2009 | ||
---|---|---|
140 | EE | Hossein Ghodosi, Josef Pieprzyk: Multi-Party Computation with Omnipresent Adversary. Public Key Cryptography 2009: 180-195 |
139 | EE | Gaurav Gupta, Josef Pieprzyk: Reversible and Blind Database Watermarking Using Difference Expansion. IJDCF 1(2): 42-54 (2009) |
2008 | ||
138 | Josef Pieprzyk: Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings Springer 2008 | |
137 | EE | Qingsong Ye, Huaxiong Wang, Josef Pieprzyk, Xian-Mo Zhang: Efficient Disjointness Tests for Private Datasets. ACISP 2008: 155-169 |
136 | EE | Peishun Wang, Huaxiong Wang, Josef Pieprzyk: Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups. CANS 2008: 178-195 |
135 | EE | Chiew Kang Leng, Josef Pieprzyk: Features-Pooling Blind JPEG Image Steganalysis. DICTA 2008: 96-103 |
134 | EE | Ron Steinfeld, Scott Contini, Krystian Matusiewicz, Josef Pieprzyk, Jian Guo, San Ling, Huaxiong Wang: Cryptanalysis of LASH. FSE 2008: 207-223 |
133 | EE | Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang: An On-Line Secure E-Passport Protocol. ISPEC 2008: 14-28 |
132 | EE | Jin Yuan, Qingsong Ye, Huaxiong Wang, Josef Pieprzyk: Secure Computation of the Vector Dominance Problem. ISPEC 2008: 319-333 |
131 | EE | Qingsong Ye, Huaxiong Wang, Josef Pieprzyk: Distributed Private Matching and Set Operations. ISPEC 2008: 347-360 |
130 | EE | Peishun Wang, Huaxiong Wang, Josef Pieprzyk: Threshold Privacy Preserving Keyword Searches. SOFSEM 2008: 646-658 |
129 | EE | Peishun Wang, Huaxiong Wang, Josef Pieprzyk: An Efficient Scheme of Common Secure Indices for Conjunctive Keyword-Based Retrieval on Encrypted Data. WISA 2008: 145-159 |
128 | EE | Christophe Tartary, Huaxiong Wang, Josef Pieprzyk: A coding approach to the multicast stream authentication problem. Int. J. Inf. Sec. 7(4): 265-283 (2008) |
127 | EE | Chris Charnes, Ulrich Dempwolff, Josef Pieprzyk: The eight variable homogeneous degree three bent functions. J. Discrete Algorithms 6(1): 66-72 (2008) |
2007 | ||
126 | Josef Pieprzyk, Hossein Ghodosi, Ed Dawson: Information Security and Privacy, 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings Springer 2007 | |
125 | EE | Brian Curtis, Josef Pieprzyk, Jan Seruga: An Efficient eAuction Protocol. ARES 2007: 417-421 |
124 | EE | Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Huaxiong Wang: On Secure Multi-party Computation in Black-Box Groups. CRYPTO 2007: 591-612 |
123 | EE | Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang: How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature. CT-RSA 2007: 357-371 |
122 | EE | Krystian Matusiewicz, Thomas Peyrin, Olivier Billet, Scott Contini, Josef Pieprzyk: Cryptanalysis of FORK-256. FSE 2007: 19-38 |
121 | EE | Scott Contini, Krystian Matusiewicz, Josef Pieprzyk: Extending FORK-256 Attack to the Full Hash Function. ICICS 2007: 296-305 |
120 | EE | Peishun Wang, Huaxiong Wang, Josef Pieprzyk: A New Dynamic Accumulator for Batch Updates. ICICS 2007: 98-112 |
119 | EE | Joo Yeon Cho, Josef Pieprzyk: Multiple Modular Additions and Crossword Puzzle Attack on NLSv2. ISC 2007: 230-248 |
118 | EE | Christophe Tartary, Josef Pieprzyk, Huaxiong Wang: Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures. Inscrypt 2007: 167-181 |
117 | EE | Christophe Tartary, Huaxiong Wang, Josef Pieprzyk: An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels. ProvSec 2007: 17-34 |
