Josef Pieprzyk
#70,179
Most Influential Person Now
Polish cryptographer
Josef Pieprzyk's AcademicInfluence.com Rankings
Josef Pieprzykcomputer-science Degrees
Computer Science
#2854
World Rank
#2986
Historical Rank
Database
#2294
World Rank
#2409
Historical Rank
Download Badge
Computer Science
Why Is Josef Pieprzyk Influential?
(Suggest an Edit or Addition)According to Wikipedia, Josef Pieprzyk is currently a professor at Queensland University of Technology in Brisbane, Australia. He has worked on cryptography, in particular the XSL attack. He collaborated in the invention of the LOKI and LOKI97 block ciphers and the HAVAL cryptographic hash function.
Josef Pieprzyk's Published Works
Published Works
- The Computer Journal (1958) (1263)
- Cryptanalysis of Block Ciphers with Overdefined Systems of Equations (2002) (873)
- Hybrid threshold adaptable quantum secret sharing scheme with reverse Huffman-Fibonacci-tree coding (2016) (407)
- Fundamentals of Computer Security (2003) (274)
- Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings (2008) (232)
- HAVAL - A One-Way Hashing Algorithm with Variable Length of Output (1992) (219)
- Universal Designated-Verifier Signatures (2003) (212)
- Cryptology and Network Security (2012) (197)
- Cryptography - an introduction to computer security (1991) (182)
- LOKI - A Cryptographic Primitive for Authentication and Secrecy Applications (1990) (132)
- Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures (2004) (114)
- Topics in Cryptology - CT-RSA 2010, The Cryptographers' Track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings (2010) (114)
- Rotation-Symmetric Functions and Fast Hashing (1998) (107)
- Towards effective nonlinear cryptosystem design (1988) (103)
- Broadcast anti-jamming systems (1999) (100)
- Fast Hashing and Rotation-Symmetric Functions (1999) (96)
- Improving Resistance to Differential Cryptanalysis and the Redesign of LOKI (1991) (92)
- Cube Attacks and Cube-Attack-Like Cryptanalysis on the Round-Reduced Keccak Sponge Function (2015) (81)
- Reversible and blind database watermarking using difference expansion (2008) (79)
- A New Biocryptosystem-Oriented Security Analysis Framework and Implementation of Multibiometric Cryptosystems Based on Decision Level Fusion (2015) (78)
- Fast and simple high-capacity quantum cryptography with error detection (2017) (76)
- Secret Sharing in Multilevel and Compartmented Groups (1998) (74)
- Rotational Cryptanalysis of Round-Reduced Keccak (2013) (71)
- Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups (2008) (68)
- Efficient One-Time Proxy Signatures (2003) (66)
- Changing Thresholds in the Absence of Secure Channels (1999) (64)
- Database Relation Watermarking Resilient against Secondary Watermarking Attacks (2009) (63)
- How to Construct Pseudorandom Permutations from Single Pseudorandom Functions (1991) (62)
- Distributed Private Matching and Set Operations (2008) (62)
- Lattice-Based Threshold Changeability for Standard Shamir Secret-Sharing Schemes (2004) (61)
- How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature (2007) (59)
- Conference Key Agreement from Secret Sharing (1999) (57)
- Identification of Bad Signatures in Batches (2000) (52)
- An Efficient Scheme of Common Secure Indices for Conjunctive Keyword-Based Retrieval on Encrypted Data (2009) (52)
- Multiparty key agreement protocols (2000) (52)
- Permutation polynomials of the form (xp-x+delta)s+L(x) (2008) (52)
- Multiple-Time Signature Schemes against Adaptive Chosen Message Attacks (2003) (46)
- Conditionally secure secret sharing schemes with disenrollment capability (1994) (46)
- Finding Good Differential Patterns for Attacks on SHA-1 (2005) (46)
- Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward (and Backward) Security (2018) (45)
- Design of Hashing Algorithms (1993) (44)
- Advances in Cryptology — AUSCRYPT '90 (1990) (43)
- Characterising and predicting cyber attacks using the Cyber Attacker Model Profile (CAMP) (2012) (43)
- SAT-based Cryptanalysis of Authenticated Ciphers from the CAESAR Competition (2016) (43)
- Algebraic Attacks on SOBER-t32 and SOBER-t16 without Stuttering (2004) (42)
