Factoring the modulus of type n = p2q by finding small solutions of the equation er − (ns + t) = αp2 + βq2
The modulus of type N=p2q is often used in many variants of factoring-based cryptosystems due to its ability to fasten the decryption process. Faster decryption is suitable for securing small devices in the Internet of Things (IoT) environment or securing fast-forwarding encryption services used in...
| Main Authors: | Asbullah, Muhammad Asyraf, Abd Rahman, Normahirah Nek, Kamel Ariffin, Muhammad Rezal, Salim, Nur Raidah |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
MDPI
2021
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/97263/ http://psasir.upm.edu.my/id/eprint/97263/1/mathematics-09-02931-v2.pdf |
Similar Items
New vulnerability of RSA modulus type N = p2q
by: Nek Abd Rahman, Normahirah, et al.
Published: (2017)
by: Nek Abd Rahman, Normahirah, et al.
Published: (2017)
New vulnerabilities of RSA modulus type N = p²q
by: Nek Abd Rahman, Normahirah, et al.
Published: (2016)
by: Nek Abd Rahman, Normahirah, et al.
Published: (2016)
New attacks on RSA with modulus N = p2q using continued fractions
by: Asbullah, Muhammad Asyraf, et al.
Published: (2015)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2015)
Another look at the security analysis of the modulus N = p 2 q by utilizing an approximation approach for ϕ(N)
by: Aqlili Ruzai, Wan Nur, et al.
Published: (2024)
by: Aqlili Ruzai, Wan Nur, et al.
Published: (2024)
New weak findings upon RSA modulo of type N = p2 q
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2016)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2016)
Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure
by: Asbullah, Muhammad Asyraf
Published: (2015)
by: Asbullah, Muhammad Asyraf
Published: (2015)
New Jochemsz–May Cryptanalytic bound for RSA system utilizing common Modulus N = p2q
by: Adenan, Nurul Nur Hanisah, et al.
Published: (2021)
by: Adenan, Nurul Nur Hanisah, et al.
Published: (2021)
Analytical cryptanalysis upon N = p2q utilizing Jochemsz-May strategy
by: Adenan, Nurul Nur Hanisah, et al.
Published: (2021)
by: Adenan, Nurul Nur Hanisah, et al.
Published: (2021)
A new efficient asymmetric cryptosystem based on the integer factorization problem of N=p2q
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2013)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2013)
SPA on Rabin variant with public key N= p2q
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2016)
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2016)
Comparative analysis of three asymmetric encryption schemes based upon the intractability of square roots modulo N = p²q
by: Asbullah, Muhammad Asyraf, et al.
Published: (2014)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2014)
An attack on N = p2q with partially known bits on the multiple of the prime factors
by: Wan Mohd Ruzai, Wan Nur Aqlili, et al.
Published: (2021)
by: Wan Mohd Ruzai, Wan Nur Aqlili, et al.
Published: (2021)
On equation x^q=a over Q_p
by: Mukhamedov, Farrukh, et al.
Published: (2013)
by: Mukhamedov, Farrukh, et al.
Published: (2013)
New vulnerability on system of Ni = p²iqi using good approximation of Φ(N)
by: Nek Abd Rahman, Normahirah, et al.
Published: (2018)
by: Nek Abd Rahman, Normahirah, et al.
Published: (2018)
The dynamics of the Potts-Bethe mapping over ℚ_p: the case p ≡ 2 (mod 3)
by: Saburov, Mansoor, et al.
Published: (2017)
by: Saburov, Mansoor, et al.
Published: (2017)
Loss of heterozygosity on chromosomes 10q, 9p, 17p and 13q in malays with malignant glioma.
by: Zainuddin, Norafiza, et al.
Published: (2004)
by: Zainuddin, Norafiza, et al.
Published: (2004)
Moufang Loops Of Odd Order p1 p2 ...p n q3
[QA174.2. C548 2007 f rb].
by: Chong, Kam Yoon
Published: (2007)
by: Chong, Kam Yoon
Published: (2007)
Provably secure Rabin-p cryptosystem in hybrid setting
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
Analysis on the Rabin-p cryptosystem
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
Analysis on the AAβ cryptosystem
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
Algebraic cryptanalysis on the AAβ cryptosystem
by: Asbullah, Muhammad Asyraf, et al.
Published: (2017)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2017)
Extending Pollard class of factorable RSA modulus
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2018)
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2018)
Provably secure randomized AAβ cryptosystem
by: Asbullah, Muhammad Asyraf, et al.