116 | EE | Peishun Wang, Huaxiong Wang, Josef Pieprzyk: Common Secure Index for Conjunctive Keyword-Based Retrieval over Encrypted Data. Secure Data Management 2007: 108-123 |
115 | EE | Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang: Lattice-Based Threshold Changeability for Standard Shamir Secret-Sharing Schemes. IEEE Transactions on Information Theory 53(7): 2542-2559 (2007) |
114 | EE | Gaurav Gupta, Josef Pieprzyk: Software Watermarking Resilient to Debugging Attacks. Journal of Multimedia 2(2): 10-16 (2007) |
2006 | ||
113 | EE | Joo Yeon Cho, Josef Pieprzyk: Distinguishing Attack on SOBER-128 with Linear Masking. ACISP 2006: 29-39 |
112 | EE | Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang, Joo Yeon Cho: Formal analysis of card-based payment systems in mobile devices. ACSW Frontiers 2006: 213-220 |
111 | EE | Gaurav Gupta, Josef Pieprzyk, Huaxiong Wang: An attack-localizing watermarking scheme for natural language documents. ASIACCS 2006: 157-165 |
110 | EE | Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang: On the Provable Security of an Efficient RSA-Based Pseudorandom Generator. ASIACRYPT 2006: 194-209 |
109 | EE | Xian-Mo Zhang, Josef Pieprzyk, Yuliang Zheng: On Algebraic Immunity and Annihilators. ICISC 2006: 65-80 |
108 | EE | Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Huaxiong Wang: A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders. ISC 2006: 459-475 |
107 | EE | Gaurav Gupta, Josef Pieprzyk: A Low-Cost Attack on Branch-Based Software Watermarking Schemes. IWDW 2006: 282-293 |
106 | EE | Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang: Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption. Public Key Cryptography 2006: 157-173 |
105 | EE | Joo Yeon Cho, Josef Pieprzyk: Crossword Puzzle Attack on NLS. Selected Areas in Cryptography 2006: 249-265 |
104 | EE | Hossein Ghodosi, Josef Pieprzyk: An Ideal and Robust Threshold RSA. VIETCRYPT 2006: 312-321 |
103 | EE | Shoulun Long, Josef Pieprzyk, Huaxiong Wang, Duncan S. Wong: Generalised Cumulative Arrays in Secret Sharing. Des. Codes Cryptography 40(2): 191-209 (2006) |
2005 | ||
102 | EE | Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang: Privacy Enhanced Electronic Cheque System. CEC 2005: 431-434 |
101 | EE | Josef Pieprzyk, Xian-Mo Zhang, Jovan Dj. Golic: Characterisations of Extended Resiliency and Extended Immunity of S-Boxes. ICISC 2005: 210-228 |
100 | EE | Ron Steinfeld, Scott Contini, Huaxiong Wang, Josef Pieprzyk: Converse Results to the Wiener Attack on RSA. Public Key Cryptography 2005: 184-198 |
99 | EE | Krystian Matusiewicz, Josef Pieprzyk: Finding Good Differential Patterns for Attacks on SHA-1. WCC 2005: 164-177 |
98 | Krystian Matusiewicz, Josef Pieprzyk, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen: Analysis of simplified variants of SHA-256. WEWoRC 2005: 123-134 | |
2004 | ||
97 | Huaxiong Wang, Josef Pieprzyk, Vijay Varadharajan: Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings Springer 2004 | |
96 | EE | Ron Steinfeld, Huaxiong Wang, Josef Pieprzyk: Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes. ASIACRYPT 2004: 170-186 |
95 | EE | Hartono Kurnio, Huaxiong Wang, Josef Pieprzyk, Kris Gaj: Securing Multicast Groups in Ad Hoc Networks. AWCC 2004: 194-207 |
