-
121
The Fermat-type equation with signature (2, 2, n) and Bunyakovsky conjecture
Published 2022-06-01“…We first discuss the Fermat-type equation with signature (2, 𝑚, 𝑛), which is the Diophantine equation in the shape 𝑥 2 + 𝑦 𝑚 = 𝑧 𝑛 , where 𝑥, 𝑦 and 𝑧 are unknown integers, and 𝑚, 𝑛 are fixed positive integers greater than 1. …”
Article -
122
Cryptanalysis of El-Gamal AAs cryptosystem
Published 2011“…Those attacks are the exhaustive search attack on the secret parameters and the linear Diophantine equation attack. We show that these attacks fail to get the correct secret parameters efficiently. …”
Get full text
Thesis -
123
Heterotic string compactification and quiver gauge theory on toric geometry
Published 2016“…After explicitly computing the Diophantine equation of five block cases, we use this structure to re-organize the result in a form that can be applied to arbitrary block numbers. …”
Thesis -
124
Factorization strategies of N = pq and N = pʳq and relation to its decryption exponent bound
Published 2018“…The major RSA underlying security problems rely on the difficulty of factoring a very large composite integer N into its two nontrivial prime factors of p and q in polynomial time, the ability to solve a given Diophantine equation ed = 1 + kφ (N) where only the public key e is known and the parameters d, k and φ (N) are un- known and finally the failure of an adversary to compute the decryption key d from the public key pair (e, N). …”
Get full text
Thesis -
125
Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure
Published 2015“…In this thesis, we also develop a new cryptographic hard problem based on a special instance of a linear Diophantine equation in two variables, with some provided restrictions and carefully selected parameters. …”
Get full text
Thesis -
126
Optimization of the multivariate polynomial public key for quantum safe digital signature
Published 2023-04-01“…The optimal key-recovery attack reduces to a Modular Diophantine Equation Problem or MDEP with more than one unknown variables for a single equation. …”
Get full text
Article -
127
Snake Graphs Arising from Groves with an Application in Coding Theory
Published 2022-07-01“…Furthermore, perfect matchings of snake graphs have also been used to find closed formulas for cluster variables of some cluster algebras and solutions of the Markov equation, which is a well-known Diophantine equation. Recent results prove that snake graphs give rise to some <i>string modules</i> over some path algebras, connecting snake graph research with the theory of representation of algebras. …”
Get full text
Article