Josef Pieprzyk

Orcid: 0000-0002-1917-6466

Affiliations:
  • Macquarie University, Sydney, Australia


According to our database1, Josef Pieprzyk authored at least 274 papers between 1984 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Pervasive User Data Collection from Cyberspace: Privacy Concerns and Countermeasures.
Cryptogr., March, 2024

A Provably Secure and Efficient Cryptographic-Key Update Protocol for Connected Vehicles.
IEEE Trans. Dependable Secur. Comput., 2024

Shared file protection against unauthorised encryption using a Buffer-Based Signature Verification Method.
J. Inf. Secur. Appl., 2024

From 5G to 6G: A Survey on Security, Privacy, and Standardization Pathways.
CoRR, 2024

File System Shield (FSS): A Pass-Through Strategy Against Unwanted Encryption in Network File Systems.
Proceedings of the Advances in Information and Computer Security, 2024

Improved Multimodal Private Signatures from Lattices.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024

2023
Differential fault attacks on the lightweight authenticated encryption algorithm CLX-128.
J. Cryptogr. Eng., September, 2023

Novel entanglement compression for QKD protocols using isometric tensors.
Sci. China Inf. Sci., August, 2023

The Compression Optimality of Asymmetric Numeral Systems.
Entropy, April, 2023

ALI: Anonymous Lightweight Inter-Vehicle Broadcast Authentication With Encryption.
IEEE Trans. Dependable Secur. Comput., 2023

Resource-saving quantum key distribution based on three-photon matrix product states.
Quantum Inf. Process., 2023

Classical to Post-Quantum Secure ABE-IBE Proxy Re-Encryption Scheme.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

2022
Forward and Backward Private DSSE for Range Queries.
IEEE Trans. Dependable Secur. Comput., 2022

An improved quantum network communication model based on compressed tensor network states.
Quantum Inf. Process., 2022

Dynamic and compressed quantum many-body state secret sharing based on site-independent matrix product states.
Quantum Inf. Process., 2022

Pseudorandom Bit Generation with Asymmetric Numeral Systems.
IACR Cryptol. ePrint Arch., 2022

Spatial Encryption Revisited: From Delegatable Multiple Inner Product Encryption and More.
IACR Cryptol. ePrint Arch., 2022

Transformer-Based Language Models for Software Vulnerability Detection: Performance, Model's Security and Platforms.
CoRR, 2022

Physical publicly verifiable randomness from pulsars.
Astron. Comput., 2022

Transformer-Based Language Models for Software Vulnerability Detection.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
A Model to Evaluate Reliability of Authentication Protocols in C-ITS Safety-Critical Applications.
IEEE Trans. Veh. Technol., 2021

Compcrypt-Lightweight ANS-Based Compression and Encryption.
IEEE Trans. Inf. Forensics Secur., 2021

On the Efficiency of Pairing-Based Authentication for Connected Vehicles: Time is Not on Our Side!
IEEE Trans. Inf. Forensics Secur., 2021

Cube Attacks on Round-Reduced TinyJAMBU.
IACR Cryptol. ePrint Arch., 2021

P2DPI: Practical and Privacy-Preserving Deep Packet Inspection.
IACR Cryptol. ePrint Arch., 2021

ANS-based Compression and Encryption with 128-bit Security.
IACR Cryptol. ePrint Arch., 2021

Authentication strategies in vehicular communications: a taxonomy and framework.
EURASIP J. Wirel. Commun. Netw., 2021

Random Differential Fault Attacks on the Lightweight Authenticated Encryption Stream Cipher Grain-128AEAD.
IEEE Access, 2021

2020
Continuous authentication for VANET.
Veh. Commun., 2020

An Efficient Authentication Scheme for Intra-Vehicular Controller Area Network.
IEEE Trans. Inf. Forensics Secur., 2020

Analysis of weighted quantum secret sharing based on matrix product states.
Quantum Inf. Process., 2020

High-capacity (2, 3) threshold quantum secret sharing based on asymmetric quantum lossy channels.
Quantum Inf. Process., 2020

A differential fault attack on the WG family of stream ciphers.
J. Cryptogr. Eng., 2020

Forward and Backward Private Dynamic Searchable Symmetric Encryption for Conjunctive Queries.
IACR Cryptol. ePrint Arch., 2020

Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2020

Foxtail+: A Learning with Errors-based Authentication Protocol for Resource-Constrained Devices.
IACR Cryptol. ePrint Arch., 2020

The Topographic Signature (TopoSign) Protocol.
IACR Cryptol. ePrint Arch., 2020

Advances in security research in the Asiacrypt region.
Commun. ACM, 2020

Trapdoor Delegation and HIBE from Middle-Product LWE in Standard Model.
Proceedings of the Applied Cryptography and Network Security, 2020

Lattice Blind Signatures with Forward Security.
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020

2019
Broadcast Authentication in Latency-Critical Applications: On the Efficiency of IEEE 1609.2.
IEEE Trans. Veh. Technol., 2019

Signcryption schemes with insider security in an ideal permutation model.
J. Math. Cryptol., 2019

S-boxes representation and efficiency of algebraic attack.
IET Inf. Secur., 2019

Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy.
IACR Cryptol. ePrint Arch., 2019

Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward/Backward Privacy.
CoRR, 2019

Cryptanalysis of WG-8 and WG-16 stream ciphers.
Cryptogr. Commun., 2019

2018
A large-alphabet three-party quantum key distribution protocol based on orbital and spin angular momenta hybrid entanglement.
Quantum Inf. Process., 2018

Tunable multi-party high-capacity quantum key distribution based on <i>m</i>-generalized Fibonacci sequences using golden coding.
Quantum Inf. Process., 2018

Efficient quantum key distribution using Fibonacci-number coding with a biased basis choice.
Inf. Process. Lett., 2018

Preprocessing optimisation: revisiting recursive-BKZ lattice reduction algorithm.
IET Inf. Secur., 2018

High-rate and high-capacity measurement-device-independent quantum key distribution with Fibonacci matrix coding in free space.
Sci. China Inf. Sci., 2018

Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward (and Backward) Security.
Proceedings of the Computer Security, 2018

2017
Analysing recursive preprocessing of BKZ lattice reduction algorithm.
IET Inf. Secur., 2017

Algebraic Attack Efficiency versus S-box Representation.
IACR Cryptol. ePrint Arch., 2017

An efficient quantum blind digital signature scheme.
Sci. China Inf. Sci., 2017

Investigating Cube Attacks on the Authenticated Encryption Stream Cipher MORUS.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

2016
High-capacity quantum key distribution using Chebyshev-map values corresponding to Lucas numbers coding.
Quantum Inf. Process., 2016

Investigating Cube Attacks on the Authenticated Encryption Stream Cipher ACORN.
IACR Cryptol. ePrint Arch., 2016

SAT-based Cryptanalysis of Authenticated Ciphers from the CAESAR Competition.
IACR Cryptol. ePrint Arch., 2016

State recovery attacks against π-cipher.
Proceedings of the Australasian Computer Science Week Multiconference, 2016

2015
A New Biocryptosystem-Oriented Security Analysis Framework and Implementation of Multibiometric Cryptosystems Based on Decision Level Fusion.
IEEE Trans. Inf. Forensics Secur., 2015

On the Linearization of Human Identification Protocols: Attacks Based on Linear Algebra, Coding Theory, and Lattices.
IEEE Trans. Inf. Forensics Secur., 2015

A hybrid quantum key distribution protocol based on extended unitary operations and fountain codes.
Quantum Inf. Process., 2015

Finding State Collisions in the Authenticated Encryption Stream Cipher ACORN.
IACR Cryptol. ePrint Arch., 2015

Applications of Key Recovery Cube-attack-like.
IACR Cryptol. ePrint Arch., 2015

Rotational Cryptanalysis of ARX Revisited.
IACR Cryptol. ePrint Arch., 2015

Special issue on trust and security in wireless sensor networks.
Concurr. Comput. Pract. Exp., 2015

2014
Quantum direct secret sharing with efficient eavesdropping-check and authentication based on distributed fountain codes.
Quantum Inf. Process., 2014

A subexponential construction of graph coloring for multiparty computation.
J. Math. Cryptol., 2014

Practical attack on NLM-MAC scheme.
Inf. Process. Lett., 2014

Lattice-based certificateless public-key encryption in the standard model.
Int. J. Inf. Sec., 2014

ICEPOLE: High-speed, Hardware-oriented Authenticated Encryption.
IACR Cryptol. ePrint Arch., 2014

Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128.
IACR Cryptol. ePrint Arch., 2014

