Kriptosistem Multi-Rsa
Dalam kertas ilmiah ini kami persembahkan kriptosistem multi-RSA. Sistem baru berasaskan RSA ini membenarkan sebarang kombinasi k+1 pelanggan menyahsulit tetapi kurang daripada k+1 pelanggan gagal berbuat demikian. Hal ini dapat dicapai dengan memperkenalkan fungsi aritmetik istimewa yang menjamin k...
| Main Authors: | How Guan Aun, How Guan Aun, Yahya Abu Hasan, Yahya Abu Hasan, Eddie Shahril Ismail, Eddie Shahril Ismail |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Penerbit UTM Press
2001
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/1314/ http://eprints.utm.my/1314/1/JT35C5.pdf |
Similar Items
ESF: suatu kriptosistem mudah ringkas berasaskan
masalah pemfaktoran
by: Eddie Shahril Ismail,, et al.
Published: (2018)
by: Eddie Shahril Ismail,, et al.
Published: (2018)
A new version of ElGamal signature scheme
by: Eddie Shahril Ismail,, et al.
Published: (2006)
by: Eddie Shahril Ismail,, et al.
Published: (2006)
Pembaikan sistem kriptografi multi RSA
by: Kamardan, Muhammad Ghazali
Published: (2005)
by: Kamardan, Muhammad Ghazali
Published: (2005)
Pembaikan sistem kriptografi multi RSA
by: Kamardan, Muhammad Ghazali
Published: (2005)
by: Kamardan, Muhammad Ghazali
Published: (2005)
A parallel distributed Javaspaces implementation of RSA public key factorization using quadratic sieve / by Lau Khek Hooi.
by: Lau, Khek Hooi
Published: (2003)
by: Lau, Khek Hooi
Published: (2003)
Modified multi prime RSA cryptosystem
by: Kamardan, M. Ghazali, et al.
Published: (2018)
by: Kamardan, M. Ghazali, et al.
Published: (2018)
Analisis kerawakan algoritma terubah suai sifer blok ultra-ringan, SLIM
by: Isma Norshahila Mohammad Shah,, et al.
Published: (2023)
by: Isma Norshahila Mohammad Shah,, et al.
Published: (2023)
Cryptanalysis of RSA
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
Billboard multilingual online system (BMOS)
by: Mohd Hasnul Shahril, Harun
Published: (2010)
by: Mohd Hasnul Shahril, Harun
Published: (2010)
Eeg-Based Person Identification Using Multi-Levelwavelet Decomposition With Multi-Objective Flower Pollination Algorithm
by: Yahya Alyasseri, Zaid Abdi Alkareem
Published: (2020)
by: Yahya Alyasseri, Zaid Abdi Alkareem
Published: (2020)
CR-submanifolds of a nearly Kaehler manifold / Loo Tee How
by: Loo, Tee How
Published: (1998)
by: Loo, Tee How
Published: (1998)
Third-order harmonic mean Runge-Kutta formulae
for solving ordinary differential equations
by: Rokiah @ Rozita Ahmad,, et al.
Published: (2010)
by: Rokiah @ Rozita Ahmad,, et al.
Published: (2010)
Gradient-Type Methods for Unconstrained Optimization
by: Guan, Hui Shan
Published: (2015)
by: Guan, Hui Shan
Published: (2015)
Rivest-Shamir-Adleman (RSA)
by: Mohammed Hayek, Iqram, et al.
Published: (2011)
by: Mohammed Hayek, Iqram, et al.
Published: (2011)
Enhancement of RSA Key Generation Using Identity
by: Norhidayah, Muhammad, et al.
Published: (2015)
by: Norhidayah, Muhammad, et al.
Published: (2015)
Ubah suaian perluasan-topsis untuk keputusan multi-kriterium linguistik kabur (Modification of TOPSIS-extension for Fuzzy Linguistic Multi-Criteria Decision)
by: Tarmudi, Zamali, et al.
Published: (2013)
by: Tarmudi, Zamali, et al.
Published: (2013)
Implementation of RSA algorithm
by: Rasid, Hafizul Azizi, et al.
Published: (2011)
by: Rasid, Hafizul Azizi, et al.
Published: (2011)
Deniable authentication protocol based on factoring and discrete logarithm problems
by: Nek Abd Rahman, Normahirah, et al.
Published: (2022)
by: Nek Abd Rahman, Normahirah, et al.
Published: (2022)
Preminilary study on electronic number mapping in Malaysia
by: Yahya, Saadiah, et al.
Published: (2008)
by: Yahya, Saadiah, et al.
Published: (2008)
Efficient quadrature rules for numerical integration based on linear legendre multi-wavelets
by: Nur Neesha, Alimin, et al.
Published: (2019)
by: Nur Neesha, Alimin, et al.
Published: (2019)
A conflicting bifuzzy evaluation approach in multi-criteria decision making
by: Tarmudi, Zamali, et al.
Published: (2010)
by: Tarmudi, Zamali, et al.
Published: (2010)
New Univariate Synthetic Double Sampling X And Multivariate Synthetic Double Sampling T2 Control Charts
by: Lee, How Chinh
Published: (2017)
by: Lee, How Chinh
Published: (2017)
The Structure Of The Number System
by: Khoo, Keat Guan
Published: (2008)
by: Khoo, Keat Guan
Published: (2008)
The quartic analog to the RSA cryptosystem
by: Wong, Tze Jin, et al.
Published: (2007)
by: Wong, Tze Jin, et al.
Published: (2007)
New compendium of RSA vulnerabilities
by: Abd Ghafar, Amir Hamzah
Published: (2020)
by: Abd Ghafar, Amir Hamzah
Published: (2020)
Multi-label learning based on positive label correlations using predictive apriori
by: Al Azaidah, Raed Hasan Saleh
Published: (2019)
by: Al Azaidah, Raed Hasan Saleh
Published: (2019)
Increment of insecure RSA private exponent bound through perfect square RSA diophantine parameters cryptanalysis
by: Wan Mohd Ruzai, Wan Nur Aqlili, et al.
Published: (2022)
by: Wan Mohd Ruzai, Wan Nur Aqlili, et al.
Published: (2022)
Loop-based RSA Key Generation Algorithm using String Identity
by: Norhidayah, Muhammad, et al.
Published: (2013)
by: Norhidayah, Muhammad, et al.
Published: (2013)
Modified Miller-Rabin primality test algorithm to detect prime numbers for generating RSA keys
by: Shereek, Balkees Mohamed
Published: (2016)
by: Shereek, Balkees Mohamed
Published: (2016)
Introducing S-index into factoring RSA modulus via Lucas sequences
by: Abu, Nur Azman, et al.
Published: (2017)
by: Abu, Nur Azman, et al.
Published: (2017)
A cubic analogue of the RSA cryptosystem
by: Md Said, Mohamad Rushdan, et al.
Published: (2003)
by: Md Said, Mohamad Rushdan, et al.
Published: (2003)
Security issues of Novel RSA variant
by: Nitaj, Abderrahmane, et al.
Published: (2022)
by: Nitaj, Abderrahmane, et al.
Published: (2022)
Solving multi-objective dynamic vehicle routing problem with time windows using multi-objective algorithm
by: Khoo, Thau Soon
Published: (2022)
by: Khoo, Thau Soon
Published: (2022)
RSA with flexible key size: a hardware approach
by: Asaduzzaman, Khandaker, et al.
Published: (2005)
by: Asaduzzaman, Khandaker, et al.
Published: (2005)
Engineering Mathematics I : A Case Study of First Year Students at Faculty of Engineering, UNIMAS
by: Kuryati, Kipli, et al.
Published: (2012)
by: Kuryati, Kipli, et al.
Published: (2012)
A study on private vehicle demand forecasting based on Box-Jenkins method
by: Abu, Noratikah, et al.
Published: (2019)
by: Abu, Noratikah, et al.
Published: (2019)
A novel approach to handwritten character recognition
by: Clarke, Eddie
Published: (1995)
by: Clarke, Eddie
Published: (1995)
In the heart of the mangrove
by: Chua, Eddie
Published: (2012)
by: Chua, Eddie
Published: (2012)
Effect of normalization and effect of normalization and training algorithm on radial basis training algorithm on radial basis function network performance function network performance
by: Wani, Eddie
Published: (2007)
by: Wani, Eddie
Published: (2007)
Comparison between RSA hardware and software implementation for WSNs sexcurity schemes
by: Md. Tap, Abu Osman, et al.
Published: (2010)
by: Md. Tap, Abu Osman, et al.
Published: (2010)
Similar Items
-
ESF: suatu kriptosistem mudah ringkas berasaskan
masalah pemfaktoran
by: Eddie Shahril Ismail,, et al.
Published: (2018) -
A new version of ElGamal signature scheme
by: Eddie Shahril Ismail,, et al.
Published: (2006) -
Pembaikan sistem kriptografi multi RSA
by: Kamardan, Muhammad Ghazali
Published: (2005) -
Pembaikan sistem kriptografi multi RSA
by: Kamardan, Muhammad Ghazali
Published: (2005) -
A parallel distributed Javaspaces implementation of RSA public key factorization using quadratic sieve / by Lau Khek Hooi.
by: Lau, Khek Hooi
Published: (2003)