- Threshold Privacy Preserving Keyword Searches (2008) (42)
- Case-based reasoning for intrusion detection (1996) (41)
- Ideal Threshold Schemes from MDS Codes (2002) (40)
- Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy (2019) (38)
- Cryptanalysis of the convex hull click human identification protocol (2010) (37)
- New constructions of anonymous membership broadcasting schemes (2007) (35)
- On the Provable Security of an Efficient RSA-Based Pseudorandom Generator (2006) (35)
- Attacking the SL2 Hashing Scheme (1994) (34)
- Decomposition Construction for Secret Sharing Schemes with Graph Access Structures in Polynomial Time (2010) (34)
- Parallel authentication and public-key encryption (2003) (34)
- Investigating Cube Attacks on the Authenticated Encryption Stream Cipher ACORN (2016) (32)
- Rotational Cryptanalysis of ARX Revisited (2015) (32)
- A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm (2010) (31)
- Keyed Hash Functions (1995) (31)
- Cryptanalysis of WG-7: a lightweight stream cipher (2012) (31)
- Homogeneous bent functions of degree n in 2n variables do not exist for nge3 (2004) (31)
- An On-Line Secure E-Passport Protocol (2008) (30)
- Lattice-based threshold-changeability for standard CRT secret-sharing schemes (2006) (30)
- Dynamic Threshold Cryptosystems ( A New Scheme in Group Oriented Cryptography ) (1995) (30)
- Theory and Practice of Cryptography Solutions for Secure Information Systems (2013) (29)
- Analysis of simplified variants of SHA-256 (2005) (29)
- Homogeneous bent functions (2000) (28)
- Binary Image Steganographic Techniques Classification Based on Multi-class Steganalysis (2010) (28)
- A Construction for Super Pseudorandom Permutations from A Single Pseudorandom Function (1992) (28)
- Fingerprints for Copyright Software Protection (1999) (27)
- A New Dynamic Accumulator for Batch Updates (2007) (26)
- A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders (2006) (26)
- Common Secure Index for Conjunctive Keyword-Based Retrieval over Encrypted Data (2007) (26)
- Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model (2014) (26)
- Known and Chosen Key Differential Distinguishers for Block Ciphers (2010) (26)
- An Algebraic Analysis of Trivium Ciphers based on the Boolean Satisfiability Problem (2007) (25)
- Introducing the new LOKI97 Block Cipher (1998) (24)
- On the Symmetric Property of Homogeneous Boolean Functions (1999) (24)
- Formal analysis of card-based payment systems in mobile devices (2006) (24)
- On the Security of PAS (Predicate-Based Authentication Service) (2009) (24)
- A Message Authentication Code Based on Latin Squares (1997) (23)
- Sibling Intractable Function Families and Their Applications (Extended Abstract) (1991) (23)
- ICEPOLE: High-speed, Hardware-oriented Authenticated Encryption (2014) (22)
- On the (In)Security of IDEA in Various Hashing Modes (2012) (21)
- Blind Steganalysis: A Countermeasure for Binary Image Steganography (2010) (21)
- A Practical Electronic Voting Protocol Using Threshold Schemes (2008) (21)
- Estimating Hidden Message Length in Binary Image Embedded by Using Boundary Pixels Steganography (2010) (20)
- Non-linearity of Exponent Permutations (1990) (20)
- Cybercrime Attribution: An Eastern European Case Study (2009) (20)
- Threshold MACs (2002) (20)
- Practical Complexity Cube Attacks on Round-Reduced Keccak Sponge Function (2014) (20)
- The resistance of PRESENT-80 against related-key differential attacks (2014) (20)
- On-the-fly web content integrity check boosts users' confidence (2002) (20)
- Finding state collisions in the authenticated encryption stream cipher ACORN (2016) (19)
- Cryptographic Hardware and Embedded Systems – CHES 2016 (2016) (19)
- Cryptanalysis of FORK-256 (2007) (18)
- On Algebraic Immunity and Annihilators (2006) (18)
- On Necessary and Sufficient Conditions for the Construction of Super Pseudorandom Permutations (1991) (18)
- RSA-based fail-stop signature schemes (1999) (18)
- Quantum direct secret sharing with efficient eavesdropping-check and authentication based on distributed fountain codes (2014) (18)
- Cryptanalysis of RC4(n, m) stream cipher (2013) (18)
