Cryptanalysis of fruit-80, craft and cham lightweight symmetric-key cryptographic primitives
In this modern era, computers are getting more lightweight and smaller in size. This advancement has caused lightweight cryptography becomes a prevalent trend. However, lightweight primitives may present undiscovered vulnerabilities that threaten the security and privacy of communications. In this t...
| Main Author: | Pang, Kok An |
|---|---|
| Format: | Thesis |
| Language: | English English |
| Published: |
2021
|
| Subjects: | |
| Online Access: | http://eprints.utem.edu.my/id/eprint/25994/ https://plh.utem.edu.my/cgi-bin/koha/opac-detail.pl?biblionumber=121297 |
| Abstract | Abstract here |
Similar Items
Improving Chaotic Cryptographic
Primitives Based On Map’s
Complexity And Period Length Of
The Chaotic Maps
by: Masoumi, Amir Akhavan
Published: (2015)
by: Masoumi, Amir Akhavan
Published: (2015)
Public announcement logic in cryptographic protocol / Muhammad Farhan Mohd Nasir
by: Muhammad Farhan , Mohd Nasir
Published: (2019)
by: Muhammad Farhan , Mohd Nasir
Published: (2019)
Geodesic deviation equation in symmetric teleparallel gravity / Beh Jing Theng
by: Beh , Jing Theng
Published: (2022)
by: Beh , Jing Theng
Published: (2022)
Development of an online ecological data warehouse / Cham Hui
by: Cham, Hui
Published: (2016)
by: Cham, Hui
Published: (2016)
Design new symmetric cryptographic algorithm for mobile communication systems
by: Jasim, Khalid Fadhil
Published: (2024)
by: Jasim, Khalid Fadhil
Published: (2024)
Mobile application for Solanaceous crop health diagnosis and treatment using a lightweight YOLO Model
by: Khan, Asar
Published: (2025)
by: Khan, Asar
Published: (2025)
Enhance key generation algorithm based user string identity as public key
by: Norhidayah, Muhammad
Published: (2015)
by: Norhidayah, Muhammad
Published: (2015)
The analysis of homological functors of some torsion free crystallographic groups with symmetric point group of order six
by: Tan, Yee Ting
Published: (2017)
by: Tan, Yee Ting
Published: (2017)
Extention and cryptanalysis of golden cryptography
by: Sharabyan, Mohammad Tahghighi
Published: (2015)
by: Sharabyan, Mohammad Tahghighi
Published: (2015)
Developing an ecological visualization system for biodiversity and water quality data / Cham Hui
by: Cham , Hui
Published: (2022)
by: Cham , Hui
Published: (2022)
Duplicates detection approach within incomplete data sets using dynamic sorting key and hot deck compensation method
by: Abdulrahim, Abdulrazzak Ali Mohamed
Published: (2022)
by: Abdulrahim, Abdulrazzak Ali Mohamed
Published: (2022)
Primitive path modelling using integration of sub-cell hits volume and dijkstra algorithm
by: Nurul Annasuha Mohd. Baharudin
Published: (2025)
by: Nurul Annasuha Mohd. Baharudin
Published: (2025)
Cryptanalysis of El-Gamal AAs cryptosystem
by: Mandangan, Arif
Published: (2011)
by: Mandangan, Arif
Published: (2011)
Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube
by: Mushtaq, Muhammad Faheem
Published: (2019)
by: Mushtaq, Muhammad Faheem
Published: (2019)
Cryptanalysis of polynomial reconstruction problem based cryptosystems
by: Yusof, Siti Nabilah
Published: (2023)
by: Yusof, Siti Nabilah
Published: (2023)
Comparative study of verification for cryptographic accumulators in blockchain based public key infrastructure
by: Yee, Yen Sing
Published: (2025)
by: Yee, Yen Sing
Published: (2025)
Absolute deviance method for symmetrical uniform designs
by: Lau, Grace Chui Ting
Published: (2015)
by: Lau, Grace Chui Ting
Published: (2015)
A parallel distributed Javaspaces implementation of RSA public key factorization using quadratic sieve / by Lau Khek Hooi.
by: Lau, Khek Hooi
Published: (2003)
by: Lau, Khek Hooi
Published: (2003)
A lightweight key management framework for secure dynamic group based applications / Salman Iqbal Malik
by: Salman Iqbal , Malik
Published: (2017)
by: Salman Iqbal , Malik
Published: (2017)
Reconstructing applicable chaotic Baptista-type symmetric cryptosystem
by: Daud, Muhamad Azlan
Published: (2014)
by: Daud, Muhamad Azlan
Published: (2014)
Design and development of e-cham application indigenous language in Vietnam
by: Van, Ngoc Sang
Published: (2025)
by: Van, Ngoc Sang
Published: (2025)
Peralihan bahasa Cham di Malaysia berdasarkan analisis sosiolinguistik
by: Noraisikin Ghazali (P88284)
Published: (2023)
by: Noraisikin Ghazali (P88284)
Published: (2023)
Symmetrical non-separable wavelet transforms in remote sensing image fusion
by: Butaev, Almaz
Published: (2012)
by: Butaev, Almaz
Published: (2012)
Analysable Chaos-based Design Paradigms For Cryptographic Applications
by: Abba, Abubakar
Published: (2024)
by: Abba, Abubakar
Published: (2024)
Efficiency key generation management in a big organization for symmetric cryptography system
by: Atefeh Mirzaee
Published: (2025)
by: Atefeh Mirzaee
Published: (2025)
Performance analysis and improvement of rabin primitive based cryptosystems
by: Mahad, Zahari
Published: (2014)
by: Mahad, Zahari
Published: (2014)
Elastic, structural and optical studies on ᵪNa₂O-(35-ᵪ)V₂O₅-65TeO₂,ƴWO₃-(40-y)Ag₂O-60TeO₂ AND zNb₂O₅-(20-z)BaO-80TeO₂ tellurite based glass systems / Muhammad Umair Mohamad
by: Mohamad, Muhammad Umair
Published: (2015)
by: Mohamad, Muhammad Umair
Published: (2015)
Cryptanalysis of RSA and its variants using continuous midpoint subdivision analysis and lattices
by: Wan Mohd Ruzai, Wan Nur Aqlili
Published: (2021)
by: Wan Mohd Ruzai, Wan Nur Aqlili
Published: (2021)
A new cryptographic algorithm based on decomposition problem in elliptic curve cryptography / Hilyati Hanina Zazali
by: Hilyati Hanina, Zazali
Published: (2012)
by: Hilyati Hanina, Zazali
Published: (2012)
Modified algorithms in interval symmetric single-step procedure for simultaneous inclusion of polynomial zeros
by: Wan Mohd Sham, Atiyah
Published: (2014)
by: Wan Mohd Sham, Atiyah
Published: (2014)
Free vibration of anti symmetric angle ply laminated conical shells
by: Izliana Abu Bakar
Published: (2025)
by: Izliana Abu Bakar
Published: (2025)
The impact of gamification on undergraduate engineers' public speaking anxiety and competency
by: Syed Osman Abadi, Sharifah Aida Hana
Published: (2025)
by: Syed Osman Abadi, Sharifah Aida Hana
Published: (2025)
Big data technology information extraction and fusion from non-homogenous web data sources
by: Lee, Qi Zian
Published: (2025)
by: Lee, Qi Zian
Published: (2025)
Gait force-based multimodal fusion architectures with deep neural network for gait disorders in older adults
by: Kazi Ashikur, Rahman
Published: (2025)
by: Kazi Ashikur, Rahman
Published: (2025)
Transformer-based sentiment analysis classification in natural language processing for Bahasa Melayu
by: Zulkalnain, Mohd Asyraf
Published: (2025)
by: Zulkalnain, Mohd Asyraf
Published: (2025)
Autism spectrum disorder screening using DSM-5 fulfillment and machine learning adaptation
by: Wan Zaini, Wan Azamudin
Published: (2025)
by: Wan Zaini, Wan Azamudin
Published: (2025)
Wood defect identification using convolutional neural network features with support vector machine classifier
by: Ali, Martina
Published: (2025)
by: Ali, Martina
Published: (2025)
A comparative analysis of Parkinson’s disease classification using artificial intelligent techniques for mobile application
by: Lee, Teng Hong
Published: (2025)
by: Lee, Teng Hong
Published: (2025)
Enhancing anomaly detection performance in imbalanced datasets using a deep generative model and Tomeklinks approach
by: Barkah, Azhari Shouni
Published: (2025)
by: Barkah, Azhari Shouni
Published: (2025)
Enhanced multi-agent approaches for efficient evacuation and rescue operations in managing disasters
by: Abusalama, Jawad
Published: (2025)
by: Abusalama, Jawad
Published: (2025)
Similar Items
-
Improving Chaotic Cryptographic
Primitives Based On Map’s
Complexity And Period Length Of
The Chaotic Maps
by: Masoumi, Amir Akhavan
Published: (2015) -
Public announcement logic in cryptographic protocol / Muhammad Farhan Mohd Nasir
by: Muhammad Farhan , Mohd Nasir
Published: (2019) -
Geodesic deviation equation in symmetric teleparallel gravity / Beh Jing Theng
by: Beh , Jing Theng
Published: (2022) -
Development of an online ecological data warehouse / Cham Hui
by: Cham, Hui
Published: (2016) -
Design new symmetric cryptographic algorithm for mobile communication systems
by: Jasim, Khalid Fadhil
Published: (2024)
