Showing 1 - 8 results of 8 for search '"Adi Shamir"', query time: 0.18s Refine Results
  1. 1
  2. 2
  3. 3

    Study of knapsack cryptosystems by Sathia Seelan Vetrichelvan

    Published 2020
    “…The cryptosystem was successfully attacked by Adi Shamir, one of the inventors for the RSA cryptosystem. …”
    Get full text
    Final Year Project (FYP)
  4. 4

    Anonymous reputation system by Chua, Wei Kiat

    Published 2017
    “…Titled the Anonymous Reputation System (ARS), it utilizes the Ron Rivest, Adi Shamir and Leonard Adleman (RSA) algorithm to create a blind signature, using a client-side JavaScript, and sent it to the journalist together with the report. …”
    Get full text
    Final Year Project (FYP)
  5. 5

    Attacks on weak implementations of RSA by Kok, Zi Ming

    Published 2021
    “…RSA an acronym which comes from the surnames of Ron Rivest, Adi Shamir and Leonard Adleman who first publicly described the algorithm in 1977, is one of the first practicable public-key cryptosystem that is widely used to secure data transmitted digitally in the public. …”
    Get full text
    Final Year Project (FYP)
  6. 6

    Effect of self-invertible matrix on cipher hexagraphic polyfunction by Lin, Sally Pei Ching, Yunos, Faridah

    Published 2019
    “…The security of this system, including its combination with the second order linear recurrence Lucas sequence (LUC) and the Ron Rivest, Adi Shamir and Leonard Adleman (RSA) method, until now is being upgraded by some researchers. …”
    Get full text
    Article
  7. 7

    Beberapa Penggunaan Teori Nombor dalam Kriptografi by Yunos, Faridah

    Published 2001
    “…Melalui penggunaan konsep aritmetik modulo, beberapa kaedah pengkriptanan dibangunkan berorientasikan sistem Saifer Digrafik, RSA (Ron Rivest, Adi Shamir dan Leonard Adleman) dan LUC (fungsi Lucas jadi semula linear berdarjah dua). …”
    Get full text
    Thesis
  8. 8

    Effect of Self-Invertible Matrix on Cipher Hexagraphic Polyfunction by Sally Lin Pei Ching, Faridah Yunos

    Published 2019-06-01
    “…The security of this system, including its combination with the second order linear recurrence Lucas sequence (LUC) and the Ron Rivest, Adi Shamir and Leonard Adleman (RSA) method, until now is being upgraded by some researchers. …”
    Get full text
    Article