default search action
Abderrahmane Nitaj
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Yansong Feng, Abderrahmane Nitaj, Yanbin Pan:
Small Public Exponent Brings More: Improved Partial Key Exposure Attacks against RSA. IACR Commun. Cryptol. 1(3): 29 (2024) - [j16]Lahraoui Younes, Saiida Lazaar, Amal Youssef, Abderrahmane Nitaj:
Securing Data Exchange with Elliptic Curve Cryptography: A Novel Hash-Based Method for Message Mapping and Integrity Assurance. Cryptogr. 8(2): 23 (2024) - [j15]Abderrahmane Nitaj, Willy Susilo, Joseph Tonien:
Enhanced S-boxes for the Advanced Encryption Standard with maximal periodicity and better avalanche property. Comput. Stand. Interfaces 87: 103769 (2024) - [j14]Virgile Dossou-Yovo, Abderrahmane Nitaj, Alain Togbé:
Solving modular cubic equations with Coppersmith's method. Inf. Comput. 298: 105169 (2024) - [j13]Yansong Feng, Abderrahmane Nitaj, Yanbin Pan:
Partial prime factor exposure attacks on some RSA variants. Theor. Comput. Sci. 999: 114549 (2024) - [c22]Abderrahmane Nitaj, Nurul Nur Hanisah Adenan, Muhammad Rezal Kamel Ariffin:
Cryptanalysis of a New Variant of the RSA Cryptosystem. AFRICACRYPT 2024: 327-345 - [i30]Michel Seck, Abderrahmane Nitaj:
A New Public Key Cryptosystem Based on the Cubic Pell Curve. IACR Cryptol. ePrint Arch. 2024: 385 (2024) - [i29]Yansong Feng, Abderrahmane Nitaj, Yanbin Pan:
Small Public Exponent Brings More: Improved Partial Key Exposure Attacks against RSA. IACR Cryptol. ePrint Arch. 2024: 1329 (2024) - [i28]Yansong Feng, Abderrahmane Nitaj, Yanbin Pan:
New Results for Coppersmith's Method from the Perspective of Sumsets Theory. IACR Cryptol. ePrint Arch. 2024: 1330 (2024) - [i27]Yansong Feng, Zhen Liu, Abderrahmane Nitaj, Yanbin Pan:
Practical Small Private Exponent Attacks against RSA. IACR Cryptol. ePrint Arch. 2024: 1331 (2024) - 2023
- [j12]Maher Boudabra, Abderrahmane Nitaj:
A New RSA Variant Based on Elliptic Curves. Cryptogr. 7(3): 37 (2023) - [j11]Abderrahmane Nitaj, Tajjeeddine Rachidi:
Applications of Neural Network-Based AI in Cryptography. Cryptogr. 7(3): 39 (2023) - [j10]Abderrahmane Nitaj, Willy Susilo, Joseph Tonien:
A new attack on some RSA variants. Theor. Comput. Sci. 960: 113898 (2023) - [c21]Abderrahmane Nitaj, Maher Boudabra:
Improved Cryptanalysis of the Multi-Power RSA Cryptosystem Variant. AFRICACRYPT 2023: 252-269 - [c20]Yansong Feng, Abderrahmane Nitaj, Yanbin Pan:
Generalized Implicit Factorization Problem. SAC 2023: 369-384 - [i26]Yansong Feng, Abderrahmane Nitaj, Yanbin Pan:
Generalized Implicit Factorization Problem. CoRR abs/2304.08718 (2023) - [i25]Maher Boudabra, Abderrahmane Nitaj:
A New RSA Variant Based on Elliptic Curves. IACR Cryptol. ePrint Arch. 2023: 1299 (2023) - [i24]Yansong Feng, Abderrahmane Nitaj, Yanbin Pan:
Generalized Implicit Factorization Problem. IACR Cryptol. ePrint Arch. 2023: 1562 (2023) - [i23]Abderrahmane Nitaj, Tajjeeddine Rachidi:
Applications of Neural Network-Based AI in Cryptography. IACR Cryptol. ePrint Arch. 2023: 1939 (2023) - 2022
- [j9]Abderrahmane Nitaj, Muhammad Rezal Bin Kamel Ariffin, Nurul Nur Hanisah Adenan, Terry Shue Chien Lau, Jiahui Chen:
Security Issues of Novel RSA Variant. IEEE Access 10: 53788-53796 (2022) - [j8]Wan Nur Aqlili Ruzai, Abderrahmane Nitaj, Muhammad Rezal Kamel Ariffin, Zahari Mahad, Muhammad Asyraf Asbullah:
Increment of insecure RSA private exponent bound through perfect square RSA diophantine parameters cryptanalysis. Comput. Stand. Interfaces 80: 103584 (2022) - [j7]Abderrahmane Nitaj, Muhammad Rezal Kamel Ariffin, Nurul Nur Hanisah Adenan, Domenica Stefania Merenda, Ali Ahmadian:
Exponential increment of RSA attack range via lattice based cryptanalysis. Multim. Tools Appl. 81(25): 36607-36622 (2022) - [c19]Abderrahmane Nitaj, Willy Susilo, Joseph Tonien:
A Generalized Attack on the Multi-prime Power RSA. AFRICACRYPT 2022: 537-549 - [c18]Virgile Dossou-Yovo, Abderrahmane Nitaj, Alain Togbé:
Finding Points on Elliptic Curves with Coppersmith's Method. CAI 2022: 69-80 - [c17]Didier Alquié, Guy Chassé, Abderrahmane Nitaj:
Cryptanalysis of the Multi-Power RSA Cryptosystem Variant. CANS 2022: 245-257 - 2021
- [c16]Meryem Cherkaoui Semmouni, Abderrahmane Nitaj, Willy Susilo, Joseph Tonien:
Cryptanalysis of RSA Variants with Primes Sharing Most Significant Bits. ISC 2021: 42-53 - [c15]Abderrahmane Nitaj, Muhammad Rezal Bin Kamel Ariffin, Nurul Nur Hanisah Adenan, Nur Azman Abu:
Classical Attacks on a Variant of the RSA Cryptosystem. LATINCRYPT 2021: 151-167 - [i22]Abderrahmane Nitaj, Muhammad Rezal Kamel Ariffin, Nurul Nur Hanisah Adenan, Nur Azman Abu:
Classical Attacks on a Variant of the RSA Cryptosystem. IACR Cryptol. ePrint Arch. 2021: 1160 (2021) - [i21]Wan Nur Aqlili Ruzai, Abderrahmane Nitaj, Muhammad Rezal Kamel Ariffin, Zahari Mahad, Muhammad Asyraf Asbullah:
Increment of Insecure RSA Private Exponent Bound Through Perfect Square RSA Diophantine Parameters Cryptanalysis. IACR Cryptol. ePrint Arch. 2021: 1629 (2021) - [i20]Abderrahmane Nitaj, Muhammad Rezal Kamel Ariffin, Nurul Nur Hanisah Adenan, Domenica Stefania Merenda, Ali Ahmadian:
Exponential Increment of RSA Attack Range via Lattice Based Cryptanalysis. IACR Cryptol. ePrint Arch. 2021: 1630 (2021) - [i19]Meryem Cherkaoui Semmouni, Abderrahmane Nitaj, Willy Susilo, Joseph Tonien:
Cryptanalysis of RSA Variants with Primes Sharing Most Significant Bits. IACR Cryptol. ePrint Arch. 2021: 1632 (2021) - 2020
- [j6]Hatem M. Bahig, Dieaa I. Nassr, Ashraf Bhery, Abderrahmane Nitaj:
A Unified Method for Private Exponent Attacks on RSA Using Lattices. Int. J. Found. Comput. Sci. 31(2): 207-231 (2020) - [c14]Abderrahmane Nitaj, Willy Susilo, Joseph Tonien:
A New Improved AES S-box with Enhanced Properties. ACISP 2020: 125-141 - [c13]Meryem Cherkaoui Semmouni, Ali Azougaghe, Abderrahmane Nitaj, Mostafa Belkasmi:
A New Electronic Voting System Based on Elliptic Curve in a Cloud Computing Environment. SoCPaR 2020: 768-778 - [e10]Abderrahmane Nitaj, Amr M. Youssef:
Progress in Cryptology - AFRICACRYPT 2020 - 12th International Conference on Cryptology in Africa, Cairo, Egypt, July 20-22, 2020, Proceedings. Lecture Notes in Computer Science 12174, Springer 2020, ISBN 978-3-030-51937-7 [contents] - [i18]Abderrahmane Nitaj, Willy Susilo, Joseph Tonien:
A New Improved AES S-box With Enhanced Properties. IACR Cryptol. ePrint Arch. 2020: 1597 (2020)
2010 – 2019
- 2019
- [j5]Maher Boudabra, Abderrahmane Nitaj:
A new public key cryptosystem based on Edwards curves. J. Appl. Math. Comput. 61(1-2): 431-450 (2019) - [c12]Meryem Cherkaoui Semmouni, Abderrahmane Nitaj, Mostafa Belkasmi:
Bitcoin Security with Post Quantum Cryptography. NETYS 2019: 281-288 - [c11]Abderrahmane Nitaj, Willy Susilo, Joseph Tonien:
Improved Cryptanalysis of the KMOV Elliptic Curve Cryptosystem. ProvSec 2019: 206-221 - [e9]Johannes Buchmann, Abderrahmane Nitaj, Tajje-eddine Rachidi:
