Josef Pieprzyk
Orcid: 0000-0002-1917-6466Affiliations:
- Macquarie University, Sydney, Australia
According to our database1,
Josef Pieprzyk
authored at least 274 papers
between 1984 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
-
on isni.org
On csauthors.net:
Bibliography
2024
Pervasive User Data Collection from Cyberspace: Privacy Concerns and Countermeasures.
Cryptogr., March, 2024
A Provably Secure and Efficient Cryptographic-Key Update Protocol for Connected Vehicles.
IEEE Trans. Dependable Secur. Comput., 2024
Shared file protection against unauthorised encryption using a Buffer-Based Signature Verification Method.
J. Inf. Secur. Appl., 2024
CoRR, 2024
File System Shield (FSS): A Pass-Through Strategy Against Unwanted Encryption in Network File Systems.
Proceedings of the Advances in Information and Computer Security, 2024
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
2023
Differential fault attacks on the lightweight authenticated encryption algorithm CLX-128.
J. Cryptogr. Eng., September, 2023
Sci. China Inf. Sci., August, 2023
IEEE Trans. Dependable Secur. Comput., 2023
Resource-saving quantum key distribution based on three-photon matrix product states.
Quantum Inf. Process., 2023
Proceedings of the 20th International Conference on Security and Cryptography, 2023
2022
IEEE Trans. Dependable Secur. Comput., 2022
An improved quantum network communication model based on compressed tensor network states.
Quantum Inf. Process., 2022
Dynamic and compressed quantum many-body state secret sharing based on site-independent matrix product states.
Quantum Inf. Process., 2022
IACR Cryptol. ePrint Arch., 2022
Spatial Encryption Revisited: From Delegatable Multiple Inner Product Encryption and More.
IACR Cryptol. ePrint Arch., 2022
Transformer-Based Language Models for Software Vulnerability Detection: Performance, Model's Security and Platforms.
CoRR, 2022
Proceedings of the Annual Computer Security Applications Conference, 2022
2021
A Model to Evaluate Reliability of Authentication Protocols in C-ITS Safety-Critical Applications.
IEEE Trans. Veh. Technol., 2021
IEEE Trans. Inf. Forensics Secur., 2021
On the Efficiency of Pairing-Based Authentication for Connected Vehicles: Time is Not on Our Side!
IEEE Trans. Inf. Forensics Secur., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
EURASIP J. Wirel. Commun. Netw., 2021
Random Differential Fault Attacks on the Lightweight Authenticated Encryption Stream Cipher Grain-128AEAD.
IEEE Access, 2021
2020
IEEE Trans. Inf. Forensics Secur., 2020
Quantum Inf. Process., 2020
High-capacity (2, 3) threshold quantum secret sharing based on asymmetric quantum lossy channels.
Quantum Inf. Process., 2020
J. Cryptogr. Eng., 2020
Forward and Backward Private Dynamic Searchable Symmetric Encryption for Conjunctive Queries.
IACR Cryptol. ePrint Arch., 2020
Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2020
Foxtail+: A Learning with Errors-based Authentication Protocol for Resource-Constrained Devices.
IACR Cryptol. ePrint Arch., 2020
Proceedings of the Applied Cryptography and Network Security, 2020
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020
2019
Broadcast Authentication in Latency-Critical Applications: On the Efficiency of IEEE 1609.2.
IEEE Trans. Veh. Technol., 2019
J. Math. Cryptol., 2019
IACR Cryptol. ePrint Arch., 2019
Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward/Backward Privacy.
CoRR, 2019
2018
A large-alphabet three-party quantum key distribution protocol based on orbital and spin angular momenta hybrid entanglement.
Quantum Inf. Process., 2018
Tunable multi-party high-capacity quantum key distribution based on <i>m</i>-generalized Fibonacci sequences using golden coding.
Quantum Inf. Process., 2018
Efficient quantum key distribution using Fibonacci-number coding with a biased basis choice.
