Repository logo
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Suomi
  • Svenska
  • Türkçe
  • Tiếng Việt
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Српски
  • Yкраї́нська
  • Log In
    New user? Click here to register.Have you forgotten your password?
Repository logo
    Communities & Collections
    Research Outputs
    Fundings & Projects
    People
    Statistics
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Suomi
  • Svenska
  • Türkçe
  • Tiếng Việt
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Српски
  • Yкраї́нська
  • Log In
    New user? Click here to register.Have you forgotten your password?
  1. Home
  2. Browse by Author

Browsing by Author "Pang Hung Yiu"

Now showing 1 - 2 of 2
Results Per Page
Sort Options
  • Loading...
    Thumbnail Image
    Some of the metrics are blocked by your 
    consent settings
    Publication
    On The Security Comparison Of Luc-Type Cryptosystems Using Chosen Message Attack
    (Union of researchers of Macedonia, 2020)
    Tze Jin Wong
    ;
    Lee Feng Koo
    ;
    Fatin Hana Naning
    ;
    Pang Hung Yiu
    ;
    Ahmad Fadly Nurullah Rasedee
    ;
    Mohamad Maulana Magiman
    ;
    Mohammad Hasan Abdul Sathar
    The security of LUC type cryptosystems was investigated. In this study, chosen message attack was employed to analyze the security of LUC, LUC3 and LUC4,6 cryptosystems. The cryptanalyst invades the system by obtaining a signature without the sender’s consent, and use it to break the system. Finding shows that LUC4,6 cryptosystem is more resilient against chosen message attack compare with LUC and LUC3 cryptosystems.
  • Loading...
    Thumbnail Image
    Some of the metrics are blocked by your 
    consent settings
    Publication
    Security Analysis On Elliptic Curve Cryptosystem Based On Second Order Lucas Sequence Using Faults Based Attack
    (Union of researchers of Macedonia, 2020)
    Lee Feng Koo
    ;
    Tze Jin Wong
    ;
    Fatin Hana Naning
    ;
    Pang Hung Yiu
    ;
    Mohammad Hasan Abdul Sathar
    ;
    Ahmad Fadly Nurullah Rasedee
    Elliptic Curve Cryptosystem based on second order Lucas sequenceis a cryptosystem using elliptic curves over finite fields as a mask and incorporate with second order of Lucas sequence. The security of the Elliptic Curve Cryptography cryptosystem depends on the discrete logarithms. In this cryptosystem, Lucas sequence is employed to compute the ciphertext or recover the plaintext. The Elliptic Curve Cryptosystem based on second order Lucas sequence is vulnerable when the bit of the decryption key, $d$ flips by using fault based attack.
      3  60
Welcome to SRP

"A platform where you can access full-text research
papers, journal articles, conference papers, book
chapters, and theses by USIM researchers and students.”

Contact:
  • ddms@usim.edu.my
  • 06-798 6206 / 6221
  • USIM Library
Follow Us:
READ MORE Copyright © 2024 Universiti Sains Islam Malaysia