|
- On the Smallest-Basis Problem underlying the GGH Lattice-based Cryptosystem
- Mandangan, A., Kamarulhaili, H., and Asbullah, M.A.
(fullpaper.pdf)
- Alternative Method to Find the Number of Points on Koblitz Curve
- Hadani, N.H., Yunos, F., Ariffin, M.R.K., Sapar, S.H., and Rahman, N.N.A.
(fullpaper.pdf)
- Searchable Symmetric Encryption Security Definitions
- Mohamad, M.S., Tan, S.Y., and Chin, J.J.
(fullpaper.pdf)
- Construction of Endomorphisms for the ISD Method on Elliptic Curves with j-invariant 1728
- Antony, S.N.F.M.A. and Kamarulhaili, H.
(fullpaper.pdf)
- An Innovative Bicartisian Algebra for Designing of Highly Performed NTRU Like Cryptosystem
- Yassein, H.R. and Al-Saidi, N.M.G.
(fullpaper.pdf)
- A Hierarchical Identity-Based Identification Scheme Without Pairing
- Vangujar, A.K., Chin, J.J., Tan, S.Y. and Ng, T.S.
(fullpaper.pdf)
- A New Attack on Special-Structured RSA Primes
- Ghafar, A.H.A., Ariffin, M.R.K. and Asbullah, M.A.
(fullpaper.pdf)
- QuCCs: An Experimental of Quantum Key Distribution using Quantum Cryptography and Communication Simulator
- Zukarnain, Z.A., Buhari, A., Harun, N.Z. and Khalid, R.
(fullpaper.pdf)
- Successful Cryptanalytic Attacks Upon RSA Moduli N=pq
- Abubakar, S.I., Ariffin, M.R.K. and Asbullah, M.A.
(fullpaper.pdf)
|