Inf. Process. Lett., 2018
IET Inf. Secur., 2018
High-rate and high-capacity measurement-device-independent quantum key distribution with Fibonacci matrix coding in free space.
Sci. China Inf. Sci., 2018
Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward (and Backward) Security.
Proceedings of the Computer Security, 2018
2017
IET Inf. Secur., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
2016
High-capacity quantum key distribution using Chebyshev-map values corresponding to Lucas numbers coding.
Quantum Inf. Process., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Australasian Computer Science Week Multiconference, 2016
2015
A New Biocryptosystem-Oriented Security Analysis Framework and Implementation of Multibiometric Cryptosystems Based on Decision Level Fusion.
IEEE Trans. Inf. Forensics Secur., 2015
On the Linearization of Human Identification Protocols: Attacks Based on Linear Algebra, Coding Theory, and Lattices.
IEEE Trans. Inf. Forensics Secur., 2015
A hybrid quantum key distribution protocol based on extended unitary operations and fountain codes.
Quantum Inf. Process., 2015
IACR Cryptol. ePrint Arch., 2015
Concurr. Comput. Pract. Exp., 2015
2014
Quantum direct secret sharing with efficient eavesdropping-check and authentication based on distributed fountain codes.
Quantum Inf. Process., 2014
J. Math. Cryptol., 2014
Int. J. Inf. Sec., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Cube Attacks and Cube-attack-like Cryptanalysis on the Round-reduced Keccak Sponge Function.
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Des. Codes Cryptogr., 2014
Cryptogr. Commun., 2014
Proceedings of the 11th International Conference on Fuzzy Systems and Knowledge Discovery, 2014
Proceedings of the Twelfth Australasian Information Security Conference, 2014
2013
Preimage attacks on the round-reduced Keccak with the aid of differential cryptanalysis.
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Cryptology and Network Security - 12th International Conference, 2013
2012
J. Cryptol., 2012
J. Math. Cryptol., 2012
IACR Cryptol. ePrint Arch., 2012
Does Counting Still Count? Revisiting the Security of Counting based User Authentication Protocols against Statistical Attacks.
IACR Cryptol. ePrint Arch., 2012
Des. Codes Cryptogr., 2012
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012
NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model.
Proceedings of the Public Key Cryptography - PKC 2012, 2012
Proceedings of the Tenth Australasian Information Security Conference, 2012
2011
Inf. Secur. Tech. Rep., 2011
Möbius transforms, coincident Boolean functions and non-coincidence property of Boolean functions.
Int. J. Comput. Math., 2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011
2010
Decomposition Construction for Secret Sharing Schemes with Graph Access Structures in Polynomial Time.
SIAM J. Discret. Math., 2010
A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm.
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the 3rd International Conference on Security of Information and Networks, 2010
Proceedings of the Advances in Multimedia Information Processing - PCM 2010, 2010
Binary Image Steganographic Techniques Classification Based on Multi-class Steganalysis.
Proceedings of the Information Security, 2010
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010
Secure Coprocessor-based Private Information Retrieval without Periodical Preprocessing.
Proceedings of the 8th Australasian Information Security Conference 2010, 2010
Estimating Hidden Message Length in Binary Image Embedded by Using Boundary Pixels Steganography.
Proceedings of the ARES 2010, 2010
Proceedings of the ARES 2010, 2010
2009
Int. J. Digit. Crime Forensics, 2009
Int. J. Appl. Cryptogr., 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
Robust and Reversible Numerical Set Watermarking.
Proceedings of the SIGMAP 2009, 2009
Certified Pseudonyms Colligated with Master Secret Key.
