UPM Institutional Repository

Items where Author is "Nek Abd Rahman, Normahirah"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 7.

Article

Hadani, Nurul Hafizah and Yunos, Faridah and Kamel Ariffin, Muhammad Rezal and Sapar, Siti Hasana and Nek Abd Rahman, Normahirah (2019) Alternative method to find the number of points on Koblitz curve. Malaysian Journal of Mathematical Sciences, 13 (spec. Aug.). pp. 13-30. ISSN 1823-8343; ESSN: 2289-750X

Nek Abd Rahman, Normahirah and Kamel Ariffin, Muhammad Rezal (2017) New vulnerability of RSA modulus type N = p2q. Malaysian Journal of Mathematical Sciences, 11 (spec. Aug.). pp. 75-88. ISSN 1823-8343; ESSN: 2289-750X

Kamel Ariffin, Muhammad Rezal and Nek Abd Rahman, Normahirah (2016) New weak findings upon RSA modulo of type N = p2 q. Global Journal of Pure and Applied Mathematics, 12 (4). pp. 3159-3185. ISSN 0973-1768; ESSN: 0973-9750

Conference or Workshop Item

Nek Abd Rahman, Normahirah and Ismail, Eddie Shahril and Laham, Mohamed Faris (2022) Deniable authentication protocol based on factoring and discrete logarithm problems. In: 2022 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE), 18-20 Dec. 2022, Gold Coast, Australia. .

Nek Abd Rahman, Normahirah and Kamel Ariffin, Muhammad Rezal and Asbullah, Muhammad Asyraf and Yunos, Faridah (2018) New vulnerability on system of Ni = p²iqi using good approximation of Φ(N). In: 6th International Cryptology and Information Security Conference 2018 (CRYPTOLOGY2018), 9-11 July 2018, Port Dickson, Negeri Sembilan, Malaysia. (pp. 139-150).

Nek Abd Rahman, Normahirah and Kamel Ariffin, Muhammad Rezal (2016) New vulnerabilities of RSA modulus type N = p²q. In: 5th International Cryptology and Information Security Conference 2016 (CRYPTOLOGY2016), 31 May-2 June 2016, Kota Kinabalu, Sabah, Malaysia. (pp. 72-82).

Nek Abd Rahman, Normahirah and Kamel Ariffin, Muhammad Rezal (2014) The development of deniable authentication protocol based on the bivariate function hard problem. In: 4th International Cryptology and Information Security Conference 2014 (CRYPTOLOGY2014), 24-26 June 2014, Putrajaya, Malaysia. (pp. 187-195).

This list was generated on Sat Apr 27 02:50:45 2024 +08.