Accessibility links

Skip to main content Turn off continuous scrollingTurn on continuous scrolling
Couldn’t set your preference. Try again.
Accessibility help
Accessibility feedback
Google
Press / to jump to the search box

  • See more
    Delete
  • Delete
  • Report inappropriate predictions
    Dismiss
    Quick Settings

    Search modes

    All
    Books
    Images
    Shopping
    Videos
    More
    Maps
    News
    Flights
    Finance
    Tools
    1. SafeSearch
      Filter explicit results
      Blur explicit images
      Off
      More about SafeSearch
    Any time
    Any time
    Past hour
    Past 24 hours
    Past week
    Past month
    Past year
    Custom range...
    Customised date range
    Go
    All results
    All results
    Verbatim
    About 227 results (0.29 seconds) 

    Quick Settings

    See all Search settings

    Your Activity

    Search history
    Saving
    Learn more about your data in Search

    Using Search

    SafeSearchHelps manage explicit content
    Languages
    English
    Advanced search

    Appearance

    Support

    Search help
    Send feedbackNew
    Privacy
    Terms

    Search Results


    Proceedings of the 4

    mscr.org.my
    https://mscr.org.my › proceeding › Cryptology2014
    mscr.org.my
    https://mscr.org.my › proceeding › Cryptology2014
    Proceedings of the 4th International Cryptology and Information Security. (4th.: 2014: Putrajaya). CONFERENCE PROCEEDINGS CRYPTOLOGY 2014: Proceedings of ...

    Proceedings of the 6

    mscr.org.my
    https://mscr.org.my › proceeding › Cryptology2018
    mscr.org.my
    https://mscr.org.my › proceeding › Cryptology2018
    11 Jul 2018 — First and foremost, I would like to thank the Malaysian. Society for Cryptology Research (MSCR) in collabo-.
    204 pages

    The government has launched the Malaysia Cyber Security ...

    mscr.org.my
    https://mscr.org.my › data › pdf › MCSS_News
    mscr.org.my
    https://mscr.org.my › data › pdf › MCSS_News
    12 Oct 2020 — KUALA LUMPUR 12 October 2020: The government has launched the Malaysia. Cyber Security Strategy (MCSS) 2020-2024 with an allocation of RM1.8 ...
    2 pages

    PLEASE USE CAPITAL LETTERS TO FILL IN THIS FORM

    mscr.org.my
    https://www.mscr.org.my › mscr_membership
    mscr.org.my
    https://www.mscr.org.my › mscr_membership
    MALAYSIAN SOCIETY FOR CRYPTOLOGY RESEARCH (0353-07-SEL) c/o Institute for Mathematical Research, Universiti Putra Malaysia,. 43400 UPM, Serdang, Selangor, ...

    Generalizing Equivalent Elliptic Divisibility Sequence for ...

    mscr.org.my
    https://mscr.org.my › journal-20190806143902
    mscr.org.my
    https://mscr.org.my › journal-20190806143902
    by N Muslim · Cited by 1 — Elliptic Net is a powerful method to compute cryptographic pair- ings or scalar multiplication. The elliptic net rank one originated from.

    Improvement of Scalar Multiplication on Elliptic Curve with j ...

    mscr.org.my
    https://mscr.org.my › journal-20200507123918
    mscr.org.my
    https://mscr.org.my › journal-20200507123918
    by SNFMA Antony — Scalar multiplication plays a vast role in elliptic curve cryptogra- phy (ECC). It consumes numerous operation cost, especially when deal-.
    15 pages

    A New Short Decryption Exponent Cryptanalysis Attacks of ...

    mscr.org.my
    https://mscr.org.my › journal-20200507124227
    mscr.org.my
    https://mscr.org.my › journal-20200507124227
    by SI Abubakar — paper also reports t instances of factoring RSA moduli Ns = psqs with public key pair (Ns,es) where three new attacks using key equations of.

    Scalar Decomposition Methods on Genus One Elliptic Curves

    mscr.org.my
    https://mscr.org.my › journal-20180121204941
    mscr.org.my
    https://mscr.org.my › journal-20180121204941
    by SNFMA Antony — In this paper, we reviewed and revisited the extension scalar decom- position method of a well-known GLV method namely the GLS (Gal-.

