Rounding theorem the possibility of applying cryptosystem on the decimal numbers.
The possibility of using the decimal numbers in cryptography as the base of the encryption and decryption is proposed by introducing the "Rounding Theorem". Until now, cryptosystems are used the integer numbers to avoid the fractions of the decimal numbers. That is to avoid losing the orig...
| Main Authors: | Alfaris, Rand, Kamel Ariffin, Muhamad Rezal, Md Said, Mohamed Rushdan |
|---|---|
| Format: | Article |
| Language: | English English |
| Published: |
Science Publications
2008
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/16603/ http://psasir.upm.edu.my/id/eprint/16603/1/Rounding%20theorem%20the%20possibility%20of%20applying%20cryptosystem%20on%20the%20decimal%20numbers.pdf |
Similar Items
A New Cryptosystem Based on Decimal Numbers and Nonlinear Function
by: Alfaris, Rand Qusay
Published: (2009)
by: Alfaris, Rand Qusay
Published: (2009)
AAβ-Cryptosystem: a chaos based public key cryptosystem
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2009)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2009)
Constructing the prime orbit theorem for the beta transformation
by: Kamel Ariffin, Muhammad Rezal
Published: (2009)
by: Kamel Ariffin, Muhammad Rezal
Published: (2009)
Analysis on the AAβ cryptosystem
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
The quartic analog to the RSA cryptosystem
by: Wong, Tze Jin, et al.
Published: (2007)
by: Wong, Tze Jin, et al.
Published: (2007)
GCD attack on the LUC4 cryptosystem.
by: Wong, Tze Jin, et al.
Published: (2009)
by: Wong, Tze Jin, et al.
Published: (2009)
Algebraic cryptanalysis on the AAβ cryptosystem
by: Asbullah, Muhammad Asyraf, et al.
Published: (2017)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2017)
Analysis on the Rabin-p cryptosystem
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
The new variable-length key symmetric cryptosystem
by: Pour, Davood Rezaei, et al.
Published: (2009)
by: Pour, Davood Rezaei, et al.
Published: (2009)
A lucas based cryptosystem analog to the ElGamal cryptosystem and elliptic curve cryptosystem
by: Wong, Tze Jin, et al.
Published: (2014)
by: Wong, Tze Jin, et al.
Published: (2014)
Provably secure randomized AAβ cryptosystem
by: Asbullah, Muhammad Asyraf, et al.
Published: (2015)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2015)
Garbage-man-in-the-middle attack on the LUC4 cryptosystem.
by: Wong, Tze Jin, et al.
Published: (2009)
by: Wong, Tze Jin, et al.
Published: (2009)
Enhanced AAβ cryptosystem: the design
by: Asbullah, Muhammad Asyraf, et al.
Published: (2018)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2018)
A new direction in utilization of chaotic fractal functions for cryptosystems.
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2012)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2012)
Cryptographic attack on Lucas based cryptosystems using chinese remainder theorem
by: Wong, Tze Jin, et al.
Published: (2019)
by: Wong, Tze Jin, et al.
Published: (2019)
Timing attack analysis on AAβ cryptosystem
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2014)
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2014)
Provably secure Rabin-p cryptosystem in hybrid setting
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
Design of Rabin-like cryptosystem without decryption failure
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
Modified Baptista type cryptosystem via matrix secret key.
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2008)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2008)
Fast decryption method for a Rabin primitive-based cryptosystem
by: Asbullah, Muhammad Asyraf, et al.
Published: (2014)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2014)
Algebraic analysis of a rabin-like cryptosystem and its countermeasures
by: Asbullah, Muhammad Asyraf, et al.
Published: (2017)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2017)
The extensions on algebraic attack in AES cryptosystem
by: RezaeiPour, Davood, et al.
Published: (2009)
by: RezaeiPour, Davood, et al.
Published: (2009)
An attack on ELG-LUC3-ECC cryptosystem using Hastad’s and Julta’s theorem
by: Wong, T.J., et al.