Proceedings of the SECRYPT 2009, 2009
Proceedings of the Public Key Cryptography, 2009
Proceedings of the Information Systems Security, 5th International Conference, 2009
Proceedings of the Information, Security and Cryptology, 2009
Proceedings of the e-Business and Telecommunications - 6th International Joint Conference, 2009
Proceedings of the e-Business and Telecommunications - 6th International Joint Conference, 2009
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009
2008
J. Discrete Algorithms, 2008
Int. J. Inf. Sec., 2008
IET Inf. Secur., 2008
Finite Fields Their Appl., 2008
J. Res. Pract. Inf. Technol., 2008
An Efficient Scheme of Common Secure Indices for Conjunctive Keyword-Based Retrieval on Encrypted Data.
Proceedings of the Information Security Applications, 9th International Workshop, 2008
Proceedings of the SOFSEM 2008: Theory and Practice of Computer Science, 2008
A Fair e-Tendering Protocol.
Proceedings of the SECRYPT 2008, 2008
Proceedings of the Information Security Practice and Experience, 2008
Proceedings of the Information Security Practice and Experience, 2008
Proceedings of the Information Security Practice and Experience, 2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Proceedings of the International Conference on Digital Image Computing: Techniques and Applications, 2008
Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008
Proceedings of the Sixth Australasian Information Security Conference, 2008
Improvement of a Dynamic Accumulator at ICICS 07 and Its Application in Multi-user Keyword-Based Retrieval on Encrypted Data.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008
2007
IEEE Trans. Inf. Theory, 2007
An Algebraic Analysis of Trivium Ciphers based on the Boolean Satisfiability Problem.
IACR Cryptol. ePrint Arch., 2007
IACR Cryptol. ePrint Arch., 2007
Adv. Math. Commun., 2007
Reversible and Semi-Blind Relational Database Watermarking.
Proceedings of the SIGMAP 2007, 2007
Proceedings of the Secure Data Management, 4th VLDB Workshop, SDM 2007, Vienna, Austria, 2007
An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels.
Proceedings of the Provable Security, 2007
Proceedings of the Information and Communications Security, 9th International Conference, 2007
Proceedings of the Information and Communications Security, 9th International Conference, 2007
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007
How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature.
Proceedings of the Topics in Cryptology, 2007
Proceedings of the Advances in Cryptology, 2007
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007
Proceedings of the The Second International Conference on Availability, 2007
2006
IACR Cryptol. ePrint Arch., 2006
Finite Fields Their Appl., 2006
Proceedings of the Public Key Cryptography, 2006
Proceedings of the Digital Watermarking, 5th International Workshop, 2006
Proceedings of the Information Security, 9th International Conference, 2006
Proceedings of the Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30, 2006
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006
Proceedings of the proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), 2006
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006
2005
Proceedings of the 7th IEEE International Conference on E-Commerce Technology (CEC 2005), 2005
Proceedings of the Public Key Cryptography, 2005
Proceedings of the Information Security and Cryptology, 2005
2004
IACR Cryptol. ePrint Arch., 2004
Discret. Math. Theor. Comput. Sci., 2004
Homogeneous bent functions of degree <i>n</i> in <i>2n</i> variables do not exist for <i>n</i>ge3.
Discret. Appl. Math., 2004
Proceedings of the Fast Software Encryption, 11th International Workshop, 2004
A Modification to the 'Authentication of Concast Communication'.
Proceedings of the Cryptographic Algorithms and their Uses, 2004
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004
2003
Efficient Extension of Standard Schnorr/RSA signatures into Universal Designated-Verifier Signatures.
IACR Cryptol. ePrint Arch., 2003
IACR Cryptol. ePrint Arch., 2003
Proceedings of the Selected Areas in Cryptography, 10th Annual International Workshop, 2003
Proceedings of the Topics in Cryptology, 2003
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003
2002
Multisecret Sharing Immune Against Cheating.