- Controllable quantum private queries using an entangled Fibonacci-sequence spiral source (2015) (18)
- Repudiation of Cheating and Non-repudiation of Zhang's Proxy Signature Schemes (1999) (18)
- The Sibling Intractable Function Family (SIFF): Notion, Construction and Applications (Special Section on Cryptography and Information Security) (1993) (17)
- Comments on Soviet Encryption Algorithm (1994) (17)
- Differential Path for SHA-1 with complexity O(252) (2009) (17)
- Efficient Fuzzy Matching and Intersection on Private Datasets (2009) (17)
- Crossword Puzzle Attack on NLS (2006) (17)
- Privacy enhanced electronic cheque system (2005) (16)
- Cheating Prevention in Linear Secret Sharing (2002) (16)
- Winning the Phishing War: A Strategy for Australia (2010) (16)
- Formal Security Analysis of Australian E-passport Implementation (2008) (16)
- Converse Results to the Wiener Attack on RSA (2005) (15)
- NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model (2012) (15)
- Security Analysis of Australian and E.U. E-passport Implementation (2008) (15)
- On password-based authenticated key exchange using collisionful hash functions (1996) (15)
- Weaknesses of the FORK-256 compression function (2006) (15)
- Multiple Modular Additions and Crossword Puzzle Attack on NLSv2 (2007) (15)
- Remarks on the multiple assignment secret sharing scheme (1997) (15)
- Continuous authentication for VANET (2020) (14)
- An Efficient Authentication Scheme for Intra-Vehicular Controller Area Network (2020) (14)
- Authenticating Multicast Streams in Lossy Channels Using Threshold Techniques (2001) (14)
- Efficient Disjointness Tests for Private Datasets (2008) (14)
- Preimage attacks on the round-reduced Keccak with the aid of differential cryptanalysis (2013) (14)
- Multi-party computation with conversion of secret sharing (2012) (14)
- An improved coding method of quantum key distribution protocols based on Fibonacci-valued OAM entangled states (2017) (13)
- Protecting Web 2.0 Services from Botnet Exploitations (2010) (13)
- Does Counting Still Count? Revisiting the Security of Counting based User Authentication Protocols against Statistical Attacks (2013) (13)
- High-rate and high-capacity measurement-device-independent quantum key distribution with Fibonacci matrix coding in free space (2018) (13)
- Generalised Cumulative Arrays in Secret Sharing (2006) (13)
- On Secure Multi-party Computation in Black-Box Groups (2007) (13)
- How to prevent cheating in Pinch's scheme (1997) (13)
- Source Code Watermarking Based on Function Dependency Oriented Sequencing (2008) (12)
- Analysis of bilinear pairing-based accumulator for identity escrowing (2008) (12)
- An attack-localizing watermarking scheme for natural language documents (2006) (12)
- On the Linearization of Human Identification Protocols: Attacks Based on Linear Algebra, Coding Theory, and Lattices (2015) (12)
- Constructions of Cheating Immune Secret Sharing (2001) (12)
- Graph Coloring Applied to Secure Computation in Non-Abelian Groups (2012) (12)
- A Fair e-Tendering Protocol (2008) (12)
- Linear Nonequivalence versus Nonlinearity (1992) (12)
- A Critical Look at Cryptographic Hash Function Literature (2008) (12)
- Cheating Prevention in Secret Sharing over GF(pt) (2001) (12)
- Broadcast Authentication in Latency-Critical Applications: On the Efficiency of IEEE 1609.2 (2019) (11)
- Permutation Generators of Alternating Groups (1990) (11)
- Software Watermarking Resilient to Debugging Attacks (2007) (11)
- On Construction of Cumulative Secret Sharing Schemes (1998) (11)
- A Multi-Level View Model for Secure Object-Oriented Databases (1997) (11)
- Lattice-based certificateless public-key encryption in the standard model (2014) (11)
- An efficient quantum blind digital signature scheme (2017) (11)
- Secret sharing in hierarchical groups (1997) (11)
- Forward and Backward Private DSSE for Range Queries (2022) (11)
- Codes Identifying Bad Signature in Batches (2000) (11)
- Security Evaluation of Rakaposhi Stream Cipher (2013) (11)
- An Efficient eAuction Protocol (2007) (10)
- Round-robin-differential-phase-shift quantum key distribution based on wavelength division multiplexing (2015) (10)
- Intrusion Detection: A Survey (1996) (10)
