MJMS
 
Home Editorial Board For Author Content and Abstract Online Submission Contact Us Links
 

Volume 7.(S).August 2013

 

  • On the Hastad's Attack to LUC 4,6 Cryptosystem and Compared with Other RSA-Type Cryptosystem
    Wong Tze Jin, Hailiza Kamarulhaili and Mohd Rushdan Md Said
    ( abstract.pdf, fullpaper.pdf)

  • A New Efficient Asymmetric Cryptosystem Based on the Integer Factorization Problem of N = p2q
    M.R.K.Ariffin, M.A. Asbullah, N.A.Abu & Z.Mahad
    ( abstract.pdf, fullpaper.pdf)

  • Secure Communication with One Decoy State and Two Way Quantum Key Distribution Scheme
    M. F. Abdul Khir, Iskandar Bahari, M. N. Mohd Zain and S. Shaari
    ( abstract.pdf, fullpaper.pdf)

  • Experimental Two Way Quantum Key Distribution with Weak+Vacuum Decoy State
    M. F. Abdul Khir, M. N. Mohd Zain, Iskandar Bahari, Suryadi and S. Shaari
    ( abstract.pdf, fullpaper.pdf)

  • Polynomial Based Key Distribution Scheme for WPAN
    R. Vimalathitan, D. Rossi, M. Omana, C. Metra and M. L. Valarmathi
    ( abstract.pdf, fullpaper.pdf)

  • Security Upgrade for a K-Resilient Identity-Based Identification Scheme in the Standard Model
    Ji-Jian Chin & Swee-Huay Heng

    ( abstract.pdf, fullpaper.pdf)

  • An Efficient Identification Scheme in Standard Model Based on the Diophantine Equation Hard Problem
    B. C. Tea, M. R. K. Ariffin & J.J. Chin
    ( abstract.pdf, fullpaper.pdf)

  • Group Codes Define Over Dihedral Groups of Small Order
    Denis C.K. Wong & Ang M.H
    ( abstract.pdf, fullpaper.pdf)

  • A New Efficient Analytically Proven Lossless Data Compression for Data Transmission Technique
    M.A. Daud & M.R.K. Ariffin

    ( abstract.pdf, fullpaper.pdf)

  • Calculation Enhancement of Chebyshev Polynomial over Zp
    Mohammed Benasser Algehawi, Azman Samsudin and Shahram Jahani
    ( abstract.pdf, fullpaper.pdf)

  • Big-Digits Representation and Its Application in Cryptography
    Shahram and Azman Samsudin
    ( abstract.pdf, fullpaper.pdf)