    1 Class of Weak Primes and Its Application on RSA

    mscr.org.my
    https://mscr.org.my › journal-20190806153919
    mscr.org.my
    https://mscr.org.my › journal-20190806153919
    by AH Abd Ghafar — The Pollard p−1 method is able to solve integer factorization prob- lem if the targeted composite number has small prime factors. This is.
    21 pages

    Garbage-Man-In-The-Middle Attack on the Luc4 Cryptosystem

    mscr.org.my
    https://mscr.org.my › journal-20180120234452
    mscr.org.my
    https://mscr.org.my › journal-20180120234452
    This paper reports an investigation into an attack on the LUC4 cryptosystem. LUC4 cryptosystem is derived from a fourth order linear recurrence relation and ...

    Key Exchange for New Cryptosystem Analogous to ...

    mscr.org.my
    https://mscr.org.my › journal-20180623231736
    mscr.org.my
    https://mscr.org.my › journal-20180623231736
    Key exchange or key establishment is any process in cryptography by which users are able to share or exchange a secret key. The problem on the key exchange ...

    A New Efficient Method to Overcome Rabin Cryptosystem ...

    mscr.org.my
    https://mscr.org.my › journal-20180121010438
    mscr.org.my
    https://mscr.org.my › journal-20180121010438
    We propose a new efficient method to overcome the 4 to 1 decryption failure for the. Rabin cryptosystem by reducing the phase space of plaintext from.

    AKSA MySEAL Block Ciphers: Four Years On

    mscr.org.my
    https://mscr.org.my › journal-20211213094842
    mscr.org.my
    https://mscr.org.my › journal-20211213094842
    by MR Z’aba — MySEAL was a project spearheaded by CyberSecurity Malaysia to develop a suite of national trusted cryptographic algorithms. The project.
    15 pages

    Algebraic Cryptanalysis on the AAβ Cryptosystem

    mscr.org.my
    https://mscr.org.my › journal-20180121205017
    mscr.org.my
    https://mscr.org.my › journal-20180121205017
    by MA Asbullah — AAβ cryptosystem is a factorization based public key encryption that uses the modulus of N = p2q. In this paper, we present three.
    12 pages

    ACM Cryptographic Key Exchange for Secure ...

    mscr.org.my
    https://mscr.org.my › journal-20180121005922
    mscr.org.my
    https://mscr.org.my › journal-20180121005922
    by C Annamalai · Cited by 11 — This paper presents a new cryptographic technique for secure authenticated key exchange. For information resource transactions cryptosystem [3] plays an ...

    Recent Advances on the Theory of S-box Design Strategies

    mscr.org.my
    https://mscr.org.my › journal-20180121204750
    mscr.org.my
    https://mscr.org.my › journal-20180121204750
    by NFM Esa — S-box is a nonlinear transformation that essential in cryptography which providing an excellent security in the symmetric key primitives.
    26 pages

    A New Cryptosystem Analogous to LUCELG and Cramer- ...

    mscr.org.my
    https://mscr.org.my › journal-20180121002123
    mscr.org.my
    https://mscr.org.my › journal-20180121002123
    by N Muslim · Cited by 3 — A special group based on a linear recurrence equation plays an important role in modern cryptography. Its relation appeared differently in various ...

    On the Mathematical Complexity and ...

    mscr.org.my
    https://mscr.org.my › journal-20180623231135
    mscr.org.my
    https://mscr.org.my › journal-20180623231135
    by NFH Al-Saffar · Cited by 9 — The group of the elliptic curve points forms an abelian group, which is considered as a suitable choice for constructing a problem similar ...
    13 pages

    Statistical Analysis on Lightweight Block Cipher, SIMON

    mscr.org.my
    https://mscr.org.my › journal-20180121011240
    mscr.org.my
    https://mscr.org.my › journal-20180121011240
    by CS Malaysia — In this paper, we present a statistical analysis on the members of the lightweight block cipher, SIMON. SIMON family of block ciphers was proposed by the ...

    Malaysia Cyber Security Strategy 2020-2024

    mscr.org.my
    https://mscr.org.my › data › pdf › MalaysiaCyb...
    mscr.org.my
    https://mscr.org.my › data › pdf › MalaysiaCyb...
    13 Oct 2020 — together with the rest of the world, for the past few decades due to the exponential and unprecedented advancement.