Cube Attacks and Cube-attack-like Cryptanalysis on the Round-reduced Keccak Sponge Function.
IACR Cryptol. ePrint Arch., 2014

Practical Complexity Cube Attacks on Round-Reduced Keccak Sponge Function.
IACR Cryptol. ePrint Arch., 2014

Algebraic Attacks on Human Identification Protocols.
IACR Cryptol. ePrint Arch., 2014

Lattice-based completely non-malleable public-key encryption in the standard model.
Des. Codes Cryptogr., 2014

The resistance of PRESENT-80 against related-key differential attacks.
Cryptogr. Commun., 2014

A survey: Error control methods used in bio-cryptography.
Proceedings of the 11th International Conference on Fuzzy Systems and Knowledge Discovery, 2014

A Case Study of User-Level Spam Filtering.
Proceedings of the Twelfth Australasian Information Security Conference, 2014

2013
Security analysis of linearly filtered NLFSRs.
J. Math. Cryptol., 2013

Cryptanalysis of RC4(n, m) Stream Cipher.
IACR Cryptol. ePrint Arch., 2013

Breaking NLM-MAC Generator.
IACR Cryptol. ePrint Arch., 2013

Preimage attacks on the round-reduced Keccak with the aid of differential cryptanalysis.
IACR Cryptol. ePrint Arch., 2013

Parallel authenticated encryption with the duplex construction.
IACR Cryptol. ePrint Arch., 2013

Truncated Differential Analysis of Reduced-Round LBlock.
Proceedings of the Cryptology and Network Security - 12th International Conference, 2013

2012
Graph Coloring Applied to Secure Computation in Non-Abelian Groups.
J. Cryptol., 2012

New security notions and relations for public-key encryption.
J. Math. Cryptol., 2012

On the (In)Security of IDEA in Various Hashing Modes.
IACR Cryptol. ePrint Arch., 2012

Security Evaluation of Rakaposhi Stream Cipher.
IACR Cryptol. ePrint Arch., 2012

Rotational cryptanalysis of round-reduced Keccak.
IACR Cryptol. ePrint Arch., 2012

Does Counting Still Count? Revisiting the Security of Counting based User Authentication Protocols against Statistical Attacks.
IACR Cryptol. ePrint Arch., 2012

Multi-party computation with conversion of secret sharing.
Des. Codes Cryptogr., 2012

Cryptanalysis of WG-7: a lightweight stream cipher.
Cryptogr. Commun., 2012

Active Security in Multiparty Computation over Black-Box Groups.
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012

NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model.
Proceedings of the Public Key Cryptography - PKC 2012, 2012

Cryptanalysis of RC4-Based Hash Function.
Proceedings of the Tenth Australasian Information Security Conference, 2012

2011
Bucket attack on numeric set watermarking model and safeguards.
Inf. Secur. Tech. Rep., 2011

Socio-technological phishing prevention.
Inf. Secur. Tech. Rep., 2011

Möbius transforms, coincident Boolean functions and non-coincidence property of Boolean functions.
Int. J. Comput. Math., 2011

Cryptanalysis of WG-7 (A Lightweight Stream Cipher for RFID Encryption).
IACR Cryptol. ePrint Arch., 2011

On the Hardness of the Sum of <i>k</i> Mins Problem.
Comput. J., 2011

Lattice-Based Completely Non-malleable PKE in the Standard Model (Poster).
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

2010
Parallel Signcryption.
Proceedings of the Practical Signcryption, 2010

Decomposition Construction for Secret Sharing Schemes with Graph Access Structures in Polynomial Time.
SIAM J. Discret. Math., 2010

A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm.
IACR Cryptol. ePrint Arch., 2010

Cryptanalysis of the Convex Hull Click Human Identification Protocol.
IACR Cryptol. ePrint Arch., 2010

Evolution of cryptographic hashing.
Proceedings of the 3rd International Conference on Security of Information and Networks, 2010

Identifying Steganographic Payload Location in Binary Image.
Proceedings of the Advances in Multimedia Information Processing - PCM 2010, 2010

Binary Image Steganographic Techniques Classification Based on Multi-class Steganalysis.
Proceedings of the Information Security, 2010

Known and Chosen Key Differential Distinguishers for Block Ciphers.
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010

