Rabin-p encryption scheme analysis on MQTT
This paper presents a Rabin-P Encryption Scheme Analysis on Message Queuing Telemetry Transport (MQTT), where MQTT is one of the OASIS standard messaging protocols used for the Internet of Things (IoT). MQTT is very popular since it has a light footprint on energy consumption and computation. MQTT p...
| Main Authors: | Che Izam, Wan Abdullah, Syed Adnan, Syed Farid, Asbullah, Muhammad Asyraf |
|---|---|
| Format: | Conference or Workshop Item |
| Published: |
IEEE
2023
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/37474/ |
Similar Items
Analysis of Rabin-p and HIME(R) encryption scheme on IoT platform
by: Abd Nashir, Abdul Muhaimin, et al.
Published: (2020)
by: Abd Nashir, Abdul Muhaimin, et al.
Published: (2020)
Analysis on the Rabin-p cryptosystem
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
Provably secure Rabin-p cryptosystem in hybrid setting
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure
by: Asbullah, Muhammad Asyraf
Published: (2015)
by: Asbullah, Muhammad Asyraf
Published: (2015)
Algebraic analysis of a rabin-like cryptosystem and its countermeasures
by: Asbullah, Muhammad Asyraf, et al.
Published: (2017)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2017)
Design and analysis of Rabin-p key encapsulation mechanism for CyberSecurity Malaysia MySEAL initiative
by: Asbullah, Muhammad Asyraf, et al.
Published: (2019)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2019)
Comparative analysis of three asymmetric encryption schemes based upon the intractability of square roots modulo N = p²q
by: Asbullah, Muhammad Asyraf, et al.
Published: (2014)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2014)
Design of Rabin-like cryptosystem without decryption failure
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
On the underlying hard lattice problems of GGH encryption scheme
by: Mandangan, Arif, et al.
Published: (2018)
by: Mandangan, Arif, et al.
Published: (2018)
Identity-based encryption schemes - a review
by: Tea, Boon Chian, et al.
Published: (2019)
by: Tea, Boon Chian, et al.
Published: (2019)
Fast decryption method for a Rabin primitive-based cryptosystem
by: Asbullah, Muhammad Asyraf, et al.
Published: (2014)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2014)
Efficient methods to overcome Rabin cryptosystem decryption failure
by: Mahad, Zahari, et al.
Published: (2017)
by: Mahad, Zahari, et al.
Published: (2017)
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
by: Syed Adnan, Syed Farid
Published: (2019)
by: Syed Adnan, Syed Farid
Published: (2019)
An upgrade on the key generation algorithm of the GGH-MKA lattice-based encryption scheme
by: Arif, Mandangan, et al.
Published: (2021)
by: Arif, Mandangan, et al.
Published: (2021)
A new efficient Rabin-like signature scheme
by: Mahad, Zahari, et al.
Published: (2016)
by: Mahad, Zahari, et al.
Published: (2016)
Secure Hybrid Scheme For Securing Mqtt Protocol Based On Enhanced Symmetric Algorithm
by: Hintaw, Ahmed Jameel
Published: (2023)
by: Hintaw, Ahmed Jameel
Published: (2023)
UPM hasilkan Mekanisme Pengkapsulan Kekunci Rabin-P
by: Sinar Harian
Published: (2019)
by: Sinar Harian
Published: (2019)
IoT smart laboratory system using NODEMCU and MQTT
by: Muhammad Aqil, Muhammad Suhud
Published: (2022)
by: Muhammad Aqil, Muhammad Suhud
Published: (2022)
Mosquitto: server and client implementation of the MQTT protocol
by: Light, Roger A.
Published: (2017)
by: Light, Roger A.
Published: (2017)
SPA on Rabin variant with public key N= p2q
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2016)
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2016)
Smart room system with remote access using MQTT
by: Merunei, Nick Cassidy, et al.
Published: (2022)
by: Merunei, Nick Cassidy, et al.
Published: (2022)
Rabin-RZ: a new efficient method to overcome Rabin cryptosystem decryption failure problem
by: Mahad, Zahari, et al.
