Abderrahmane Nitaj

Orcid: 0000-0002-0372-1757

According to our database1, Abderrahmane Nitaj authored at least 48 papers between 1993 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Enhanced S-boxes for the Advanced Encryption Standard with maximal periodicity and better avalanche property.
Comput. Stand. Interfaces, January, 2024

A New Public Key Cryptosystem Based on the Cubic Pell Curve.
IACR Cryptol. ePrint Arch., 2024

2023
Applications of Neural Network-Based AI in Cryptography.
Cryptogr., July, 2023

A New RSA Variant Based on Elliptic Curves.
Cryptogr., July, 2023

A new attack on some RSA variants.
Theor. Comput. Sci., June, 2023

Generalized Implicit Factorization Problem.
IACR Cryptol. ePrint Arch., 2023

Improved Cryptanalysis of the Multi-Power RSA Cryptosystem Variant.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2023, 2023

2022
Exponential increment of RSA attack range via lattice based cryptanalysis.
Multim. Tools Appl., 2022

Increment of insecure RSA private exponent bound through perfect square RSA diophantine parameters cryptanalysis.
Comput. Stand. Interfaces, 2022

Security Issues of Novel RSA Variant.
IEEE Access, 2022

Cryptanalysis of the Multi-Power RSA Cryptosystem Variant.
Proceedings of the Cryptology and Network Security - 21st International Conference, 2022

Finding Points on Elliptic Curves with Coppersmith's Method.
Proceedings of the Algebraic Informatics - 9th International Conference, 2022

A Generalized Attack on the Multi-prime Power RSA.
Proceedings of the Progress in Cryptology, 2022

2021
Cryptanalysis of RSA Variants with Primes Sharing Most Significant Bits.
IACR Cryptol. ePrint Arch., 2021

Classical Attacks on a Variant of the RSA Cryptosystem.
IACR Cryptol. ePrint Arch., 2021

2020
A Unified Method for Private Exponent Attacks on RSA Using Lattices.
Int. J. Found. Comput. Sci., 2020

A New Improved AES S-box With Enhanced Properties.
IACR Cryptol. ePrint Arch., 2020

A New Electronic Voting System Based on Elliptic Curve in a Cloud Computing Environment.
Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020), 2020

2019
A new public key cryptosystem based on Edwards curves.
J. Appl. Math. Comput., October, 2019

Improved Cryptanalysis of the KMOV Elliptic Curve Cryptosystem.
IACR Cryptol. ePrint Arch., 2019

A New Attack on RSA and Demytko's Elliptic Curve Cryptosystem.
IACR Cryptol. ePrint Arch., 2019

Bitcoin Security with Post Quantum Cryptography.
Proceedings of the Networked Systems - 7th International Conference, 2019

2018
Cryptanalysis of RSA-type cryptosystems based on Lucas sequences, Gaussian integers and elliptic curves.
J. Inf. Secur. Appl., 2018

A Generalized Attack on Some Variants of the RSA Cryptosystem.
Proceedings of the Selected Areas in Cryptography - SAC 2018, 2018

Cryptanalysis of the Randomized Version of a Lattice-Based Signature Scheme from PKC'08.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
A generalized attack on RSA type cryptosystems.
Theor. Comput. Sci., 2017

A New Generalization of the KMOV Cryptosystem.
IACR Cryptol. ePrint Arch., 2017

2016
Dirichlet Product for Boolean Functions.
IACR Cryptol. ePrint Arch., 2016

A New Attack on Three Variants of the RSA Cryptosystem.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Cryptanalysis of Public Key Cryptosystems.
, 2016

2015
Lattice Attacks on the DGHV Homomorphic Encryption Scheme.
IACR Cryptol. ePrint Arch., 2015

New attacks on RSA with Moduli N=p<sup>rq</sup>.
IACR Cryptol. ePrint Arch., 2015

Factoring RSA moduli with weak prime factors.
IACR Cryptol. ePrint Arch., 2015

New Attacks on RSA with Moduli N = p r q.
Proceedings of the Codes, Cryptology, and Information Security, 2015

2014
Cryptanalysis of NTRU with two Public Keys.
Int. J. Netw. Secur., 2014

A new attack on RSA with a composed decryption exponent.
IACR Cryptol. ePrint Arch., 2014

New Attacks on the RSA Cryptosystem.
IACR Cryptol. ePrint Arch., 2014

Implicit factorization of unbalanced RSA moduli.
IACR Cryptol. ePrint Arch., 2014

2013
Diophantine and Lattice Cryptanalysis of the RSA Cryptosystem.
Proceedings of the Artificial Intelligence, Evolutionary Computing and Metaheuristics, 2013

An Attack on RSA Using LSBs of Multiples of the Prime Factors.
Proceedings of the Progress in Cryptology, 2013

2012
A New Attack on RSA and CRT-RSA.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012

2011
A new attack on the KMOVcryptosystem.
IACR Cryptol. ePrint Arch., 2011

2009
Cryptanalysis of RSA Using the Ratio of the Primes.
Proceedings of the Progress in Cryptology, 2009

2008
Another Generalization of Wiener's Attack on RSA.
Proceedings of the Progress in Cryptology, 2008

2006
Application of ECM to a Class of RSA keys.
IACR Cryptol. ePrint Arch., 2006

RSA and a higher degree diophantine equation.
IACR Cryptol. ePrint Arch., 2006

Cryptanalysis of RSA with constrained keys.
IACR Cryptol. ePrint Arch., 2006

1993
Algorithms for Finding Good Examples for the abc and Szpiro Conjectures.
Exp. Math., 1993


  Loading...