RSA modulus type N = p2q
by: Nek Abd Rahman, Normahirah, et al.
Published: (2017) -
Factoring the modulus of type n = p2q by finding small solutions of the equation er − (ns + t) = αp2 + βq2
by: Asbullah, Muhammad Asyraf, et al.
Published: (2021) -
Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure
by: Asbullah, Muhammad Asyraf
Published: (2015)