Search Results
Proceedings of the 4
mscr.org.my
https://mscr.org.my › proceeding › Cryptology2014
mscr.org.my
https://mscr.org.my › proceeding › Cryptology2014
Proceedings of the 4th International Cryptology and Information Security. (4th.: 2014: Putrajaya). CONFERENCE PROCEEDINGS CRYPTOLOGY 2014: Proceedings of ...
Proceedings of the 6
mscr.org.my
https://mscr.org.my › proceeding › Cryptology2018
mscr.org.my
https://mscr.org.my › proceeding › Cryptology2018
11 Jul 2018 — First and foremost, I would like to thank the Malaysian. Society for Cryptology Research (MSCR) in collabo-.
204 pages
The government has launched the Malaysia Cyber Security ...
mscr.org.my
https://mscr.org.my › data › pdf › MCSS_News
mscr.org.my
https://mscr.org.my › data › pdf › MCSS_News
12 Oct 2020 — KUALA LUMPUR 12 October 2020: The government has launched the Malaysia. Cyber Security Strategy (MCSS) 2020-2024 with an allocation of RM1.8 ...
2 pages
PLEASE USE CAPITAL LETTERS TO FILL IN THIS FORM
mscr.org.my
https://www.mscr.org.my › mscr_membership
mscr.org.my
https://www.mscr.org.my › mscr_membership
MALAYSIAN SOCIETY FOR CRYPTOLOGY RESEARCH (0353-07-SEL) c/o Institute for Mathematical Research, Universiti Putra Malaysia,. 43400 UPM, Serdang, Selangor, ...
Generalizing Equivalent Elliptic Divisibility Sequence for ...
mscr.org.my
https://mscr.org.my › journal-20190806143902
mscr.org.my
https://mscr.org.my › journal-20190806143902
by N MuslimCited by 1 — Elliptic Net is a powerful method to compute cryptographic pair- ings or scalar multiplication. The elliptic net rank one originated from.
Improvement of Scalar Multiplication on Elliptic Curve with j ...
mscr.org.my
https://mscr.org.my › journal-20200507123918
mscr.org.my
https://mscr.org.my › journal-20200507123918
by SNFMA Antony — Scalar multiplication plays a vast role in elliptic curve cryptogra- phy (ECC). It consumes numerous operation cost, especially when deal-.
15 pages
A New Short Decryption Exponent Cryptanalysis Attacks of ...
mscr.org.my
https://mscr.org.my › journal-20200507124227
mscr.org.my
https://mscr.org.my › journal-20200507124227
by SI Abubakar — paper also reports t instances of factoring RSA moduli Ns = psqs with public key pair (Ns,es) where three new attacks using key equations of.
Scalar Decomposition Methods on Genus One Elliptic Curves
mscr.org.my
https://mscr.org.my › journal-20180121204941
mscr.org.my
https://mscr.org.my › journal-20180121204941
by SNFMA Antony — In this paper, we reviewed and revisited the extension scalar decom- position method of a well-known GLV method namely the GLS (Gal-.
1 Class of Weak Primes and Its Application on RSA
mscr.org.my
https://mscr.org.my › journal-20190806153919
mscr.org.my
https://mscr.org.my › journal-20190806153919
by AH Abd Ghafar — The Pollard p−1 method is able to solve integer factorization prob- lem if the targeted composite number has small prime factors. This is.
21 pages
Garbage-Man-In-The-Middle Attack on the Luc4 Cryptosystem
mscr.org.my
https://mscr.org.my › journal-20180120234452
mscr.org.my
https://mscr.org.my › journal-20180120234452
This paper reports an investigation into an attack on the LUC4 cryptosystem. LUC4 cryptosystem is derived from a fourth order linear recurrence relation and ...
Key Exchange for New Cryptosystem Analogous to ...
mscr.org.my
https://mscr.org.my › journal-20180623231736
mscr.org.my
https://mscr.org.my › journal-20180623231736
Key exchange or key establishment is any process in cryptography by which users are able to share or exchange a secret key. The problem on the key exchange ...
A New Efficient Method to Overcome Rabin Cryptosystem ...
mscr.org.my
https://mscr.org.my › journal-20180121010438
mscr.org.my
https://mscr.org.my › journal-20180121010438
We propose a new efficient method to overcome the 4 to 1 decryption failure for the. Rabin cryptosystem by reducing the phase space of plaintext from.
AKSA MySEAL Block Ciphers: Four Years On
mscr.org.my
https://mscr.org.my › journal-20211213094842
mscr.org.my
https://mscr.org.my › journal-20211213094842
by MR Z’aba — MySEAL was a project spearheaded by CyberSecurity Malaysia to develop a suite of national trusted cryptographic algorithms. The project.
