MJMS
 
Home Editorial Board For Author Content and Abstract Online Submission Recognition Contact Us Links
 

Volume 13. (S). August 2019

 

  • On the Smallest-Basis Problem underlying the GGH Lattice-based Cryptosystem
    - Mandangan, A., Kamarulhaili, H., and Asbullah, M.A.
    (fullpaper.pdf)
  • Alternative Method to Find the Number of Points on Koblitz Curve
    - Hadani, N.H., Yunos, F., Ariffin, M.R.K., Sapar, S.H., and Rahman, N.N.A.
    (fullpaper.pdf)
  • Searchable Symmetric Encryption Security Definitions
    - Mohamad, M.S., Tan, S.Y., and Chin, J.J.
    (fullpaper.pdf)
  • Construction of Endomorphisms for the ISD Method on Elliptic Curves with j-invariant 1728
    - Antony, S.N.F.M.A. and Kamarulhaili, H.
    (fullpaper.pdf)
  • An Innovative Bicartisian Algebra for Designing of Highly Performed NTRU Like Cryptosystem
    - Yassein, H.R. and Al-Saidi, N.M.G.
    (fullpaper.pdf)
  • A Hierarchical Identity-Based Identification Scheme Without Pairing
    - Vangujar, A.K., Chin, J.J., Tan, S.Y. and Ng, T.S.
    (fullpaper.pdf)
  • A New Attack on Special-Structured RSA Primes
    - Ghafar, A.H.A., Ariffin, M.R.K. and Asbullah, M.A.
    (fullpaper.pdf)
  • QuCCs: An Experimental of Quantum Key Distribution using Quantum Cryptography and Communication Simulator
    - Zukarnain, Z.A., Buhari, A., Harun, N.Z. and Khalid, R.
    (fullpaper.pdf)
  • Successful Cryptanalytic Attacks Upon RSA Moduli N=pq
    - Abubakar, S.I., Ariffin, M.R.K. and Asbullah, M.A.
    (fullpaper.pdf)