Secure Coprocessor-based Private Information Retrieval without Periodical Preprocessing.
Proceedings of the 8th Australasian Information Security Conference 2010, 2010

Estimating Hidden Message Length in Binary Image Embedded by Using Boundary Pixels Steganography.
Proceedings of the ARES 2010, 2010

Blind Steganalysis: A Countermeasure for Binary Image Steganography.
Proceedings of the ARES 2010, 2010

2009
Reversible and Blind Database Watermarking Using Difference Expansion.
Int. J. Digit. Crime Forensics, 2009

Unconditionally secure disjointness tests for private datasets.
Int. J. Appl. Cryptogr., 2009

Extensions of the Cube Attack based on Low Degree Annihilators.
IACR Cryptol. ePrint Arch., 2009

On the Security of PAS (Predicate-based Authentication Service).
IACR Cryptol. ePrint Arch., 2009

Robust and Reversible Numerical Set Watermarking.
Proceedings of the SIGMAP 2009, 2009

Certified Pseudonyms Colligated with Master Secret Key.
Proceedings of the SECRYPT 2009, 2009

Multi-Party Computation with Omnipresent Adversary.
Proceedings of the Public Key Cryptography, 2009

Database Relation Watermarking Resilient against Secondary Watermarking Attacks.
Proceedings of the Information Systems Security, 5th International Conference, 2009

Efficient Fuzzy Matching and Intersection on Private Datasets.
Proceedings of the Information, Security and Cryptology, 2009

Privacy Enhancements for Hardware-Based Security Modules.
Proceedings of the e-Business and Telecommunications - 6th International Joint Conference, 2009

Robust Numeric Set Watermarking: Numbers Don't Lie.
Proceedings of the e-Business and Telecommunications - 6th International Joint Conference, 2009

Cryptanalysis of the LAKE Hash Family.
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009

2008
The eight variable homogeneous degree three bent functions.
J. Discrete Algorithms, 2008

A coding approach to the multicast stream authentication problem.
Int. J. Inf. Sec., 2008

Analysis of bilinear pairing-based accumulator for identity escrowing.
IET Inf. Secur., 2008

Permutation polynomials of the form (x<sup>p</sup>-x+delta)<sup>s</sup>+L(x).
Finite Fields Their Appl., 2008

Security Analysis of Australian and E.U. E-passport Implementation.
J. Res. Pract. Inf. Technol., 2008

An Efficient Scheme of Common Secure Indices for Conjunctive Keyword-Based Retrieval on Encrypted Data.
Proceedings of the Information Security Applications, 9th International Workshop, 2008

Threshold Privacy Preserving Keyword Searches.
Proceedings of the SOFSEM 2008: Theory and Practice of Computer Science, 2008

A Fair e-Tendering Protocol.
Proceedings of the SECRYPT 2008, 2008

Secure Computation of the Vector Dominance Problem.
Proceedings of the Information Security Practice and Experience, 2008

Distributed Private Matching and Set Operations.
Proceedings of the Information Security Practice and Experience, 2008

An On-Line Secure E-Passport Protocol.
Proceedings of the Information Security Practice and Experience, 2008

Source Code Watermarking Based on Function Dependency Oriented Sequencing.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Features-Pooling Blind JPEG Image Steganalysis.
Proceedings of the International Conference on Digital Image Computing: Techniques and Applications, 2008

Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008

Formal Security Analysis of Australian E-passport Implementation.
Proceedings of the Sixth Australasian Information Security Conference, 2008

Improvement of a Dynamic Accumulator at ICICS 07 and Its Application in Multi-user Keyword-Based Retrieval on Encrypted Data.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

Efficient Disjointness Tests for Private Datasets.
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008

2007
Lattice-Based Threshold Changeability for Standard Shamir Secret-Sharing Schemes.
IEEE Trans. Inf. Theory, 2007

Software Watermarking Resilient to Debugging Attacks.
J. Multim., 2007

An Algebraic Analysis of Trivium Ciphers based on the Boolean Satisfiability Problem.
IACR Cryptol. ePrint Arch., 2007

Cryptanalysis of LASH.
IACR Cryptol. ePrint Arch., 2007

An Improved Distinguisher for Dragon.
IACR Cryptol. ePrint Arch., 2007

Multiple Modular Additions and Crossword Puzzle Attack on NLSv2.
IACR Cryptol. ePrint Arch., 2007