    Cryptographic Randomness Analysis on Simon32/64

    mscr.org.my
    https://mscr.org.my › journal-20191102135019
    mscr.org.my
    https://mscr.org.my › journal-20191102135019
    by INM Shah · Cited by 1 — Internet of Things (IoT) contains private data that must be protected from irresponsible parties. Conventional cryptography algorithms are.
    18 pages

    Bias in the Nonlinear Filter Generator Output Sequence

    mscr.org.my
    https://mscr.org.my › journal-20180121005158
    mscr.org.my
    https://mscr.org.my › journal-20180121005158
    by SG Teo · Cited by 6 — Nonlinear filter generators are common components used in the keystream generators for stream ciphers and more recently for authentication mechanisms.

    RSA Decryption Techniques and The Underlying ...

    mscr.org.my
    https://mscr.org.my › journal-20180121002027
    mscr.org.my
    https://mscr.org.my › journal-20180121002027
    by HK Haili · Cited by 8 — Number theory is always known for its practicality in many fields. One of the most interesting applications of it is in the study of RSA cryptosystem and ...

    NTRU Public-Key Cryptosystem and Its Variants

    mscr.org.my
    https://mscr.org.my › journal-20200507123724
    mscr.org.my
    https://mscr.org.my › journal-20200507123724
    by N Salleh · Cited by 4 — NTRU is a lattice-based public-key cryptosystem which operates in a polynomial ring with integer coefficients. The encryption algorithm,.
    21 pages

    Cryptographic Key From Webcam Image

    mscr.org.my
    https://mscr.org.my › journal-20180120234916
    mscr.org.my
    https://mscr.org.my › journal-20180120234916
    by WS Lang · Cited by 7 — Random numbers plays a critical role in cryptosystem. Random key is recognized as an essential part of the security of cryptographic system.

    Bivariate Polynomials Public Key Encryption Schemes

    mscr.org.my
    https://mscr.org.my › journal-20180623231854
    mscr.org.my
    https://mscr.org.my › journal-20180623231854
    by RK Ajeena · Cited by 5 — One of the important fundamental problems in cryptography is a Polynomial. Reconstruction Problem (PRP). There are several public key cryptographic systems.

    Cancellable Fingerprint Minutiae Template Protection ...

    mscr.org.my
    https://mscr.org.my › journal-20180121205046
    mscr.org.my
    https://mscr.org.my › journal-20180121205046
    by B Alam — Due to the strong linkage between an individual and a claimed iden- tity, biometric authentication is widely used to authenticate an individ-.

    LED and SIMECK FPGA Implementation

    mscr.org.my
    https://mscr.org.my › journal-20191102142555
    mscr.org.my
    https://mscr.org.my › journal-20191102142555
    by JH Phoon · Cited by 2 — Lightweight cryptography has been an essential research area in the cryptographic community in recent years, due to the booming of Inter-.
    14 pages

    A Review on Lattice Based Cryptography Resistance to ...

    mscr.org.my
    https://mscr.org.my › journal-20180121012010
    mscr.org.my
    https://mscr.org.my › journal-20180121012010
    by SA Muhammad — To run Shors algorithm or any other code breaking algorithm on quantum computing machine will make most of the cryptographic hard.

    New Vulnerabilities Upon Pomaranch Boolean Function ...

    mscr.org.my
    https://mscr.org.my › journal-20191102142754
    mscr.org.my
    https://mscr.org.my › journal-20191102142754
    by SS Ariffin — Pomaranch stream cipher is a synchronous stream cipher submitted to eS-. TREAM, the ECRYPT Stream Cipher Project and was designed by Jansen et al.

    A New Blind Signature Scheme Based On Factoring and ...

    mscr.org.my
    https://mscr.org.my › journal-20180120233852
    mscr.org.my
    https://mscr.org.my › journal-20180120233852
    by NMF Tahat · Cited by 28 — Blind signature scheme, an important cryptographic primitive, is useful in protocols that guarantee the anonymity of the participants.

    Randomness Tests on Nine Data Categories of ...

    mscr.org.my
    https://mscr.org.my › journal-20210427151256
    mscr.org.my
    https://mscr.org.my › journal-20210427151256
    by AA Zakaria — RECTANGLE lightweight algorithm is a 64-bit block cipher using. 80-bit and 128-bit key variants. A lightweight algorithm takes lesser.

