A
PROFILE
Laman Web Staf UPM
DR. MUHAMMAD ASYRAF BIN ASBULLAH
PENSYARAH KANAN
PUSAT ASASI SAINS UNIVERSITI PUTRA MALAYSIA
ma_asyraf@upm.edu.my
ma_asyraf
BM
EN

PROFESIONAL

NAMA :
(Dr.) MUHAMMAD ASYRAF BIN ASBULLAH
JAWATAN :
PENSYARAH KANAN
PTJ :
PUSAT ASASI SAINS UNIVERSITI PUTRA MALAYSIA

BIDANG PENYELIAAN
ANALYTICAL AND STRUCTURAL MATHEMATICS / MATHEMATICAL CRYPTOGRAPHY
PENDIDIKAN
PHD
UNIVERSITI PUTRA MALAYSIA, SERDANG, SELANGOR
Graduated : 2015
SARJANA MUDA SAINS SERTA PENDIDIKAN (MATEMATIK)
UNIVERSITI TEKNOLOGI MALAYSIA, SKUDAI, JOHOR
Graduated : 2008
PENERBITAN BUKU
1. FAILURE-FREE VERSION OF RABIN CRYPTOSYSTEM: THE DESIGN
    ISPN: 9789672908913
PENERBITAN JOURNAL
1. Design of Rabin-like Cryptosystem without Decryption Failure
    Journal type: Citation-Indexed - Scopus
2. Efficient Methods to Overcome Rabin Cryptosystem Decryption Failure
    Journal type: Citation-Indexed - Scopus
3. Provably Secure Randomized AAB Cryptosystem
    Journal type: Other Abstracting / Indexing Bodies
4. Algebraic Analysis of a Rabin-Like Cryptosystem and Its Countermeasures
    Journal type: Other Abstracting / Indexing Bodies
5. Algebraic Cryptanalysis on the AAβ Cryptosystem
    Journal type: Other Abstracting / Indexing Bodies
6. Another Proof Of Wiener's Short Secret Exponent
    Journal type: Citation-Indexed - Scopus
7. A Fast and Efficient Design for AAbeta Cryptosystem
    Journal type: Other Abstracting / Indexing Bodies
8. Enhanced AAβ Cryptosystem - A Comparative Analysis
    Journal type: Citation-Indexed - Scopus
9. Design and Analysis of Rabin-p Key Encapsulation Mechanism for CyberSecurity Malaysia MySEAL Initiative
    Journal type: Other Abstracting / Indexing Bodies
10. On the Smallest-Basis Problem underlying the GGH Lattice-based Cryptosystem
    Journal type: Citation-Indexed - Scopus
11. The Blömer-May’s Weak Key Revisited
    Journal type: Citation-Indexed - Scopus
12. CRYPTANALYSIS OF RSA KEY EQUATION OF N=p^2q FOR SMALL |2q – p| USING CONTINUED FRACTION
    Journal type: Citation-Indexed - Scopus
13. Survival of GGH Cryptosystem against the Nguyen’s Attack
    Journal type: Citation-Indexed - Scopus
14. Analysis of Rabin-p And HIME(R) Encryption Scheme on IoT Platform
    Journal type: Citation-Indexed - Scopus
15. Use of the CFEA Lossless Data Compression Method in Transmitting Encrypted Modified Baptista Symmetric Chaotic Cryptosystem Data
    Journal type: Citation-Indexed - Scopus
16. Square Integer Matrix with a Single Non-Integer Entry in Its Inverse
    Journal type: Citation-Indexed Journal - Science Citation Index (JCR)
17. An Upgrade on the Key Generation Algorithm of the GGH-MKA Lattice-Based Encryption Scheme
    Journal type: Citation-Indexed - Scopus
18. Factoring the Modulus of Type N = p2q by Finding Small Solutions of the Equation er − (Ns + t) = αp2 + βq2
    Journal type: Citation-Indexed Journal - Science Citation Index (JCR)
19. Security Analysis of a Public Key Cryptosystem for Synchronized Chaotic Systems
    Journal type: Non Citation-Indexed
20. Survival of the First Practical Lattice-based Encryption Scheme: A Review
    Journal type: Non Citation-Indexed
21. Uncover Weak Keys of RSADemo2 Software Using Batch Greatest Common Divisor Algorithm
    Journal type: MYCITE
22. COMPARATIVE OF RIVEST-SHAMIR-ADLEMAN CRYPTOSYSTEM AND ITS FOUR VARIANTS USING RUNNING TIME AND MEMORY CONSUMPTION ANALYSIS
    Journal type: Citation-Indexed - Scopus
23. Concurrent Factorization of RSA Moduli via Weak Key Equations
    Journal type: Citation-Indexed Journal - Science Citation Index (JCR)
24. Another Look at the Security Analysis of the Modulus N = p 2 q by Utilizing an Approximation Approach for Ï•(N)
    Journal type: Citation-Indexed Journal - ESCI
25. A New Countermeasure to Combat the Embedding-Based Attacks on the Goldreich-Goldwasser-Halevi Lattice-Based Cryptosystem
    Journal type: MYCITE
LATARBELAKANG PENDIDIKAN
PENERBITAN
2025
Efficient Factorization of RSA Modulus: Small Solutions of Weak Key Equations
2024
Concurrent Factorization of RSA Moduli via Weak Key Equations
2024
COMPARATIVE OF RIVEST-SHAMIR-ADLEMAN CRYPTOSYSTEM AND ITS FOUR VARIANTS USING RUNNING TIME AND MEMORY CONSUMPTION ANALYSIS
2021
Square Integer Matrix with a Single Non-Integer Entry in Its Inverse
2021
An Upgrade on the Key Generation Algorithm of the GGH-MKA Lattice-Based Encryption Scheme
2021
Factoring the Modulus of Type N = p2q by Finding Small Solutions of the Equation er ? (Ns + t) = ?p2 + ?q2
2020
CRYPTANALYSIS OF RSA KEY EQUATION OF N=p^2q FOR SMALL |2q – p| USING CONTINUED FRACTION
2020
Use of the CFEA Lossless Data Compression Method in Transmitting Encrypted Modified Baptista Symmetric Chaotic Cryptosystem Data
2020
Survival of GGH Cryptosystem against the Nguyen’s Attack
2020
Analysis of Rabin-p And HIME(R) Encryption Scheme on IoT Platform
2020
A SECURITY UPGRADE ON THE GGH LATTICE-BASED CRYPTOSYSTEM
2019
On the Smallest-Basis Problem underlying the GGH Lattice-based Cryptosystem
2019
Another Proof Of Wiener's Short Secret Exponent
2019
Enhanced AA? Cryptosystem - A Comparative Analysis
2019
Design and Analysis of Rabin-p Key Encapsulation Mechanism for CyberSecurity Malaysia MySEAL Initiative
2019
The Blömer-May’s Weak Key Revisited
2018
A Fast and Efficient Design for AAbeta Cryptosystem
2017
Efficient Methods to Overcome Rabin Cryptosystem Decryption Failure
2017
Algebraic Analysis of a Rabin-Like Cryptosystem and Its Countermeasures
2017
Algebraic Cryptanalysis on the AA? Cryptosystem
2016
Design of Rabin-like Cryptosystem without Decryption Failure
2015
Provably Secure Randomized AAB Cryptosystem