A New Efficient Asymmetric Cryptosystem Based on the Integer Factorization Problem of N=p^{2}q MRK Ariffin, MA Asbullah, NA Abu, ZM Mahad Malaysian Journal Mathematical Sciences 7, 19-37, 2013 | 50* | 2013 |
A new hyperchaotic map for a secure communication scheme with an experimental realization NMG Al-Saidi, D Younus, H Natiq, MRK Ariffin, MA Asbullah, Z Mahad Symmetry 12 (11), 1881, 2020 | 26 | 2020 |
Analysis on the Rabin-p cryptosystem MA Asbullah, MRK Ariffin, Z Mahad AIP Conference Proceedings 1787 (1), 2016 | 18 | 2016 |
Efficient methods to overcome Rabin cryptosystem decryption failure Z Mahad, MA Asbullah, MRK Ariffin Malaysian Journal of Mathematical Sciences 11, 9–20-9–20, 2017 | 15 | 2017 |
Enhancing chaos complexity of a plasma model through power input with desirable random features H Natiq, MR Kamel Ariffin, MA Asbullah, Z Mahad, M Najah Entropy 23 (1), 48, 2020 | 13 | 2020 |
On the improvement attack upon some variants of RSA cryptosystem via the continued fractions method WNA Ruzai, MRK Ariffin, MA Asbullah, Z Mahad, A Nawawi IEEE Access 8, 80997-81006, 2020 | 13 | 2020 |
Increment of insecure RSA private exponent bound through perfect square RSA diophantine parameters cryptanalysis WNAWM Ruzai, A Nitaj, MRK Ariffin, Z Mahad, MA Asbullah Computer Standards & Interfaces 80, 103584, 2022 | 9 | 2022 |
Determination of a good indicator for estimated prime factor and its modification in Fermat’s factoring algorithm RRM Tahir, MA Asbullah, MRK Ariffin, Z Mahad Symmetry 13 (5), 735, 2021 | 8 | 2021 |
AA_{\beta} Public-Key Cryptosystem - A Practical Comparative Analysis against RSA and ECC MRK Ariffin, Z Mahad International Journal of Digital Content Technology and its Applications 7 …, 2013 | 8* | 2013 |
On the Hastad's Attack to LUC Cryptosystem and Compared with Other RSA-Type Cryptosystem WT Jin, H Kamarulhaili, MRM Said Malaysian Journal of Mathematical Sciences 7, 1-17, 2013 | 7 | 2013 |
Analysis of Rabin-P and RSA-OAEP Encryption Scheme on Microprocessor Platform MH Mazlisham, SFS Adnan, MAM Isa, Z Mahad, MA Asbullah 2020 IEEE 10th Symposium on Computer Applications & Industrial Electronics …, 2020 | 6 | 2020 |
A new direction in utilization of chaotic fractal functions for cryptosystems MRK Ariffin, NMG Al-Saidi, MRM Said, Z Mahad, MA Daud Applications of Chaos and Nonlinear Dynamics in Science and Engineering-Vol …, 2012 | 6 | 2012 |
AAβpublic key cryptosystem - A new practical asymmetric implementation based on the square root problem Z Mahad, MRK Ariffin 2012 7th International Conference on Computing and Convergence Technology …, 2012 | 4 | 2012 |
Enhanced AAβ cryptosystem: The design MA Asbullah, MRK Ariffin, Z Mahad Proceedings of the 6th International Cryptology and Information Security …, 2018 | 3 | 2018 |
A multi-view clustering algorithm for attributed weighted multi-edge directed networks AZ Khameneh, A Kilicman, Z Mahad Neural Computing and Applications 35 (10), 7779-7800, 2023 | 2 | 2023 |
Cryptanalysis of RSA-variant cryptosystem generated by potential rogue CA methodology Z Mahad, MRK Ariffin, AHA Ghafar, NR Salim Symmetry 14 (8), 1498, 2022 | 2 | 2022 |
AA_{\beta} Public-Key Cryptosystem - A Practical Implementation of the New Asymmetric Cryptosystem Z Mahad, MRK Ariffin International Journal of Digital Content Technology and its Applications 7 …, 2013 | 2 | 2013 |
Enhanced Cryptosystem - A Comparative Analysis Z Mahad, MA Asbullah, MRK Ariffin Malaysian Journal of Mathematical Sciences 13 (2), 187-200, 2019 | 1 | 2019 |
A maximal-clique-based clustering approach for multi-observer multi-view data by using k-nearest neighbor with S-pseudo-ultrametric induced by a fuzzy similarity AZ Khameneh, M Ghaznavi, A Kilicman, Z Mahad, A Mardani Neural Computing and Applications 36 (16), 9525-9550, 2024 | | 2024 |
A failure in decryption process for bivariate polynomial reconstruction problem cryptosystem SN Yusof, MRK Ariffin, SC Yip, TSC Lau, Z Mahad, JJ Chin, CY Ting Heliyon 10 (4), 2024 | | 2024 |