94 | Hossein Ghodosi, Josef Pieprzyk: A Modification to the 'Authentication of Concast Communication'. Cryptographic Algorithms and their Uses 2004: 72-77 | |
93 | EE | Joo Yeon Cho, Josef Pieprzyk: Algebraic Attacks on SOBER-t32 and SOBER-t16 without Stuttering. FSE 2004: 49-64 |
92 | EE | Ron Steinfeld, Huaxiong Wang, Josef Pieprzyk: Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures. Public Key Cryptography 2004: 86-100 |
91 | EE | Tianbing Xia, Jennifer Seberry, Josef Pieprzyk, Chris Charnes: Homogeneous bent functions of degree n in 2n variables do not exist for nge3. Discrete Applied Mathematics 142(1-3): 127-132 (2004) |
90 | EE | Josef Pieprzyk, Xian-Mo Zhang: On Cheating Immune Secret Sharing. Discrete Mathematics & Theoretical Computer Science 6(2): 253-264 (2004) |
89 | EE | Josef Pieprzyk, Xian-Mo Zhang: Characterisations of Ideal Threshold Schemes. Discrete Mathematics & Theoretical Computer Science 6(2): 471-482 (2004) |
88 | EE | Huaxiong Wang, Josef Pieprzyk: Shared generation of pseudo-random functions. J. Complexity 20(2-3): 458-472 (2004) |
2003 | ||
87 | EE | Josef Pieprzyk, David Pointcheval: Josef Pieprzyk, David Pointcheval. ACISP 2003: 387-401 |
86 | EE | Huaxiong Wang, Josef Pieprzyk: Efficient One-Time Proxy Signatures. ASIACRYPT 2003: 507-522 |
85 | EE | Ron Steinfeld, Laurence Bull, Huaxiong Wang, Josef Pieprzyk: Universal Designated-Verifier Signatures. ASIACRYPT 2003: 523-542 |
84 | EE | Huaxiong Wang, Josef Pieprzyk: Shared Generation of Pseudo-Random Functions with Cumulative Maps. CT-RSA 2003: 281-294 |
83 | EE | Josef Pieprzyk, Huaxiong Wang, Chaoping Xing: Multiple-Time Signature Schemes against Adaptive Chosen Message Attacks. Selected Areas in Cryptography 2003: 88-100 |
2002 | ||
82 | EE | Josef Pieprzyk, Xian-Mo Zhang: Cheating Prevention in Linear Secret Sharing. ACISP 2002: 121-135 |
81 | EE | Nicolas Courtois, Josef Pieprzyk: Cryptanalysis of Block Ciphers with Overdefined Systems of Equations. ASIACRYPT 2002: 267-287 |
80 | EE | Huaxiong Wang, Josef Pieprzyk: A Combinatorial Approach to Anonymous Membership Broadcast. COCOON 2002: 162-170 |
79 | Mohamed Al-Ibrahim, Josef Pieprzyk: Authentication of transit flows and k-siblings one-time signature. Communications and Multimedia Security 2002: 41-55 | |
78 | EE | Josef Pieprzyk, Xian-Mo Zhang: Ideal Threshold Schemes from Orthogonal Arrays. ICICS 2002: 469-479 |
77 | EE | Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild: Threshold MACs. ICISC 2002: 237-252 |
76 | EE | Josef Pieprzyk, Xian-Mo Zhang: Ideal Threshold Schemes from MDS Codes. ICISC 2002: 253-263 |
75 | EE | Mohamed Al-Ibrahim, Hossein Ghodosi, Josef Pieprzyk: Authentication of Concast Communication. INDOCRYPT 2002: 185-198 |
74 | EE | Kamil Kulesza, Zbigniew Kotulski, Josef Pieprzyk: On alternative approach for verifiable secret sharing CoRR math.CO/0211267: (2002) |
73 | EE | Soroush Sedaghat, Josef Pieprzyk, Ehsan Vossough: On-the-fly web content integrity check boosts users's confidence. Commun. ACM 45(11): 33-37 (2002) |
72 | Josef Pieprzyk, Xian-Mo Zhang: Multisecret Sharing Immune Against Cheating. Informatica (Slovenia) 26(3): (2002) | |
2001 | ||
71 | EE | Hossein Ghodosi, Josef Pieprzyk: Democratic Systems. ACISP 2001: 392-402 |
70 | EE | Soroush Sedaghat, Josef Pieprzyk, Ehsan Vossough: A Dynamic Web Agent for Verifying the Security and Integrity of a Web Site's Contents. CSCWD 2001: 330-337 |
