Security Analysis on LUC-type Cryptosystems Using Common Modulus Attack
LUC-type cryptosystems are asymmetric key cryptosystems based on the Lucas sequence
that is extended from RSA. The security challenge is comparable to RSA, which is based on …
that is extended from RSA. The security challenge is comparable to RSA, which is based on …
Further cryptanalysis of some variants of the RSA cryptosystem
To improve the security and the efficiency of the RSA cryptosystem, several variants have
been proposed such as CRT-RSA, KMOV, Multiprime-RSA, Takagi-RSA, and Multiprime …
been proposed such as CRT-RSA, KMOV, Multiprime-RSA, Takagi-RSA, and Multiprime …
The security analysis of GCD attack on LUCELG, LUC (3) ELG and LUC (4, 6) ELG
This paper focuses on the security analysis of Lucas based El-Gamal cryptosystem scheme.
The El-Gamal scheme is incorporated with different Lucas order, including second-order in …
The El-Gamal scheme is incorporated with different Lucas order, including second-order in …
[PDF][PDF] A cubic El-Gamal encryption scheme based on lucas sequence and elliptic curve
The public key cryptosystem is fundamental in safeguard communication in cyberspace.
This paper described a new cryptosystem analogous to El-Gamal encryption scheme, which …
This paper described a new cryptosystem analogous to El-Gamal encryption scheme, which …
Cubic Extensions of the Lucas Sequences
CJC Ballot, HC Williams - The Lucas Sequences: Theory and Applications, 2023 - Springer
This is the first of three chapters devoted to the question of how to generalize the Lucas
sequences. We begin with a detailed discussion of Lucas's thoughts concerning this …
sequences. We begin with a detailed discussion of Lucas's thoughts concerning this …
An efficient computation technique for Cryptosystems based on Lucas Functions
Lucas Functions is a special form of second order linear recurrence relation. This function
has been used in the LUC Cryptosystems. The encryption process of this system is the …
has been used in the LUC Cryptosystems. The encryption process of this system is the …
[PDF][PDF] On the security comparison of luc-type cryptosystems using chosen message attack
The security of LUC type cryptosystems was investigated. In this study, chosen message
attack was employed to analyze the security of LUC, LUC3 and LUC4, 6 cryptosystems. The …
attack was employed to analyze the security of LUC, LUC3 and LUC4, 6 cryptosystems. The …
Implementation of parallel algorithms for luc cryptosystem
The encryption process of LUC Cryptosystem is V e (P, 1)(mod N), while the decryption
process is V d (C, 1)(mod N). An N is a product of two relatively primes p and q, P is a …
process is V d (C, 1)(mod N). An N is a product of two relatively primes p and q, P is a …
[PDF][PDF] PARALLEL COMPUTATION ALGORITHM FOR LUC CRYPTOSYSTEM BASED ON BINARY NUMBER.
Z ALI - Journal of Theoretical & Applied Information …, 2012 - jatit.org
ABSTRACT LUC Cryptosystem is a public key cryptosystem based on Lucas Function. It is
first discussed by Smith and Lennon in 1993. They proposed a new public key system using …
first discussed by Smith and Lennon in 1993. They proposed a new public key system using …
[PDF][PDF] Cryptosystem Analogous to LUCELG and a Digital Signature Scheme
CM Yoong, MRM Said - Pertanika J. Sci. Techno., 2005 - core.ac.uk
ElGamal and LUC are examples of a public-key cryptosystem. Based on these two systems,
LUCELG that depends on the strength of the two systems was constructed. The combination …
LUCELG that depends on the strength of the two systems was constructed. The combination …