Factorization strategies of N = pq and N = pʳq and relation to its decryption exponent bound
The major RSA underlying security problems rely on the difficulty of factoring a very large composite integer N into its two nontrivial prime factors of p and q in polynomial time, the ability to solve a given Diophantine equation ed = 1 + kφ (N) where only the public...
| Main Author: | Abubakar, Saidu Isah |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2018
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/83705/ http://psasir.upm.edu.my/id/eprint/83705/1/FS%202019%2036%20-%20ir.pdf |
Similar Items
Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure
by: Asbullah, Muhammad Asyraf
Published: (2015)
by: Asbullah, Muhammad Asyraf
Published: (2015)
Successful cryptanalytic attacks upon RSA moduli N = pq
by: Abubakar, Saidu Isah, et al.
Published: (2019)
by: Abubakar, Saidu Isah, et al.
Published: (2019)
A new simultaneous diophantine attack upon RSA moduli N = pq
by: Abubakar, Saidu Isah, et al.
Published: (2018)
by: Abubakar, Saidu Isah, et al.
Published: (2018)
New cryptanalytic attack on RSA modulus N = pq using small prime difference method
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2019)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2019)
Development of some fast and efficient methods for elliptic curve scalar multiplication over prime fields
by: Al-Saffar, Najlae Falah Hameed
Published: (2015)
by: Al-Saffar, Najlae Falah Hameed
Published: (2015)
Reduction technique for n × n complex matrix systems.
by: Nik Long, Nik Mohd Asri, et al.
Published: (2009)
by: Nik Long, Nik Mohd Asri, et al.
Published: (2009)
Reconstructing applicable chaotic Baptista-type symmetric cryptosystem
by: Daud, Muhamad Azlan
Published: (2014)
by: Daud, Muhamad Azlan
Published: (2014)
New directions in factoring the prime power RSA modulus N = prq
by: Shehu, Sadiq, et al.
Published: (2016)
by: Shehu, Sadiq, et al.
Published: (2016)
Cryptanalysis on prime power RSA modulus of the form N=prq
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2016)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2016)
New attacks on prime power N = prq using good approximation of φ(N)
by: Shehu, Sadiq, et al.
Published: (2017)
by: Shehu, Sadiq, et al.
Published: (2017)
Side channel analysis on AAᵝ cryptosystem and a signing scheme based on bivariate function hard problem and discrete logarithm problem
by: Abd Ghafar, Amir Hamzah
Published: (2015)
by: Abd Ghafar, Amir Hamzah
Published: (2015)
Designing new chaotic and hyperchaotic systems for chaos-based cryptography
by: Kadhim, Al Karawi Hayder Natiq
Published: (2019)
by: Kadhim, Al Karawi Hayder Natiq
Published: (2019)
Cryptanalysis of RSA and its variants using continuous midpoint subdivision analysis and lattices
by: Wan Mohd Ruzai, Wan Nur Aqlili
Published: (2021)
by: Wan Mohd Ruzai, Wan Nur Aqlili
Published: (2021)
The Fourth Order Linear Recurrence Sequence For RSA Type Cryptosystem
by: Wong, Tze Jin
Published: (2006)
by: Wong, Tze Jin
Published: (2006)
Computer Algebra Solution of GPS N-points Problem
by: Palancz, Bela, et al.
Published: (2007)
by: Palancz, Bela, et al.
Published: (2007)
On the Improvement of Addition Chain in Applications to Elliptic Curve Cryptosystem
Status: Submitted
by: Mohamed, Mohamad Afendee
Published: (2011)
by: Mohamed, Mohamad Afendee
Published: (2011)
Enhancement of {0, 1, 3}-NAF Recoding Algorithm using Block Method Technique for Elliptic Curve Cryptosystem
by: Bafandehkar, Mohsen
Published: (2015)
by: Bafandehkar, Mohsen
Published: (2015)
Classification of leibniz algebras over finite fields
by: Mohammed, Mohammed Ardo
Published: (2019)
by: Mohammed, Mohammed Ardo
Published: (2019)
Derivations of some classes of Leibniz algebras
by: Ahmed I, Al-Nashri Al-Hossain
Published: (2013)
by: Ahmed I, Al-Nashri Al-Hossain
Published: (2013)
Combinatorial structure associated with low-dimensional filiform leibniz algebras
by: Ahmad Jamri, Ayu Ameliatul Shahilah
Published: (2017)
by: Ahmad Jamri, Ayu Ameliatul Shahilah
Published: (2017)
Classification of a subclass of filiform Leibniz algebra
by: Abdulkareem, Abdulafeez Olalekan
Published: (2014)
by: Abdulkareem, Abdulafeez Olalekan
Published: (2014)
Cryptanalysis of polynomial reconstruction problem based cryptosystems
by: Yusof, Siti Nabilah
Published: (2023)
by: Yusof, Siti Nabilah
Published: (2023)
A faster version of Rijndael Cryptograpic algorithm using cyclic shift and bitwise operations
by: Mohd Ali, Fakariah Hani
Published: (2004)
by: Mohd Ali, Fakariah Hani
Published: (2004)
Mathematical aspects of selected block ciphers
by: Alqarni, Yazeed Saeed
Published: (2015)
by: Alqarni, Yazeed Saeed
Published: (2015)
Classification of Moufang Loops of Odd Order pq3.