Published: (2015)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2015)
Enhanced AAβ cryptosystem: the design
by: Asbullah, Muhammad Asyraf, et al.
Published: (2018)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2018)
Development And Application Of Dengue Virus Ns2b/Ns3 Protease Inhibition Assay Using Alphascreen® Technology.
by: Abduraman, Muhammad Asyraf
Published: (2015)
by: Abduraman, Muhammad Asyraf
Published: (2015)
Enhanced AAβ cryptosystem - a comparative analysis
by: Mahad, Zahari, et al.
Published: (2019)
by: Mahad, Zahari, et al.
Published: (2019)
Design and analysis of Rabin-p key encapsulation mechanism for CyberSecurity Malaysia MySEAL initiative
by: Asbullah, Muhammad Asyraf, et al.
Published: (2019)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2019)
New cryptanalytic attack on RSA modulus N = pq using small prime difference method
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2019)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2019)
Extended p-adic q-invariant integrals on ℤp associated with applications of umbral calculus
by: Araci, Serkan, et al.
Published: (2013)
by: Araci, Serkan, et al.
Published: (2013)
On p-Adic quasi Gibbs Measures for q+1-state Potts model on the cayley tree
by: Mukhamedov, Farrukh
Published: (2010)
by: Mukhamedov, Farrukh
Published: (2010)
Assignment of the phosphoglycerate kinase 2 (PGK2) gene to porcine chromosome 7q14–q15 by fluorescence in situ hybridization and by analysis of somatic cell and radiation hybrid panels
by: Chen, Kefei, et al.
Published: (2004)
by: Chen, Kefei, et al.
Published: (2004)
Pengitlakan satu kaitan koszul mendatar (TS2, ð, S2) Kepada (E,q,B)
by: Ahmad, Tahir
Published: (2000)
by: Ahmad, Tahir
Published: (2000)
Fe2o3 nanoparticle-based q-switched pulse fiber laser
by: Muhammad, Farah Diana, et al.
Published: (2023)
by: Muhammad, Farah Diana, et al.
Published: (2023)
Ligand based drug discovery of novel dengue-2 NS2B-NS3 protease inhibitors
by: Mohd Nawi, Mohamed Sufian, et al.
Published: (2016)
by: Mohd Nawi, Mohamed Sufian, et al.
Published: (2016)
Ligand Based Drug Discovery Of Novel Dengue-2 NS2B-NS3 Protease Inhibitors
by: Mohd Nawi, Mohamed Sufian
Published: (2015)
by: Mohd Nawi, Mohamed Sufian
Published: (2015)
On dynamical systems and phase transitions for q + 1-state p-adic Potts model on the Cayley tree
by: Mukhamedov, Farrukh
Published: (2013)
by: Mukhamedov, Farrukh
Published: (2013)
On dynamical systems and phase transitions for Q + 1-state P-adic Potts model on the Cayley tree
by: Mukhamedov, Farrukh
Published: (2010)
by: Mukhamedov, Farrukh
Published: (2010)
Kekeliruan mengecam huruf b-d-p-q di kalangan kanak-kanak pra-sekolah
by: Ai, Hong Chen, et al.
Published: (2002)
by: Ai, Hong Chen, et al.
Published: (2002)
Robust Sensorless Decoupled P-Q Control of Doubly Fed Induction Generators for Wind Power Applications
by: Mohseni, Mansour, et al.
Published: (2010)
by: Mohseni, Mansour, et al.
Published: (2010)
Certain generalized fractional calculus formulas and integral transforms involving (p,q)-Mathieu-type series
by: Agarwal, Ravi P., et al.
Published: (2019)
by: Agarwal, Ravi P., et al.
Published: (2019)
Similar Items
-
New vulnerability of RSA modulus type N = p2q
by: Nek Abd Rahman, Normahirah, et al.
Published: (2017) -
New vulnerabilities of RSA modulus type N = p²q
by: Nek Abd Rahman, Normahirah, et al.
Published: (2016) -
New attacks on RSA with modulus N = p2q using continued fractions
by: Asbullah, Muhammad Asyraf, et al.
Published: (2015) -
Another look at the security analysis of the modulus N = p 2 q by utilizing an approximation approach for ϕ(N)
by: Aqlili Ruzai, Wan Nur, et al.
Published: (2024) -
New weak findings upon RSA modulo of type N = p2 q
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2016)