Cryptographic attack on Lucas based cryptosystems using chinese remainder theorem
Lenstra’s attack uses Chinese remainder theorem as a tool and requires a faulty signature to be successful. This paper reports on the security responses of fourth and sixth order Lucas based (LUC4,6) cryptosystem under the Lenstra’s attack as compared to the other two Lucas based cryptosystems such...
| Main Authors: | Wong, Tze Jin, Lee, Feng Koo, Pang, Hung Yiu |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
World Academy of Science Engineering and Technology
2019
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/81055/ http://psasir.upm.edu.my/id/eprint/81055/1/LUCAS.pdf |
Similar Items
On the wiener's attack into lucas based El-gamal cryptosystem in the elliptic curve over finite field
by: Wong, Tze Jin, et al.
Published: (2018)
by: Wong, Tze Jin, et al.
Published: (2018)
Lucas based el-gamal cryptosystem in the elliptic curve group over finite field under lenstras attack
by: Tze, Jin Wong, et al.
Published: (2018)
by: Tze, Jin Wong, et al.
Published: (2018)
An analysis for chosen plaintext attack in elliptic curve cryptosystem based on second order lucas sequence
by: Koo, Lee Feng, et al.
Published: (2019)
by: Koo, Lee Feng, et al.
Published: (2019)
Cryptographic attack on LUC-type cryptosystems using GMITM (Type 1)
by: Sarbini, Izzatul Nabila, et al.
Published: (2019)
by: Sarbini, Izzatul Nabila, et al.
Published: (2019)
Common modulus attack against Lucas based El-Gamal Cryptosystem in the elliptic curve group over finite field
by: Koo, Lee Feng, et al.
Published: (2018)
by: Koo, Lee Feng, et al.
Published: (2018)
A lucas based cryptosystem analog to the ElGamal cryptosystem and elliptic curve cryptosystem
by: Wong, Tze Jin, et al.
Published: (2014)
by: Wong, Tze Jin, et al.
Published: (2014)
Garbage-man-in-the-middle (type 2) attack on the Lucas based El-Gamal cryptosystem in the elliptic curve group over finite field
by: Sarbini, Izzatul Nabila, et al.
Published: (2018)
by: Sarbini, Izzatul Nabila, et al.
Published: (2018)
Security analysis of Lucas based El-Gamal Cryptosystem in the elliptic curve group over finite field using two types of GMITM attacks
by: Sarbini, Izzatul Nabila, et al.
Published: (2018)
by: Sarbini, Izzatul Nabila, et al.
Published: (2018)
An attack on ELG-LUC3-ECC cryptosystem using Hastad’s and Julta’s theorem
by: Wong, Tze Jin, et al.
Published: (2024)
by: Wong, Tze Jin, et al.
Published: (2024)
Robust Watermarking Scheme Using Chinese Remainder Theorem-Based Error Correcting Codes
by: Goh, Vik Tor
Published: (2005)
by: Goh, Vik Tor
Published: (2005)
On the common modulus attack into the LUC4,6 cryptosystem
by: Wong, Tze Jin, et al.
Published: (2014)
by: Wong, Tze Jin, et al.
Published: (2014)
An attack on ELG-LUC3-ECC cryptosystem using Hastad’s and Julta’s theorem
by: Wong, T.J., et al.
Published: (2024)
by: Wong, T.J., et al.
Published: (2024)
Enhancing speed performance of the cryptographic algorithm based on the lucas sequence
by: M. Abulkhirat, Esam
Published: (2003)
by: M. Abulkhirat, Esam
Published: (2003)
An efficient computation technique for cryptosystems based on Lucas functions
by: Md Ali, Zulkarnain, et al.
Published: (2008)
by: Md Ali, Zulkarnain, et al.
Published: (2008)
An improvement of LUC2 cryptosystem algorithm using doubling with remainder
by: Othman, Mohamed, et al.
Published: (2006)
by: Othman, Mohamed, et al.
Published: (2006)
Computation of cryptosystem based on Lucas functions using addition chain
by: Md Ali, Zulkarnain, et al.
Published: (2010)
by: Md Ali, Zulkarnain, et al.
Published: (2010)
A new computation algorithm for a cryptosystem based on Lucas Functions
by: Othman, Mohamed, et al.
Published: (2008)
by: Othman, Mohamed, et al.
Published: (2008)
GCD attack on the LUC4 cryptosystem.
by: Wong, Tze Jin, et al.
Published: (2009)
by: Wong, Tze Jin, et al.
Published: (2009)
Security analysis on luc-type cryptosystems using common modulus attack
by: Sarbini, Izzatul Nabila, et al.
Published: (2023)
by: Sarbini, Izzatul Nabila, et al.
Published: (2023)
On the hastad's attack to LUC4,6 cryptosystem and compared with other RSA-type cryptosystem
by: Wong, Tze Jin, et al.
Published: (2013)
by: Wong, Tze Jin, et al.
Published: (2013)
A method to decrease computation time for fourth order Lucas sequence
by: Wong, Tze Jin, et al.
Published: (2013)
by: Wong, Tze Jin, et al.
Published: (2013)
Garbage-man-in-the-middle attack on the LUC4 cryptosystem.
by: Wong, Tze Jin, et al.
Published: (2009)
by: Wong, Tze Jin, et al.
Published: (2009)
Rounding theorem the possibility of applying cryptosystem on the decimal numbers.
by: Alfaris, Rand, et al.
Published: (2008)
by: Alfaris, Rand, et al.
Published: (2008)
A RSA-type cryptosystem based on quartic polynomials
by: Wong, Tze Jin
Published: (2011)
by: Wong, Tze Jin
Published: (2011)
The extensions on algebraic attack in AES cryptosystem
by: RezaeiPour, Davood, et al.
Published: (2009)
by: RezaeiPour, Davood, et al.
Published: (2009)
The efficiency of embedding-based attacks on the GGH lattice-based cryptosystem
by: Mandangan,, A., et al.
Published: (2023)
by: Mandangan,, A., et al.
Published: (2023)
Timing attack analysis on AAβ cryptosystem
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2014)
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2014)
A secure cryptographic algorithm against side channel attacks
by: Abu, Nur Azman, et al.
Published: (2015)
by: Abu, Nur Azman, et al.
Published: (2015)
The Fourth Order Linear Recurrence Sequence For RSA Type Cryptosystem
by: Wong, Tze Jin
Published: (2006)
by: Wong, Tze Jin
Published: (2006)
A survey of partial key exposure attacks on RSA cryptosystem
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2019)
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2019)
A balanced secure cryptographic algorithm against timing and side channel attacks
by: Abu, Nur Azman, et al.
Published: (2014)
by: Abu, Nur Azman, et al.
Published: (2014)
The quartic analog to the RSA cryptosystem
by: Wong, Tze Jin, et al.
Published: (2007)
by: Wong, Tze Jin, et al.
Published: (2007)
Johnson noise and optical characteristics of polymer nanocomposites based on colloidal quantum dots and in-situ nanoparticles formation
by: Naning @ Zin, Fatin Hana, et al.
Published: (2020)
by: Naning @ Zin, Fatin Hana, et al.
Published: (2020)
Artificial Immune System Based Remainder Method for Multimodal Mathematical Function Optimization
by: Yap, David F. W., et al.
Published: (2011)
by: Yap, David F. W., et al.
Published: (2011)
Antibody Remainder Method Based Artificial Immune System for Mathematical Function Optimization
by: Yap, David F. W., et al.
Published: (2011)
by: Yap, David F. W., et al.
Published: (2011)
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
by: Abubakar, Adamu, et al.
Published: (2014)
by: Abubakar, Adamu, et al.
Published: (2014)
Mathematical function optimization using AIS antibody remainder method
by: Yap, David F. W., et al.
Published: (2011)
by: Yap, David F. W., et al.
Published: (2011)
Feature-based Lucas-Kanade and Active Appearance Models
by: Antonakos, Epameinondas, et al.
Published: (2015)
by: Antonakos, Epameinondas, et al.
Published: (2015)
A new countermeasure to combat the embedding-based attacks on the Goldreich-Goldwasser-Halevi lattice-based cryptosystem
by: Mandangan, Arif, et al.
Published: (2024)
by: Mandangan, Arif, et al.
Published: (2024)
Conditions for counter measure against one time pad attack on Baptista type cryptosystem
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2009)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2009)
Similar Items
-
On the wiener's attack into lucas based El-gamal cryptosystem in the elliptic curve over finite field
by: Wong, Tze Jin, et al.
Published: (2018) -
Lucas based el-gamal cryptosystem in the elliptic curve group over finite field under lenstras attack
by: Tze, Jin Wong, et al.
Published: (2018) -
An analysis for chosen plaintext attack in elliptic curve cryptosystem based on second order lucas sequence
by: Koo, Lee Feng, et al.
Published: (2019) -
Cryptographic attack on LUC-type cryptosystems using GMITM (Type 1)
by: Sarbini, Izzatul Nabila, et al.
Published: (2019) -
Common modulus attack against Lucas based El-Gamal Cryptosystem in the elliptic curve group over finite field
by: Koo, Lee Feng, et al.
Published: (2018)