Published: (2024)
by: Wong, T.J., et al.
Published: (2024)
An attack on ELG-LUC3-ECC cryptosystem using Hastad’s and Julta’s theorem
by: Wong, Tze Jin, et al.
Published: (2024)
by: Wong, Tze Jin, et al.
Published: (2024)
AAβ public-key cryptosystem - a practical implementation of the new asymmetric
by: Mahad, Zahari, et al.
Published: (2013)
by: Mahad, Zahari, et al.
Published: (2013)
Efficient methods to overcome Rabin cryptosystem decryption failure
by: Mahad, Zahari, et al.
Published: (2017)
by: Mahad, Zahari, et al.
Published: (2017)
Enhanced AAβ cryptosystem - a comparative analysis
by: Mahad, Zahari, et al.
Published: (2019)
by: Mahad, Zahari, et al.
Published: (2019)
A cubic analogue of the RSA cryptosystem
by: Md Said, Mohamad Rushdan, et al.
Published: (2003)
by: Md Said, Mohamad Rushdan, et al.
Published: (2003)
Hardware modeling of binary coded decimal adder in FPGA
by: Ibrahimy, Muhammad Ibn, et al.
Published: (2012)
by: Ibrahimy, Muhammad Ibn, et al.
Published: (2012)
AAβ public key cryptosystem - a comparative analysis against RSA and ECC
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2012)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2012)
On the hastad's attack to LUC4,6 cryptosystem and compared with other RSA-type cryptosystem
by: Wong, Tze Jin, et al.
Published: (2013)
by: Wong, Tze Jin, et al.
Published: (2013)
Improving skills in rounding off the whole number
by: Rusiman, Mohd Saifullah, et al.
Published: (2017)
by: Rusiman, Mohd Saifullah, et al.
Published: (2017)
Conditions for counter measure against one time pad attack on Baptista type cryptosystem
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2009)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2009)
Rabin-RZ: a new efficient method to overcome Rabin cryptosystem decryption failure problem
by: Mahad, Zahari, et al.
Published: (2015)
by: Mahad, Zahari, et al.
Published: (2015)
Rabin-RZ: a new efficient method to overcome Rabin cryptosystem decryption failure problem
by: Mahad, Zahari, et al.
Published: (2014)
by: Mahad, Zahari, et al.
Published: (2014)
On the variants of RSA cryptosystem and its related algebraic cryptanalysis
by: Ruzai, Wan Nur Aqlili, et al.
Published: (2019)
by: Ruzai, Wan Nur Aqlili, et al.
Published: (2019)
Computation of private key for LUC cryptosystem
by: Md Ali, Zulkarnain, et al.
Published: (2009)
by: Md Ali, Zulkarnain, et al.
Published: (2009)
Chaotic pseudorandom sequences and the security of cryptosystems
by: Hina, Aliyu Danladi, et al.
Published: (2015)
by: Hina, Aliyu Danladi, et al.
Published: (2015)
A new cryptosystem analogous to LUCELG and Cramer-Shoup
by: Muslim, Norliana, et al.
Published: (2009)
by: Muslim, Norliana, et al.
Published: (2009)
AAβ public key cryptosystem - a new practical asymmetric implementation based on the square root problem
by: Mahad, Zahari, et al.
Published: (2012)
by: Mahad, Zahari, et al.
Published: (2012)
Similar Items
-
A New Cryptosystem Based on Decimal Numbers and Nonlinear Function
by: Alfaris, Rand Qusay
Published: (2009) -
AAβ-Cryptosystem: a chaos based public key cryptosystem
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2009) -
Constructing the prime orbit theorem for the beta transformation
by: Kamel Ariffin, Muhammad Rezal
Published: (2009) -
Analysis on the AAβ cryptosystem
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016) -
The quartic analog to the RSA cryptosystem
by: Wong, Tze Jin, et al.
Published: (2007)