Follow
Abderrahmane Nitaj
Abderrahmane Nitaj
Unknown affiliation
Verified email at unicaen.fr
Title
Cited by
Cited by
Year
How to date blind signatures
M Abe, E Fujisaki
International Conference on the Theory and Application of Cryptology and …, 1996
5341996
Fabrication and characterization of 3C‐SiC‐based MOSFETs
A Schöner, M Krieger, G Pensl, M Abe, H Nagasawa
Chemical Vapor Deposition 12 (8‐9), 523-530, 2006
1402006
Isolation, characterization, and disruption of dnr1, the areA/nit-2-like nitrogen regulatory gene of the zoophilic dermatophyte, Microsporum canis
T Yamada, K Makimura, S Abe
Medical Mycology 44 (3), 243-252, 2006
472006
Another generalization of Wiener’s attack on RSA
A Nitaj
International Conference on Cryptology in Africa, 174-190, 2008
462008
New attacks on the RSA cryptosystem
A Nitaj, MRK Ariffin, DI Nassr, HM Bahig
Progress in Cryptology–AFRICACRYPT 2014: 7th International Conference on …, 2014
452014
The TactaPack: A wireless sensor/actuator package for physical therapy applications
RW Lindeman, Y Yanagida, K Hosaka, S Abe
2006 14th Symposium on Haptic Interfaces for Virtual Environment and …, 2006
452006
Agrobacterium tumefaciens-mediated transformation of the dermatophyte, Trichophyton mentagrophytes: an efficient tool for gene transfer
T Yamada, K Makimura, K Satoh, Y Umeda, Y Ishihara, S Abe
Sabouraudia 47 (5), 485-494, 2009
402009
Diophantine and lattice cryptanalysis of the RSA cryptosystem
A Nitaj
Artificial Intelligence, Evolutionary Computing and Metaheuristics: In the …, 2013
342013
La conjecture abc
A Nitaj
ENSEIGNEMENT MATHEMATIQUE 42, 3-24, 1996
321996
Bitcoin security with post quantum cryptography
MC Semmouni, A Nitaj, M Belkasmi
Networked Systems: 7th International Conference, NETYS 2019, Marrakech …, 2019
312019
Enhanced gene replacements in Ku80 disruption mutants of the dermatophyte, Trichophyton mentagrophytes
T Yamada, K Makimura, T Hisajima, Y Ishihara, Y Umeda, S Abe
FEMS microbiology letters 298 (2), 208-217, 2009
312009
A generalized attack on RSA type cryptosystems
M Bunder, A Nitaj, W Susilo, J Tonien
Theoretical Computer Science 704, 74-81, 2017
302017
The abc conjecture home page
A Nitaj
Link, 2007
272007
L’algorithme de Cornacchia
A Nitaj
Exposition. Math 13 (4), 358-365, 1995
261995
A new attack on three variants of the RSA cryptosystem
M Bunder, A Nitaj, W Susilo, J Tonien
Australasian Conference on Information Security and Privacy, 258-268, 2016
232016
A new attack on RSA and Demytko’s elliptic curve cryptosystem
A Nitaj, E Fouotsa
Journal of Discrete Mathematical Sciences and Cryptography 22 (3), 391-409, 2019
222019
A new improved AES S-box with enhanced properties
A Nitaj, W Susilo, J Tonien
Information Security and Privacy: 25th Australasian Conference, ACISP 2020 …, 2020
192020
A new public key cryptosystem based on Edwards curves
M Boudabra, A Nitaj
Journal of Applied Mathematics and Computing 61, 431-450, 2019
182019
Cryptanalysis of RSA-type cryptosystems based on Lucas sequences, Gaussian integers and elliptic curves
M Bunder, A Nitaj, W Susilo, J Tonien
Journal of information security and applications 40, 193-198, 2018
182018
On a Conjecture of Erdös on 3‐Powerful Numbers
A Nitaj
Bulletin of the London Mathematical Society 27 (4), 317-318, 1995
181995
The system can't perform the operation now. Try again later.
Articles 1–20