How to date blind signatures M Abe, E Fujisaki International Conference on the Theory and Application of Cryptology and …, 1996 | 539 | 1996 |
Fabrication and characterization of 3C‐SiC‐based MOSFETs A Schöner, M Krieger, G Pensl, M Abe, H Nagasawa Chemical Vapor Deposition 12 (8‐9), 523-530, 2006 | 145 | 2006 |
Another generalization of Wiener’s attack on RSA A Nitaj International Conference on Cryptology in Africa, 174-190, 2008 | 57 | 2008 |
New attacks on the RSA cryptosystem A Nitaj, MRK Ariffin, DI Nassr, HM Bahig Progress in Cryptology–AFRICACRYPT 2014: 7th International Conference on …, 2014 | 53 | 2014 |
Agrobacterium tumefaciens-mediated transformation of the dermatophyte, Trichophyton mentagrophytes: an efficient tool for gene transfer T Yamada, K Makimura, K Satoh, Y Umeda, Y Ishihara, S Abe Sabouraudia 47 (5), 485-494, 2009 | 49 | 2009 |
Isolation, characterization, and disruption of dnr1, the areA/nit-2-like nitrogen regulatory gene of the zoophilic dermatophyte, Microsporum canis T Yamada, K Makimura, S Abe Medical Mycology 44 (3), 243-252, 2006 | 48 | 2006 |
The TactaPack: A wireless sensor/actuator package for physical therapy applications RW Lindeman, Y Yanagida, K Hosaka, S Abe 2006 14th Symposium on Haptic Interfaces for Virtual Environment and …, 2006 | 48 | 2006 |
A generalized attack on RSA type cryptosystems M Bunder, A Nitaj, W Susilo, J Tonien Theoretical Computer Science 704, 74-81, 2017 | 38 | 2017 |
Diophantine and lattice cryptanalysis of the RSA cryptosystem A Nitaj Artificial Intelligence, Evolutionary Computing and Metaheuristics: In the …, 2013 | 37 | 2013 |
Enhanced gene replacements in Ku80 disruption mutants of the dermatophyte, Trichophyton mentagrophytes T Yamada, K Makimura, T Hisajima, Y Ishihara, Y Umeda, S Abe FEMS microbiology letters 298 (2), 208-217, 2009 | 36 | 2009 |
Bitcoin security with post quantum cryptography MC Semmouni, A Nitaj, M Belkasmi Networked Systems: 7th International Conference, NETYS 2019, Marrakech …, 2019 | 35 | 2019 |
La conjecture abc A Nitaj ENSEIGNEMENT MATHEMATIQUE 42, 3-24, 1996 | 32 | 1996 |
A new attack on three variants of the RSA cryptosystem M Bunder, A Nitaj, W Susilo, J Tonien Australasian Conference on Information Security and Privacy, 258-268, 2016 | 29 | 2016 |
The abc conjecture home page A Nitaj Link, 2007 | 28 | 2007 |
L’algorithme de Cornacchia A Nitaj Exposition. Math 13 (4), 358-365, 1995 | 27 | 1995 |
A new improved AES S-box with enhanced properties A Nitaj, W Susilo, J Tonien Information Security and Privacy: 25th Australasian Conference, ACISP 2020 …, 2020 | 26 | 2020 |
A new attack on RSA and Demytko’s elliptic curve cryptosystem A Nitaj, E Fouotsa Journal of Discrete Mathematical Sciences and Cryptography 22 (3), 391-409, 2019 | 22 | 2019 |
Cryptanalysis of RSA-type cryptosystems based on Lucas sequences, Gaussian integers and elliptic curves M Bunder, A Nitaj, W Susilo, J Tonien Journal of information security and applications 40, 193-198, 2018 | 22 | 2018 |
On a Conjecture of Erdös on 3‐Powerful Numbers A Nitaj Bulletin of the London Mathematical Society 27 (4), 317-318, 1995 | 22 | 1995 |
A new public key cryptosystem based on Edwards curves M Boudabra, A Nitaj Journal of Applied Mathematics and Computing 61, 431-450, 2019 | 20 | 2019 |