A RSA-type cryptosystem based on quartic polynomials
RSA cryptosystem was introduced by Rivest. Shamir, and Adlernan 111 1978. Common users of RSA cryptosystem are currently using 1024-bit keys. They are recommended to use 2048-bit keys in 20 I I and 3072-bit key in 2031. However, increasing the bit of keys will decrease the efficiency and increase...
| Main Author: | Wong, Tze Jin |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2011
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/84971/ http://psasir.upm.edu.my/id/eprint/84971/1/IPM%202011%2019%20ir.pdf |
Similar Items
Estimation of multiple exponential sums associated with quartic polynomials
by: Yap, Hong Keat
Published: (2018)
by: Yap, Hong Keat
Published: (2018)
The Fourth Order Linear Recurrence Sequence For RSA Type Cryptosystem
by: Wong, Tze Jin
Published: (2006)
by: Wong, Tze Jin
Published: (2006)
The quartic analog to the RSA cryptosystem
by: Wong, Tze Jin, et al.
Published: (2007)
by: Wong, Tze Jin, et al.
Published: (2007)
Cryptanalysis of polynomial reconstruction problem based cryptosystems
by: Yusof, Siti Nabilah
Published: (2023)
by: Yusof, Siti Nabilah
Published: (2023)
Reconstructing applicable chaotic Baptista-type symmetric cryptosystem
by: Daud, Muhamad Azlan
Published: (2014)
by: Daud, Muhamad Azlan
Published: (2014)
Cryptanalysis of RSA and its variants using continuous midpoint subdivision analysis and lattices
by: Wan Mohd Ruzai, Wan Nur Aqlili
Published: (2021)
by: Wan Mohd Ruzai, Wan Nur Aqlili
Published: (2021)
Cryptanalysis of El-Gamal AAs cryptosystem
by: Mandangan, Arif
Published: (2011)
by: Mandangan, Arif
Published: (2011)
Exponential sums for some higher degree polynomials
by: Low, Chee Wai
Published: (2018)
by: Low, Chee Wai
Published: (2018)
Interval iterative methods on simultaneous inclusion of polynomial zeros
by: Mohammad Rusli, Syaida Fadhilah
Published: (2017)
by: Mohammad Rusli, Syaida Fadhilah
Published: (2017)
On the hastad's attack to LUC4,6 cryptosystem and compared with other RSA-type cryptosystem
by: Wong, Tze Jin, et al.
Published: (2013)
by: Wong, Tze Jin, et al.
Published: (2013)
Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure
by: Asbullah, Muhammad Asyraf
Published: (2015)
by: Asbullah, Muhammad Asyraf
Published: (2015)
Exponential sums for some nth degree polynomial
by: Lasaraiya, Suriana
Published: (2016)
by: Lasaraiya, Suriana
Published: (2016)
An Estimation of Exponential Sums Associated with a Cubic Form Polynomial
by: Heng, Swee Huay
Published: (1999)
by: Heng, Swee Huay
Published: (1999)
Side channel analysis on AAᵝ cryptosystem and a signing scheme based on bivariate function hard problem and discrete logarithm problem
by: Abd Ghafar, Amir Hamzah
Published: (2015)
by: Abd Ghafar, Amir Hamzah
Published: (2015)
Parameterization of nice polynomials
by: Anton, Hozjee
Published: (2018)
by: Anton, Hozjee
Published: (2018)
A New "F-Lueg" Cryptosystem and its Security
by: Choo, Mun Yoong
Published: (2002)
by: Choo, Mun Yoong
Published: (2002)
On the Improvement of Addition Chain in Applications to Elliptic Curve Cryptosystem
Status: Submitted
by: Mohamed, Mohamad Afendee
Published: (2011)
by: Mohamed, Mohamad Afendee
Published: (2011)
Lines of best fit for the zeros and for the critical points of a polynomial
by: Keady, Grant
Published: (2011)
by: Keady, Grant
Published: (2011)
Performance analysis and improvement of rabin primitive based cryptosystems
by: Mahad, Zahari
Published: (2014)
by: Mahad, Zahari
Published: (2014)
New compendium of RSA vulnerabilities
by: Abd Ghafar, Amir Hamzah
Published: (2020)
by: Abd Ghafar, Amir Hamzah
Published: (2020)
Exponential sums associated with quartic polynomial
by: Yap, H. K., et al.
Published: (2019)
by: Yap, H. K., et al.
