Joseph Tonien

Orcid: 0000-0003-2846-1071

Affiliations:
  • University of Wollongong, NSW, Australia


According to our database1, Joseph Tonien authored at least 38 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Enhanced S-boxes for the Advanced Encryption Standard with maximal periodicity and better avalanche property.
Comput. Stand. Interfaces, January, 2024

2023
A new attack on some RSA variants.
Theor. Comput. Sci., June, 2023

2022
Message-Locked Searchable Encryption: A New Versatile Tool for Secure Cloud Storage.
IEEE Trans. Serv. Comput., 2022

A Generalized Attack on the Multi-prime Power RSA.
Proceedings of the Progress in Cryptology, 2022

2021
Privacy-Preserving Multi-Keyword Searchable Encryption for Distributed Systems.
IEEE Trans. Parallel Distributed Syst., 2021

A Wiener-type attack on an RSA-like cryptosystem constructed from cubic Pell equations.
Theor. Comput. Sci., 2021

Cryptanalysis of RSA Variants with Primes Sharing Most Significant Bits.
IACR Cryptol. ePrint Arch., 2021

Divide and capture: An improved cryptanalysis of the encryption standard algorithm RSA.
Comput. Stand. Interfaces, 2021

Broadcast Authenticated Encryption with Keyword Search.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021

2020
A generalised bound for the Wiener attack on RSA.
J. Inf. Secur. Appl., 2020

A New Improved AES S-box With Enhanced Properties.
IACR Cryptol. ePrint Arch., 2020

2019
Improved Cryptanalysis of the KMOV Elliptic Curve Cryptosystem.
IACR Cryptol. ePrint Arch., 2019

Towards Enhanced Security for Certificateless Public-Key Authenticated Encryption with Keyword Search.
Proceedings of the Provable Security, 2019

The Wiener Attack on RSA Revisited: A Quest for the Exact Bound.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

2018
Cooperative Secret Sharing Using QR Codes and Symmetric Keys.
Symmetry, 2018

Cryptanalysis of RSA-type cryptosystems based on Lucas sequences, Gaussian integers and elliptic curves.
J. Inf. Secur. Appl., 2018

A Generalized Attack on Some Variants of the RSA Cryptosystem.
Proceedings of the Selected Areas in Cryptography - SAC 2018, 2018

2017
A generalized attack on RSA type cryptosystems.
Theor. Comput. Sci., 2017

A QR Code Watermarking Approach Based on the DWT-DCT Technique.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Dirichlet Product for Boolean Functions.
IACR Cryptol. ePrint Arch., 2016

Securing Shared Systems.
Proceedings of the Cooperative Design, Visualization, and Engineering, 2016

A New Attack on Three Variants of the RSA Cryptosystem.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2012
Some Constructions of Mutually Orthogonal Latin Squares and Superimposed Codes.
Discret. Math. Algorithms Appl., 2012

2011
A new generic digital signature algorithm.
Groups Complex. Cryptol., 2011

On "the Power of Verification Queries" in Unconditionally Secure Message Authentication.
Discret. Math. Algorithms Appl., 2011

Breaking and Repairing an Approximate Message Authentication Scheme.
Discret. Math. Algorithms Appl., 2011

Fuzzy Universal Hashing and Approximate Authentication.
Discret. Math. Algorithms Appl., 2011

2009
Unconditionally Secure Approximate Message Authentication.
Proceedings of the Coding and Cryptology, Second International Workshop, 2009

2008
Birthday Paradox for Multi-Collisions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

2007
Construction of deletion correcting codes using generalized Reed-Solomon codes and their subcodes.
Des. Codes Cryptogr., 2007

Combinatorial characterizations of authentication codes in verification oracle model.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

2006
Recursive constructions of secure codes and hash families using <i>difference function families</i>.
J. Comb. Theory A, 2006

On a traitor tracing scheme from ACISP 2003.
Inf. Process. Lett., 2006

An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families.
IACR Cryptol. ePrint Arch., 2006

Multi-party Concurrent Signatures.
Proceedings of the Information Security, 9th International Conference, 2006

Generic Construction of Hybrid Public Key Traitor Tracing with Full-Public-Traceability.
Proceedings of the Automata, Languages and Programming, 33rd International Colloquium, 2006

2005
Explicit Construction of Secure Frameproof Codes.
IACR Cryptol. ePrint Arch., 2005

Recursive Constructions of Secure Codes and Hash Families Using Difference Function Families.
IACR Cryptol. ePrint Arch., 2005


  Loading...