New attacks on the RSA cryptosystem A Nitaj, MRK Ariffin, DI Nassr, HM Bahig Progress in Cryptology–AFRICACRYPT 2014: 7th International Conference on …, 2014 | 44 | 2014 |
Cryptanalysis of multi-prime RSA with small prime difference HM Bahig, A Bhery, DI Nassr Information and Communications Security: 14th International Conference …, 2012 | 22 | 2012 |
Improved generation of minimal addition chains HM Bahig Computing 78, 161-172, 2006 | 22 | 2006 |
A new RSA vulnerability using continued fractions DI Nassr, HM Bahig, A Bhery, SS Daoud 2008 IEEE/ACS International Conference on Computer Systems and Applications …, 2008 | 18 | 2008 |
DNA-based AES with silent mutations HM Bahig, DI Nassr Arabian Journal for Science and Engineering 44 (4), 3389-3403, 2019 | 17 | 2019 |
Performance analysis of fermat factorization algorithms HM Bahig, MA Mahdi, KA Alutaibi, A AlGhadhban, HM Bahig International Journal of Advanced Computer Science and Applications 11 (12), 2020 | 12 | 2020 |
Some properties of nonstar steps in addition chains and new cases where the Scholz conjecture is true HM Bahig, K Nakamula Journal of Algorithms 42 (2), 304-316, 2002 | 12 | 2002 |
Star reduction among minimal length addition chains HM Bahig Computing 91 (4), 335-352, 2011 | 11 | 2011 |
On a generalization of addition chains: Addition–multiplication chains HM Bahig Discrete mathematics 308 (4), 611-616, 2008 | 11 | 2008 |
Interactive visualization system for DES MS Asseisah, HM Bahig, SS Daoud International Conference on Active Media Technology, 18-25, 2010 | 10 | 2010 |
A unified method for private exponent attacks on RSA using lattices HM Bahig, DI Nassr, A Bhery, A Nitaj International Journal of Foundations of Computer Science 31 (02), 207-231, 2020 | 9 | 2020 |
A new strategy for generating shortest addition sequences HM Bahig, HM Bahig Computing 91, 285-306, 2011 | 9 | 2011 |
Fermat factorization using a multi-core system HM Bahig, HM Bahig, Y Kotb International Journal of Advanced Computer Science and Applications 11 (4), 2020 | 6 | 2020 |
Factoring RSA modulus with primes not necessarily sharing least significant bits HM Bahig, DI Nassr, A Bhery Appl. Math. Inform. Sci 11, 243-249, 2017 | 6 | 2017 |
Small private exponent attacks on RSA using continued fractions and multicore systems HM Bahig, DI Nassr, MA Mahdi, HM Bahig Symmetry 14 (9), 1897, 2022 | 5 | 2022 |
Fast and scalable algorithm for product large data on multicore system HM Bahig, HM Bahig, KA Fathy Concurrency and Computation: Practice and Experience 33 (2), e5259, 2021 | 5 | 2021 |
Visualizing secure hash algorithm (SHA-1) on the web DB Nasr, HM Bahig, SS Daoud Active Media Technology: 7th International Conference, AMT 2011, Lanzhou …, 2011 | 5 | 2011 |
Cryptanalysis of NTRU where the private polynomial has one or more consecutive zero coefficients HM Bahig, AM Bhery, DI Nassr Journal of Discrete Mathematical Sciences and Cryptography 23 (8), 1493-1513, 2020 | 4 | 2020 |
Improving BDD enumeration for LWE problem using GPU MS Esseissah, A Bhery, HM Bahig IEEE Access 8, 19737-19749, 2019 | 4 | 2019 |
A fast GPU-based hybrid algorithm for addition chains HM Bahig, KA AbdElbari Cluster Computing 21 (4), 2001-2011, 2018 | 4 | 2018 |