An efficient computation technique for cryptosystems based on Lucas functions
Lucas Functions is a special form of second order linear recurrence relation. This function has been used in the LUC Cryptosystems. The encryption process of this system is the computations of V(e), while the decryption process is done by the computations of V(d). The V(e) and V(d) are both Lucas Fu...
| Main Authors: | Md Ali, Zulkarnain, Othman, Mohamed, Md. Said, Mohamad Rushdan, Sulaiman, Md. Nasir |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
IEEE
2008
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/69100/ http://psasir.upm.edu.my/id/eprint/69100/1/An%20efficient%20computation%20technique%20for%20cryptosystems%20based%20on%20Lucas%20functions.pdf |
Similar Items
Computation of cryptosystem based on Lucas functions using addition chain
by: Md Ali, Zulkarnain, et al.
Published: (2010)
by: Md Ali, Zulkarnain, et al.
Published: (2010)
A new computation algorithm for a cryptosystem based on Lucas Functions
by: Othman, Mohamed, et al.
Published: (2008)
by: Othman, Mohamed, et al.
Published: (2008)
A lucas based cryptosystem analog to the ElGamal cryptosystem and elliptic curve cryptosystem
by: Wong, Tze Jin, et al.
Published: (2014)
by: Wong, Tze Jin, et al.
Published: (2014)
Computation of private key for LUC cryptosystem
by: Md Ali, Zulkarnain, et al.
Published: (2009)
by: Md Ali, Zulkarnain, et al.
Published: (2009)
A method to decrease computation time for fourth order Lucas sequence
by: Wong, Tze Jin, et al.
Published: (2013)
by: Wong, Tze Jin, et al.
Published: (2013)
Garbage-man-in-the-middle (type 2) attack on the Lucas based El-Gamal cryptosystem in the elliptic curve group over finite field
by: Sarbini, Izzatul Nabila, et al.
Published: (2018)
by: Sarbini, Izzatul Nabila, et al.
Published: (2018)
Cryptographic attack on Lucas based cryptosystems using chinese remainder theorem
by: Wong, Tze Jin, et al.
Published: (2019)
by: Wong, Tze Jin, et al.
Published: (2019)
Security analysis of Lucas based El-Gamal Cryptosystem in the elliptic curve group over finite field using two types of GMITM attacks
by: Sarbini, Izzatul Nabila, et al.
Published: (2018)
by: Sarbini, Izzatul Nabila, et al.
Published: (2018)
On the wiener's attack into lucas based El-gamal cryptosystem in the elliptic curve over finite field
by: Wong, Tze Jin, et al.
Published: (2018)
by: Wong, Tze Jin, et al.
Published: (2018)
An analysis for chosen plaintext attack in elliptic curve cryptosystem based on second order lucas sequence
by: Koo, Lee Feng, et al.
Published: (2019)
by: Koo, Lee Feng, et al.
Published: (2019)
An improvement of LUC2 cryptosystem algorithm using doubling with remainder
by: Othman, Mohamed, et al.
Published: (2006)
by: Othman, Mohamed, et al.
Published: (2006)
A cubic analogue of the RSA cryptosystem
by: Md Said, Mohamad Rushdan, et al.
Published: (2003)
by: Md Said, Mohamad Rushdan, et al.
Published: (2003)
Lucas based el-gamal cryptosystem in the elliptic curve group over finite field under lenstras attack
by: Tze, Jin Wong, et al.
Published: (2018)
by: Tze, Jin Wong, et al.
Published: (2018)
The extensions on algebraic attack in AES cryptosystem
by: RezaeiPour, Davood, et al.
Published: (2009)
by: RezaeiPour, Davood, et al.
Published: (2009)
A new public key cryptosystem based on IFS
by: Mohammed G. Al-Saidi, Nadia, et al.
Published: (2010)
by: Mohammed G. Al-Saidi, Nadia, et al.
Published: (2010)
Common modulus attack against Lucas based El-Gamal Cryptosystem in the elliptic curve group over finite field
by: Koo, Lee Feng, et al.
Published: (2018)
by: Koo, Lee Feng, et al.
Published: (2018)
A new cryptosystem analogous to LUCELG and Cramer-Shoup
by: Muslim, Norliana, et al.
Published: (2009)
by: Muslim, Norliana, et al.
Published: (2009)
GCD attack on the LUC4 cryptosystem.
by: Wong, Tze Jin, et al.
Published: (2009)
by: Wong, Tze Jin, et al.
Published: (2009)
On the hastad's attack to LUC4,6 cryptosystem and compared with other RSA-type cryptosystem
by: Wong, Tze Jin, et al.
Published: (2013)
by: Wong, Tze Jin, et al.