69 | EE | Xian-Mo Zhang, Josef Pieprzyk: Cheating Immune Secret Sharing. ICICS 2001: 144-149 |
68 | EE | Jaroslaw Pastuszak, Darek Michalek, Josef Pieprzyk: Copyright Protection of Object-Oriented Software. ICISC 2001: 186-199 |
67 | EE | Josef Pieprzyk, Xian-Mo Zhang: Constructions of Cheating Immune Secret Sharing. ICISC 2001: 226-243 |
66 | EE | Mohamed Al-Ibrahim, Josef Pieprzyk: Authenticating Multicast Streams in Lossy Channels Using Threshold Techniques. ICN (2) 2001: 239-249 |
65 | EE | Josef Pieprzyk, Xian-Mo Zhang: Cheating Prevention in Secret Sharing over GF(pt). INDOCRYPT 2001: 79-90 |
64 | EE | Yvo Desmedt, Reihaneh Safavi-Naini, Huaxiong Wang, Lynn Margaret Batten, Chris Charnes, Josef Pieprzyk: Broadcast anti-jamming systems. Computer Networks 35(2-3): 223-236 (2001) |
2000 | ||
63 | Josef Pieprzyk, Eiji Okamoto, Jennifer Seberry: Information Security, Third International Workshop, ISW 2000, Wollongong, NSW, Australia, December 20-21, 2000, Proceedings Springer 2000 | |
62 | Hossein Ghodosi, Josef Pieprzyk: Cheating Prevention in Secret Sharing. ACISP 2000: 328-341 | |
61 | EE | Jaroslaw Pastuszak, Josef Pieprzyk, Jennifer Seberry: Codes Identifying Bad Signature in Batches. INDOCRYPT 2000: 143-154 |
60 | Jaroslaw Pastuszak, Dariusz Michatek, Josef Pieprzyk, Jennifer Seberry: Identification of Bad Signatures in Batches. Public Key Cryptography 2000: 28-45 | |
59 | Chengxin Qu, Jennifer Seberry, Josef Pieprzyk: Homogeneous bent functions. Discrete Applied Mathematics 102(1-2): 133-139 (2000) | |
1999 | ||
58 | Josef Pieprzyk, Reihaneh Safavi-Naini, Jennifer Seberry: Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings Springer 1999 | |
57 | EE | Willy Susilo, Reihaneh Safavi-Naini, Josef Pieprzyk: Fail-Stop Threshold Signature Schemes Based on Elliptic Curves. ACISP 1999: 103-116 |
56 | EE | Hossein Ghodosi, Josef Pieprzyk: Repudiation of Cheating and Non-repudiation of Zhang's Proxy Signature Schemes. ACISP 1999: 129-134 |
55 | EE | Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang: Changing Thresholds in the Absence of Secure Channels. ACISP 1999: 177-191 |
54 | EE | Chengxin Qu, Jennifer Seberry, Josef Pieprzyk: On the Symmetric Property of Homogeneous Boolean Functions. ACISP 1999: 26-35 |
53 | EE | Chih-Hung Li, Josef Pieprzyk: Conference Key Agreement from Secret Sharing. ACISP 1999: 64-76 |
52 | Josef Pieprzyk: Linear Secret Sharing with Divisible Shares. ICICS 1999: 71-86 | |
51 | Josef Pieprzyk, Eiji Okamoto: Verfiable Secret Sharing and Time Capsules. ICISC 1999: 169-183 | |
50 | EE | Willy Susilo, Reihaneh Safavi-Naini, Josef Pieprzyk: RSA-Based Fail-Stop Signature Schemes. ICPP Workshops 1999: 161-166 |
49 | EE | Josef Pieprzyk: Fingerprints for Copyright Software Protection. ISW 1999: 178-190 |
48 | Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang: Changing Thresholds in the Absence of Secure Channels. Australian Computer Journal 31(2): 34-43 (1999) | |
47 | EE | Josef Pieprzyk, Cheng Xin Qu: Rotation-Symmetric Functions and Fast Hashing. J. UCS 5(1): 20-31 (1999) |
1998 | ||
46 | EE | Josef Pieprzyk, Cheng Xin Qu: Rotation-Symmetric Functions and Fast Hashing. ACISP 1998: 169-180 |
45 | EE | Hossein Ghodosi, Josef Pieprzyk, Reihaneh Safavi-Naini: Secret Sharing in Multilevel and Compartmented Groups. ACISP 1998: 367-378 |
44 | EE | Hossein Ghodosi, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang: On Construction of Cumulative Secret Sharing Schemes. ACISP 1998: 379-390 |
1997 | ||
43 | Vijay Varadharajan, Josef Pieprzyk, Yi Mu: Information Security and Privacy, Second Australasian Conference, ACISP'97, Syndey, NSW, Australia, July 7-9, 1997, Proceedings Springer 1997 | |
42 | Shahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk: A Message Authentication Code Based on Latin Squares. ACISP 1997: 194-203 | |
41 | Hossein Ghodosi, Josef Pieprzyk, Reihaneh Safavi-Naini: Remarks on the multiple assignment secret sharing scheme. ICICS 1997: 72-80 | |
40 | Chris Charnes, Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini: Secret sharing in hierarchical groups. ICICS 1997: 81-86 | |
39 | EE | Ahmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini: A Multi-Level View Model for Secure Object-Oriented Databases. Data Knowl. Eng. 23(2): 97-117 (1997) |
38 | EE | Shahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk: On the Weakness of Gong's Collisionful Hash Functions. J. UCS 3(3): 185-196 (1997) |
37 | EE | Ahmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini, Janusz R. Getta: Using Cryptographic Hash Functions for Discretionary Access Control in Object-Oriented Databases. J. UCS 3(6): 730-753 (1997) |
1996 | ||
36 | Josef Pieprzyk, Jennifer Seberry: Information Security and Privacy, First Australasian Conference, ACISP'96, Wollongong, NSW, Australia, June 24-26, 1996, Proceedings Springer 1996 | |
35 | Ahmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini: Modeling a multi-level secure object-oriented database using views. ACISP 1996: 190-206 | |
34 | Mansour Esmaili, Reihaneh Safavi-Naini, Josef Pieprzyk: Evidential reasoning in network intrusion detection systems. ACISP 1996: 253-265 | |
33 | Hossein Ghodosi, Josef Pieprzyk, Chris Charnes, Reihaneh Safavi-Naini: Cryptosystems for hierarchical groups. ACISP 1996: 275-286 | |
32 | Shahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk: On selectable collisionful hash functions. ACISP 1996: 287-298 | |
31 | Shahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk: On password-based authenticated key exchange using collisionful hash functions. ACISP 1996: 299-310 | |
30 | Josef Pieprzyk, Hossein Ghodosi, Chris Charnes, Reihaneh Safavi-Naini: Cryptography based on transcendental numbers. ACISP 1996: 96-107 | |
29 | EE | Mansour Esmaili, Bala Balachandran, Reihaneh Safavi-Naini, Josef Pieprzyk: Case-Based Reasoning for Intrusion Detection. ACSAC 1996: 214-223 |
1995 | ||
28 | Josef Pieprzyk, Reihaneh Safavi-Naini: Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28 - December 1, 1994, Proceedings Springer 1995 | |
27 | Ahmad Baraani-Dastjerdi, Janusz R. Getta, Josef Pieprzyk, Reihaneh Safavi-Naini: A Cryptographic Solution to Discretionary Access Control in Structurally Object-Oriented Databases. Australasian Database Conference 1995: 0- | |
26 | Shahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk: Keyed Hash Functions. Cryptography: Policy and Algorithms 1995: 201-214 | |
25 | Ahmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini, Janusz R. Getta: A Model of Authorization for Object-Oriented Databases based on Object Views. DOOD 1995: 503-520 | |
24 | EE | Ahmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini, Janusz R. Getta: A Cryptographic Mechanism for Object-Instance-Based Authorization in Object-Oriented Database Systems. OOER 1995: 44-54 |
1994 | ||
23 | EE | Chris Charnes, Josef Pieprzyk, Reihaneh Safavi-Naini: Conditionally Secure Secret Sharing Schemes with Disenrollment Capability. ACM Conference on Computer and Communications Security 1994: 89-95 |
22 | Chris Charnes, Josef Pieprzyk: Attacking the SL2 Hashing Scheme. ASIACRYPT 1994: 322-330 | |
21 | EE | Chris Charnes, Luke O'Connor, Josef Pieprzyk, Reihaneh Safavi-Naini, Yuliang Zheng: Comments on Soviet Encryption Algorithm. EUROCRYPT 1994: 433-438 |
1993 | ||
20 | Josef Pieprzyk, Babak Sadeghiyan: Design of Hashing Algorithms Springer 1993 | |
1992 | ||
19 | Chris Charnes, Josef Pieprzyk: Linear Nonequivalence versus Nonlinearity. AUSCRYPT 1992: 156-164 | |
18 | Yuliang Zheng, Josef Pieprzyk, Jennifer Seberry: HAVAL - A One-Way Hashing Algorithm with Variable Length of Output. AUSCRYPT 1992: 83-104 | |
17 | EE | Babak Sadeghiyan, Josef Pieprzyk: A Construction for Super Pseudorandom Permutations from A Single Pseudorandom Function. EUROCRYPT 1992: 267-284 |
1991 | ||
16 | Yuliang Zheng, Thomas Hardjono, Josef Pieprzyk: Sibling Intractable Function Families and Their Applications (Extended Abstract). ASIACRYPT 1991: 124-138 | |
15 | Babak Sadeghiyan, Josef Pieprzyk: On Necessary and Sufficient Conditions for the Construction of Super Pseudorandom Permutations. ASIACRYPT 1991: 194-209 | |
14 | Josef Pieprzyk, Babak Sadeghiyan: Optima Perfect Randomizers. ASIACRYPT 1991: 225-236 | |
13 | Matthew Kwan, Josef Pieprzyk: A General Purpose Technique for Locating Key Scheduling Weakness in DES-like Cryptosystems (Extended Abstract). ASIACRYPT 1991: 237-246 | |
12 | Lawrence Brown, Matthew Kwan, Josef Pieprzyk, Jennifer Seberry: Improving Resistance to Differential Cryptanalysis and the Redesign of LOKI. ASIACRYPT 1991: 36-50 | |
11 | Babak Sadeghiyan, Yuliang Zheng, Josef Pieprzyk: How to Construct A Family of Strong One Way Permutations. ASIACRYPT 1991: 97-110 | |
10 | EE | Babak Sadeghiyan, Josef Pieprzyk: A Construction for One Way Hash Functions and Pseudorandom Bit Generators. EUROCRYPT 1991: 431-445 |
9 | EE | Josef Pieprzyk, Reihaneh Safavi-Naini: Randomized Authentication Systems. EUROCRYPT 1991: 472-481 |
8 | EE | Josef Pieprzyk: Probabilistic Analysis of Elementary Randimizers. EUROCRYPT 1991: 542-546 |
1990 | ||
7 | Jennifer Seberry, Josef Pieprzyk: Advances in Cryptology - AUSCRYPT '90, International Conference on Cryptology, Sydney, Australia, January 8-11, 1990, Proceedings Springer 1990 | |
6 | Lawrence Brown, Josef Pieprzyk, Jennifer Seberry: LOKI - A Cryptographic Primitive for Authentication and Secrecy Applications. AUSCRYPT 1990: 229-236 | |
5 | Josef Pieprzyk, Xian-Mo Zhang: Permutation Generators of Alternating Groups. AUSCRYPT 1990: 237-244 | |
4 | EE | Josef Pieprzyk: How to Construct Pseudorandom Permutations from Single Pseudorandom Functions. EUROCRYPT 1990: 140-150 |
1989 | ||
3 | EE | Josef Pieprzyk: Non-linearity of Exponent Permutations. EUROCRYPT 1989: 80-92 |
1985 | ||
2 | EE | Josef Pieprzyk: On Public-Key Cryptosystems Built using Polynomial Rings. EUROCRYPT 1985: 73-78 |
1984 | ||
1 | EE | Josef Pieprzyk: Algebraical Structures of Cryptographic Transformations. EUROCRYPT 1984: 16-24 |