- Authentication strategies in vehicular communications: a taxonomy and framework (2021) (10)
- Ideal Secret Sharing Schemes from Permutations (2006) (9)
- Dynamic (2, 3) threshold quantum secret sharing of secure direct communication (2015) (9)
- On selectable collisionful hash functions (1996) (9)
- Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption (2020) (9)
- Möbius transforms, coincident Boolean functions and non-coincidence property of Boolean functions (2011) (9)
- Investigating Cube Attacks on the Authenticated Encryption Stream Cipher MORUS (2017) (9)
- Cube attacks on round-reduced TinyJAMBU (2022) (9)
- Distinguishing Attack on SOBER-128 with Linear Masking (2006) (9)
- Socio-technological phishing prevention (2011) (8)
- Cheating Prevention in Secret Sharing (2000) (8)
- Shared Generation of Pseudo-Random Functions with Cumulative Maps (2003) (8)
- On Cheating Immune Secret Sharing (2001) (8)
- A large-alphabet three-party quantum key distribution protocol based on orbital and spin angular momenta hybrid entanglement (2018) (8)
- Error propagation property and application in cryptography (1989) (8)
- Malleability attacks on multi-party key agreement protocols (2004) (8)
- Public-Key Cryptosystems (2003) (8)
- Cryptanalysis of LASH (2008) (8)
- High-capacity (2,3) threshold quantum secret sharing based on asymmetric quantum lossy channels (2020) (8)
- Families of threshold schemes (1994) (7)
- On Public-Key Cryptosystems Built using Polynomial Rings (1985) (7)
- A Low-Cost Attack on Branch-Based Software Watermarking Schemes (2006) (7)
- Forward and Backward Private Dynamic Searchable Symmetric Encryption for Conjunctive Queries (2020) (7)
- Linear Distinguishing Attack on NLS (2006) (7)
- Evidential reasoning in network intrusion detection systems (1996) (7)
- Cryptography based on transcendental numbers (1996) (7)
- Improvement of a Dynamic Accumulator at ICICS 07 and Its Application in Multi-user Keyword-Based Retrieval on Encrypted Data (2008) (7)
- Construction of cubic homogeneous boolean bent functions (2000) (6)
- Cryptanalysis of the LAKE Hash Family (2009) (6)
- Key Establishment Protocols (2003) (6)
- Large-Capacity Three-Party Quantum Digital Secret Sharing Using Three Particular Matrices Coding (2016) (6)
- Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward/Backward Privacy (2019) (6)
- P2DPI: Practical and Privacy-Preserving Deep Packet Inspection (2021) (6)
- Reversible and Semi-Blind Relational Database Watermarking (2017) (6)
- Secure Computation of the Vector Dominance Problem (2008) (6)
- Lattice-Based Completely Non-malleable PKE in the Standard Model (Poster) (2011) (6)
- Unconditionally secure disjointness tests for private datasets (2009) (6)
- A differential fault attack on the WG family of stream ciphers (2020) (6)
- On alternative approach for verifiable secret sharing (2002) (6)
- Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures (2007) (6)
- A Case Study of User-Level Spam Filtering (2014) (6)
- A survey: Error control methods used in bio-cryptography (2014) (6)
- An Improved Distinguisher for Dragon (2008) (6)
- Active Security in Multiparty Computation over Black-Box Groups (2012) (6)
- Parallel authenticated encryption with the duplex construction (2013) (6)
- A General Purpose Technique for Locating Key Scheduling Weakness in DES-like Cryptosystems (Extended Abstract) (1991) (6)
- Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128 (2014) (6)
- Compcrypt–Lightweight ANS-Based Compression and Encryption (2021) (6)
- Extensions of the Cube Attack Based on Low Degree Annihilators (2009) (5)
- Can We CAN the Email Spam (2013) (5)
- A Model of Authorization for Object-Oriented Databases based on Object Views (1995) (5)
- Dual compressible hybrid quantum secret sharing schemes based on extended unitary operations (2014) (5)
- Advances in cryptology, ASIACRYPT '94 : 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28-December 1, 1994 : proceedings (1995) (5)
- Security analysis of linearly filtered NLFSRs (2013) (5)
- Extending FORK-256 Attack to the Full Hash Function (2007) (5)
- Authentication of Concast Communication (2002) (5)
