Items where Author is "Sarbini, Izzatul Nabila"
![]() | Up a level |
Group by: Item Type | No Grouping
Number of items: 6.
Sarbini, Izzatul Nabila and Tze, Jin Wong and Koo, Lee Feng and Rasedee, Ahmad Fadly Nurullah and Naning, Fatin Hana and Abdul Sathar, Mohammad Hasan
(2023)
Security analysis on luc-type cryptosystems using common modulus attack.
Journal of Advanced Research in Applied Sciences and Engineering Technology, 29 (3).
206 - 213.
ISSN 2462-1943
Sarbini, Izzatul Nabila and Wong, Tze Jin and Othman, Mohamed and Koo, Lee Feng and Rasedee, Ahmad Fadly Nurullah and Yiu, Pang Hung and Naning @ Zin, Fatin Hana
(2019)
Cryptographic attack on LUC-type cryptosystems using GMITM (Type 1).
Journal of Advanced Research in Dynamical and Control Systems, 11 (spec.12).
pp. 806-813.
ISSN 1943-023X
Koo, Lee Feng and Sarbini, Izzatul Nabila and Yiu, Pang Hung and Naning @ Zin, Fatin Hana and Wong, Tze Jin
(2019)
An analysis for chosen plaintext attack in elliptic curve cryptosystem based on second order lucas sequence.
International Journal of Scientific and Technology Research, 8 (11).
pp. 1193-1196.
ISSN 2277-8616
Koo, Lee Feng and Sarbini, Izzatul Nabila and Naning @ Zin, Fatin Hana and Kwan, Yee Min and Yiu, Pang Hung and Wong, Tze Jin
(2018)
Common modulus attack against Lucas based El-Gamal Cryptosystem in the elliptic curve group over finite field.
International Journal of Cryptology Research, 8 (2).
pp. 1-10.
ISSN 0933-2790
Sarbini, Izzatul Nabila and Wong, Tze Jin and Koo, Lee Feng and Othman, Mohamed and Md. Said, Mohamad Rushdan and Yiu, Pang Hung
(2018)
Garbage-man-in-the-middle (type 2) attack on the Lucas based El-Gamal cryptosystem in the elliptic curve group over finite field.
In: 6th International Cryptology and Information Security Conference 2018 (CRYPTOLOGY2018), 9-11 July 2018, Port Dickson, Negeri Sembilan, Malaysia. (pp. 35-41).
Sarbini, Izzatul Nabila and Wong, Tze Jin and Koo, Lee Feng and Othman, Mohamed and Md Said, Mohamad Rushdan and Yiu, Pang Hung
(2018)
Security analysis of Lucas based El-Gamal Cryptosystem in the elliptic curve group over finite field using two types of GMITM attacks.
International Journal of Cryptology Research, 8 (2).
24 - 38.
ISSN 1985-5753