Informatica (Slovenia), 2002
IACR Cryptol. ePrint Arch., 2002
Proceedings of the Progress in Cryptology, 2002
Proceedings of the Information Security and Cryptology, 2002
Proceedings of the Information and Communications Security, 4th International Conference, 2002
Proceedings of the Computing and Combinatorics, 8th Annual International Conference, 2002
Proceedings of the Advanced Communications and Multimedia Security, 2002
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002
2001
Proceedings of the Progress in Cryptology, 2001
Proceedings of the Networking, 2001
Proceedings of the Information Security and Cryptology, 2001
Proceedings of the Information Security and Cryptology, 2001
A Dynamic Web Agent for Verifying the Security and Integrity of a Web Site's Contents.
Proceedings of the Sixth International Conference on Computer Supported Cooperative Work in Design, 2001
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001
2000
Proceedings of the Public Key Cryptography, 2000
Proceedings of the Progress in Cryptology, 2000
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000
1999
Changing Thresholds in the Absence of Secure Channels.
Aust. Comput. J., 1999
Proceedings of the Information Security, Second International Workshop, 1999
Proceedings of the 1999 International Conference on Parallel Processing Workshops, 1999
Proceedings of the IEEE International Conference on Networks 1999, 1999
Proceedings of the Information Security and Cryptology, 1999
Proceedings of the Information and Communication Security, Second International Conference, 1999
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999
Proceedings of the Algorithms and Theory of Computation Handbook., 1999
Proceedings of the Algorithms and Theory of Computation Handbook., 1999
1998
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998
1997
Using Cryptographic Hash Functions for Discretionary Access Control in Object-Oriented Databases.
J. Univers. Comput. Sci., 1997
J. Univers. Comput. Sci., 1997
Data Knowl. Eng., 1997
Proceedings of the Information and Communication Security, First International Conference, 1997
Proceedings of the Information and Communication Security, First International Conference, 1997
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997
1996
Computer Intrusion Detection and Incomplete Information.
Proceedings of the Industrial and Engineering Applications of Artificial Intelligence and Expert Systems, 1996
Proceedings of the 12th Annual Computer Security Applications Conference (ACSAC 1996), 1996
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996
1995
A Cryptographic Mechanism for Object-Instance-Based Authorization in Object-Oriented Database Systems.
Proceedings of the OOER'95: Object-Oriented and Entity-Relationship Modelling, 1995
Proceedings of the Deductive and Object-Oriented Databases, 1995
A Cryptographic Solution to Discretionary Access Control in Structurally Object-Oriented Databases.
Proceedings of the Sixth Australasian Database Conference, 1995
1994
Proceedings of the Advances in Cryptology, 1994
Proceedings of the CCS '94, 1994
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994
1993
Lecture Notes in Computer Science 756, Springer, ISBN: 3-540-57500-6, 1993
1992
A Construction for Super Pseudorandom Permutations from A Single Pseudorandom Function.
Proceedings of the Advances in Cryptology, 1992
Proceedings of the Advances in Cryptology, 1992
Proceedings of the Advances in Cryptology, 1992
1991
Proceedings of the Advances in Cryptology, 1991
Proceedings of the Advances in Cryptology, 1991
Proceedings of the Advances in Cryptology, 1991
Proceedings of the Advances in Cryptology, 1991
On Necessary and Sufficient Conditions for the Construction of Super Pseudorandom Permutations.
Proceedings of the Advances in Cryptology, 1991
A General Purpose Technique for Locating Key Scheduling Weakness in DES-like Cryptosystems (Extended Abstract).
Proceedings of the Advances in Cryptology, 1991
Proceedings of the Advances in Cryptology, 1991
Cryptography - an introduction to computer security.
Advances in computer science series, Prentice Hall, ISBN: 978-0-13-194986-7, 1991
1990
Proceedings of the Advances in Cryptology, 1990
Proceedings of the Advances in Cryptology, 1990
Proceedings of the Advances in Cryptology, 1990
1989
Proceedings of the Advances in Cryptology, 1989
1985
Comput. Secur., 1985
Proceedings of the Advances in Cryptology, 1985
1984
Proceedings of the Advances in Cryptology: Proceedings of EUROCRYPT 84, 1984