Published: (2015)
by: Mahad, Zahari, et al.
Published: (2015)
Rabin-RZ: a new efficient method to overcome Rabin cryptosystem decryption failure problem
by: Mahad, Zahari, et al.
Published: (2014)
by: Mahad, Zahari, et al.
Published: (2014)
A proposed CCA-secure encryption on an ElGamal variant
by: Asbullah, Muhammad Asyraf, et al.
Published: (2012)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2012)
Buiding a HA MQTT brokerage solution using mosquitto
by: Wong, Kei Yin
Published: (2021)
by: Wong, Kei Yin
Published: (2021)
Performance analysis and improvement of rabin primitive based cryptosystems
by: Mahad, Zahari
Published: (2014)
by: Mahad, Zahari
Published: (2014)
A new CCA-secure encryption based on the Gap Hashed Diffie-Hellman problem
by: Asbullah, Muhammad Asyraf, et al.
Published: (2013)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2013)
On the security defects of an image encryption scheme
by: C., Li, et al.
Published: (2009)
by: C., Li, et al.
Published: (2009)
An Enhanced Distribution Transforming Encoder (Dte) Of The Honey Encryption Scheme For Reinforcing Text-Based Encryption
by: Omolara, Abiodun Esther
Published: (2020)
by: Omolara, Abiodun Esther
Published: (2020)
An Enhanced Distribution Transforming Encoder (Dte) Of The Honey Encryption Scheme For Reinforcing Text-Based Encryption
by: Omolara, Abiodun Esther
Published: (2020)
by: Omolara, Abiodun Esther
Published: (2020)
Design And Cryptanalysis Of Encryption And Signature Schemes Without Certificates
by: Yap, Wun She
Published: (2007)
by: Yap, Wun She
Published: (2007)
Fault tolerant container-based message queuing telemetry transport (MQTT) embedded cluster system
by: Thean, Zhong Ying
Published: (2020)
by: Thean, Zhong Ying
Published: (2020)
Comparative of Rivest-Shamir-Adleman cryptosystem and its four variants using running time and memory consumption analysis
by: Mandangan, Arif, et al.
Published: (2024)
by: Mandangan, Arif, et al.
Published: (2024)
Optimizing OLAP heterogeneous computing based on Rabin-Karp algorithm
by: Alzeini, Haytham I M, et al.
Published: (2013)
by: Alzeini, Haytham I M, et al.
Published: (2013)
Exploring self-invertible 3×3 matrices for cipher trigraphic polyfunction with distinct encryption keys
by: Yunos, Faridah, et al.
Published: (2024)
by: Yunos, Faridah, et al.
Published: (2024)
Encrypted quick response scheme for hotel check-in and access control system
by: Cheong, S., et al.
Published: (2017)
by: Cheong, S., et al.
Published: (2017)
Pairing-based public-key encryption schemes with backward-and-forward security
by: Han, Song, et al.
Published: (2008)
by: Han, Song, et al.
Published: (2008)
Analysis for McEliece and Niederreiter Encryptions: An Alternative to Public Key Encryption
by: Chaw, Lian Foong
Published: (2018)
by: Chaw, Lian Foong
Published: (2018)
New IV-Based database encryption scheme
using TS block cipher
by: Zailani Mohamad Sidek,, et al.
Published: (2004)
by: Zailani Mohamad Sidek,, et al.
Published: (2004)
Double random phase encryption scheme to multiplex and simultaneous encode multiple images
by: Alfalou, A., et al.
Published: (2009)
by: Alfalou, A., et al.
Published: (2009)
Similar Items
-
Analysis of Rabin-p and HIME(R) encryption scheme on IoT platform
by: Abd Nashir, Abdul Muhaimin, et al.
Published: (2020) -
Analysis on the Rabin-p cryptosystem
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016) -
Provably secure Rabin-p cryptosystem in hybrid setting
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016) -
Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure
by: Asbullah, Muhammad Asyraf
Published: (2015) -
Algebraic analysis of a rabin-like cryptosystem and its countermeasures
by: Asbullah, Muhammad Asyraf, et al.
Published: (2017)