default search action
Muhammad Rezal Kamel Ariffin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j23]Wan Nur Aqlili Ruzai, Muhammad Rezal Kamel Ariffin, Muhammad Asyraf Asbullah, Amir Hamzah Abd Ghafar:
New simultaneous Diophantine attacks on generalized RSA key equations. J. King Saud Univ. Comput. Inf. Sci. 36(5): 102074 (2024) - [c8]Abderrahmane Nitaj, Nurul Nur Hanisah Adenan, Muhammad Rezal Kamel Ariffin:
Cryptanalysis of a New Variant of the RSA Cryptosystem. AFRICACRYPT 2024: 327-345 - 2023
- [j22]Siti Nabilah Yusof, Muhammad Rezal Kamel Ariffin, Terry Shue Chien Lau, Nur Raidah Salim, Sook-Chin Yip, Timothy Tzen Vun Yap:
An IND-CPA Analysis of a Cryptosystem Based on Bivariate Polynomial Reconstruction Problem. Axioms 12(3): 304 (2023) - [j21]Terry Shue Chien Lau, Fedor Ivanov, Muhammad Rezal Kamel Ariffin, Ji-Jian Chin, Timothy Tzen Vun Yap:
New code-based cryptosystems via the IKKR framework. J. Inf. Secur. Appl. 76: 103530 (2023) - 2022
- [j20]Abderrahmane Nitaj, Muhammad Rezal Bin Kamel Ariffin, Nurul Nur Hanisah Adenan, Terry Shue Chien Lau, Jiahui Chen:
Security Issues of Novel RSA Variant. IEEE Access 10: 53788-53796 (2022) - [j19]Wan Nur Aqlili Ruzai, Abderrahmane Nitaj, Muhammad Rezal Kamel Ariffin, Zahari Mahad, Muhammad Asyraf Asbullah:
Increment of insecure RSA private exponent bound through perfect square RSA diophantine parameters cryptanalysis. Comput. Stand. Interfaces 80: 103584 (2022) - [j18]Abderrahmane Nitaj, Muhammad Rezal Kamel Ariffin, Nurul Nur Hanisah Adenan, Domenica Stefania Merenda, Ali Ahmadian:
Exponential increment of RSA attack range via lattice based cryptanalysis. Multim. Tools Appl. 81(25): 36607-36622 (2022) - [j17]Zahari Mahad, Muhammad Rezal Kamel Ariffin, Amir Hamzah Abd Ghafar, Nur Raidah Salim:
Cryptanalysis of RSA-Variant Cryptosystem Generated by Potential Rogue CA Methodology. Symmetry 14(8): 1498 (2022) - [j16]Boon Chian Tea, Muhammad Rezal Kamel Ariffin, Amir Hamzah Abd Ghafar, Siti Hasana Sapar, Mohamat Aidil Mohamat Johari:
An Efficient Identification Scheme Based on Bivariate Function Hard Problem. Symmetry 14(9): 1784 (2022) - [j15]Wan Nur Aqlili Ruzai, Amir Hamzah Abd Ghafar, Nur Raidah Salim, Muhammad Rezal Kamel Ariffin:
On (Unknowingly) Using Near-Square RSA Primes. Symmetry 14(9): 1898 (2022) - [j14]Nurul Amiera Sakinah Abdul Jamal, Muhammad Rezal Kamel Ariffin, Siti Hasana Sapar, Kamilah Abdullah:
New Identified Strategies to Forge Multivariate Signature Schemes. Symmetry 14(11): 2368 (2022) - 2021
- [j13]Hayder Natiq, Muhammad Rezal Kamel Ariffin, Muhammad Asyraf Asbullah, Zahari Mahad, Mohammed Najah:
Enhancing Chaos Complexity of a Plasma Model through Power Input with Desirable Random Features. Entropy 23(1): 48 (2021) - [j12]Mohd Shariq, Karan Singh, Pramod Kumar Maurya, Ali Ahmadian, Muhammad Rezal Kamel Ariffin:
URASP: An ultralightweight RFID authentication scheme using permutation operation. Peer-to-Peer Netw. Appl. 14(6): 3737-3757 (2021) - [j11]Rasyid Redha Mohd Tahir, Muhammad Asyraf Asbullah, Muhammad Rezal Kamel Ariffin, Zahari Mahad:
Determination of a Good Indicator for Estimated Prime Factor and Its Modification in Fermat's Factoring Algorithm. Symmetry 13(5): 735 (2021) - [c7]Abderrahmane Nitaj, Muhammad Rezal Bin Kamel Ariffin, Nurul Nur Hanisah Adenan, Nur Azman Abu:
Classical Attacks on a Variant of the RSA Cryptosystem. LATINCRYPT 2021: 151-167 - [i12]Abderrahmane Nitaj, Muhammad Rezal Kamel Ariffin, Nurul Nur Hanisah Adenan, Nur Azman Abu:
Classical Attacks on a Variant of the RSA Cryptosystem. IACR Cryptol. ePrint Arch. 2021: 1160 (2021) - [i11]Wan Nur Aqlili Ruzai, Abderrahmane Nitaj, Muhammad Rezal Kamel Ariffin, Zahari Mahad, Muhammad Asyraf Asbullah:
Increment of Insecure RSA Private Exponent Bound Through Perfect Square RSA Diophantine Parameters Cryptanalysis. IACR Cryptol. ePrint Arch. 2021: 1629 (2021) - [i10]Abderrahmane Nitaj, Muhammad Rezal Kamel Ariffin, Nurul Nur Hanisah Adenan, Domenica Stefania Merenda, Ali Ahmadian:
Exponential Increment of RSA Attack Range via Lattice Based Cryptanalysis. IACR Cryptol. ePrint Arch. 2021: 1630 (2021) - 2020
- [j10]Wan Nur Aqlili Ruzai, Muhammad Rezal Kamel Ariffin, Muhammad Asyraf Asbullah, Zahari Mahad, Athirah Nawawi:
On the Improvement Attack Upon Some Variants of RSA Cryptosystem via the Continued Fractions Method. IEEE Access 8: 80997-81006 (2020) - [j9]Amir Hamzah Abd Ghafar, Muhammad Rezal Kamel Ariffin, Muhammad Asyraf Asbullah:
A New LSB Attack on Special-Structured RSA Primes. Symmetry 12(5): 838 (2020) - [j8]Nadia M. G. Al-Saidi, Dhurgham Younus, Hayder Natiq, Muhammad Rezal Kamel Ariffin, M. A. Asbullah, Zahari Mahad:
A New Hyperchaotic Map for a Secure Communication Scheme with an Experimental Realization. Symmetry 12(11): 1881 (2020) - [c6]Muhammad Rezal Kamel Ariffin, Amir Hamzah Abd Ghafar, Muhammad Asyraf Asbullah:
Attacking RSA Using an Arbitrary Parameter. AFRICACRYPT 2020: 382-399
2010 – 2019
- 2019
- [j7]Muhammad Rezal Kamel Ariffin, Saidu Isah Abubakar, Faridah Yunos, Muhammad Asyraf Asbullah:
New Cryptanalytic Attack on RSA Modulus N = pq Using Small Prime Difference Method. Cryptogr. 3(1): 2 (2019) - [j6]Hayder Natiq, Muhammad Rezal Kamel Ariffin, Mohamad Rushdan Md. Said, Santo Banerjee:
Enhancing the sensitivity of a chaos sensor for Internet of things. Internet Things 7 (2019) - [j5]Athirah Nawawi, Sharifah Kartini Said Husain, Muhammad Rezal Kamel Ariffin:
Commuting Graphs, C(G, X) in Symmetric Groups Sym(n) and Its Connectivity. Symmetry 11(9): 1178 (2019) - [c5]Muhammad Asyraf Asbullah, Muhammad Rezal Kamel Ariffin, Zahari Mahad, Muhamad Azlan Daud:
(In)Security of the AAβ Cryptosystem for Transmitting Large Data. ICSCA 2019: 91-94 - 2017
- [j4]Sayan Mukherjee, Sanjay Kumar Palit, Santo Banerjee, Ainuddin Wahid Abdul Wahab, Muhammad Rezal Kamel Ariffin, D. K. Bhattacharya:
Computing two dimensional Poincaré maps for hyperchaotic dynamics. Appl. Math. Comput. 301: 140-154 (2017) - 2016