15 pages
Algebraic Cryptanalysis on the AAβ Cryptosystem
mscr.org.my
https://mscr.org.my › journal-20180121205017
mscr.org.my
https://mscr.org.my › journal-20180121205017
by MA Asbullah — AAβ cryptosystem is a factorization based public key encryption that uses the modulus of N = p2q. In this paper, we present three.
12 pages
ACM Cryptographic Key Exchange for Secure ...
mscr.org.my
https://mscr.org.my › journal-20180121005922
mscr.org.my
https://mscr.org.my › journal-20180121005922
by C AnnamalaiCited by 11 — This paper presents a new cryptographic technique for secure authenticated key exchange. For information resource transactions cryptosystem [3] plays an ...
Recent Advances on the Theory of S-box Design Strategies
mscr.org.my
https://mscr.org.my › journal-20180121204750
mscr.org.my
https://mscr.org.my › journal-20180121204750
by NFM Esa — S-box is a nonlinear transformation that essential in cryptography which providing an excellent security in the symmetric key primitives.
26 pages
A New Cryptosystem Analogous to LUCELG and Cramer- ...
mscr.org.my
https://mscr.org.my › journal-20180121002123
mscr.org.my
https://mscr.org.my › journal-20180121002123
by N MuslimCited by 3 — A special group based on a linear recurrence equation plays an important role in modern cryptography. Its relation appeared differently in various ...
On the Mathematical Complexity and ...
mscr.org.my
https://mscr.org.my › journal-20180623231135
mscr.org.my
https://mscr.org.my › journal-20180623231135
by NFH Al-SaffarCited by 9 — The group of the elliptic curve points forms an abelian group, which is considered as a suitable choice for constructing a problem similar ...
13 pages
Statistical Analysis on Lightweight Block Cipher, SIMON
mscr.org.my
https://mscr.org.my › journal-20180121011240
mscr.org.my
https://mscr.org.my › journal-20180121011240
by CS Malaysia — In this paper, we present a statistical analysis on the members of the lightweight block cipher, SIMON. SIMON family of block ciphers was proposed by the ...
Malaysia Cyber Security Strategy 2020-2024
mscr.org.my
https://mscr.org.my › data › pdf › MalaysiaCyb...
mscr.org.my
https://mscr.org.my › data › pdf › MalaysiaCyb...
13 Oct 2020 — together with the rest of the world, for the past few decades due to the exponential and unprecedented advancement.
Cryptographic Randomness Analysis on Simon32/64
mscr.org.my
https://mscr.org.my › journal-20191102135019
mscr.org.my
https://mscr.org.my › journal-20191102135019
by INM ShahCited by 1 — Internet of Things (IoT) contains private data that must be protected from irresponsible parties. Conventional cryptography algorithms are.
18 pages
Bias in the Nonlinear Filter Generator Output Sequence
mscr.org.my
https://mscr.org.my › journal-20180121005158
mscr.org.my
https://mscr.org.my › journal-20180121005158
by SG TeoCited by 6 — Nonlinear filter generators are common components used in the keystream generators for stream ciphers and more recently for authentication mechanisms.
RSA Decryption Techniques and The Underlying ...
mscr.org.my
https://mscr.org.my › journal-20180121002027
mscr.org.my
https://mscr.org.my › journal-20180121002027
by HK HailiCited by 8 — Number theory is always known for its practicality in many fields. One of the most interesting applications of it is in the study of RSA cryptosystem and ...
NTRU Public-Key Cryptosystem and Its Variants
mscr.org.my
https://mscr.org.my › journal-20200507123724
mscr.org.my
https://mscr.org.my › journal-20200507123724
by N SallehCited by 4 — NTRU is a lattice-based public-key cryptosystem which operates in a polynomial ring with integer coefficients. The encryption algorithm,.
21 pages
Cryptographic Key From Webcam Image
mscr.org.my
https://mscr.org.my › journal-20180120234916
mscr.org.my
https://mscr.org.my › journal-20180120234916
by WS LangCited by 7 — Random numbers plays a critical role in cryptosystem. Random key is recognized as an essential part of the security of cryptographic system.
Bivariate Polynomials Public Key Encryption Schemes
mscr.org.my
https://mscr.org.my › journal-20180623231854
mscr.org.my
https://mscr.org.my › journal-20180623231854
by RK AjeenaCited by 5 — One of the important fundamental problems in cryptography is a Polynomial. Reconstruction Problem (PRP). There are several public key cryptographic systems.