    Generic Construction for Attribute-Based Identification ...

    mscr.org.my
    https://mscr.org.my › journal › journal-20180121010542
    mscr.org.my
    https://mscr.org.my › journal › journal-20180121010542
    Identification schemes are a common one-way authentication technique for a user to prove himself securely to a verifier. However, it is known that ...

    A Comment on “Key Generation Using Generalized Pell's ...

    mscr.org.my
    https://mscr.org.my › journal › journal-20211217094950
    mscr.org.my
    https://mscr.org.my › journal › journal-20211217094950
    In (Rao et al., 2020), the authors present the RSA cryptosystem using the con- cept of fake modulus and generalized Pell's equation. By using that concept,.

    Common Modulus Attack Against Lucas Based El-Gamal ...

    mscr.org.my
    https://mscr.org.my › journal-20190806143649
    mscr.org.my
    https://mscr.org.my › journal-20190806143649
    by LF Koo — Common modulus attack is one of the various homomorphic attacks based on homomorphism nature of cryptosystems. This type of attack.

    A Chaos Based Public Key Cryptosystem

    mscr.org.my
    https://mscr.org.my › journal-20180121001919
    mscr.org.my
    https://mscr.org.my › journal-20180121001919
    by MRK Ariffin · Cited by 20 — We describe the -cryptosystem, a new public key cryptosystem that is built by utilizing the classical one-way chaotic beta-transformation mapping given by.

    Randomness Analysis on Speck Family Of Lightweight ...

    mscr.org.my
    https://mscr.org.my › journal-20180121010714
    mscr.org.my
    https://mscr.org.my › journal-20180121010714
    Speck family of lightweight block cipher was publicly released by National Security Agency. (NSA), USA in June 2013. Speck has been designed with ten ...

    GCD Attack on the LUC4 Cryptosystem

    mscr.org.my
    https://mscr.org.my › journal-20180121002056
    mscr.org.my
    https://mscr.org.my › journal-20180121002056
    LUC4 cryptosystem is derived from a fourth order linear recurrence relation and is based on the Lucas function. This cryptosystem is analogous to the RSA, ...

    A Method of SSO IN P2P Networks with the Capability ...

    mscr.org.my
    https://mscr.org.my › journal-20180120234541
    mscr.org.my
    https://mscr.org.my › journal-20180120234541
    In this paper, we propose a method to provide distributed authentication in p2p networks. Our method has the advantages of reducing the computational burden ...

    2 June 2016 Kota Kinabalu, Mal

    mscr.org.my
    https://www.mscr.org.my › Cryptology2016
    mscr.org.my
    https://www.mscr.org.my › Cryptology2016
    First and foremost, I would like to thank the Malaysian. Society for Cryptology Research (MSCR) in collabo- ration with CyberSecurity Malaysia together with ...

    Design and Analysis of Rabin-p Key Encapsulation ...

    mscr.org.my
    https://mscr.org.my › journal-20191102142025
    mscr.org.my
    https://mscr.org.my › journal-20191102142025
    by MA Asbullah · Cited by 2 — The modular square root problem has a special property of the hav- ing computational equivalent to a well-known hard mathematical prob-.

    Random Walk Algorithm Based Design Technique for S-Box

    mscr.org.my
    https://mscr.org.my › journal › journal-20180120234655
    mscr.org.my
    https://mscr.org.my › journal › journal-20180120234655
    by S Kazmi · Cited by 3 — Substitution boxes (S-Boxes) are important in the design of symmetric algorithms. Design of efficient and cryptographically strong S-boxes have always been ...

    A Faster Version of Rijndael Cryptographic Algorithm ...

    mscr.org.my
    https://mscr.org.my › journal-20180121002228
    mscr.org.my
    https://mscr.org.my › journal-20180121002228
    by FHM Ali · Cited by 10 — Doing arithmetic in finite field is the key part to the implementation of communication and coding system including the newly developed ...

    Design and Implementation of Key-Policy Attribute-Based ...

    mscr.org.my
    https://mscr.org.my › journal-20180623232311
    mscr.org.my
    https://mscr.org.my › journal-20180623232311
    by BPD No · Cited by 11 — Body sensor network (BSN) is a set of sensors attached to patients' body to collect vital signs. The vital signs will be sent from patients' ...

    Security Analysis of a Public Key Cryptosystem for ...

    mscr.org.my
    https://mscr.org.my › journal-20221227234305
    mscr.org.my
    https://mscr.org.my › journal-20221227234305
    by Z Mahad — This article introduces a novel cryptanalysis technique for the Diffie-. Hellman Key Exchange (DHKE) protocol, created in 2014 by.

    Security Analysis of Lucas Based El-Gamal Cryptosystem ...

    mscr.org.my
    https://mscr.org.my › journal › journal-20190806154957
    mscr.org.my
    https://mscr.org.my › journal › journal-20190806154957
    by IN Sarbini · Cited by 1 — The success of Garbage-man-in-the-middle (GMITM) attack relies on the possibility to access to the ”bin” of recipient in the cryptosystem.

    An Optimized Pairing-Based Cryptography Library for ...

    mscr.org.my
    https://mscr.org.my › journal-20180121011713
    mscr.org.my
    https://mscr.org.my › journal-20180121011713
    by SY Tan · Cited by 4 — There are numerous pairing-based cryptography (PBC) libraries avail- able for desktop-based applications. However, these libraries are mostly.

    Proceedings of the 7

    mscr.org.my
    https://www.mscr.org.my › Cryptology2020
    mscr.org.my
    https://www.mscr.org.my › Cryptology2020
    First and foremost, I would like to thank the Malaysian. Society for Cryptology Research (MSCR) in collabo- ration with CyberSecurity Malaysia together with ...

    Enhanced Statistical Analysis Evaluation Using CSM ...

    mscr.org.my
    https://mscr.org.my › journal-20191102142356
    mscr.org.my
    https://mscr.org.my › journal-20191102142356
    by AA Zakaria — Random numbers are at the heart of modern cryptography, and hav- ing access to a source of randomness is crucial for information security.

    A Shift Column Different Offset for better Rijndael Security

    mscr.org.my
    https://mscr.org.my › journal-20180121002339
    mscr.org.my
    https://mscr.org.my › journal-20180121002339
    by R Mahmod · Cited by 5 — The strength of an encryption algorithms depends on the key's secrecy combined with the structure of the block cipher that is able to produce random output.

    Hybrid Heuristic Methods in Constructing Cryptographically ...

    mscr.org.my
    https://mscr.org.my › journal › journal-20180121011643
    mscr.org.my
    https://mscr.org.my › journal › journal-20180121011643
    by H Isa · Cited by 13 — Isa et al. (2013, 2016) proposed two heuristic algorithms (redun- dancy removal and bee waggle dance) to construct cryptographically.

    Conditional Probability Based Camera Identification

    mscr.org.my
    https://mscr.org.my › journal-20180121005437
    mscr.org.my
    https://mscr.org.my › journal-20180121005437
    20 Jan 2018 — In this research, we propose a new camera identification technique based on the conditional probability features.

    Table of Contents

    mscr.org.my
    https://mscr.org.my › journal-20180121001752
    mscr.org.my
    https://mscr.org.my › journal-20180121001752
    LILI to Dragon: from Bit-Based to Word-Based Stream Ciphers. 129. Ed Dawson & Leonie Simpson. AAβ-Cryptosystem: A Chaos Based Public Key Cryptosystem.

    Table of Contents

    mscr.org.my
    https://mscr.org.my › journal-20180120233557
    mscr.org.my
    https://mscr.org.my › journal-20180120233557
    by NMF Tahat · Cited by 28 — A New Online/Offline Signature Scheme without Key Exposure in the Standard Model 11. Zhiwei Wang, Shihui Zheng & Yixian Yang.

    A New Public Key Cryptosystem Based on IFS

    mscr.org.my
    https://www.mscr.org.my › data › journal › jou...
    mscr.org.my
    https://www.mscr.org.my › data › journal › jou...
    by NMG AL-Saidi · Cited by 5 — Most public key encryption methods suffers from the inability to prove the difficulty of the algorithms, which summarizes under the category of mathematical ...