- [j3]Normahirah Nek Abd Rahman, Muhammad Rezal Kamel Ariffin:
The Development of Deniable Authentication Protocol Based on The Bivariate Function Hard Problem. Int. J. Netw. Secur. 18(1): 151-157 (2016) - [j2]Amir Hamzah Abd Ghafar, Muhammad Rezal Kamel Ariffin:
SPA on Rabin variant with public key N=p2q. J. Cryptogr. Eng. 6(4): 339-346 (2016) - [i9]Nur Azman Abu, Shekh Faisal Abdul-Latip, Muhammad Rezal Kamel Ariffin:
A Comparative S-Index in Factoring RSA Modulus via Lucas Sequences. IACR Cryptol. ePrint Arch. 2016: 937 (2016) - 2014
- [c4]Ainuddin Wahid Abdul Wahab, Mustapha Aminu Bagiwa, Mohd Yamani Idna Bin Idris, Suleman Khan, Zaidi Razak, Muhammad Rezal Kamel Ariffin:
Passive video forgery detection techniques: A survey. IAS 2014: 29-34 - [c3]Nur Azman Abu, Muhammad Rezal Kamel Ariffin:
A novel psychovisual model on an independent video frame for an almost lossless compression. IAS 2014: 60-65 - [c2]Abderrahmane Nitaj, Muhammad Rezal Kamel Ariffin, Dieaa I. Nassr, Hatem M. Bahig:
New Attacks on the RSA Cryptosystem. AFRICACRYPT 2014: 178-198 - [i8]Muhammad Asyraf Asbullah, Muhammad Rezal Kamel Ariffin:
Rabin-$p$ Cryptosystem: Practical and Efficient Method for Rabin based Encryption Scheme. CoRR abs/1411.4398 (2014) - [i7]Abderrahmane Nitaj, Muhammad Rezal Kamel Ariffin:
Implicit factorization of unbalanced RSA moduli. IACR Cryptol. ePrint Arch. 2014: 548 (2014) - [i6]Abderrahmane Nitaj, Muhammad Rezal Kamel Ariffin, Dieaa I. Nassr, Hatem M. Bahig:
New Attacks on the RSA Cryptosystem. IACR Cryptol. ePrint Arch. 2014: 549 (2014) - 2013
- [i5]Muhammad Rezal Kamel Ariffin:
An asymmetric primitive based on the Bivariate Function Hard Problem. CoRR abs/1301.6963 (2013) - 2012
- [j1]Suriyani Ariffin, Ramlan Mahmod, Azmi Jaafar, Muhammad Rezal Kamel Ariffin:
Symmetric Encryption Algorithm Inspired by Randomness and Non-Linearity of Immune Systems. Int. J. Nat. Comput. Res. 3(1): 56-72 (2012) - [i4]Muhammad Rezal Kamel Ariffin, M. A. Asbullah, Nor Azman Abu:
A New Efficient Asymmetric Cryptosystem Based on the Square Root Problem. CoRR abs/1207.1157 (2012) - [i3]Muhammad Rezal Kamel Ariffin:
A New Efficient Asymmetric Cryptosystem Based on Diophantine Equation Hard Problem. CoRR abs/1209.3458 (2012) - 2011
- [c1]Suriyani Ariffin, Ramlan Mahmod, Azmi Jaafar, Muhammad Rezal Kamel Ariffin:
Immune Systems Approaches for Cryptographic Algorithm. BIC-TA 2011: 231-235 - [i2]Muhammad Rezal Kamel Ariffin, Zahari Mahad, Nor Azman Abu, Arif Mandangan, Kamel Ariffin Mohd Atan:
Linear Diophantine Equation Discrete Log Problem and the AAβ-Cryptosystem. CoRR abs/1103.4433 (2011) - [i1]Muhammad Rezal Kamel Ariffin, M. A. Asbullah, Nor Azman Abu:
Security Features of an Asymmetric Cryptosystem based on the Diophantine Equation Discrete Log Problem. IACR Cryptol. ePrint Arch. 2011: 467 (2011)
Coauthor Index
aka: Muhammad Asyraf Asbullah
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-21 21:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint