A
PROFILE
UPM's Staff Profile
DR. MUHAMMAD ASYRAF BIN ASBULLAH
SENIOR LECTURER
ma_asyraf@upm.edu.my
ma_asyraf
BM
EN

PROFESSIONAL

NAME :
(Dr.) MUHAMMAD ASYRAF BIN ASBULLAH
POST :
SENIOR LECTURER
ENTITY :

FIELD OF SUPERVISION
ANALYTICAL AND STRUCTURAL MATHEMATICS / MATHEMATICAL CRYPTOGRAPHY
EDUCATION
PHD
UNIVERSITI PUTRA MALAYSIA, SERDANG, SELANGOR
Graduated : 2015
SARJANA MUDA SAINS SERTA PENDIDIKAN (MATEMATIK)
UNIVERSITI TEKNOLOGI MALAYSIA, SKUDAI, JOHOR
Graduated : 2008
BOOK PUBLICATION
1. FAILURE-FREE VERSION OF RABIN CRYPTOSYSTEM: THE DESIGN
    ISPN: 9789672908913
JOURNAL PUBLICATION
1. Design of Rabin-like Cryptosystem without Decryption Failure
    Journal type: Citation-Indexed - Scopus
2. Efficient Methods to Overcome Rabin Cryptosystem Decryption Failure
    Journal type: Citation-Indexed - Scopus
3. Provably Secure Randomized AAB Cryptosystem
    Journal type: Other Abstracting / Indexing Bodies
4. Algebraic Analysis of a Rabin-Like Cryptosystem and Its Countermeasures
    Journal type: Other Abstracting / Indexing Bodies
5. Algebraic Cryptanalysis on the AAβ Cryptosystem
    Journal type: Other Abstracting / Indexing Bodies
6. Another Proof Of Wiener's Short Secret Exponent
    Journal type: Citation-Indexed - Scopus
7. A Fast and Efficient Design for AAbeta Cryptosystem
    Journal type: Other Abstracting / Indexing Bodies
8. Enhanced AAβ Cryptosystem - A Comparative Analysis
    Journal type: Citation-Indexed - Scopus
9. Design and Analysis of Rabin-p Key Encapsulation Mechanism for CyberSecurity Malaysia MySEAL Initiative
    Journal type: Other Abstracting / Indexing Bodies
10. On the Smallest-Basis Problem underlying the GGH Lattice-based Cryptosystem
    Journal type: Citation-Indexed - Scopus
11. The Blömer-May’s Weak Key Revisited
    Journal type: Citation-Indexed - Scopus
12. CRYPTANALYSIS OF RSA KEY EQUATION OF N=p^2q FOR SMALL |2q – p| USING CONTINUED FRACTION
    Journal type: Citation-Indexed - Scopus
13. Survival of GGH Cryptosystem against the Nguyen’s Attack
    Journal type: Citation-Indexed - Scopus
14. Analysis of Rabin-p And HIME(R) Encryption Scheme on IoT Platform
    Journal type: Citation-Indexed - Scopus
15. Use of the CFEA Lossless Data Compression Method in Transmitting Encrypted Modified Baptista Symmetric Chaotic Cryptosystem Data
    Journal type: Citation-Indexed - Scopus
16. Square Integer Matrix with a Single Non-Integer Entry in Its Inverse
    Journal type: Citation-Indexed Journal - Science Citation Index (JCR)
17. An Upgrade on the Key Generation Algorithm of the GGH-MKA Lattice-Based Encryption Scheme
    Journal type: Citation-Indexed - Scopus
18. Factoring the Modulus of Type N = p2q by Finding Small Solutions of the Equation er − (Ns + t) = αp2 + βq2
    Journal type: Citation-Indexed Journal - Science Citation Index (JCR)
19. Security Analysis of a Public Key Cryptosystem for Synchronized Chaotic Systems
    Journal type: Non Citation-Indexed
20. Survival of the First Practical Lattice-based Encryption Scheme: A Review
    Journal type: Non Citation-Indexed
21. Uncover Weak Keys of RSADemo2 Software Using Batch Greatest Common Divisor Algorithm
    Journal type: MYCITE
22. COMPARATIVE OF RIVEST-SHAMIR-ADLEMAN CRYPTOSYSTEM AND ITS FOUR VARIANTS USING RUNNING TIME AND MEMORY CONSUMPTION ANALYSIS
    Journal type: Citation-Indexed - Scopus
23. Concurrent Factorization of RSA Moduli via Weak Key Equations
    Journal type: Citation-Indexed Journal - Science Citation Index (JCR)
24. Another Look at the Security Analysis of the Modulus N = p 2 q by Utilizing an Approximation Approach for Ï•(N)
    Journal type: Citation-Indexed Journal - ESCI
25. A New Countermeasure to Combat the Embedding-Based Attacks on the Goldreich-Goldwasser-Halevi Lattice-Based Cryptosystem
    Journal type: MYCITE
EDUCATIONAL BACKGROUND
2015
Doctor of Philosophy (Mathematical Cryptography), Universiti Putra Malaysia.
2011
Master of Science (Computational Mathematics), Universiti Putra Malaysia.
2008
Bachelor of Science with Education (Mathematics), Universiti Teknologi
Malaysia.
PUBLICATION
2025
Efficient Factorization of RSA Modulus: Small Solutions of Weak Key Equations
2024
Concurrent Factorization of RSA Moduli via Weak Key Equations
2024
COMPARATIVE OF RIVEST-SHAMIR-ADLEMAN CRYPTOSYSTEM AND ITS FOUR VARIANTS USING RUNNING TIME AND MEMORY CONSUMPTION ANALYSIS
2021
Square Integer Matrix with a Single Non-Integer Entry in Its Inverse
2021
An Upgrade on the Key Generation Algorithm of the GGH-MKA Lattice-Based Encryption Scheme
2021
Factoring the Modulus of Type N = p2q by Finding Small Solutions of the Equation er ? (Ns + t) = ?p2 + ?q2
2020
CRYPTANALYSIS OF RSA KEY EQUATION OF N=p^2q FOR SMALL |2q – p| USING CONTINUED FRACTION
2020
Use of the CFEA Lossless Data Compression Method in Transmitting Encrypted Modified Baptista Symmetric Chaotic Cryptosystem Data
2020
Survival of GGH Cryptosystem against the Nguyen’s Attack
2020
Analysis of Rabin-p And HIME(R) Encryption Scheme on IoT Platform
2020
A SECURITY UPGRADE ON THE GGH LATTICE-BASED CRYPTOSYSTEM
2019
On the Smallest-Basis Problem underlying the GGH Lattice-based Cryptosystem
2019
Another Proof Of Wiener's Short Secret Exponent
2019
Enhanced AA? Cryptosystem - A Comparative Analysis
2019
Design and Analysis of Rabin-p Key Encapsulation Mechanism for CyberSecurity Malaysia MySEAL Initiative
2019
The Blömer-May’s Weak Key Revisited
2018
A Fast and Efficient Design for AAbeta Cryptosystem
2017
Efficient Methods to Overcome Rabin Cryptosystem Decryption Failure
2017
Algebraic Analysis of a Rabin-Like Cryptosystem and Its Countermeasures
2017
Algebraic Cryptanalysis on the AA? Cryptosystem
2016
Design of Rabin-like Cryptosystem without Decryption Failure
2015
Provably Secure Randomized AAB Cryptosystem