An improvement of LUC2 cryptosystem algorithm using doubling with remainder
The major factor that influences the performance of the LUC public-key cryptosystem is the computation of Ve and Vd, a public and private key, respectively. Its involve a huge steps of computations for large values of e and d. We concentrated our discussion on how to utilize and manipulate the doubl...
| Main Authors: | Othman, Mohamed, Abulkhirat, Esam M., Md. Said, Mohamad Rushdan, Johari, Rozita, Md Ali, Zulkarnain |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2006
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/58877/ http://psasir.upm.edu.my/id/eprint/58877/1/149.pdf |
Similar Items
Computation of private key for LUC cryptosystem
by: Md Ali, Zulkarnain, et al.
Published: (2009)
by: Md Ali, Zulkarnain, et al.
Published: (2009)
GCD attack on the LUC4 cryptosystem.
by: Wong, Tze Jin, et al.
Published: (2009)
by: Wong, Tze Jin, et al.
Published: (2009)
On the common modulus attack into the LUC4,6 cryptosystem
by: Wong, Tze Jin, et al.
Published: (2014)
by: Wong, Tze Jin, et al.
Published: (2014)
Garbage-man-in-the-middle attack on the LUC4 cryptosystem.
by: Wong, Tze Jin, et al.
Published: (2009)
by: Wong, Tze Jin, et al.
Published: (2009)
On the hastad's attack to LUC4,6 cryptosystem and compared with other RSA-type cryptosystem
by: Wong, Tze Jin, et al.
Published: (2013)
by: Wong, Tze Jin, et al.
Published: (2013)
A new computation algorithm for a cryptosystem based on Lucas Functions
by: Othman, Mohamed, et al.
Published: (2008)
by: Othman, Mohamed, et al.
Published: (2008)
Cryptographic attack on Lucas based cryptosystems using chinese remainder theorem
by: Wong, Tze Jin, et al.
Published: (2019)
by: Wong, Tze Jin, et al.
Published: (2019)
Cryptographic attack on LUC-type cryptosystems using GMITM (Type 1)
by: Sarbini, Izzatul Nabila, et al.
Published: (2019)
by: Sarbini, Izzatul Nabila, et al.
Published: (2019)
Security analysis on luc-type cryptosystems using common modulus attack
by: Sarbini, Izzatul Nabila, et al.
Published: (2023)
by: Sarbini, Izzatul Nabila, et al.
Published: (2023)
An attack on ELG-LUC3-ECC cryptosystem using Hastad’s and Julta’s theorem
by: Wong, T.J., et al.
Published: (2024)
by: Wong, T.J., et al.
Published: (2024)
An attack on ELG-LUC3-ECC cryptosystem using Hastad’s and Julta’s theorem
by: Wong, Tze Jin, et al.
Published: (2024)
by: Wong, Tze Jin, et al.
Published: (2024)
A lucas based cryptosystem analog to the ElGamal cryptosystem and elliptic curve cryptosystem
by: Wong, Tze Jin, et al.
Published: (2014)
by: Wong, Tze Jin, et al.
Published: (2014)
An efficient computation technique for cryptosystems based on Lucas functions
by: Md Ali, Zulkarnain, et al.
Published: (2008)
by: Md Ali, Zulkarnain, et al.
Published: (2008)
Computation of cryptosystem based on Lucas functions using addition chain
by: Md Ali, Zulkarnain, et al.
Published: (2010)
by: Md Ali, Zulkarnain, et al.
Published: (2010)
Enhancing speed performance of the cryptographic algorithm based on the lucas sequence
by: M. Abulkhirat, Esam
Published: (2003)
by: M. Abulkhirat, Esam
Published: (2003)
A cubic analogue of the RSA cryptosystem
by: Md Said, Mohamad Rushdan, et al.
Published: (2003)
by: Md Said, Mohamad Rushdan, et al.
Published: (2003)
The extensions on algebraic attack in AES cryptosystem
by: RezaeiPour, Davood, et al.
Published: (2009)
by: RezaeiPour, Davood, et al.
Published: (2009)
A new cryptosystem analogous to LUCELG and Cramer-Shoup
by: Muslim, Norliana, et al.
Published: (2009)
by: Muslim, Norliana, et al.
Published: (2009)
Chaotic pseudorandom sequences and the security of cryptosystems
by: Hina, Aliyu Danladi, et al.
Published: (2015)
by: Hina, Aliyu Danladi, et al.
Published: (2015)
Key exchange for new cryptosystem analogous to LUCELG
and Cramer-Shoup
by: Muslim, Norliana, et al.
Published: (2013)
by: Muslim, Norliana, et al.
Published: (2013)
The quartic analog to the RSA cryptosystem
by: Wong, Tze Jin, et al.