by: Balasingam Gnanaraj, Andrew Rajah
Published: (2014)
by: Balasingam Gnanaraj, Andrew Rajah
Published: (2014)
An analysis of secondary school students’ learning of algebra / Nur Ikhwany Hj Kamaruddin
by: Kamaruddin (Hj), Nur Ikhwany
Published: (2019)
by: Kamaruddin (Hj), Nur Ikhwany
Published: (2019)
The description of dendriform algebra structures on two-dimensional complex space
by: M. Rikhsiboev, Ikrom, et al.
Published: (2010)
by: M. Rikhsiboev, Ikrom, et al.
Published: (2010)
Group actions and their applications in associative algebras and algebraic statistics
by: Mohammed, Nadia Faiq
Published: (2017)
by: Mohammed, Nadia Faiq
Published: (2017)
Geometry of two-qubit system and hopf fibration
by: Wong, Wen Wei
Published: (2013)
by: Wong, Wen Wei
Published: (2013)
Classification of second-class 10-dimensional complex filiform Leibniz algebras
by: Mohd Kasim, Suzila
Published: (2014)
by: Mohd Kasim, Suzila
Published: (2014)
New directions in forging multivariate signature schemes
by: Abdul Jamal, Nurul Amiera Sakinah
Published: (2023)
by: Abdul Jamal, Nurul Amiera Sakinah
Published: (2023)
Properties of pseudo τ- adic non-adjacent form and the expansion of τ-adic non-adjacent form
by: Mohd Suberi, Syahirah
Published: (2017)
by: Mohd Suberi, Syahirah
Published: (2017)
Kembangan pseudotnaf untuk pendaraban skalar di atas lenkuk koblitz
by: Yunos, Faridah
Published: (2014)
by: Yunos, Faridah
Published: (2014)
A New "F-Lueg" Cryptosystem and its Security
by: Choo, Mun Yoong
Published: (2002)
by: Choo, Mun Yoong
Published: (2002)
Steganography For Embedding Data In Digital Image
by: Sowan, Salah Ibrahem
Published: (2003)
by: Sowan, Salah Ibrahem
Published: (2003)
Extention and cryptanalysis of golden cryptography
by: Sharabyan, Mohammad Tahghighi
Published: (2015)
by: Sharabyan, Mohammad Tahghighi
Published: (2015)
Cryptanalysis of El-Gamal AAs cryptosystem
by: Mandangan, Arif
Published: (2011)
by: Mandangan, Arif
Published: (2011)
Annihilators through fault injection analysis on selected stream ciphers
by: Omar @ Othman, Wan Zariman
Published: (2019)
by: Omar @ Othman, Wan Zariman
Published: (2019)
Classification of second class filiform leibniz algebras in dimension nine
by: Deraman, Fatanah
Published: (2013)
by: Deraman, Fatanah
Published: (2013)
Moufang Loops Of Odd Order p1 p2 ...p n q3
[QA174.2. C548 2007 f rb].
by: Chong, Kam Yoon
Published: (2007)
by: Chong, Kam Yoon
Published: (2007)
Similar Items
-
Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure
by: Asbullah, Muhammad Asyraf
Published: (2015) -
Successful cryptanalytic attacks upon RSA moduli N = pq
by: Abubakar, Saidu Isah, et al.
Published: (2019) -
A new simultaneous diophantine attack upon RSA moduli N = pq
by: Abubakar, Saidu Isah, et al.
Published: (2018) -
New cryptanalytic attack on RSA modulus N = pq using small prime difference method
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2019) -
Development of some fast and efficient methods for elliptic curve scalar multiplication over prime fields
by: Al-Saffar, Najlae Falah Hameed
Published: (2015)