Increment of insecure RSA private exponent bound through perfect square RSA diophantine parameters cryptanalysis WNAWM Ruzai, A Nitaj, MRK Ariffin, Z Mahad, MA Asbullah Computer Standards & Interfaces 80, 103584, 2022 | 13 | 2022 |
On the improvement attack upon some variants of RSA cryptosystem via the continued fractions method WNA Ruzai, MRK Ariffin, MA Asbullah, Z Mahad, A Nawawi IEEE Access 8, 80997-81006, 2020 | 13 | 2020 |
New simultaneous Diophantine attacks on generalized RSA key equations WNA Ruzai, MRK Ariffin, MA Asbullah, AH Abd Ghafar Journal of King Saud University-Computer and Information Sciences 36 (5), 102074, 2024 | 6 | 2024 |
On (Unknowingly) Using Near-Square RSA Primes WNA Ruzai, AH Abd Ghafar, NR Salim, MRK Ariffin Symmetry 14 (9), 1898, 2022 | 3 | 2022 |
Soft Computing Approach for Mathematical Modeling of Engineering Problems A Ahmadian, S Salahshour CRC Press, 2021 | 3 | 2021 |
An Attack on N=p2q with Partially Known Bits on the Multiple of the Prime Factors WNA Ruzai, NNH Adenan, MRK Ariffin, AHA Ghaffar, MAM Johari Malaysian Journal of Mathematical Sciences 15 (S), 63-75, 2021 | 2* | 2021 |
Concurrent factorization of RSA moduli via weak key equations WNA Ruzai, Y Ying, KN Muhammad, MA Asbullah, MRK Ariffin AIMS Mathematics 9 (10), 28211-28231, 2024 | 1 | 2024 |
On the variants of RSA cryptosystem and its related algebraic cryptanalysis WNA Ruzai, MRK Ariffin, MA Asbullah Embracing Mathematical Diversity, 67, 2019 | 1 | 2019 |
Logic mining method via hybrid discrete hopfield neural network Y Guo, MSM Kasihmuddin, NE Zamri, J Li, NA Romli, MA Mansor, ... Computers & Industrial Engineering, 111200, 2025 | | 2025 |
EFFICIENT FACTORIZATION OF RSA MODULUS: SMALL SOLUTIONS OF WEAK KEY EQUATIONS WANNURA RUZAI, YOU YING, RRM TAHIR, MA ASBULLAH, ... Journal of Engineering Science and Technology 20 (2), 442-457, 2025 | | 2025 |
On Newly Partial Key Exposure Attack Using Near-square RSA Primes. WN Aqlili Ruzai, AH Abd Ghafar, MR Kamel Ariffin, MA Asbullah IAENG International Journal of Applied Mathematics 55 (2), 2025 | | 2025 |
Another Look at the Security Analysis of the Modulus N= p²q by Utilizing an Approximation Approach for φ (N). WN Aqlili Ruzai, NN Abd Rahman, MA Asbullah Punjab University Journal of Mathematics 56 (5), 2024 | | 2024 |
A Cryptanalysis on the Bivariate Cryptosystem in a Multivariate Setting SN Yusof, MRK Ariffin, WN Aqlili Cryptology and Information Security Conference 2024, 75, 2024 | | 2024 |
Analysis Trigonometry Learning Obstacles from Mathematical Literacy Perspective WNA Ruzai Pasundan Journal of Mathematics Education: Jurnal Pendidikan Matematika 13 …, 2023 | | 2023 |
New Approach for Efficiently Computing Factors of the RSA Modulus MRK Ariffin, AHAG Ghafar, WNAWM Ruzai, NNH Adenan Soft Computing Approach for Mathematical Modeling of Engineering Problems, 2021 | | 2021 |
Cryptanalysis of RSA Cryptosystem via the Continued Midpoint Subdivision Analysis MRK Ariffin, WNA Ruzai, MA Asbullah Cryptology and Information Security Conference 2020, 10-19, 2020 | | 2020 |