Published: (2019)
Enhancement of {0, 1, 3}-NAF Recoding Algorithm using Block Method Technique for Elliptic Curve Cryptosystem
by: Bafandehkar, Mohsen
Published: (2015)
by: Bafandehkar, Mohsen
Published: (2015)
Some Modification on Interval Symmetric Single-Step Procedure for Simultaneous Inclusion of Real Zzeros of Polynomials
by: Mohammad Rusli, Syaida Fadhilah
Published: (2011)
by: Mohammad Rusli, Syaida Fadhilah
Published: (2011)
Motion Path Generation Using A Modified 6th Order Polynomial Function for Visual Speech Synthesis
by: Salleh, Siti Salwa
Published: (2008)
by: Salleh, Siti Salwa
Published: (2008)
Nonlinearity analyses and adaptation of nonlinearity traits of key generation protocol of el-gamal AAß cryptosystem
by: Ahmad, Miza Mumtaz
Published: (2011)
by: Ahmad, Miza Mumtaz
Published: (2011)
Modification of interval symmetric single-step procedure for simultaneous bounding polynomial zeros
by: Jamaludin, Noraini
Published: (2014)
by: Jamaludin, Noraini
Published: (2014)
Convergence of interval symmetric single-step method for simultaneous inclusion of real polynomial zeros
by: Salim, Nur Raidah
Published: (2012)
by: Salim, Nur Raidah
Published: (2012)
A new class of efficient piecewise nonlinear chaotic maps for secure cryptosystems
by: Li, Y., et al.
Published: (2009)
by: Li, Y., et al.
Published: (2009)
On the triality theory for a quartic polynomial optimization problem
by: Gao, D., et al.
Published: (2012)
by: Gao, D., et al.
Published: (2012)
Minkowski polynomials and mutations
by: Akhtar, Mohammad, et al.
Published: (2012)
by: Akhtar, Mohammad, et al.
Published: (2012)
A cubic analogue of the RSA cryptosystem
by: Md Said, Mohamad Rushdan, et al.
Published: (2003)
by: Md Said, Mohamad Rushdan, et al.
Published: (2003)
Modified multi prime RSA cryptosystem
by: Kamardan, M. Ghazali, et al.
Published: (2018)
by: Kamardan, M. Ghazali, et al.
Published: (2018)
Development of some fast and efficient methods for elliptic curve scalar multiplication over prime fields
by: Al-Saffar, Najlae Falah Hameed
Published: (2015)
by: Al-Saffar, Najlae Falah Hameed
Published: (2015)
Use of Evolutionary Polynomial Regression (EPR) for Prediction of Total Sediment Load of Malaysian Rivers
by: Abdul Ghani, Nadiatul, et al.
Published: (2012)
by: Abdul Ghani, Nadiatul, et al.
Published: (2012)
Fast decryption methods for the Somsuk-RSA cryptosystem.
by: Asbullah, Muhammad Asyraf, et al.
Published: (2024)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2024)
Nonnegative polynomial optimization over unit spheres and convex programming relaxations
by: Zhou, Guanglu, et al.
Published: (2012)
by: Zhou, Guanglu, et al.
Published: (2012)
Semi-bounded solutions of singular integral equations of Cauchy type
by: Nik Long, Nik Mohd Asri, et al.
Published: (2009)
by: Nik Long, Nik Mohd Asri, et al.
Published: (2009)
A faster version of Rijndael Cryptograpic algorithm using cyclic shift and bitwise operations
by: Mohd Ali, Fakariah Hani
Published: (2004)
by: Mohd Ali, Fakariah Hani
Published: (2004)
A Polynomial Formulation of Inverse Kinematics of Rolling Contact
by: Cui, Lei, et al.
Published: (2015)
by: Cui, Lei, et al.
Published: (2015)
Polynomial modeling for time-varying systems based on a particle swarm optimization algorithm
by: Chan, Kit Yan, et al.
Published: (2011)
by: Chan, Kit Yan, et al.
Published: (2011)
Similar Items
-
Estimation of multiple exponential sums associated with quartic polynomials
by: Yap, Hong Keat
Published: (2018) -
The Fourth Order Linear Recurrence Sequence For RSA Type Cryptosystem
by: Wong, Tze Jin
Published: (2006) -
The quartic analog to the RSA cryptosystem
by: Wong, Tze Jin, et al.
Published: (2007) -
Cryptanalysis of polynomial reconstruction problem based cryptosystems
by: Yusof, Siti Nabilah
Published: (2023) -
Reconstructing applicable chaotic Baptista-type symmetric cryptosystem
by: Daud, Muhamad Azlan
Published: (2014)