Cancellable Fingerprint Minutiae Template Protection ...
mscr.org.my
https://mscr.org.my › journal-20180121205046
mscr.org.my
https://mscr.org.my › journal-20180121205046
by B Alam — Due to the strong linkage between an individual and a claimed iden- tity, biometric authentication is widely used to authenticate an individ-.
LED and SIMECK FPGA Implementation
mscr.org.my
https://mscr.org.my › journal-20191102142555
mscr.org.my
https://mscr.org.my › journal-20191102142555
by JH PhoonCited by 2 — Lightweight cryptography has been an essential research area in the cryptographic community in recent years, due to the booming of Inter-.
14 pages
A Review on Lattice Based Cryptography Resistance to ...
mscr.org.my
https://mscr.org.my › journal-20180121012010
mscr.org.my
https://mscr.org.my › journal-20180121012010
by SA Muhammad — To run Shors algorithm or any other code breaking algorithm on quantum computing machine will make most of the cryptographic hard.
New Vulnerabilities Upon Pomaranch Boolean Function ...
mscr.org.my
https://mscr.org.my › journal-20191102142754
mscr.org.my
https://mscr.org.my › journal-20191102142754
by SS Ariffin — Pomaranch stream cipher is a synchronous stream cipher submitted to eS-. TREAM, the ECRYPT Stream Cipher Project and was designed by Jansen et al.
A New Blind Signature Scheme Based On Factoring and ...
mscr.org.my
https://mscr.org.my › journal-20180120233852
mscr.org.my
https://mscr.org.my › journal-20180120233852
by NMF TahatCited by 28 — Blind signature scheme, an important cryptographic primitive, is useful in protocols that guarantee the anonymity of the participants.
Randomness Tests on Nine Data Categories of ...
mscr.org.my
https://mscr.org.my › journal-20210427151256
mscr.org.my
https://mscr.org.my › journal-20210427151256
by AA Zakaria — RECTANGLE lightweight algorithm is a 64-bit block cipher using. 80-bit and 128-bit key variants. A lightweight algorithm takes lesser.
Generic Construction for Attribute-Based Identification ...
mscr.org.my
https://mscr.org.my › journal › journal-20180121010542
mscr.org.my
https://mscr.org.my › journal › journal-20180121010542
Identification schemes are a common one-way authentication technique for a user to prove himself securely to a verifier. However, it is known that ...
A Comment on “Key Generation Using Generalized Pell's ...
mscr.org.my
https://mscr.org.my › journal › journal-20211217094950
mscr.org.my
https://mscr.org.my › journal › journal-20211217094950
In (Rao et al., 2020), the authors present the RSA cryptosystem using the con- cept of fake modulus and generalized Pell's equation. By using that concept,.
Common Modulus Attack Against Lucas Based El-Gamal ...
mscr.org.my
https://mscr.org.my › journal-20190806143649
mscr.org.my
https://mscr.org.my › journal-20190806143649
by LF Koo — Common modulus attack is one of the various homomorphic attacks based on homomorphism nature of cryptosystems. This type of attack.
A Chaos Based Public Key Cryptosystem
mscr.org.my
https://mscr.org.my › journal-20180121001919
mscr.org.my
https://mscr.org.my › journal-20180121001919
by MRK AriffinCited by 20 — We describe the -cryptosystem, a new public key cryptosystem that is built by utilizing the classical one-way chaotic beta-transformation mapping given by.
Randomness Analysis on Speck Family Of Lightweight ...
mscr.org.my
https://mscr.org.my › journal-20180121010714
mscr.org.my
https://mscr.org.my › journal-20180121010714
Speck family of lightweight block cipher was publicly released by National Security Agency. (NSA), USA in June 2013. Speck has been designed with ten ...
GCD Attack on the LUC4 Cryptosystem
mscr.org.my
https://mscr.org.my › journal-20180121002056
mscr.org.my
https://mscr.org.my › journal-20180121002056
LUC4 cryptosystem is derived from a fourth order linear recurrence relation and is based on the Lucas function. This cryptosystem is analogous to the RSA, ...
A Method of SSO IN P2P Networks with the Capability ...
mscr.org.my
https://mscr.org.my › journal-20180120234541
mscr.org.my
https://mscr.org.my › journal-20180120234541
In this paper, we propose a method to provide distributed authentication in p2p networks. Our method has the advantages of reducing the computational burden ...
2 June 2016 Kota Kinabalu, Mal
mscr.org.my
https://www.mscr.org.my › Cryptology2016
mscr.org.my
https://www.mscr.org.my › Cryptology2016
First and foremost, I would like to thank the Malaysian. Society for Cryptology Research (MSCR) in collabo- ration with CyberSecurity Malaysia together with ...
Design and Analysis of Rabin-p Key Encapsulation ...
mscr.org.my
https://mscr.org.my › journal-20191102142025
mscr.org.my
https://mscr.org.my › journal-20191102142025
by MA AsbullahCited by 2 — The modular square root problem has a special property of the hav- ing computational equivalent to a well-known hard mathematical prob-.
Random Walk Algorithm Based Design Technique for S-Box
mscr.org.my
https://mscr.org.my › journal › journal-20180120234655
mscr.org.my
https://mscr.org.my › journal › journal-20180120234655
by S KazmiCited by 3 — Substitution boxes (S-Boxes) are important in the design of symmetric algorithms. Design of efficient and cryptographically strong S-boxes have always been ...
A Faster Version of Rijndael Cryptographic Algorithm ...
mscr.org.my
https://mscr.org.my › journal-20180121002228
mscr.org.my
https://mscr.org.my › journal-20180121002228
by FHM AliCited by 10 — Doing arithmetic in finite field is the key part to the implementation of communication and coding system including the newly developed ...
Design and Implementation of Key-Policy Attribute-Based ...
mscr.org.my
https://mscr.org.my › journal-20180623232311
mscr.org.my
https://mscr.org.my › journal-20180623232311
by BPD NoCited by 11 — Body sensor network (BSN) is a set of sensors attached to patients' body to collect vital signs. The vital signs will be sent from patients' ...
Security Analysis of a Public Key Cryptosystem for ...
mscr.org.my
https://mscr.org.my › journal-20221227234305
mscr.org.my
https://mscr.org.my › journal-20221227234305
by Z Mahad — This article introduces a novel cryptanalysis technique for the Diffie-. Hellman Key Exchange (DHKE) protocol, created in 2014 by.
Security Analysis of Lucas Based El-Gamal Cryptosystem ...
mscr.org.my
https://mscr.org.my › journal › journal-20190806154957
mscr.org.my
https://mscr.org.my › journal › journal-20190806154957
by IN SarbiniCited by 1 — The success of Garbage-man-in-the-middle (GMITM) attack relies on the possibility to access to the ”bin” of recipient in the cryptosystem.
An Optimized Pairing-Based Cryptography Library for ...
mscr.org.my
https://mscr.org.my › journal-20180121011713
mscr.org.my
https://mscr.org.my › journal-20180121011713
by SY TanCited by 4 — There are numerous pairing-based cryptography (PBC) libraries avail- able for desktop-based applications. However, these libraries are mostly.
Proceedings of the 7
mscr.org.my
https://www.mscr.org.my › Cryptology2020
mscr.org.my
https://www.mscr.org.my › Cryptology2020
First and foremost, I would like to thank the Malaysian. Society for Cryptology Research (MSCR) in collabo- ration with CyberSecurity Malaysia together with ...
Enhanced Statistical Analysis Evaluation Using CSM ...
mscr.org.my
https://mscr.org.my › journal-20191102142356
mscr.org.my
https://mscr.org.my › journal-20191102142356
by AA Zakaria — Random numbers are at the heart of modern cryptography, and hav- ing access to a source of randomness is crucial for information security.
A Shift Column Different Offset for better Rijndael Security
mscr.org.my
https://mscr.org.my › journal-20180121002339
mscr.org.my
https://mscr.org.my › journal-20180121002339
by R MahmodCited by 5 — The strength of an encryption algorithms depends on the key's secrecy combined with the structure of the block cipher that is able to produce random output.
Hybrid Heuristic Methods in Constructing Cryptographically ...
mscr.org.my
https://mscr.org.my › journal › journal-20180121011643
mscr.org.my
https://mscr.org.my › journal › journal-20180121011643
by H IsaCited by 13 — Isa et al. (2013, 2016) proposed two heuristic algorithms (redun- dancy removal and bee waggle dance) to construct cryptographically.
Conditional Probability Based Camera Identification
mscr.org.my
https://mscr.org.my › journal-20180121005437
mscr.org.my
https://mscr.org.my › journal-20180121005437
20 Jan 2018 — In this research, we propose a new camera identification technique based on the conditional probability features.
Table of Contents
mscr.org.my
https://mscr.org.my › journal-20180121001752
mscr.org.my
https://mscr.org.my › journal-20180121001752
LILI to Dragon: from Bit-Based to Word-Based Stream Ciphers. 129. Ed Dawson & Leonie Simpson. AAβ-Cryptosystem: A Chaos Based Public Key Cryptosystem.
Table of Contents
mscr.org.my
https://mscr.org.my › journal-20180120233557
mscr.org.my
https://mscr.org.my › journal-20180120233557
by NMF TahatCited by 28 — A New Online/Offline Signature Scheme without Key Exposure in the Standard Model 11. Zhiwei Wang, Shihui Zheng & Yixian Yang.
A New Public Key Cryptosystem Based on IFS
mscr.org.my
https://www.mscr.org.my › data › journal › jou...
mscr.org.my
https://www.mscr.org.my › data › journal › jou...
by NMG AL-SaidiCited by 5 — Most public key encryption methods suffers from the inability to prove the difficulty of the algorithms, which summarizes under the category of mathematical ...
Table of Contents
mscr.org.my
https://mscr.org.my › journal-20180121010310
mscr.org.my
https://mscr.org.my › journal-20180121010310
Arif Mandangan, Loh Chai Mei, Chang Ee Hung & Che Haziqah Che Hussin. Rabin-RZ: A New Efficient Method to Overcome Rabin Cryptosystem Decryption.
from Bit-Based to Word-Based Stream Ciphers
mscr.org.my
https://www.mscr.org.my › data › journal › jou...
mscr.org.my
https://www.mscr.org.my › data › journal › jou...
by E Dawson — Stream ciphers are the standard form of encryption for most applications in secure communications. Recently, many existing stream cipher proposals have been ...
Table of Contents
mscr.org.my
https://mscr.org.my › journal-20180121010204
mscr.org.my
https://mscr.org.my › journal-20180121010204
On the Mathematical Complexity and the Time Implementation of Proposed Vari- ants of Elliptic Curves Cryptosystems. 42. Najlae F. Hameed Al-Saffar & Mohamad ...
CFEA-Technique: Smaller Size of the Compressed Plaintext
mscr.org.my
https://www.mscr.org.my › data › journal › jou...
mscr.org.my
https://www.mscr.org.my › data › journal › jou...
20 Jan 2018 — Key distribution problem has been solve by the emergence of asymmetric cryptography. Without exchanging private key, two parties are able to ...
Table of Contents
mscr.org.my
https://mscr.org.my › journal-20191102134859
mscr.org.my
https://mscr.org.my › journal-20191102134859
2 Nov 2019 — Isma Norshahila Mohammad Shah, Hazlin Abdul Rani, Miza Mumtaz Ahmad & Eddie. Shahril Ismail. Rabin-p Key Encapsulation Mechanism for ...
Table of Contents
mscr.org.my
https://mscr.org.my › journal-20180121011559
mscr.org.my
https://mscr.org.my › journal-20180121011559
Hybrid Heuristic Methods in Constructing Cryptographically Strong S-boxes. 1. Herman Isa, Norziana Jamil, & Muhammad Reza Zaba.
Table of Contents
mscr.org.my
https://mscr.org.my › journal-20181228171028
mscr.org.my
https://mscr.org.my › journal-20181228171028
Lee Feng Koo, Tze Jin Wong, Pang Hung Yiu, Izzatul Nabila Sarbini, Yee Min Kwan &. Fatin Hana Naning. Generalizing Equivalent Elliptic Divisibility Sequence ...
Table of Contents
mscr.org.my
https://mscr.org.my › journal-20211213094455
mscr.org.my
https://mscr.org.my › journal-20211213094455
A Comment on “Key Generation Using Generalized Pell's Equation in Public Key. Cryptography Based on the Prime Fake Modulus Principle to Image Encryption and.
Table of Contents
mscr.org.my
https://mscr.org.my › journal-20200912213236
mscr.org.my
https://mscr.org.my › journal-20200912213236
Factorization of Prime Power Moduli N = prqs Using Continued Fractions Method. 1. Saidu Isah Abubakar & Sadiq Shehu. Forging the TNC Digital Signature.
Table of Contents
mscr.org.my
https://mscr.org.my › journal-20210427151128
mscr.org.my
https://mscr.org.my › journal-20210427151128
Randomness Tests on Nine Data Categories of RECTANGLE Using NIST Statistical. Test Suite. 1. Abdul Alif Zakaria, A. H. Azni, Farida Ridzuan, ...
Table of Contents
mscr.org.my
https://mscr.org.my › journal-20180121204649
mscr.org.my
https://mscr.org.my › journal-20180121204649
Recent Advances on the Theory of S-box Design Strategies. 1. Nur Fasihah Mohd Esa, Shekh Faisal Abdul-Latip & Zaheera Zainal Abidin.