Progress in Cryptology - AFRICACRYPT 2019 - 11th International Conference on Cryptology in Africa, Rabat, Morocco, July 9-11, 2019, Proceedings. Lecture Notes in Computer Science 11627, Springer 2019, ISBN 978-3-030-23695-3 [contents] - [e8]Claude Carlet, Sylvain Guilley, Abderrahmane Nitaj, El Mamoun Souidi:
Codes, Cryptology and Information Security - Third International Conference, C2SI 2019, Rabat, Morocco, April 22-24, 2019, Proceedings - In Honor of Said El Hajji. Lecture Notes in Computer Science 11445, Springer 2019, ISBN 978-3-030-16457-7 [contents] - [i17]Abderrahmane Nitaj, Emmanuel Fouotsa:
A New Attack on RSA and Demytko's Elliptic Curve Cryptosystem. IACR Cryptol. ePrint Arch. 2019: 1050 (2019) - [i16]Maher Boudabra, Abderrahmane Nitaj:
A New Public Key Cryptosystem Based on Edwards Curves. IACR Cryptol. ePrint Arch. 2019: 1051 (2019) - [i15]Abderrahmane Nitaj, Willy Susilo, Joseph Tonien:
Improved Cryptanalysis of the KMOV Elliptic Curve Cryptosystem. IACR Cryptol. ePrint Arch. 2019: 1052 (2019) - 2018
- [j4]Martin W. Bunder, Abderrahmane Nitaj, Willy Susilo, Joseph Tonien:
Cryptanalysis of RSA-type cryptosystems based on Lucas sequences, Gaussian integers and elliptic curves. J. Inf. Secur. Appl. 40: 193-198 (2018) - [c10]Haoyu Li, Renzhang Liu, Abderrahmane Nitaj, Yanbin Pan:
Cryptanalysis of the Randomized Version of a Lattice-Based Signature Scheme from PKC'08. ACISP 2018: 455-466 - [c9]Abderrahmane Nitaj, Yanbin Pan, Joseph Tonien:
A Generalized Attack on Some Variants of the RSA Cryptosystem. SAC 2018: 421-433 - [e7]Antoine Joux, Abderrahmane Nitaj, Tajjeeddine Rachidi:
Progress in Cryptology - AFRICACRYPT 2018 - 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7-9, 2018, Proceedings. Lecture Notes in Computer Science 10831, Springer 2018, ISBN 978-3-319-89338-9 [contents] - 2017
- [j3]Martin W. Bunder, Abderrahmane Nitaj, Willy Susilo, Joseph Tonien:
A generalized attack on RSA type cryptosystems. Theor. Comput. Sci. 704: 74-81 (2017) - [e6]Marc Joye, Abderrahmane Nitaj:
Progress in Cryptology - AFRICACRYPT 2017 - 9th International Conference on Cryptology in Africa, Dakar, Senegal, May 24-26, 2017, Proceedings. Lecture Notes in Computer Science 10239, 2017, ISBN 978-3-319-57338-0 [contents] - [e5]Said El Hajji, Abderrahmane Nitaj, El Mamoun Souidi:
Codes, Cryptology and Information Security - Second International Conference, C2SI 2017, Rabat, Morocco, April 10-12, 2017, Proceedings - In Honor of Claude Carlet. Lecture Notes in Computer Science 10194, Springer 2017, ISBN 978-3-319-55588-1 [contents] - [i14]Martin W. Bunder, Abderrahmane Nitaj, Willy Susilo, Joseph Tonien:
A generalized attack on RSA type cryptosystems. IACR Cryptol. ePrint Arch. 2017: 1076 (2017) - [i13]Maher Boudabra, Abderrahmane Nitaj:
A New Generalization of the KMOV Cryptosystem. IACR Cryptol. ePrint Arch. 2017: 1077 (2017) - 2016
- [b1]Abderrahmane Nitaj:
Cryptanalysis of Public Key Cryptosystems. University of Caen Normandy, France, 2016 - [c8]Martin W. Bunder, Abderrahmane Nitaj, Willy Susilo, Joseph Tonien:
A New Attack on Three Variants of the RSA Cryptosystem. ACISP (2) 2016: 258-268 - [e4]David Pointcheval, Abderrahmane Nitaj, Tajjeeddine Rachidi:
Progress in Cryptology - AFRICACRYPT 2016 - 8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedings. Lecture Notes in Computer Science 9646, Springer 2016, ISBN 978-3-319-31516-4 [contents] - [i12]Abderrahmane Nitaj, Willy Susilo, Joseph Tonien:
Dirichlet Product for Boolean Functions. IACR Cryptol. ePrint Arch. 2016: 673 (2016) - 2015
- [c7]Abderrahmane Nitaj, Tajjeeddine Rachidi:
New Attacks on RSA with Moduli N = p r q. C2SI 2015: 352-360 - [c6]Abderrahmane Nitaj, Tajjeeddine Rachidi:
Factoring RSA Moduli with Weak Prime Factors. C2SI 2015: 361-374 - [e3]Said El Hajji, Abderrahmane Nitaj, Claude Carlet, El Mamoun Souidi:
Codes, Cryptology, and Information Security - First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Berger. Lecture Notes in Computer Science 9084, Springer 2015, ISBN 978-3-319-18680-1 [contents] - [i11]Abderrahmane Nitaj, Tajjeeddine Rachidi:
Factoring RSA moduli with weak prime factors. IACR Cryptol. ePrint Arch. 2015: 398 (2015) - [i10]Abderrahmane Nitaj, Tajjeeddine Rachidi:
New attacks on RSA with Moduli N=prq. IACR Cryptol. ePrint Arch. 2015: 399 (2015) - [i9]Abderrahmane Nitaj, Tajjeeddine Rachidi:
Lattice Attacks on the DGHV Homomorphic Encryption Scheme. IACR Cryptol. ePrint Arch. 2015: 1145 (2015) - 2014
- [j2]Abderrahmane Nitaj:
Cryptanalysis of NTRU with two Public Keys. Int. J. Netw. Secur. 16(2): 112-117 (2014) - [c5]Abderrahmane Nitaj, Muhammad Rezal Kamel Ariffin, Dieaa I. Nassr, Hatem M. Bahig:
New Attacks on the RSA Cryptosystem. AFRICACRYPT 2014: 178-198 - [i8]Abderrahmane Nitaj, Mohamed Ould Douh:
A new attack on RSA with a composed decryption exponent. IACR Cryptol. ePrint Arch. 2014: 35 (2014) - [i7]Abderrahmane Nitaj, Muhammad Rezal Kamel Ariffin:
Implicit factorization of unbalanced RSA moduli. IACR Cryptol. ePrint Arch. 2014: 548 (2014) - [i6]Abderrahmane Nitaj, Muhammad Rezal Kamel Ariffin, Dieaa I. Nassr, Hatem M. Bahig:
New Attacks on the RSA Cryptosystem. IACR Cryptol. ePrint Arch. 2014: 549 (2014) - 2013
- [c4]Abderrahmane Nitaj:
An Attack on RSA Using LSBs of Multiples of the Prime Factors. AFRICACRYPT 2013: 297-310 - [p1]Abderrahmane Nitaj:
Diophantine and Lattice Cryptanalysis of the RSA Cryptosystem. Artificial Intelligence, Evolutionary Computing and Metaheuristics 2013: 139-168 - [e2]Amr M. Youssef, Abderrahmane Nitaj, Aboul Ella Hassanien:
Progress in Cryptology - AFRICACRYPT 2013, 6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedings. Lecture Notes in Computer Science 7918, Springer 2013, ISBN 978-3-642-38552-0 [contents] - 2012
- [c3]Abderrahmane Nitaj:
A New Attack on RSA and CRT-RSA. AFRICACRYPT 2012: 221-233 - 2011
- [e1]Abderrahmane Nitaj, David Pointcheval:
Progress in Cryptology - AFRICACRYPT 2011 - 4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings. Lecture Notes in Computer Science 6737, Springer 2011, ISBN 978-3-642-21968-9 [contents] - [i5]Abderrahmane Nitaj:
A new attack on the KMOVcryptosystem. IACR Cryptol. ePrint Arch. 2011: 427 (2011) - [i4]Abderrahmane Nitaj:
Cryptanalysis of NTRU with two public keys. IACR Cryptol. ePrint Arch. 2011: 477 (2011)
2000 – 2009
- 2009
- [c2]Abderrahmane Nitaj:
Cryptanalysis of RSA Using the Ratio of the Primes. AFRICACRYPT 2009: 98-115 - 2008
- [c1]Abderrahmane Nitaj:
Another Generalization of Wiener's Attack on RSA. AFRICACRYPT 2008: 174-190 - 2006
- [i3]Abderrahmane Nitaj:
Cryptanalysis of RSA with constrained keys. IACR Cryptol. ePrint Arch. 2006: 92 (2006) - [i2]Abderrahmane Nitaj:
RSA and a higher degree diophantine equation. IACR Cryptol. ePrint Arch. 2006: 93 (2006) - [i1]Abderrahmane Nitaj:
Application of ECM to a Class of RSA keys. IACR Cryptol. ePrint Arch. 2006: 235 (2006)
1990 – 1999
- 1993
- [j1]Abderrahmane Nitaj:
Algorithms for Finding Good Examples for the abc and Szpiro Conjectures. Exp. Math. 2(3): 223-230 (1993)
Coauthor Index
aka: Muhammad Rezal Bin Kamel Ariffin
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint