Joseph Tonien
Orcid: 0000-0003-2846-1071Affiliations:
- University of Wollongong, NSW, Australia
According to our database1,
Joseph Tonien
authored at least 38 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on uow.edu.au
On csauthors.net:
Bibliography
2024
Enhanced S-boxes for the Advanced Encryption Standard with maximal periodicity and better avalanche property.
Comput. Stand. Interfaces, January, 2024
2023
2022
IEEE Trans. Serv. Comput., 2022
Proceedings of the Progress in Cryptology, 2022
2021
IEEE Trans. Parallel Distributed Syst., 2021
A Wiener-type attack on an RSA-like cryptosystem constructed from cubic Pell equations.
Theor. Comput. Sci., 2021
IACR Cryptol. ePrint Arch., 2021
Divide and capture: An improved cryptanalysis of the encryption standard algorithm RSA.
Comput. Stand. Interfaces, 2021
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021
2020
2019
IACR Cryptol. ePrint Arch., 2019
Towards Enhanced Security for Certificateless Public-Key Authenticated Encryption with Keyword Search.
Proceedings of the Provable Security, 2019
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019
2018
Cryptanalysis of RSA-type cryptosystems based on Lucas sequences, Gaussian integers and elliptic curves.
J. Inf. Secur. Appl., 2018
Proceedings of the Selected Areas in Cryptography - SAC 2018, 2018
2017
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
2016
Proceedings of the Cooperative Design, Visualization, and Engineering, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2012
Discret. Math. Algorithms Appl., 2012
2011
On "the Power of Verification Queries" in Unconditionally Secure Message Authentication.
Discret. Math. Algorithms Appl., 2011
Discret. Math. Algorithms Appl., 2011
Discret. Math. Algorithms Appl., 2011
2009
Proceedings of the Coding and Cryptology, Second International Workshop, 2009
2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
2007
Construction of deletion correcting codes using generalized Reed-Solomon codes and their subcodes.
Des. Codes Cryptogr., 2007
Combinatorial characterizations of authentication codes in verification oracle model.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007
2006
Recursive constructions of secure codes and hash families using <i>difference function families</i>.
J. Comb. Theory A, 2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Information Security, 9th International Conference, 2006
Generic Construction of Hybrid Public Key Traitor Tracing with Full-Public-Traceability.
Proceedings of the Automata, Languages and Programming, 33rd International Colloquium, 2006
2005
Recursive Constructions of Secure Codes and Hash Families Using Difference Function Families.
IACR Cryptol. ePrint Arch., 2005