- Information Security and Privacy, 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings (2007) (5)
- Cryptosystems for hierarchical groups (1996) (5)
- Democratic Systems (2001) (5)
- On the Hardness of the Sum of k Mins Problem (2011) (5)
- A Model to Evaluate Reliability of Authentication Protocols in C-ITS Safety-Critical Applications (2021) (5)
- Multi-Party Computation with Omnipresent Adversary (2009) (5)
- Fail-Stop Threshold Signature Schemes Based on Elliptic Curves (1999) (5)
- Information Security and Privacy, Proceedings of 12th Australasian Conference, ACISP 2007, (2007) (5)
- Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption (2006) (5)
- Novel quantum key distribution with shift operations based on Fibonacci and Lucas valued orbital angular momentum entangled states (2020) (5)
- On the Weakness of Gong's Collisionful Hash Functions (1997) (5)
- Optima Perfect Randomizers (1991) (4)
- Proceedings of the Second International Workshop on Information Security (1997) (4)
- Critical analysis of spam prevention techniques (2011) (4)
- Lattice-based completely non-malleable public-key encryption in the standard model (2014) (4)
- Nonlinear secret sharing immune against cheating (2001) (4)
- Copyright Protection of Object-Oriented Software (2001) (4)
- Transformer-Based Language Models for Software Vulnerability Detection (2022) (4)
- ALI: Anonymous Lightweight Inter-Vehicle Broadcast Authentication with Encryption (2022) (4)
- Cryptology and Network Security — CANS 2012 (2012) (4)
- Collisions for two branches of FORK-256 (2006) (4)
- Applications of Key Recovery Cube-attack-like (2015) (4)
- A Quantum Secret Sharing Scheme Using Orbital Angular Momentum onto Multiple Spin States Based on Fibonacci Compression Encoding (2018) (4)
- Disenrollment Capability of Conditionally Secure Secret Sharing Schemes (1994) (4)
- Random Differential Fault Attacks on the Lightweight Authenticated Encryption Stream Cipher Grain-128AEAD (2021) (4)
- Authentication of transit flows and k-siblings one-time signature (2002) (4)
- MöBIUS-α commutative functions and partially coincident functions (2008) (4)
- Cryptanalysis of WG-8 and WG-16 stream ciphers (2019) (3)
- A coding approach to the multicast stream authentication problem (2008) (3)
- A strong lightweight authentication protocol for low-cost RFID systems (2014) (3)
- A Model of Content-based Authorization in Object-Oriented Databases based on Object Views (1995) (3)
- A Combinatorial Approach to Anonymous Membership Broadcast (2002) (3)
- On the Efficiency of Pairing-Based Authentication for Connected Vehicles: Time is Not on Our Side! (2021) (3)
- Identifying Steganographic Payload Location in Binary Image (2010) (3)
- A Cryptographic Solution to Discretionary Access Control in Structurally Object-Oriented Databases (1995) (3)
- Two types of dynamic quantum state secret sharing based on tensor networks states (2021) (3)
- Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology (2008) (3)
- Randomized Authentication Systems (1991) (3)
- A Construction for One Way Hash Functions and Pseudorandom Bit Generators (1991) (3)
- An Ideal and Robust Threshold RSA (2006) (3)
- A hybrid quantum key distribution protocol based on extended unitary operations and fountain codes (2015) (3)
- Cryptanalysis of RC4-Based Hash Function (2012) (2)
- Characterisations of Ideal Threshold Schemes (2004) (2)
- Perfect Authenticity and Optimal A-codes (1994) (2)
- Physical publicly verifiable randomness from pulsars (2022) (2)
- S-boxes representation and efficiency of algebraic attack (2019) (2)
- Secure Coprocessor-based Private Information Retrieval without Periodical Preprocessing (2010) (2)
- Computer Intrusion Detection and Incomplete Information (1996) (2)
- Cheating Prevention in Secret Sharing over ... (2001) (2)
- Cheating Immune Se ret Sharing (2001) (2)
- A generalised testbed for analysing block and stream ciphers (1991) (2)
- The management of citizen identity in electronic government (2007) (2)
- Multimedia copyright protection (2001) (2)
- Parallel Signcryption (2010) (2)
- Dynamic and compressed quantum many-body state secret sharing based on site-independent matrix product states (2022) (2)
- Multisecret Sharing Immune Against Cheating (2002) (2)
- High-capacity quantum key distribution using Chebyshev-map values corresponding to Lucas numbers coding (2016) (2)
- Lattice-Based Threshold Changeability for Standard (2007) (2)
- Lattice Blind Signatures with Forward Security (2020) (2)
- Foxtail+: A Learning with Errors-based Authentication Protocol for Resource-Constrained Devices (2020) (2)
- Truncated Differential Analysis of Reduced-Round LBlock (2013) (2)
- The eight variable homogeneous degree three bent functions (2008) (2)
- Crypto Topics and Applications II (1999) (2)
- New security notions and relations for public-key encryption (2012) (2)
- Algebraic Attack Efficiency versus S-box Representation (2017) (2)
- An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels (2007) (2)
- Trapdoor Delegation and HIBE from Middle-Product LWE in Standard Model (2020) (2)
- Analysis of weighted quantum secret sharing based on matrix product states (2020) (2)
- Analysing recursive preprocessing of BKZ lattice reduction algorithm (2016) (2)
- How to Construct A Family of Strong One Way Permutations (1991) (2)
- JPEG Image Steganalysis Improvement Via Image-to-Image Variation Minimization (2008) (1)
- A sound structure (1993) (1)
- Advances in security research in the Asiacrypt region (2020) (1)
- Breaking NLM-MAC Generator (2013) (1)
- Probabilistic Analysis of Elementary Randimizers (1991) (1)
- State recovery attacks against π-cipher (2016) (1)
- A dynamic Web agent for verifying the security and integrity of a Web site's contents (2001) (1)
- (Chosen-multi-target) preimage attacks on reduced Grøstl-0 (2012) (1)
- Robust Numeric Set Watermarking: Numbers Don't Lie (2009) (1)
- SIN'09 - Proceedings of the Second International Conference on Security of Information and Networks: Preface (2009) (1)
- Robust and Reversible Numerical Set Watermarking (2009) (1)
- A Cryptographic Mechanism for Object-Instance-Based Authorization in Object-Oriented Database Systems (1995) (1)
- Modeling a multi-level secure object-oriented database using views (1996) (1)
- An improved quantum network communication model based on compressed tensor network states (2022) (1)
- Linear Secret Sharing with Divisible Shares (1999) (1)
- Efficient quantum private queries based on quantum key distribution with pulse-position modulation (2019) (1)
- Algebraical Structures of Cryptographic Transformations (1985) (1)
- Methods of attack on hash functions (1993) (1)
- Algebraic Attacks on Human Identification Protocols (2014) (1)
- Pseudorandom Bit Generators (1991) (1)
- Verfiable Secret Sharing and Time Capsules (1999) (1)
- Introducing the new LOKI 97 Block Cipher (1998) (1)
- Ideal Threshold Schemes from Orthogonal Arrays (2002) (1)
- Using Cryptographic Hash Functions for Discretionary Access Control in Object-Oriented Databases (1997) (1)
- Provable Security, Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings (2009) (1)
- Securing Multicast Groups in Ad Hoc Networks (2004) (1)
- ANS-based compression and encryption with 128-bit security (2022) (1)
- The Topographic Signature (TopoSign) Protocol (2020) (1)
- Features-Pooling Blind JPEG Image Steganalysis (2008) (1)
- Lattice-based certificateless public-key encryption in the standard model (2013) (0)
- Pseudorandom Bit Generation with Asymmetric Numeral Systems (2022) (0)
- Taxonomy and control measures of SPAM and SPIM (2012) (0)
- Dynamic hierarchical quantum secret sharing based on the multiscale entanglement renormalization ansatz (2022) (0)
- Proceedings of the Second Australasian Conference on Information Security and Privacy (1997) (0)
- Information security : third international workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000 : proceedings (2000) (0)
- Quantum-key-expansion protocol based on number-state-entanglement-preserving tensor network with compression (2022) (0)
- Proceedings of the International Conference on Cryptology and Network Security [Lecture Notes in Computer Science, Volume 7712] (2012) (0)
- Multi-party computation with conversion of secret sharing (2011) (0)
- Welcome message: CTC 2012 (2013) (0)
- Digital Immunity Module: Preventing Unwanted Encryption using Source Coding (2022) (0)
- Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004, Proceedings (Lecture Notes in Computer Science) (2004) (0)
- The Security of “2FLIP” Authentication Scheme for VANETs: Attacks and Rectifications (2023) (0)
- An efficient quantum blind digital signature scheme (2017) (0)
- Evolution of cryptographic hashing (2010) (0)
- Special issue on trust and security in wireless sensor networks (2015) (0)
- Information Security and Privacy: 22nd Australasian Conference, ACISP 2017, Proceedings, Part I (Lecture Notes in Computer Science, Volume 10342) (2017) (0)
- Preprocessing optimisation: revisiting recursive-BKZ lattice reduction algorithm (2018) (0)
- Proceedings of the Australasian Information Security Conference (AISC 2012): Proceedings of the Australasian Information Security Conference (AISC 2012) (2012) (0)
- Information Security and Privacy - 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part I (2017) (0)
- Optimizing preprocessing method of recursive-BKZ lattice reduction algorithm (2015) (0)
- Predicting tours and probabilistic simulation for BKZ lattice reduction algorithm (2014) (0)
- Signcryption schemes with insider security in an ideal permutation model (2019) (0)
- Authentication strategies in vehicular communications: a taxonomy and framework (2021) (0)
- The resistance of PRESENT-80 against related-key differential attacks (2013) (0)
- Relationships between boolean functions and symmetric groups (2000) (0)
- A large-alphabet three-party quantum key distribution protocol based on orbital and spin angular momenta hybrid entanglement (2018) (0)
- Proceedings of the 2010 international conference on Topics in Cryptology (2010) (0)
- An Efficient Protocol for eAuction (2010) (0)
- Tunable multi-party high-capacity quantum key distribution based on m-generalized Fibonacci sequences using golden coding (2018) (0)
- Quantum direct secret sharing with efficient eavesdropping-check and authentication based on distributed fountain codes (2013) (0)
- Bucket attack on numeric set watermarking model and safeguards (2011) (0)
- Practical attack on NLM-MAC scheme (2014) (0)
- Cryptography: General (2016) (0)
- An efficient eAuction potocol (2007) (0)
- Editorship : Networking science (2013) (0)
- Certified Pseudonyms Colligated with Master Secret Key (2009) (0)
- An Equivalent expression of Rijndael algorithm (2003) (0)
- Macquarie University, Sydney Overview of Micropayment Technology Final Project Report (2009) (0)
- Number-Theoretic Methods in Cryptology (2017) (0)
- Josef Pieprzyk, David Pointcheval (2003) (0)
- Group-Oriented Cryptography (2003) (0)
- Spatial Encryption Revisited: From Delegatable Multiple Inner Product Encryption and More (2022) (0)
- High-capacity quantum key distribution using Chebyshev-map values corresponding to Lucas numbers coding (2016) (0)
- An efficient protocol for e-auction (2010) (0)
- Research Online Research Online Multiparty key agreement protocols Multiparty key agreement protocols (2020) (0)
- A subexponential construction of graph coloring for multiparty computation (2014) (0)
- A SURVEY OF EASTERN EUROPEAN ORGANISED CRIME & CYBERCRIME A SHORT HISTORY OF EASTERN EUROPEAN ORGANISED CRIME (2010) (0)
- A Secure Approach of User Authentication Using Multibiometric Cryptosystem : A Review (2016) (0)
- AISC '11 Proceedings of the Ninth Australasian Information Security Conference (2011) (0)
- Advances in Cryptology - AUSCRYPT '90, International Conference on Cryptology, Sydney, Australia, January 8-11, 1990, Proceedings (1990) (0)
- Tunable multi-party high-capacity quantum key distribution based on m-generalized Fibonacci sequences using golden coding (2018) (0)
- Shared generation of pseudo-random functions (2004) (0)
- Cryptanalysis of WG-7: a lightweight stream cipher (2012) (0)
- A Single Pseudorandom Function (1993) (0)
- Combinatorial Design of Secure Lightweight Data Dispersal Schemes (Work in Progress) (2016) (0)
- Database Protection and Security (2003) (0)
- A differential fault attack on the WG family of stream ciphers (2020) (0)