Published: (2013)
Chaotic pseudorandom sequences and the security of cryptosystems
by: Hina, Aliyu Danladi, et al.
Published: (2015)
by: Hina, Aliyu Danladi, et al.
Published: (2015)
Key exchange for new cryptosystem analogous to LUCELG
and Cramer-Shoup
by: Muslim, Norliana, et al.
Published: (2013)
by: Muslim, Norliana, et al.
Published: (2013)
The new variable-length key symmetric cryptosystem
by: Pour, Davood Rezaei, et al.
Published: (2009)
by: Pour, Davood Rezaei, et al.
Published: (2009)
A new direction in utilization of chaotic fractal functions for cryptosystems.
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2012)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2012)
On the common modulus attack into the LUC4,6 cryptosystem
by: Wong, Tze Jin, et al.
Published: (2014)
by: Wong, Tze Jin, et al.
Published: (2014)
The quartic analog to the RSA cryptosystem
by: Wong, Tze Jin, et al.
Published: (2007)
by: Wong, Tze Jin, et al.
Published: (2007)
A Cryptosystem Analogous to LUCELG and a
Digital Signature Scheme
by: Yoong, Choo Mun, et al.
Published: (2005)
by: Yoong, Choo Mun, et al.
Published: (2005)
Garbage-man-in-the-middle attack on the LUC4 cryptosystem.
by: Wong, Tze Jin, et al.
Published: (2009)
by: Wong, Tze Jin, et al.
Published: (2009)
Rounding theorem the possibility of applying cryptosystem on the decimal numbers.
by: Alfaris, Rand, et al.
Published: (2008)
by: Alfaris, Rand, et al.
Published: (2008)
On the mathematical complexity and the time implementation
of proposed variants of elliptic curves cryptosystems
by: Al-Saffar, Najlae F. Hameed, et al.
Published: (2013)
by: Al-Saffar, Najlae F. Hameed, et al.
Published: (2013)
Feature-based Lucas-Kanade and Active Appearance Models
by: Antonakos, Epameinondas, et al.
Published: (2015)
by: Antonakos, Epameinondas, et al.
Published: (2015)
On the security of golden cryptosystems
by: Tahghighi, Muhammad, et al.
Published: (2012)
by: Tahghighi, Muhammad, et al.
Published: (2012)
The efficiency of embedding-based attacks on the GGH lattice-based cryptosystem
by: Mandangan,, A., et al.
Published: (2023)
by: Mandangan,, A., et al.
Published: (2023)
Enhancing speed performance of the cryptographic algorithm based on the lucas sequence
by: M. Abulkhirat, Esam
Published: (2003)
by: M. Abulkhirat, Esam
Published: (2003)
A review on heuristics for addition chain problem: towards efficient public key cryptosystems
by: Muhammad Noma, Adamu, et al.
Published: (2017)
by: Muhammad Noma, Adamu, et al.
Published: (2017)
Efficiency analysis for public key systems based on fractal functions.
by: M. G. AL-Saidi, Nadia, et al.
Published: (2011)
by: M. G. AL-Saidi, Nadia, et al.
Published: (2011)
A New Cryptosystem Based on Decimal Numbers and Nonlinear Function
by: Alfaris, Rand Qusay
Published: (2009)
by: Alfaris, Rand Qusay
Published: (2009)
AAβ-Cryptosystem: a chaos based public key cryptosystem
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2009)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2009)
Efficient methods to overcome Rabin cryptosystem decryption failure
by: Mahad, Zahari, et al.
Published: (2017)
by: Mahad, Zahari, et al.
Published: (2017)
Introducing S-index into factoring RSA modulus via Lucas sequences
by: Abu, Nur Azman, et al.
Published: (2017)
by: Abu, Nur Azman, et al.
Published: (2017)
A New Visual Public-Key Cryptosystem Based On Non-Expansion Technique And Boolean Operations
by: Jaafar, Abdullah Mohammed Abdo Ali
Published: (2011)
by: Jaafar, Abdullah Mohammed Abdo Ali
Published: (2011)
Similar Items
-
Computation of cryptosystem based on Lucas functions using addition chain
by: Md Ali, Zulkarnain, et al.
Published: (2010) -
A new computation algorithm for a cryptosystem based on Lucas Functions
by: Othman, Mohamed, et al.
Published: (2008) -
A lucas based cryptosystem analog to the ElGamal cryptosystem and elliptic curve cryptosystem
by: Wong, Tze Jin, et al.
Published: (2014) -
Computation of private key for LUC cryptosystem
by: Md Ali, Zulkarnain, et al.
Published: (2009) -
A method to decrease computation time for fourth order Lucas sequence
by: Wong, Tze Jin, et al.
Published: (2013)