Published: (2007)
by: Wong, Tze Jin, et al.
Published: (2007)
The new variable-length key symmetric cryptosystem
by: Pour, Davood Rezaei, et al.
Published: (2009)
by: Pour, Davood Rezaei, et al.
Published: (2009)
A Cryptosystem Analogous to LUCELG and a
Digital Signature Scheme
by: Yoong, Choo Mun, et al.
Published: (2005)
by: Yoong, Choo Mun, et al.
Published: (2005)
A new public key cryptosystem based on IFS
by: Mohammed G. Al-Saidi, Nadia, et al.
Published: (2010)
by: Mohammed G. Al-Saidi, Nadia, et al.
Published: (2010)
Mathematical function optimization using AIS antibody remainder method
by: Yap, David F. W., et al.
Published: (2011)
by: Yap, David F. W., et al.
Published: (2011)
Rounding theorem the possibility of applying cryptosystem on the decimal numbers.
by: Alfaris, Rand, et al.
Published: (2008)
by: Alfaris, Rand, et al.
Published: (2008)
On the mathematical complexity and the time implementation
of proposed variants of elliptic curves cryptosystems
by: Al-Saffar, Najlae F. Hameed, et al.
Published: (2013)
by: Al-Saffar, Najlae F. Hameed, et al.
Published: (2013)
Development of a luciferase/luciferin cell proliferation (XenoLuc) assay for real-time measurements of Gfp-Luc2-modified cells in a co-culture system
by: Teow, Sin Yeang *, et al.
Published: (2019)
by: Teow, Sin Yeang *, et al.
Published: (2019)
Sistem Kripto Luc Untuk Pengesahan Aplikasi Telnet
by: Sibo, Siti Jauyah
Published: (1999)
by: Sibo, Siti Jauyah
Published: (1999)
On the security of golden cryptosystems
by: Tahghighi, Muhammad, et al.
Published: (2012)
by: Tahghighi, Muhammad, et al.
Published: (2012)
Artificial Immune System Based Remainder Method for Multimodal Mathematical Function Optimization
by: Yap, David F. W., et al.
Published: (2011)
by: Yap, David F. W., et al.
Published: (2011)
Antibody Remainder Method Based Artificial Immune System for Mathematical Function Optimization
by: Yap, David F. W., et al.
Published: (2011)
by: Yap, David F. W., et al.
Published: (2011)
A performance improvement of Domosi’s cryptosystem
by: Khaleel, Ghassan, et al.
Published: (2015)
by: Khaleel, Ghassan, et al.
Published: (2015)
A performance improvement of Dömösi’s cryptosystem
by: Khaleel, Ghassan, et al.
Published: (2016)
by: Khaleel, Ghassan, et al.
Published: (2016)
Robust Watermarking Scheme Using Chinese Remainder Theorem-Based Error Correcting Codes
by: Goh, Vik Tor
Published: (2005)
by: Goh, Vik Tor
Published: (2005)
A new direction in utilization of chaotic fractal functions for cryptosystems.
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2012)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2012)
Luc’s Abscess: a reminder of a potential complication of otitis media
by: Asha'ari, Zamzil Amin, et al.
Published: (2012)
by: Asha'ari, Zamzil Amin, et al.
Published: (2012)
Bilinear pairings computation using the extended double-base chains algorithm
by: Mohammed Ismail, Abdulwahed, et al.
Published: (2010)
by: Mohammed Ismail, Abdulwahed, et al.
Published: (2010)
Garbage-man-in-the-middle (type 2) attack on the Lucas based El-Gamal cryptosystem in the elliptic curve group over finite field
by: Sarbini, Izzatul Nabila, et al.
Published: (2018)
by: Sarbini, Izzatul Nabila, et al.
Published: (2018)
Removal of extensive maxillary dentigerous cyst via a Caldwell-Luc procedure
by: Asha'ari, Zamzil Amin, et al.
Published: (2008)
by: Asha'ari, Zamzil Amin, et al.
Published: (2008)
Similar Items
-
Computation of private key for LUC cryptosystem
by: Md Ali, Zulkarnain, et al.
Published: (2009) -
GCD attack on the LUC4 cryptosystem.
by: Wong, Tze Jin, et al.
Published: (2009) -
On the common modulus attack into the LUC4,6 cryptosystem
by: Wong, Tze Jin, et al.
Published: (2014) -
Garbage-man-in-the-middle attack on the LUC4 cryptosystem.
by: Wong, Tze Jin, et al.
Published: (2009) -
On the hastad's attack to LUC4,6 cryptosystem and compared with other RSA-type cryptosystem
by: Wong, Tze Jin, et al.
Published: (2013)