The development of deniable authentication protocol based on the bivariate function hard problem
A deniable authentication protocol enables a receiver to identify the true source of a given message but not to prove the identity of the sender to the third party. Non-interactive protocol is more efficient than interactive protocol in terms of communication overhead, and thus several non-interacti...
| Main Authors: | Nek Abdul Rahman, Normahirah, Kamel Ariffin, Muhammad Rezal |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Femto Technique
2016
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/3638/ http://psasir.upm.edu.my/id/eprint/3638/1/The%20development%20of%20deniable%20authentication%20protocol%20based%20on%20the%20bivariate%20function%20hard%20problem.pdf |
Similar Items
The development of deniable authentication protocol based on the bivariate function hard problem
by: Nek Abd Rahman, Normahirah, et al.
Published: (2014)
by: Nek Abd Rahman, Normahirah, et al.
Published: (2014)
Deniable authentication protocol based on factoring and discrete logarithm problems
by: Nek Abd Rahman, Normahirah, et al.
Published: (2022)
by: Nek Abd Rahman, Normahirah, et al.
Published: (2022)
An identification scheme based on bivariate function hard problem
by: Tea, Boon Chian, et al.
Published: (2014)
by: Tea, Boon Chian, et al.
Published: (2014)
An efficient identification scheme based on Bivariate function hard problem
by: Boon, Chian Tea, et al.
Published: (2022)
by: Boon, Chian Tea, et al.
Published: (2022)
Efficient identification scheme in standard model based on bivariate function hard problem
by: Tea, Boon Chian
Published: (2014)
by: Tea, Boon Chian
Published: (2014)
The diophantine equation hard problem (DEHP) as an asymmetric primitive - is it possible?
by: Kamel Ariffin, Muhammad Rezal
Published: (2013)
by: Kamel Ariffin, Muhammad Rezal
Published: (2013)
Side channel analysis on AAᵝ cryptosystem and a signing scheme based on bivariate function hard problem and discrete logarithm problem
by: Abd Ghafar, Amir Hamzah
Published: (2015)
by: Abd Ghafar, Amir Hamzah
Published: (2015)
New weak findings upon RSA modulo of type N = p2 q
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2016)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2016)
New vulnerability of RSA modulus type N = p2q
by: Nek Abd Rahman, Normahirah, et al.
Published: (2017)
by: Nek Abd Rahman, Normahirah, et al.
Published: (2017)
New vulnerabilities of RSA modulus type N = p²q
by: Nek Abd Rahman, Normahirah, et al.
Published: (2016)
by: Nek Abd Rahman, Normahirah, et al.
Published: (2016)
A failure in decryption process for bivariate polynomial reconstruction problem cryptosystem
by: Yusof, Siti Nabilah, et al.
Published: (2024)
by: Yusof, Siti Nabilah, et al.
Published: (2024)
An efficient identification scheme in standard model based on the diophantine equation hard problem
by: Tea, Boon Chian, et al.
Published: (2013)
by: Tea, Boon Chian, et al.
Published: (2013)
Committal deniable signatures over elliptic curves
by: Han, Song, et al.
Published: (2004)
by: Han, Song, et al.
Published: (2004)
Verifying the authenticity of digital certificates
by: Kamel Ariffin, Muhammad Rezal
Published: (2021)
by: Kamel Ariffin, Muhammad Rezal
Published: (2021)
Grey is the new black: covert action and implausible deniability
by: Cormac, Rory, et al.
Published: (2018)
by: Cormac, Rory, et al.
Published: (2018)
Noise induced synchronization of time-delayed semiconductor lasers and authentication based asymmetric encryption.
by: Banerjee, Santo, et al.
Published: (2013)
by: Banerjee, Santo, et al.
Published: (2013)
New vulnerability on system of Ni = p²iqi using good approximation of Φ(N)
by: Nek Abd Rahman, Normahirah, et al.
Published: (2018)
by: Nek Abd Rahman, Normahirah, et al.
Published: (2018)
Factoring the modulus of type n = p2q by finding small solutions of the equation er − (ns + t) = αp2 + βq2
by: Asbullah, Muhammad Asyraf, et al.
Published: (2021)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2021)
Modification of Pickands' dependence function for ordered bivariate extreme distribution.
by: Adam, Mohd. Bakri, et al.
Published: (2011)
by: Adam, Mohd. Bakri, et al.
