Modified multi prime RSA cryptosystem
RSA [1] is one of the mostly used cryptosystem in securing data and information. Though, it has been recently discovered that RSA has some weaknesses and in advance technology, RSA is believed to be inefficient especially when it comes to decryption. Thus, a new algorithm called Multi prime RS...
| Main Authors: | Kamardan, M. Ghazali, Aminudin, N., Che-Him, Norziha, Sufahani, Suliadi, Khalid, Kamil, Roslan, Rozaini |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2018
|
| Subjects: | |
| Online Access: | http://eprints.uthm.edu.my/7011/ http://eprints.uthm.edu.my/7011/1/P10113_3bdf5ce22e55537e0d65153f89bdfaf5.pdf |
Similar Items
Pembaikan sistem kriptografi multi RSA
by: Kamardan, Muhammad Ghazali
Published: (2005)
by: Kamardan, Muhammad Ghazali
Published: (2005)
Pembaikan sistem kriptografi multi RSA
by: Kamardan, Muhammad Ghazali
Published: (2005)
by: Kamardan, Muhammad Ghazali
Published: (2005)
The quartic analog to the RSA cryptosystem
by: Wong, Tze Jin, et al.
Published: (2007)
by: Wong, Tze Jin, et al.
Published: (2007)
A cubic analogue of the RSA cryptosystem
by: Md Said, Mohamad Rushdan, et al.
Published: (2003)
by: Md Said, Mohamad Rushdan, et al.
Published: (2003)
Fast decryption methods for the Somsuk-RSA cryptosystem.
by: Asbullah, Muhammad Asyraf, et al.
Published: (2024)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2024)
On the variants of RSA cryptosystem and its related algebraic cryptanalysis
by: Ruzai, Wan Nur Aqlili, et al.
Published: (2019)
by: Ruzai, Wan Nur Aqlili, et al.
Published: (2019)
A RSA-type cryptosystem based on quartic polynomials
by: Wong, Tze Jin
Published: (2011)
by: Wong, Tze Jin
Published: (2011)
On the hastad's attack to LUC4,6 cryptosystem and compared with other RSA-type cryptosystem
by: Wong, Tze Jin, et al.
Published: (2013)
by: Wong, Tze Jin, et al.
Published: (2013)
On (unknowingly) using near-square RSA primes
by: Ruzai, Wan Nur Aqlili, et al.
Published: (2022)
by: Ruzai, Wan Nur Aqlili, et al.
Published: (2022)
The Fourth Order Linear Recurrence Sequence For RSA Type Cryptosystem
by: Wong, Tze Jin
Published: (2006)
by: Wong, Tze Jin
Published: (2006)
A survey of partial key exposure attacks on RSA cryptosystem
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2019)
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2019)
A new attack on special-structured RSA primes
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2019)
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2019)
Unsteady blood flow with nanoparticles through stenosed arteries in the presence of periodic body acceleration
by: Jamil, Dzuliana Fatin, et al.
Published: (2018)
by: Jamil, Dzuliana Fatin, et al.
Published: (2018)
Modified Miller-Rabin primality test algorithm to detect prime numbers for generating RSA keys
by: Shereek, Balkees Mohamed
Published: (2016)
by: Shereek, Balkees Mohamed
Published: (2016)
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
by: Abubakar, Adamu, et al.
Published: (2014)
by: Abubakar, Adamu, et al.
Published: (2014)
A mathematical model development for the lateral collapse of octagonal tubes
by: Kamardan, M.Ghazali, et al.
Published: (2018)
by: Kamardan, M.Ghazali, et al.
Published: (2018)
A new LSB attack on special-structured RSA primes
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2020)
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2020)
Cryptanalysis on prime power RSA modulus of the form N=prq
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2016)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2016)
New directions in factoring the prime power RSA modulus N = prq
by: Shehu, Sadiq, et al.
Published: (2016)
by: Shehu, Sadiq, et al.
Published: (2016)
Applied mathematical optimization technique on menu scheduling for boarding school student using delete-reshuffle-reoptimize algorithm
by: Sufahani, Suliadi, et al.
Published: (2017)
by: Sufahani, Suliadi, et al.
Published: (2017)
Kriptosistem Multi-Rsa
by: How Guan Aun, How Guan Aun, et al.
Published: (2001)
by: How Guan Aun, How Guan Aun, et al.
Published: (2001)
AAβ public key cryptosystem - a comparative analysis against RSA and ECC
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2012)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2012)
Applied Mathematical Optimization Technique on Menu Scheduling for Boarding School Student Using Delete-Reshuffle-Reoptimize Algorithm
by: Sufahani, Suliadi, et al.
Published: (2018)
by: Sufahani, Suliadi, et al.
Published: (2018)
Spatio-temporal modelling of dengue fever incidence in
Malaysia
by: Che-Him, Norziha, et al.
Published: (2017)
by: Che-Him, Norziha, et al.
Published: (2017)
Case study: students’ symbolic manipulation in calculus among UTHM students
by: Ali, Maselan, et al.
Published: (2018)
by: Ali, Maselan, et al.
Published: (2018)
New cryptanalytic attack on RSA modulus N = pq using small prime difference method
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2019)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2019)
A study of nanoparticles as a drug carrier on the wall of Stenosed Arteries
by: Jamil, Dzuliana Fatin, et al.
Published: (2018)
by: Jamil, Dzuliana Fatin, et al.
Published: (2018)
Multi-Threading Elliptic Curve Cryptosystems.
by: Kanniah, Uma S., et al.
Published: (2007)
by: Kanniah, Uma S., et al.
Published: (2007)
Cryptanalysis of RSA
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
Application FCM in modelling DIR for Selangor using negative binomial GAM
by: Mohamad, Nazeera, et al.
Published: (2018)
by: Mohamad, Nazeera, et al.
Published: (2018)
Analysis of time series for Malaysian currency exchange rate to the United States currency
by: Ting, Heng Sheng, et al.
Published: (2021)
by: Ting, Heng Sheng, et al.
Published: (2021)
High performance of RSA simulation system based on modified montgomery algorithm
by: Liu, J., et al.
Published: (2016)
by: Liu, J., et al.
Published: (2016)
Review on queueing problem in healthcare
by: Ariff, Hajar, et al.
Published: (2018)
by: Ariff, Hajar, et al.
Published: (2018)
Implementation of RSA algorithm
by: Rasid, Hafizul Azizi, et al.
Published: (2011)
by: Rasid, Hafizul Azizi, et al.
Published: (2011)
ADM for solving linear second-order fredholm integro- differential equation
by: Karim, Mohd F., et al.
Published: (2018)
by: Karim, Mohd F., et al.
Published: (2018)
ADM for solving linear second-order fredholm integro- differential equation
by: Karim, Mohd F., et al.
Published: (2018)
by: Karim, Mohd F., et al.
Published: (2018)
Modified Baptista type cryptosystem via matrix secret key.
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2008)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2008)
Potential for using climate forecasts in spatio-temporal prediction of dengue fever incidence in Malaysia submitted
by: Che Him, Norziha
Published: (2015)
by: Che Him, Norziha
Published: (2015)
The effects of magnetic casson blood flow in an inclined multi-stenosed artery by using caputo-fabrizio fractional derivatives
by: Jamil, Dzuliana Fatin, et al.
Published: (2021)
by: Jamil, Dzuliana Fatin, et al.
Published: (2021)
A lucas based cryptosystem analog to the ElGamal cryptosystem and elliptic curve cryptosystem
by: Wong, Tze Jin, et al.
Published: (2014)
by: Wong, Tze Jin, et al.
Published: (2014)
Similar Items
-
Pembaikan sistem kriptografi multi RSA
by: Kamardan, Muhammad Ghazali
Published: (2005) -
Pembaikan sistem kriptografi multi RSA
by: Kamardan, Muhammad Ghazali
Published: (2005) -
The quartic analog to the RSA cryptosystem
by: Wong, Tze Jin, et al.
Published: (2007) -
A cubic analogue of the RSA cryptosystem
by: Md Said, Mohamad Rushdan, et al.
Published: (2003) -
Fast decryption methods for the Somsuk-RSA cryptosystem.
by: Asbullah, Muhammad Asyraf, et al.
Published: (2024)