New constructions of anonymous membership broadcasting schemes.
Adv. Math. Commun., 2007

Reversible and Semi-Blind Relational Database Watermarking.
Proceedings of the SIGMAP 2007, 2007

Common Secure Index for Conjunctive Keyword-Based Retrieval over Encrypted Data.
Proceedings of the Secure Data Management, 4th VLDB Workshop, SDM 2007, Vienna, Austria, 2007

An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels.
Proceedings of the Provable Security, 2007

A New Dynamic Accumulator for Batch Updates.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

Extending FORK-256 Attack to the Full Hash Function.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

Cryptanalysis of FORK-256.
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007

How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature.
Proceedings of the Topics in Cryptology, 2007

On Secure Multi-party Computation in Black-Box Groups.
Proceedings of the Advances in Cryptology, 2007

Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

An Efficient eAuction Protocol.
Proceedings of the The Second International Conference on Availability, 2007

2006
Ideal Secret Sharing Schemes from Permutations.
Int. J. Netw. Secur., 2006

On the Provable Security of an Efficient RSA-Based Pseudorandom Generator.
IACR Cryptol. ePrint Arch., 2006

Weaknesses of the FORK-256 compression function.
IACR Cryptol. ePrint Arch., 2006

Crossword Puzzle Attack on NLS.
IACR Cryptol. ePrint Arch., 2006

Lattice-based threshold-changeability for standard CRT secret-sharing schemes.
Finite Fields Their Appl., 2006

Generalised Cumulative Arrays in Secret Sharing.
Des. Codes Cryptogr., 2006

An Ideal and Robust Threshold RSA.
Proceedings of the Progressin Cryptology, 2006

Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption.
Proceedings of the Public Key Cryptography, 2006

A Low-Cost Attack on Branch-Based Software Watermarking Schemes.
Proceedings of the Digital Watermarking, 5th International Workshop, 2006

A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders.
Proceedings of the Information Security, 9th International Conference, 2006

On Algebraic Immunity and Annihilators.
Proceedings of the Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30, 2006

An attack-localizing watermarking scheme for natural language documents.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

Formal analysis of card-based payment systems in mobile devices.
Proceedings of the proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), 2006

Distinguishing Attack on SOBER-128 with Linear Masking.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006

2005
Analysis of simplified variants of SHA-256.
Proceedings of the WEWoRC 2005, 2005

Privacy Enhanced Electronic Cheque System.
Proceedings of the 7th IEEE International Conference on E-Commerce Technology (CEC 2005), 2005

Converse Results to the Wiener Attack on RSA.
Proceedings of the Public Key Cryptography, 2005

Characterisations of Extended Resiliency and Extended Immunity of S-Boxes.
Proceedings of the Information Security and Cryptology, 2005

2004
Shared generation of pseudo-random functions.
J. Complex., 2004

Finding good differential patterns for attacks on SHA-1.
IACR Cryptol. ePrint Arch., 2004

Characterisations of Ideal Threshold Schemes.
Discret. Math. Theor. Comput. Sci., 2004

On Cheating Immune Secret Sharing.
Discret. Math. Theor. Comput. Sci., 2004

Homogeneous bent functions of degree <i>n</i> in <i>2n</i> variables do not exist for <i>n</i>ge3.
Discret. Appl. Math., 2004

Algebraic Attacks on SOBER-t32 and SOBER-t16 without Stuttering.
Proceedings of the Fast Software Encryption, 11th International Workshop, 2004

A Modification to the 'Authentication of Concast Communication'.
Proceedings of the Cryptographic Algorithms and their Uses, 2004

Securing Multicast Groups in Ad Hoc Networks.
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004

2003
Efficient Extension of Standard Schnorr/RSA signatures into Universal Designated-Verifier Signatures.
IACR Cryptol. ePrint Arch., 2003

Universal Designated-Verifier Signatures.
IACR Cryptol. ePrint Arch., 2003

On alternative approach for verifiable secret sharing.
IACR Cryptol. ePrint Arch., 2003

Multiple-Time Signature Schemes against Adaptive Chosen Message Attacks.
Proceedings of the Selected Areas in Cryptography, 10th Annual International Workshop, 2003

Shared Generation of Pseudo-Random Functions with Cumulative Maps.
Proceedings of the Topics in Cryptology, 2003

Efficient One-Time Proxy Signatures.
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003

Josef Pieprzyk, David Pointcheval.
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003

Fundamentals of computer security.
Springer, ISBN: 978-3-540-43101-5, 2003

2002
Multisecret Sharing Immune Against Cheating.
Informatica (Slovenia), 2002

Cryptanalysis of Block Ciphers with Overdefined Systems of Equations.
IACR Cryptol. ePrint Arch., 2002

On-the-fly web content integrity check boosts users's confidence.
Commun. ACM, 2002

Authentication of Concast Communication.
Proceedings of the Progress in Cryptology, 2002

Ideal Threshold Schemes from MDS Codes.
Proceedings of the Information Security and Cryptology, 2002

Threshold MACs.
Proceedings of the Information Security and Cryptology, 2002

Ideal Threshold Schemes from Orthogonal Arrays.
Proceedings of the Information and Communications Security, 4th International Conference, 2002

A Combinatorial Approach to Anonymous Membership Broadcast.
Proceedings of the Computing and Combinatorics, 8th Annual International Conference, 2002

Authentication of transit flows and k-siblings one-time signature.
Proceedings of the Advanced Communications and Multimedia Security, 2002

Cheating Prevention in Linear Secret Sharing.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002

2001
Broadcast anti-jamming systems.
Comput. Networks, 2001

Cheating Prevention in Secret Sharing over GF(p<sup>t</sup>).
Proceedings of the Progress in Cryptology, 2001

Authenticating Multicast Streams in Lossy Channels Using Threshold Techniques.
Proceedings of the Networking, 2001

Constructions of Cheating Immune Secret Sharing.
Proceedings of the Information Security and Cryptology, 2001

Copyright Protection of Object-Oriented Software.
Proceedings of the Information Security and Cryptology, 2001

A Dynamic Web Agent for Verifying the Security and Integrity of a Web Site's Contents.
Proceedings of the Sixth International Conference on Computer Supported Cooperative Work in Design, 2001

Democratic Systems.
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001

2000
Homogeneous bent functions.
Discret. Appl. Math., 2000

Construction of cubic homogeneous boolean bent functions.
Australas. J Comb., 2000

Identification of Bad Signatures in Batches.
Proceedings of the Public Key Cryptography, 2000

Codes Identifying Bad Signature in Batches.
Proceedings of the Progress in Cryptology, 2000

Cheating Prevention in Secret Sharing.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

1999
Rotation-Symmetric Functions and Fast Hashing.
J. Univers. Comput. Sci., 1999

Changing Thresholds in the Absence of Secure Channels.
Aust. Comput. J., 1999

Fingerprints for Copyright Software Protection.
Proceedings of the Information Security, Second International Workshop, 1999

RSA-Based Fail-Stop Signature Schemes.
Proceedings of the 1999 International Conference on Parallel Processing Workshops, 1999

Broadcast anti-jamming systems.
Proceedings of the IEEE International Conference on Networks 1999, 1999

Verfiable Secret Sharing and Time Capsules.
Proceedings of the Information Security and Cryptology, 1999

Linear Secret Sharing with Divisible Shares.
Proceedings of the Information and Communication Security, Second International Conference, 1999

Fail-Stop Threshold Signature Schemes Based on Elliptic Curves.
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999

On the Symmetric Property of Homogeneous Boolean Functions.
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999

Conference Key Agreement from Secret Sharing.
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999

Repudiation of Cheating and Non-repudiation of Zhang's Proxy Signature Schemes.
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999

Crypto Topics and Applications II.
Proceedings of the Algorithms and Theory of Computation Handbook., 1999

Crypto Topics and Applications I.
Proceedings of the Algorithms and Theory of Computation Handbook., 1999

1998
On Construction of Cumulative Secret Sharing Schemes.
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998

Secret Sharing in Multilevel and Compartmented Groups.
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998

1997
Using Cryptographic Hash Functions for Discretionary Access Control in Object-Oriented Databases.
J. Univers. Comput. Sci., 1997

On the Weakness of Gong's Collisionful Hash Functions.
J. Univers. Comput. Sci., 1997

A Multi-Level View Model for Secure Object-Oriented Databases.
Data Knowl. Eng., 1997

Remarks on the multiple assignment secret sharing scheme.
Proceedings of the Information and Communication Security, First International Conference, 1997

