关注
Zahari Mahad
Zahari Mahad
Research Officer of Institute for Mathematical Research, Universiti Putra Malaysia
在 upm.edu.my 的电子邮件经过验证
标题
引用次数
引用次数
年份
A New Efficient Asymmetric Cryptosystem Based on the Integer Factorization Problem of N=p^{2}q
MRK Ariffin, MA Asbullah, NA Abu, ZM Mahad
Malaysian Journal Mathematical Sciences 7, 19-37, 2013
50*2013
A new hyperchaotic map for a secure communication scheme with an experimental realization
NMG Al-Saidi, D Younus, H Natiq, MRK Ariffin, MA Asbullah, Z Mahad
Symmetry 12 (11), 1881, 2020
262020
Analysis on the Rabin-p cryptosystem
MA Asbullah, MRK Ariffin, Z Mahad
AIP Conference Proceedings 1787 (1), 2016
182016
Efficient methods to overcome Rabin cryptosystem decryption failure
Z Mahad, MA Asbullah, MRK Ariffin
Malaysian Journal of Mathematical Sciences 11, 9–20-9–20, 2017
152017
Enhancing chaos complexity of a plasma model through power input with desirable random features
H Natiq, MR Kamel Ariffin, MA Asbullah, Z Mahad, M Najah
Entropy 23 (1), 48, 2020
132020
On the improvement attack upon some variants of RSA cryptosystem via the continued fractions method
WNA Ruzai, MRK Ariffin, MA Asbullah, Z Mahad, A Nawawi
IEEE Access 8, 80997-81006, 2020
132020
Increment of insecure RSA private exponent bound through perfect square RSA diophantine parameters cryptanalysis
WNAWM Ruzai, A Nitaj, MRK Ariffin, Z Mahad, MA Asbullah
Computer Standards & Interfaces 80, 103584, 2022
92022
Determination of a good indicator for estimated prime factor and its modification in Fermat’s factoring algorithm
RRM Tahir, MA Asbullah, MRK Ariffin, Z Mahad
Symmetry 13 (5), 735, 2021
82021
AA_{\beta} Public-Key Cryptosystem - A Practical Comparative Analysis against RSA and ECC
MRK Ariffin, Z Mahad
International Journal of Digital Content Technology and its Applications 7 …, 2013
8*2013
On the Hastad's Attack to LUC Cryptosystem and Compared with Other RSA-Type Cryptosystem
WT Jin, H Kamarulhaili, MRM Said
Malaysian Journal of Mathematical Sciences 7, 1-17, 2013
72013
Analysis of Rabin-P and RSA-OAEP Encryption Scheme on Microprocessor Platform
MH Mazlisham, SFS Adnan, MAM Isa, Z Mahad, MA Asbullah
2020 IEEE 10th Symposium on Computer Applications & Industrial Electronics …, 2020
62020
A new direction in utilization of chaotic fractal functions for cryptosystems
MRK Ariffin, NMG Al-Saidi, MRM Said, Z Mahad, MA Daud
Applications of Chaos and Nonlinear Dynamics in Science and Engineering-Vol …, 2012
62012
AAβpublic key cryptosystem - A new practical asymmetric implementation based on the square root problem
Z Mahad, MRK Ariffin
2012 7th International Conference on Computing and Convergence Technology …, 2012
42012
Enhanced AAβ cryptosystem: The design
MA Asbullah, MRK Ariffin, Z Mahad
Proceedings of the 6th International Cryptology and Information Security …, 2018
32018
A multi-view clustering algorithm for attributed weighted multi-edge directed networks
AZ Khameneh, A Kilicman, Z Mahad
Neural Computing and Applications 35 (10), 7779-7800, 2023
22023
Cryptanalysis of RSA-variant cryptosystem generated by potential rogue CA methodology
Z Mahad, MRK Ariffin, AHA Ghafar, NR Salim
Symmetry 14 (8), 1498, 2022
22022
AA_{\beta} Public-Key Cryptosystem - A Practical Implementation of the New Asymmetric Cryptosystem
Z Mahad, MRK Ariffin
International Journal of Digital Content Technology and its Applications 7 …, 2013
22013
Enhanced Cryptosystem - A Comparative Analysis
Z Mahad, MA Asbullah, MRK Ariffin
Malaysian Journal of Mathematical Sciences 13 (2), 187-200, 2019
12019
A maximal-clique-based clustering approach for multi-observer multi-view data by using k-nearest neighbor with S-pseudo-ultrametric induced by a fuzzy similarity
AZ Khameneh, M Ghaznavi, A Kilicman, Z Mahad, A Mardani
Neural Computing and Applications 36 (16), 9525-9550, 2024
2024
A failure in decryption process for bivariate polynomial reconstruction problem cryptosystem
SN Yusof, MRK Ariffin, SC Yip, TSC Lau, Z Mahad, JJ Chin, CY Ting
Heliyon 10 (4), 2024
2024
系统目前无法执行此操作,请稍后再试。
文章 1–20