- Lattice-based completely non-malleable public-key encryption in the standard model (2012) (0)
- CLAE : a Lightweight AEAD Scheme of Resisting Side Channel Attacks (2019) (0)
- Overview of hash functions (1993) (0)
- Codes Identifying Bad Signatures in Bat hesJaros (2006) (0)
- Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128 (cid:2) (2014) (0)
- Information Security and Privacy: Second Australasian Conference, ACISP '97, Sydney, NSW, Australia, July 7-9, 1997 Proceedings (1997) (0)
- Special Issue on the Design and Engineering of Cryptographic Solutions for Secure Information Systems (2012) (0)
- Characterisations of Extended Resiliency and Extended Immunity of S-Boxes (2005) (0)
- Proceedings of the 4th Australasian Conference on Information Security and Privacy (1999) (0)
- Electronic Elections and Digital Money (2003) (0)
- Program chairs' welcome (2011) (0)
- Efficient quantum key distribution using Fibonacci-number coding with a biased basis choice (2018) (0)
- Construction of super-pseudorandom permutations (1993) (0)
- Cryptanalysis of the convex hull click human identification protocol (2012) (0)
- Preface of CTC'09: The international workshop on cybercrime and trustworthy computing (CTC-2009) (2009) (0)
- Zero-Knowledge Proof Systems (2003) (0)
- Crypto Topics and Applications I (1999) (0)
- Session details: CS.1: cryptography, security and networks (2010) (0)
- High-rate and high-capacity measurement-device-independent quantum key distribution with Fibonacci matrix coding in free space (2018) (0)
- Advances in Cryptology - ASIACRYPT 2008: 14th International Conference on the Theory and Application of Cryptology and Information Security Proceedings [Lecture Notes in Computer Science, Volume 5350] (2008) (0)
- Privacy Enhancements for Hardware-Based Security Modules (2009) (0)
- Information Security and Privacy : Proceedings of the 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. (2004) (0)
- A Flexible Threshold Cryptosystem 1 (1996) (0)
- Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model (2014) (0)
- A Generalised Testbed for Analysing Blockand Stream (1991) (0)
- A hybrid quantum key distribution protocol based on extended unitary operations and fountain codes (2014) (0)
- Proceedings of the 3rd International Conference on Provable Security (2009) (0)
- Information security and privacy : First Australasian Conference, ACISP '96, Wollongong, NSW, Australia, June 24-26, 1996 : proceedings (1996) (0)
- Evaluating the performance of the practical lattice reduction algorithms (2014) (0)
- The Compression Optimality of Asymmetric Numeral Systems (2022) (0)
- Cryptanalysis of WG-8 and WG-16 stream ciphers (2018) (0)
- Proceedings of the international conference on cryptology on Advances in cryptology (1990) (0)
- Information security and privacy : 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004 : proceedings (2004) (0)
- Proceedings of the 12th Australasian conference on Information security and privacy (2007) (0)
- Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009 (2009) (0)
- A Modification to the 'Authentication of Concast Communication' (2004) (0)
- Proceedings of the First Australasian Conference on Information Security and Privacy (1996) (0)
- Information Security and Privacy: 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings (1999) (0)
- Cryptography Cryptography: General (2017) (0)
- 41 CRYPTO TOPICS AND APPLICATIONS (2006) (0)
- Introduction to the special issue on Next Generation Network Architectures, Protocols, Theory, Systems and Applications (2013) (0)
- Proceedings of the 4th International Conference on the Theory and Applications of Cryptology: Advances in Cryptology (1994) (0)
- Welcome message from the CTC Steering Committee (2013) (0)
- High-capacity (2,3) threshold quantum secret sharing based on asymmetric quantum lossy channels (2020) (0)
- Editorship : Proceedings of the Australasian Information Security Conference (AISC 2012) (2012) (0)
- Private-Key Cryptosystems (2003) (0)
This paper list is powered by the following services:
Other Resources About Josef Pieprzyk
What Schools Are Affiliated With Josef Pieprzyk?
Josef Pieprzyk is affiliated with the following schools: