On the common modulus attack into the LUC4,6 cryptosystem
The LUC4,6 cryptosystem is a system analogy with RSA cryptosystem and extended from LUC and LUC3 cryptosystems. The process of encryption and decryption are derived from the fourth order linear recurrence sequence and based on Lucas function. This paper reports an investigation into the common modul...
| Main Authors: | Wong, Tze Jin, Md. Said, Mohamad Rushdan, Othman, Mohamed, Koo, Lee Feng |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
AIP Publishing LLC
2014
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/57317/ http://psasir.upm.edu.my/id/eprint/57317/1/On%20the%20common%20modulus%20attack%20into%20the%20LUC4%2C6%20cryptosystem.pdf |
Similar Items
On the hastad's attack to LUC4,6 cryptosystem and compared with other RSA-type cryptosystem
by: Wong, Tze Jin, et al.
Published: (2013)
by: Wong, Tze Jin, et al.
Published: (2013)
Security analysis on luc-type cryptosystems using common modulus attack
by: Sarbini, Izzatul Nabila, et al.
Published: (2023)
by: Sarbini, Izzatul Nabila, et al.
Published: (2023)
GCD attack on the LUC4 cryptosystem.
by: Wong, Tze Jin, et al.
Published: (2009)
by: Wong, Tze Jin, et al.
Published: (2009)
Garbage-man-in-the-middle attack on the LUC4 cryptosystem.
by: Wong, Tze Jin, et al.
Published: (2009)
by: Wong, Tze Jin, et al.
Published: (2009)
Cryptographic attack on LUC-type cryptosystems using GMITM (Type 1)
by: Sarbini, Izzatul Nabila, et al.
Published: (2019)
by: Sarbini, Izzatul Nabila, et al.
Published: (2019)
An attack on ELG-LUC3-ECC cryptosystem using Hastad’s and Julta’s theorem
by: Wong, Tze Jin, et al.
Published: (2024)
by: Wong, Tze Jin, et al.
Published: (2024)
Computation of private key for LUC cryptosystem
by: Md Ali, Zulkarnain, et al.
Published: (2009)
by: Md Ali, Zulkarnain, et al.
Published: (2009)
Common modulus attack against Lucas based El-Gamal Cryptosystem in the elliptic curve group over finite field
by: Koo, Lee Feng, et al.
Published: (2018)
by: Koo, Lee Feng, et al.
Published: (2018)
An attack on ELG-LUC3-ECC cryptosystem using Hastad’s and Julta’s theorem
by: Wong, T.J., et al.
Published: (2024)
by: Wong, T.J., et al.
Published: (2024)
A lucas based cryptosystem analog to the ElGamal cryptosystem and elliptic curve cryptosystem
by: Wong, Tze Jin, et al.
Published: (2014)
by: Wong, Tze Jin, et al.
Published: (2014)
An improvement of LUC2 cryptosystem algorithm using doubling with remainder
by: Othman, Mohamed, et al.
Published: (2006)
by: Othman, Mohamed, et al.
Published: (2006)
Cryptographic attack on Lucas based cryptosystems using chinese remainder theorem
by: Wong, Tze Jin, et al.
Published: (2019)
by: Wong, Tze Jin, et al.
Published: (2019)
On the wiener's attack into lucas based El-gamal cryptosystem in the elliptic curve over finite field
by: Wong, Tze Jin, et al.
Published: (2018)
by: Wong, Tze Jin, et al.
Published: (2018)
Lucas based el-gamal cryptosystem in the elliptic curve group over finite field under lenstras attack
by: Tze, Jin Wong, et al.
Published: (2018)
by: Tze, Jin Wong, et al.
Published: (2018)
The extensions on algebraic attack in AES cryptosystem
by: RezaeiPour, Davood, et al.
Published: (2009)
by: RezaeiPour, Davood, et al.
Published: (2009)
Garbage-man-in-the-middle (type 2) attack on the Lucas based El-Gamal cryptosystem in the elliptic curve group over finite field
by: Sarbini, Izzatul Nabila, et al.
Published: (2018)
by: Sarbini, Izzatul Nabila, et al.
Published: (2018)
Security analysis of Lucas based El-Gamal Cryptosystem in the elliptic curve group over finite field using two types of GMITM attacks
by: Sarbini, Izzatul Nabila, et al.
Published: (2018)
by: Sarbini, Izzatul Nabila, et al.
Published: (2018)
An analysis for chosen plaintext attack in elliptic curve cryptosystem based on second order lucas sequence
by: Koo, Lee Feng, et al.
Published: (2019)
by: Koo, Lee Feng, et al.
Published: (2019)
The quartic analog to the RSA cryptosystem
by: Wong, Tze Jin, et al.
Published: (2007)
by: Wong, Tze Jin, et al.
Published: (2007)
2-Amino-4,6-dimethylpyridinium benzoate
by: Mohd Razip, Asaruddin, et al.
Published: (2010)
by: Mohd Razip, Asaruddin, et al.
Published: (2010)
Timing attack analysis on AAβ cryptosystem
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2014)
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2014)
A RSA-type cryptosystem based on quartic polynomials
by: Wong, Tze Jin
Published: (2011)
by: Wong, Tze Jin
Published: (2011)
The Fourth Order Linear Recurrence Sequence For RSA Type Cryptosystem
by: Wong, Tze Jin
Published: (2006)
by: Wong, Tze Jin
Published: (2006)
A cubic analogue of the RSA cryptosystem
by: Md Said, Mohamad Rushdan, et al.
Published: (2003)
by: Md Said, Mohamad Rushdan, et al.
Published: (2003)
A survey of partial key exposure attacks on RSA cryptosystem
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2019)
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2019)
The efficiency of embedding-based attacks on the GGH lattice-based cryptosystem
by: Mandangan,, A., et al.
Published: (2023)
by: Mandangan,, A., et al.
Published: (2023)
Chaotic pseudorandom sequences and the security of cryptosystems
by: Hina, Aliyu Danladi, et al.
Published: (2015)
by: Hina, Aliyu Danladi, et al.
Published: (2015)
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
by: Abubakar, Adamu, et al.
Published: (2014)
by: Abubakar, Adamu, et al.
Published: (2014)
A new cryptosystem analogous to LUCELG and Cramer-Shoup
by: Muslim, Norliana, et al.
Published: (2009)
by: Muslim, Norliana, et al.
Published: (2009)
42 staf UMP berbasikal sejauh 4.6 km tamatkan misi kayuhan
by: Nor Salwana, Mohammad Idris
Published: (2020)
by: Nor Salwana, Mohammad Idris
Published: (2020)
Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure
by: Asbullah, Muhammad Asyraf
Published: (2015)
by: Asbullah, Muhammad Asyraf
Published: (2015)
The new variable-length key symmetric cryptosystem
by: Pour, Davood Rezaei, et al.
Published: (2009)
by: Pour, Davood Rezaei, et al.
Published: (2009)
Key exchange for new cryptosystem analogous to LUCELG
and Cramer-Shoup
by: Muslim, Norliana, et al.
Published: (2013)
by: Muslim, Norliana, et al.
Published: (2013)
A method to decrease computation time for fourth order Lucas sequence
by: Wong, Tze Jin, et al.
Published: (2013)
by: Wong, Tze Jin, et al.
Published: (2013)
An efficient computation technique for cryptosystems based on Lucas functions
by: Md Ali, Zulkarnain, et al.
Published: (2008)
by: Md Ali, Zulkarnain, et al.
Published: (2008)
A Cryptosystem Analogous to LUCELG and a
Digital Signature Scheme
by: Yoong, Choo Mun, et al.
Published: (2005)
by: Yoong, Choo Mun, et al.
Published: (2005)
A new public key cryptosystem based on IFS
by: Mohammed G. Al-Saidi, Nadia, et al.
Published: (2010)
by: Mohammed G. Al-Saidi, Nadia, et al.
Published: (2010)
Sistem Kripto Luc Untuk Pengesahan Aplikasi Telnet
by: Sibo, Siti Jauyah
Published: (1999)
by: Sibo, Siti Jauyah
Published: (1999)
Computation of cryptosystem based on Lucas functions using addition chain
by: Md Ali, Zulkarnain, et al.
Published: (2010)
by: Md Ali, Zulkarnain, et al.
Published: (2010)
Conditions for counter measure against one time pad attack on Baptista type cryptosystem
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2009)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2009)
Similar Items
-
On the hastad's attack to LUC4,6 cryptosystem and compared with other RSA-type cryptosystem
by: Wong, Tze Jin, et al.
Published: (2013) -
Security analysis on luc-type cryptosystems using common modulus attack
by: Sarbini, Izzatul Nabila, et al.
Published: (2023) -
GCD attack on the LUC4 cryptosystem.
by: Wong, Tze Jin, et al.
Published: (2009) -
Garbage-man-in-the-middle attack on the LUC4 cryptosystem.
by: Wong, Tze Jin, et al.
Published: (2009) -
Cryptographic attack on LUC-type cryptosystems using GMITM (Type 1)
by: Sarbini, Izzatul Nabila, et al.
Published: (2019)