Secret sharing in hierarchical groups.
Proceedings of the Information and Communication Security, First International Conference, 1997

A Message Authentication Code Based on Latin Squares.
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997

1996
Computer Intrusion Detection and Incomplete Information.
Proceedings of the Industrial and Engineering Applications of Artificial Intelligence and Expert Systems, 1996

Case-Based Reasoning for Intrusion Detection.
Proceedings of the 12th Annual Computer Security Applications Conference (ACSAC 1996), 1996

Cryptography based on transcendental numbers.
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996

Cryptosystems for hierarchical groups.
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996

Evidential reasoning in network intrusion detection systems.
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996

Modeling a multi-level secure object-oriented database using views.
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996

On password-based authenticated key exchange using collisionful hash functions.
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996

On selectable collisionful hash functions.
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996

1995
A Cryptographic Mechanism for Object-Instance-Based Authorization in Object-Oriented Database Systems.
Proceedings of the OOER'95: Object-Oriented and Entity-Relationship Modelling, 1995

A Model of Authorization for Object-Oriented Databases based on Object Views.
Proceedings of the Deductive and Object-Oriented Databases, 1995

Keyed Hash Functions.
Proceedings of the Cryptography: Policy and Algorithms, 1995

A Cryptographic Solution to Discretionary Access Control in Structurally Object-Oriented Databases.
Proceedings of the Sixth Australasian Database Conference, 1995

1994
Comments on Soviet Encryption Algorithm.
Proceedings of the Advances in Cryptology, 1994

Conditionally Secure Secret Sharing Schemes with Disenrollment Capability.
Proceedings of the CCS '94, 1994

Attacking the SL<sub>2</sub> Hashing Scheme.
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994

1993
Design of Hashing Algorithms
Lecture Notes in Computer Science 756, Springer, ISBN: 3-540-57500-6, 1993

1992
A Construction for Super Pseudorandom Permutations from A Single Pseudorandom Function.
Proceedings of the Advances in Cryptology, 1992

HAVAL - A One-Way Hashing Algorithm with Variable Length of Output.
Proceedings of the Advances in Cryptology, 1992

Linear Nonequivalence versus Nonlinearity.
Proceedings of the Advances in Cryptology, 1992

1991
A Construction for One Way Hash Functions and Pseudorandom Bit Generators.
Proceedings of the Advances in Cryptology, 1991

Randomized Authentication Systems.
Proceedings of the Advances in Cryptology, 1991

Probabilistic Analysis of Elementary Randimizers.
Proceedings of the Advances in Cryptology, 1991

Sibling Intractable Function Families and Their Applications (Extended Abstract).
Proceedings of the Advances in Cryptology, 1991

How to Construct A Family of Strong One Way Permutations.
Proceedings of the Advances in Cryptology, 1991

On Necessary and Sufficient Conditions for the Construction of Super Pseudorandom Permutations.
Proceedings of the Advances in Cryptology, 1991

Optima Perfect Randomizers.
Proceedings of the Advances in Cryptology, 1991

A General Purpose Technique for Locating Key Scheduling Weakness in DES-like Cryptosystems (Extended Abstract).
Proceedings of the Advances in Cryptology, 1991

Improving Resistance to Differential Cryptanalysis and the Redesign of LOKI.
Proceedings of the Advances in Cryptology, 1991

Cryptography - an introduction to computer security.
Advances in computer science series, Prentice Hall, ISBN: 978-0-13-194986-7, 1991

1990
How to Construct Pseudorandom Permutations from Single Pseudorandom Functions.
Proceedings of the Advances in Cryptology, 1990

Permutation Generators of Alternating Groups.
Proceedings of the Advances in Cryptology, 1990

LOKI - A Cryptographic Primitive for Authentication and Secrecy Applications.
Proceedings of the Advances in Cryptology, 1990

1989
Non-linearity of Exponent Permutations.
Proceedings of the Advances in Cryptology, 1989

1985
Design of public key cryptosystems using idempotent elements.
Comput. Secur., 1985

Modular design of information encipherment for computer systems.
Comput. Secur., 1985

On Public-Key Cryptosystems Built using Polynomial Rings.
Proceedings of the Advances in Cryptology, 1985

1984
Algebraical Structures of Cryptographic Transformations.
Proceedings of the Advances in Cryptology: Proceedings of EUROCRYPT 84, 1984


  Loading...