|
- The CiliPadi Family of Lightweight Authenticated Encryption, v1.2
- Z'aba, M. R., Jamil, N., Rohmad, M. S., Rani, H. A., and Shamsuddin, S.
(abstract.pdf | fullpaper.pdf)
- An Upgrade on the Key Generation Algorithm of the GGH-MKA Lattice-Based Encryption Scheme
- Mandangan, A., Kamarulhaili, H., and Asbullah, M. A.
(abstract.pdf | fullpaper.pdf)
- A Chronological Review of Key Establishment Models and Protocols
- Yap, E. Y. Y., Chin, J. J., and Goh, A.
(abstract.pdf | fullpaper.pdf)
- An Attack on N = p2q with Partially Known Bits on the Multiple of the Prime Factors
- Ruzai,W. N. A., Adenan, N. N. H., Ariffin, M. R. K., Ghaffar, A. H. A., and Johari, M. A. M.
(abstract.pdf | fullpaper.pdf)
- On the Security of a Non-Interactive Authenticated Key Agreement over Mobile Communication Networks
- Yau, W. C., Yap, W. S., and Chin, J. J.
(abstract.pdf | fullpaper.pdf)
- Power of Frobenius Endomorphism and its Performance on PseudoTNAF System
- Yunos, F., Yusof, A. M., Hadani, N. H., Ariffin, M. R. K., and Sapar, S. H.
(abstract.pdf | fullpaper.pdf)
- Group Identity-Based Identification: Definitions, Construction and Implementation
- Vangujar, A. K., Ng, T. S., Chia, J., Chin, J. J., and Yip, S. C.
(abstract.pdf | fullpaper.pdf)
|