Selamat Datang Ke
LAMAN WEB PERIBADI
Prof. Madya Dr.
Muhammad Rezal Kamel Ariffin
FAKULTI SAINS
Laman Utama Profesional Minat & Hobi Galeri Foto Pautan Menarik
dapatkan nombor telefon dan faks saya hantar email kepada saya
PROFAIL

MAKLUMAT PERIBADI
SAPAAN : Prof. Madya Dr.
NAMA : Muhammad Rezal Bin Kamel Ariffin
JAWATAN HAKIKI : Profesor Madya
PTJ : Fakulti Sains



PENERBITAN (KMPORTAL)
Optical complexity in external cavity semiconductor laser 2017
Algebraic Analysis of a Rabin-Like Cryptosystem and Its Countermeasures 2017
NEW ATTACKS ON PRIME POWER RSA MODULUS N = p^{r}q 2016
Analysis on the AAB Cryptosystem 2016
Provably Secure Rabin-p Cryptosystem in Hybrid Setting 2016
Proceedings of the 5th International Cryptology and Information Security Conference 2016 2016
Design of Rabin-like Cryptosystem without Decryption Failure 2016
Analysis on the Rabin­-p Cryptosystem 2016
The Development of Deniable Authentication Protocol Based on The Bivariate Function Hard Problem 2016
Complexity in congestive heart failure: A time-frequency approach 2016
A new efficient lossless data compression method for transmitting Encrypted data transmission utilizing baptista symmetric chaotic Cryptosystem 2016
New Weak Findings Upon RSA Modulo Of Type N=(p^2)q 2016
SPA on Rabin variant with public key N= p2q 2016
Cryptanalysis on Prime Power RSA modulus of the form N = (p^r )q 2016
Can complexity decreases in Congestive Heart failure? 2015
Attacks on RSA variant type modulus of the form N=p^2 q 2015
A New Arbitrated Signing Scheme Based on BFHP 2015
Some Time-Delay Finding Measures and Attractor Reconstructions 2015
Implicit factorization of unbalanced RSA moduli 2015
Rabin-RZ: A New Efficient Method to Overcome Rabin Cryptosystem Decryption Failure Problem 2015
Provably Secure Randomized AAB Cryptosystem 2015
Comparative Analysis of Three Asymmetric Encryption Schemes Based Upon the Intractability of Square Roots Modulo N=p2q 2014
Phase synchronization of instrumental music signals 2014
Fast Decryption Method for a Rabin Primitive-based Cryptosystem 2014
A Signing Scheme Based on Discrete Logarithm Problem and Diophantine Equation 2014
Timing Attack Analysis on AAB Cryptosystem 2014
Rabin-RZ: A New Efficient Method to Overcome Rabin Cryptosystem Decryption Failure Problem 2014
Pseudo t - Adic Non Adjacent Form for Scalar Multiplication on Koblitz Curves 2014
A Reduced r-adic Naf (RTNAF) Representation for an Efficient Scalar Multiplication on Anomalous Binary Curves (ABC) 2014
A New Arbitrated Signing Scheme Based on BFHP 2014
New Attacks on the RSA Cryptosystem 2014
An Identification Scheme Based On Bivariate Function Hard Problem 2014
Synchronization in coupled Ikeda delay system 2014
The Development of Deniable Authentication Protocol Based on The Bivariate Function Hard Problem 2014
Passive Video Forgery Detection Techniques: A Survey 2014
Proceedings of the 4th International Cryptology and Information Security Conference 2014 2014
Noise induced synchronization of time-delayed semiconductor lasers and authentication based asymmetric encryption 2013
Synchronization and a secure communication scheme using optical star network 2013
A new CCA-secure Encryption based on the Gap Hashed Diffie-Hellman Problem 2013
A New Efficient Analytically Proven Lossless Data Compression for Data Transmission Technique 2013
An Efficient Identification Scheme in Standard Model Based on the Diophantine Equation Hard Problem 2013
AAbeta Public-Key Cryptosystem - A Practical Implementation of the New Asymmetric 2013
A Proposed CCA-secure Encryption on an el-Gamal Variant 2012
Chaos Synchronization based Data Transmission with Asymmetric Encryption 2012
An Efficient Two Way Zero Knowledge Scheme Based On The Diophantine Equation Hard Problem 2012
A Proposed IND-CCA2 Scheme for Implementation on an Asymmetric Cryptosystem Based on the Diophantine Equation Hard Problem 2012
A New Direction in Utilization of Chaotic Fractal Functions for Cryptosystems 2012
Pre-Conditions for Designing Asymmetric Cryptosystems Based on DEHP 2012
AAbeta PKC ? A comparative analysis against RSA and ECC 2012
An Immune System-Inspired Byte PermutationFunction to Improve Confusion Performance of Round Transformation in Symmetric Encryption Scheme 2012
Symmetric Encryption Algorithm Inspired by Randomness and Non-Linearity of Immune Systems 2012
Cryptanalysis of 3D Byte Permutation Block Cipher 2012
AAbeta PKC ? A new practical implementation based on the square root problem 2012
Proceedings of the 3rd International Conference on cryptology and computer security 2012
Intractability of a Diophantine Equation Discrete Log Problem based Asymmetric Cryptosystem 2011
The Hashing Qualities of the AAbeta Function 2011
Immune systems approaches for cryptographic algorithm 2011
Hashing Qualities of the AA-beta Function 2011
A Novel Enhancement Technique of the Hill Cipher for Effective Cryptographic Purposes 2011
Byte Permutation in Block Cipher Based on Immune Systems 2011
Byte Permutations in Block Cipher Based on Immune Systems 2011
MATHEMATICAL TREATMENT FOR CONSTRUCTING A COUNTERMEASURE AGAINST THE ONE-TIME-PAD ATTACK ON THE BAPTISTA TYPE CRYPTOSYSTEM 2011
Kriptologi - matematik untuk keselamatan maklumat 2010
STRENGTHENING THE EL-GAMAL AA_BETA CRYPTOSYSTEM 2010
Proceeding of Cryptology 2010 2010
Generalization of the Prime Orbit Theorem for the S-integer dynamical systems with characteristics zero 2009
The Beta Transform - A Case Study for Chaos Base Cryptography 2009
AAb Cryptosystem - A Chaos Based Public Key Cryptosystem 2009
Constructing the Prime Orbit Theorem for the beta transformation 2009
2009
Conditions for Counter Measure Against One Time Pad Attack on Baptista Type Cryptosystem 2009
Rounding Theorem The possibility of Applying Cryptosystem on Decimal Numbers 2008
Modified Baptista type cryptosystem via matrix secret key 2008
The cryptosystems on the decimal numbers 2007



2264 HITS
sejak 31 Mac'08



1.03
© UNIVERSITI PUTRA MALAYSIA, 2008
template oleh zuraya