Showing 1 - 9 results of 9 for search '"continued fraction"', query time: 0.06s Refine Results
  1. 1

    New attacks on RSA with modulus N = p2q using continued fractions by Asbullah, Muhammad Asyraf, Kamel Ariffin, Muhammad Rezal

    Published 2015
    “…In this paper, we propose two new attacks on RSA with modulus N = p2q using continued fractions. Our first attack is based on the RSA key equation ed - φ(N)k = 1 where φ(N) = p(p - 1)(q - 1). …”
    Get full text
    Conference or Workshop Item
  2. 2

    Algebraic analysis of a rabin-like cryptosystem and its countermeasures by Asbullah, Muhammad Asyraf, Kamel Ariffin, Muhammad Rezal

    Published 2017
    “…Methods/Analysis: We show that by using the continued fraction’s method and the Coppersmith’s theorems, there exists inappropriate parameter’s size that can affect the security of Rabin-p cryptosystem. …”
    Get full text
    Article
  3. 3

    Analysis on the AAβ cryptosystem by Asbullah, Muhammad Asyraf, Kamel Ariffin, Muhammad Rezal

    Published 2016
    “…For the second and third analysis, we bring in the continued fraction’s method and the Coppersmith’s theorems, which presents several potential ways to retrieve the prime factor of p and q from the AAβ public keys or the plaintext m from the AAβ ciphertext, respectively. …”
    Get full text
    Conference or Workshop Item
  4. 4

    Algebraic cryptanalysis on the AAβ cryptosystem by Asbullah, Muhammad Asyraf, Kamel Ariffin, Muhammad Rezal

    Published 2017
    “…We begin with the continued fraction’s method, then followed by the Coppersmith’s techniques which present several potential ways to retrieve the prime factor of p and q from the AAβ public keys or the plain text m from the AAβ ciphertext, respectively. …”
    Get full text
    Article
  5. 5

    The Blömer-May’s weak key revisited by Mohd Tahir, Rasyid Redha, Asbullah, Muhammad Asyraf, Ariffin, Muhammad Rezal Kamel

    Published 2019
    “…Note that the said attack can lead a polynomial time factorisation of modulus N via continued fraction method. Later, the attack was reformulated to satisfies xy<N/(4(p+q)). …”
    Get full text
    Article
  6. 6

    Determination of a good indicator for estimated prime factor and its modification in Fermat’s Factoring Algorithm by Mohd Tahir, Rasyid Redha, Asbullah, Muhammad Asyraf, Kamel Ariffin, Muhammad Rezal, Mahad, Zahari

    Published 2021
    “…The main results of mFFA1-EPF focused on three criteria: (i) the approach to select good candidates from a list of convergent continued fraction, (ii) the establishment of new potential initial values based on EPF, and (iii) the application of the above modification upon FFA. …”
    Get full text
    Article
  7. 7

    Another proof of wiener's short secret exponent by Asbullah, Muhammad Asyraf, Kamel Ariffin, Muhammad Rezal

    Published 2019
    “…Wiener’s short secret exponent attack is a well-known crypt-analytical result upon the RSA cryptosystem using a Diophantine’s method called continued fractions. We recall that Wiener’s attack works efficiently on RSA with the condition that the secret exponent d<13N14. …”
    Get full text
    Article
  8. 8

    Increment of insecure RSA private exponent bound through perfect square RSA diophantine parameters cryptanalysis by Wan Mohd Ruzai, Wan Nur Aqlili, Nitaj, Abderrahmane, Kamel Ariffin, Muhammad Rezal, Mahad, Zahari, Asbullah, Muhammad Asyraf

    Published 2022
    “…That is, the unknown [Formula presented] can be found amongst the convergents of [Formula presented] via continued fractions algorithm. Consequently, Coppersmith's theorem is applied to solve for prime factors p and q in polynomial time. …”
    Article
  9. 9

    On the variants of RSA cryptosystem and its related algebraic cryptanalysis by Ruzai, Wan Nur Aqlili, Kamel Ariffin, Muhammad Rezal, Asbullah, Muhammad Asyraf

    Published 2019
    “…This review article also emphasizes on the algebraic cryptanaly-sis methods proposed on those variants cryptosystems specifically via the continued fractions method and the lattice reduction method…”
    Get full text
    Book Section