    Table of Contents

    mscr.org.my
    https://mscr.org.my › journal-20180121010310
    mscr.org.my
    https://mscr.org.my › journal-20180121010310
    Arif Mandangan, Loh Chai Mei, Chang Ee Hung & Che Haziqah Che Hussin. Rabin-RZ: A New Efficient Method to Overcome Rabin Cryptosystem Decryption.

    from Bit-Based to Word-Based Stream Ciphers

    mscr.org.my
    https://www.mscr.org.my › data › journal › jou...
    mscr.org.my
    https://www.mscr.org.my › data › journal › jou...
    by E Dawson — Stream ciphers are the standard form of encryption for most applications in secure communications. Recently, many existing stream cipher proposals have been ...

    Table of Contents

    mscr.org.my
    https://mscr.org.my › journal-20180121010204
    mscr.org.my
    https://mscr.org.my › journal-20180121010204
    On the Mathematical Complexity and the Time Implementation of Proposed Vari- ants of Elliptic Curves Cryptosystems. 42. Najlae F. Hameed Al-Saffar & Mohamad ...

    CFEA-Technique: Smaller Size of the Compressed Plaintext

    mscr.org.my
    https://www.mscr.org.my › data › journal › jou...
    mscr.org.my
    https://www.mscr.org.my › data › journal › jou...
    20 Jan 2018 — Key distribution problem has been solve by the emergence of asymmetric cryptography. Without exchanging private key, two parties are able to ...

    Table of Contents

    mscr.org.my
    https://mscr.org.my › journal-20191102134859
    mscr.org.my
    https://mscr.org.my › journal-20191102134859
    2 Nov 2019 — Isma Norshahila Mohammad Shah, Hazlin Abdul Rani, Miza Mumtaz Ahmad & Eddie. Shahril Ismail. Rabin-p Key Encapsulation Mechanism for ...

    Table of Contents

    mscr.org.my
    https://mscr.org.my › journal-20180121011559
    mscr.org.my
    https://mscr.org.my › journal-20180121011559
    Hybrid Heuristic Methods in Constructing Cryptographically Strong S-boxes. 1. Herman Isa, Norziana Jamil, & Muhammad Reza Zaba.

    Table of Contents

    mscr.org.my
    https://mscr.org.my › journal-20181228171028
    mscr.org.my
    https://mscr.org.my › journal-20181228171028
    Lee Feng Koo, Tze Jin Wong, Pang Hung Yiu, Izzatul Nabila Sarbini, Yee Min Kwan &. Fatin Hana Naning. Generalizing Equivalent Elliptic Divisibility Sequence ...

    Table of Contents

    mscr.org.my
    https://mscr.org.my › journal-20211213094455
    mscr.org.my
    https://mscr.org.my › journal-20211213094455
    A Comment on “Key Generation Using Generalized Pell's Equation in Public Key. Cryptography Based on the Prime Fake Modulus Principle to Image Encryption and.

    Table of Contents

    mscr.org.my
    https://mscr.org.my › journal-20200912213236
    mscr.org.my
    https://mscr.org.my › journal-20200912213236
    Factorization of Prime Power Moduli N = prqs Using Continued Fractions Method. 1. Saidu Isah Abubakar & Sadiq Shehu. Forging the TNC Digital Signature.

    Table of Contents

    mscr.org.my
    https://mscr.org.my › journal-20210427151128
    mscr.org.my
    https://mscr.org.my › journal-20210427151128
    Randomness Tests on Nine Data Categories of RECTANGLE Using NIST Statistical. Test Suite. 1. Abdul Alif Zakaria, A. H. Azni, Farida Ridzuan, ...

    Table of Contents

    mscr.org.my
    https://mscr.org.my › journal-20180121204649
    mscr.org.my
    https://mscr.org.my › journal-20180121204649
    Recent Advances on the Theory of S-box Design Strategies. 1. Nur Fasihah Mohd Esa, Shekh Faisal Abdul-Latip & Zaheera Zainal Abidin.

    Page Navigation


    More results


    Try again

    Footer links

    Malaysia
    Bedong, Kedah
     - Based on your past activity
     - Update location
    Can't update your locationLearn more
    Updating location…
    More options in Quick settings ()
    Google apps
    Google Account
    Husein Zolkepli
    husein.zol05@gmail.com