Name
Papers
Collaborators
ABDERRAHMANE NITAJ
36
34
Citations 
PageRank 
Referers 
72
15.00
145
Referees 
References 
84
105
Search Limit
100145
Title
Citations
PageRank
Year
Cryptanalysis of RSA Variants with Primes Sharing Most Significant Bits.00.342021
Exponential Increment of RSA Attack Range via Lattice Based Cryptanalysis.00.342021
Cryptanalysis of RSA Variants with Primes Sharing Most Significant Bits00.342021
Increment of Insecure RSA Private Exponent Bound Through Perfect Square RSA Diophantine Parameters Cryptanalysis.00.342021
Classical Attacks on a Variant of the RSA Cryptosystem.00.342021
A Unified Method For Private Exponent Attacks On Rsa Using Lattices10.392020
A New Improved AES S-box with Enhanced Properties.00.342020
A new attack on RSA and Demytko’s elliptic curve cryptosystem00.342019
Key Encapsulation Mechanism From Modular Multivariate Linear Equations.00.342019
A new public key cryptosystem based on Edwards curves00.342019
Bitcoin Security with Post Quantum Cryptography.00.342019
A Generalized Attack on Some Variants of the RSA Cryptosystem.00.342018
Cryptanalysis of the Randomized Version of a Lattice-Based Signature Scheme from PKC'08.00.342018
Cryptanalysis of RSA-type cryptosystems based on Lucas sequences, Gaussian integers and elliptic curves.00.342018
A New Generalization of the KMOV Cryptosystem.00.342017
A generalized attack on RSA type cryptosystems.20.472017
Dirichlet Product for Boolean Functions.00.342016
A New Attack on Three Variants of the RSA Cryptosystem.40.522016
Factoring Rsa Moduli With Weak Prime Factors00.342015
New attacks on RSA with Moduli N=prq.00.342015
New Attacks On Rsa With Moduli N = P(R)Q10.362015
Lattice Attacks on the DGHV Homomorphic Encryption Scheme.00.342015
A New Attack on RSA With a Composed Decryption Exponent00.342014
Cryptanalysis of NTRU with two public keys.00.342014
Implicit factorization of unbalanced RSA moduli.00.342014
An Attack on RSA Using LSBs of Multiples of the Prime Factors.00.342013
Progress in Cryptology - AFRICACRYPT 2013, 6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedings261.032013
A new attack on RSA and CRT-RSA20.392012
Progress in Cryptology - AFRICACRYPT 2011 - 4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings231.332011
A new attack on the KMOVcryptosystem.00.342011
Cryptanalysis of RSA Using the Ratio of the Primes10.362009
Another generalization of Wiener's attack on RSA60.592008
Application of ECM to a Class of RSA keys.10.372006
Cryptanalysis Of Rsa With Constrained Keys10.372006
RSA and a higher degree diophantine equation.20.402006
Algorithms for Finding Good Examples for the abc and Szpiro Conjectures.20.651993