Security Analysis on LUC-type Cryptosystems Using Common Modulus Attack

IN Sarbini, TJ Wong, LF Koo… - … in Applied Sciences …, 2023 - semarakilmu.com.my
LUC-type cryptosystems are asymmetric key cryptosystems based on the Lucas sequence
that is extended from RSA. The security challenge is comparable to RSA, which is based on …

Further cryptanalysis of some variants of the RSA cryptosystem

M Rahmani, A Nitaj, M Ziane - Journal of Applied Mathematics and …, 2024 - Springer
To improve the security and the efficiency of the RSA cryptosystem, several variants have
been proposed such as CRT-RSA, KMOV, Multiprime-RSA, Takagi-RSA, and Multiprime …

The security analysis of GCD attack on LUCELG, LUC (3) ELG and LUC (4, 6) ELG

IN Sarbini, WT Jin, M Othman, KL Feng - AIP Conference Proceedings, 2024 - pubs.aip.org
This paper focuses on the security analysis of Lucas based El-Gamal cryptosystem scheme.
The El-Gamal scheme is incorporated with different Lucas order, including second-order in …

[PDF][PDF] A cubic El-Gamal encryption scheme based on lucas sequence and elliptic curve

TJ Wong, LF Koo, FH Naning, AFN Rasedee… - Advances in …, 2021 - academia.edu
The public key cryptosystem is fundamental in safeguard communication in cyberspace.
This paper described a new cryptosystem analogous to El-Gamal encryption scheme, which …

Cubic Extensions of the Lucas Sequences

CJC Ballot, HC Williams - The Lucas Sequences: Theory and Applications, 2023 - Springer
This is the first of three chapters devoted to the question of how to generalize the Lucas
sequences. We begin with a detailed discussion of Lucas's thoughts concerning this …

An efficient computation technique for Cryptosystems based on Lucas Functions

ZM Ali, M Othman, MRM Said… - … on Computer and …, 2008 - ieeexplore.ieee.org
Lucas Functions is a special form of second order linear recurrence relation. This function
has been used in the LUC Cryptosystems. The encryption process of this system is the …

[PDF][PDF] On the security comparison of luc-type cryptosystems using chosen message attack

TJ Wong, LF Koo, FH Naning… - Advances in …, 2020 - research-publication.com
The security of LUC type cryptosystems was investigated. In this study, chosen message
attack was employed to analyze the security of LUC, LUC3 and LUC4, 6 cryptosystems. The …

Implementation of parallel algorithms for luc cryptosystem

ZM Ali, M Othman, MRM Said… - 2008 Ninth ACIS …, 2008 - ieeexplore.ieee.org
The encryption process of LUC Cryptosystem is V e (P, 1)(mod N), while the decryption
process is V d (C, 1)(mod N). An N is a product of two relatively primes p and q, P is a …

[PDF][PDF] PARALLEL COMPUTATION ALGORITHM FOR LUC CRYPTOSYSTEM BASED ON BINARY NUMBER.

Z ALI - Journal of Theoretical & Applied Information …, 2012 - jatit.org
ABSTRACT LUC Cryptosystem is a public key cryptosystem based on Lucas Function. It is
first discussed by Smith and Lennon in 1993. They proposed a new public key system using …

[PDF][PDF] Cryptosystem Analogous to LUCELG and a Digital Signature Scheme

CM Yoong, MRM Said - Pertanika J. Sci. Techno., 2005 - core.ac.uk
ElGamal and LUC are examples of a public-key cryptosystem. Based on these two systems,
LUCELG that depends on the strength of the two systems was constructed. The combination …