Zobrazeno 1 - 10
of 20
pro vyhledávání: '"Amir Hamzah Abd Ghafar"'
Autor:
Wan Nur Aqlili Ruzai, Muhammad Rezal Kamel Ariffin, Muhammad Asyraf Asbullah, Amir Hamzah Abd Ghafar
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 36, Iss 5, Pp 102074- (2024)
RSA stands as a widely adopted method within asymmetric cryptography, commonly applied for digital signature validation and message encryption. The security of RSA relies on the challenge of integer factorization, a problem considered either computat
Externí odkaz:
https://doaj.org/article/88acc6d0f15140b78829516127f02102
Publikováno v:
Symmetry, Vol 14, Iss 9, p 1898 (2022)
The invention in 1978 of the first practical asymmetric cryptosystem known as RSA was a breakthrough within the long history of secret communications. Since its inception, the RSA cryptosystem has become embedded in millions of digital applications w
Externí odkaz:
https://doaj.org/article/92040b5a5b734f538cb555d9e46f6ef3
Autor:
Boon Chian Tea, Muhammad Rezal Kamel Ariffin, Amir Hamzah Abd Ghafar, Siti Hasana Sapar, Mohamat Aidil Mohamat Johari
Publikováno v:
Symmetry, Vol 14, Iss 9, p 1784 (2022)
Symmetric cryptography allows faster and more secure communication between two entities using the identical pre-established secret key. However, identifying the honest entity with the same secret key before initiating symmetric encryption is vital si
Externí odkaz:
https://doaj.org/article/03ee01cd55f9466a8017af1627e77af4
Autor:
Nurul Nur Hanisah Adenan, Muhammad Rezal Kamel Ariffin, Siti Hasana Sapar, Amir Hamzah Abd Ghafar, Muhammad Asyraf Asbullah
Publikováno v:
Mathematics, Vol 9, Iss 4, p 340 (2021)
This paper describes an attack on the Rivest, Shamir and Adleman (RSA) cryptosystem utilizing the modulus N=p2q where p and q are two large balanced primes. Let e1,e2
Externí odkaz:
https://doaj.org/article/ec137d38a9ce4cce89c4e3e90a22e422
Publikováno v:
Mathematics, Vol 8, Iss 12, p 2188 (2020)
The CRT-RSA cryptosystem is the most widely adopted RSA variant in digital applications. It exploits the properties of the Chinese remainder theorem (CRT) to elegantly reduce the size of the private keys. This significantly increases the efficiency o
Externí odkaz:
https://doaj.org/article/d4ed508aa8d6441cac94395da5486629
Publikováno v:
Symmetry, Vol 12, Iss 5, p 838 (2020)
Asymmetric key cryptosystem is a vital element in securing our communication in cyberspace. It encrypts our transmitting data and authenticates the originality and integrity of the data. The Rivest–Shamir–Adleman (RSA) cryptosystem is highly rega
Externí odkaz:
https://doaj.org/article/a95e040bf7ee417a9c8be2b304e7c049
Autor:
Amir Hamzah Abd Ghafar
Publikováno v:
Malaysian Journal of Science. 41:1-8
The concept of public-key cryptography introduced the notion of a digital signature scheme. In the era of online and digital communications, a signature scheme that works perfectly to achieve the goals of cryptography- confidentiality, authentication
Autor:
Muhammad Rezal Kamel Ariffin, Amir Hamzah Abd Ghafar, Muhammad Asyraf Asbullah, Boon Chian Tea
Publikováno v:
Mathematics, Vol 9, Iss 2642, p 2642 (2021)
Mathematics
Volume 9
Issue 21
Mathematics
Volume 9
Issue 21
Boneh et al. introduced mediated RSA (mRSA) in 2001 in an attempt to achieve faster key revocation for medium-sized organizations via the involvement of a security mediator (SEM) as a semi-trusted third party to provide partial ciphertext decryption
Autor:
Muhammad Rezal Kamel Ariffin, Amir Hamzah Abd Ghafar Ghafar, Wan Nur Aqlili Wan Mohd Ruzai, Nurul Nur Hanisah Adenan
Publikováno v:
Soft Computing Approach for Mathematical Modeling of Engineering Problems ISBN: 9781003138341
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f6ddaeca447016d5e49144b9f26f9cca
https://doi.org/10.1201/9781003138341-11-11
https://doi.org/10.1201/9781003138341-11-11
Publikováno v:
Symmetry; Volume 14; Issue 8; Pages: 1498
Rogue certificate authorities (RCA) are third-party entities that intentionally produce key pairs that satisfy publicly known security requirements but contain weaknesses only known to the RCA. This work analyses the Murru–Saettone RSA variant sche