-
1
A new cryptosystem analogous to LUCELG and Cramer-Shoup
Published 2009“…Malaysian Society for Cryptology Research…”
Get full text
Article -
2
A new public key cryptosystem based on IFS
Published 2010“…Malaysian Society for Cryptology Research…”
Get full text
Article -
3
AAβ-Cryptosystem: a chaos based public key cryptosystem
Published 2009“…Malaysian Society for Cryptology Research…”
Get full text
Article -
4
Conditions for counter measure against one time pad attack on Baptista type cryptosystem
Published 2009“…Malaysian Society for Cryptology Research…”
Get full text
Article -
5
Garbage-man-in-the-middle attack on the LUC4 cryptosystem.
Published 2009“…Malaysian Society for Cryptology Research…”
Get full text
Article -
6
GCD attack on the LUC4 cryptosystem.
Published 2009“…Malaysian Society for Cryptology Research…”
Get full text
Article -
7
The beta-transformation: a case study for chaos based cryptography
Published 2009“…Malaysian Society for Cryptology Research…”
Get full text
Article -
8
On the mathematical complexity and the time implementation of proposed variants of elliptic curves cryptosystems
Published 2013“…Malaysian Society for Cryptology Research…”
Get full text
Article -
9
Key exchange for new cryptosystem analogous to LUCELG and Cramer-Shoup
Published 2013“…Malaysian Society for Cryptology Research…”
Get full text
Article -
10
A new arbitrated signing scheme based on BFHP
Published 2015“…Malaysian Society for Cryptology Research…”
Get full text
Article -
11
Rabin-RZ: a new efficient method to overcome Rabin cryptosystem decryption failure problem
Published 2015“…Malaysian Society for Cryptology Research…”
Get full text
Article -
12
Provably secure randomized AAβ cryptosystem
Published 2015“…Malaysian Society for Cryptology Research…”
Get full text
Article -
13
A secure cryptographic algorithm against side channel attacks
Published 2015“…Malaysian Society for Cryptology Research…”
Get full text
Article -
14
Mutual remote attestation in IPSec based VPN
Published 2013“…Malaysian Society for Cryptology Research…”
Get full text
Article -
15
Hardware implementation of RC4A stream cipher
Published 2009“…Malaysian Society for Cryptology Research…”
Get full text
Article -
16
Improving security performance with parallel crypto operations in SSL bulk data transfer
Published 2009“…Malaysian Society for Cryptology Research…”
Get full text
Article -
17
A shift column different offset for better Rijndael security
Published 2009“…Malaysian Society for Cryptology Research…”
Get full text
Article -
18
Generalizing equivalent elliptic divisibility sequence for elliptic net scalar multiplication
Published 2018“…Malaysian Society for Cryptology Research…”
Get full text
Article -
19
Security analysis of Lucas based El-Gamal Cryptosystem in the elliptic curve group over finite field using two types of GMITM attacks
Published 2018“…Malaysian Society for Cryptology Research…”
Get full text
Article -
20
Design and analysis of Rabin-p key encapsulation mechanism for CyberSecurity Malaysia MySEAL initiative
Published 2019“…Malaysian Society for Cryptology Research (MSCR)…”
Get full text
Article