Published: (2011)
Disruption and deniable interventionism: explaining the appeal of covert action and special forces in contemporary British policy
by: Cormac, Rory
Published: (2017)
by: Cormac, Rory
Published: (2017)
The Mellin Transform of Generalized Functions and Some Applications
by: Kamel Ariffin, Muhammad Rezal
Published: (2002)
by: Kamel Ariffin, Muhammad Rezal
Published: (2002)
A new CCA-secure encryption based on the Gap Hashed Diffie-Hellman problem
by: Asbullah, Muhammad Asyraf, et al.
Published: (2013)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2013)
Alternative method to find the number of points on Koblitz curve
by: Hadani, Nurul Hafizah, et al.
Published: (2019)
by: Hadani, Nurul Hafizah, et al.
Published: (2019)
Predictive inference with copulas for bivariate data
by: Noryanti, Muhammad
Published: (2016)
by: Noryanti, Muhammad
Published: (2016)
AAβ public key cryptosystem - a new practical asymmetric implementation based on the square root problem
by: Mahad, Zahari, et al.
Published: (2012)
by: Mahad, Zahari, et al.
Published: (2012)
An estimator for the new bivariate copula
by: Mah, Pauline Jin Wee, et al.
Published: (2016)
by: Mah, Pauline Jin Wee, et al.
Published: (2016)
An authentication protocol for mobile cellular network
by: Mohammed, Lawan Ahmed, et al.
Published: (2002)
by: Mohammed, Lawan Ahmed, et al.
Published: (2002)
Enhancement of Security Architecture for Smartcard Based Authentication Protocols
by: Mohammed, Lawan Ahmed
Published: (2004)
by: Mohammed, Lawan Ahmed
Published: (2004)
URASP: an ultralightweight RFID authentication scheme using permutation operation
by: Mohd Shariq, et al.
Published: (2021)
by: Mohd Shariq, et al.
Published: (2021)
Nonparametric predictive inference with copulas for bivariate data
by: Noryanti, Muhammad, et al.
Published: (2023)
by: Noryanti, Muhammad, et al.
Published: (2023)
Predictive Inference for Bivariate Data with Nonparametric Copula
by: Noryanti, Muhammad, et al.
Published: (2016)
by: Noryanti, Muhammad, et al.
Published: (2016)
Novel bivariate moment-closure approximations
by: Krishnarajah, Isthrinayagy, et al.
Published: (2007)
by: Krishnarajah, Isthrinayagy, et al.
Published: (2007)
Bayesian inference for the bivariate extreme model
by: Mohd Amin, Nor Azrita, et al.
Published: (2016)
by: Mohd Amin, Nor Azrita, et al.
Published: (2016)
On robust bivariate and multivariate correlation coefficient
by: Uraibi, Hassan Sami, et al.
Published: (2019)
by: Uraibi, Hassan Sami, et al.
Published: (2019)
A survey of RFID authentication protocols
by: Yousuf, Y., et al.
Published: (2008)
by: Yousuf, Y., et al.
Published: (2008)
Authentication-chains: blockchain-inspired lightweight authentication protocol for IoT networks
by: Al Ahmed, Mahmoud Tayseer, et al.
Published: (2023)
by: Al Ahmed, Mahmoud Tayseer, et al.
Published: (2023)
Ghazali and the problem of authenticity
by: Babu Sahib, Hikmatullah
Published: (2004)
by: Babu Sahib, Hikmatullah
Published: (2004)
Construction of a new bivariate copula based on Ruschendorf method
by: Jin, Pauline Wee Mah, et al.
Published: (2014)
by: Jin, Pauline Wee Mah, et al.
Published: (2014)
Enhanced password-based authentication protocol / Lee Chee Kiam.
by: Lee, Chee Kiam
Published: (2000)
by: Lee, Chee Kiam
Published: (2000)
Rabin-RZ: a new efficient method to overcome Rabin cryptosystem decryption failure problem
by: Mahad, Zahari, et al.
Published: (2015)
by: Mahad, Zahari, et al.
Published: (2015)
Similar Items
-
The development of deniable authentication protocol based on the bivariate function hard problem
by: Nek Abd Rahman, Normahirah, et al.
Published: (2014) -
Deniable authentication protocol based on factoring and discrete logarithm problems
by: Nek Abd Rahman, Normahirah, et al.
Published: (2022) -
An identification scheme based on bivariate function hard problem
by: Tea, Boon Chian, et al.
Published: (2014) -
An efficient identification scheme based on Bivariate function hard problem
by: Boon, Chian Tea, et al.
Published: (2022) -
Efficient identification scheme in standard model based on bivariate function hard problem
by: Tea, Boon Chian
Published: (2014)