dblp.uni-trier.dewww.uni-trier.de

Josef Pieprzyk

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2009
140EEHossein Ghodosi, Josef Pieprzyk: Multi-Party Computation with Omnipresent Adversary. Public Key Cryptography 2009: 180-195
139EEGaurav Gupta, Josef Pieprzyk: Reversible and Blind Database Watermarking Using Difference Expansion. IJDCF 1(2): 42-54 (2009)
2008
138 Josef Pieprzyk: Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings Springer 2008
137EEQingsong Ye, Huaxiong Wang, Josef Pieprzyk, Xian-Mo Zhang: Efficient Disjointness Tests for Private Datasets. ACISP 2008: 155-169
136EEPeishun Wang, Huaxiong Wang, Josef Pieprzyk: Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups. CANS 2008: 178-195
135EEChiew Kang Leng, Josef Pieprzyk: Features-Pooling Blind JPEG Image Steganalysis. DICTA 2008: 96-103
134EERon Steinfeld, Scott Contini, Krystian Matusiewicz, Josef Pieprzyk, Jian Guo, San Ling, Huaxiong Wang: Cryptanalysis of LASH. FSE 2008: 207-223
133EEVijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang: An On-Line Secure E-Passport Protocol. ISPEC 2008: 14-28
132EEJin Yuan, Qingsong Ye, Huaxiong Wang, Josef Pieprzyk: Secure Computation of the Vector Dominance Problem. ISPEC 2008: 319-333
131EEQingsong Ye, Huaxiong Wang, Josef Pieprzyk: Distributed Private Matching and Set Operations. ISPEC 2008: 347-360
130EEPeishun Wang, Huaxiong Wang, Josef Pieprzyk: Threshold Privacy Preserving Keyword Searches. SOFSEM 2008: 646-658
129EEPeishun Wang, Huaxiong Wang, Josef Pieprzyk: An Efficient Scheme of Common Secure Indices for Conjunctive Keyword-Based Retrieval on Encrypted Data. WISA 2008: 145-159
128EEChristophe Tartary, Huaxiong Wang, Josef Pieprzyk: A coding approach to the multicast stream authentication problem. Int. J. Inf. Sec. 7(4): 265-283 (2008)
127EEChris Charnes, Ulrich Dempwolff, Josef Pieprzyk: The eight variable homogeneous degree three bent functions. J. Discrete Algorithms 6(1): 66-72 (2008)
2007
126 Josef Pieprzyk, Hossein Ghodosi, Ed Dawson: Information Security and Privacy, 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings Springer 2007
125EEBrian Curtis, Josef Pieprzyk, Jan Seruga: An Efficient eAuction Protocol. ARES 2007: 417-421
124EEYvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Huaxiong Wang: On Secure Multi-party Computation in Black-Box Groups. CRYPTO 2007: 591-612
123EERon Steinfeld, Josef Pieprzyk, Huaxiong Wang: How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature. CT-RSA 2007: 357-371
122EEKrystian Matusiewicz, Thomas Peyrin, Olivier Billet, Scott Contini, Josef Pieprzyk: Cryptanalysis of FORK-256. FSE 2007: 19-38
121EEScott Contini, Krystian Matusiewicz, Josef Pieprzyk: Extending FORK-256 Attack to the Full Hash Function. ICICS 2007: 296-305
120EEPeishun Wang, Huaxiong Wang, Josef Pieprzyk: A New Dynamic Accumulator for Batch Updates. ICICS 2007: 98-112
119EEJoo Yeon Cho, Josef Pieprzyk: Multiple Modular Additions and Crossword Puzzle Attack on NLSv2. ISC 2007: 230-248
118EEChristophe Tartary, Josef Pieprzyk, Huaxiong Wang: Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures. Inscrypt 2007: 167-181
117EEChristophe Tartary, Huaxiong Wang, Josef Pieprzyk: An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels. ProvSec 2007: 17-34
116EEPeishun Wang, Huaxiong Wang, Josef Pieprzyk: Common Secure Index for Conjunctive Keyword-Based Retrieval over Encrypted Data. Secure Data Management 2007: 108-123
115EERon Steinfeld, Josef Pieprzyk, Huaxiong Wang: Lattice-Based Threshold Changeability for Standard Shamir Secret-Sharing Schemes. IEEE Transactions on Information Theory 53(7): 2542-2559 (2007)
114EEGaurav Gupta, Josef Pieprzyk: Software Watermarking Resilient to Debugging Attacks. Journal of Multimedia 2(2): 10-16 (2007)
2006
113EEJoo Yeon Cho, Josef Pieprzyk: Distinguishing Attack on SOBER-128 with Linear Masking. ACISP 2006: 29-39
112EEVijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang, Joo Yeon Cho: Formal analysis of card-based payment systems in mobile devices. ACSW Frontiers 2006: 213-220
111EEGaurav Gupta, Josef Pieprzyk, Huaxiong Wang: An attack-localizing watermarking scheme for natural language documents. ASIACCS 2006: 157-165
110EERon Steinfeld, Josef Pieprzyk, Huaxiong Wang: On the Provable Security of an Efficient RSA-Based Pseudorandom Generator. ASIACRYPT 2006: 194-209
109EEXian-Mo Zhang, Josef Pieprzyk, Yuliang Zheng: On Algebraic Immunity and Annihilators. ICISC 2006: 65-80
108EEYvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Huaxiong Wang: A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders. ISC 2006: 459-475
107EEGaurav Gupta, Josef Pieprzyk: A Low-Cost Attack on Branch-Based Software Watermarking Schemes. IWDW 2006: 282-293
106EERon Steinfeld, Josef Pieprzyk, Huaxiong Wang: Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption. Public Key Cryptography 2006: 157-173
105EEJoo Yeon Cho, Josef Pieprzyk: Crossword Puzzle Attack on NLS. Selected Areas in Cryptography 2006: 249-265
104EEHossein Ghodosi, Josef Pieprzyk: An Ideal and Robust Threshold RSA. VIETCRYPT 2006: 312-321
103EEShoulun Long, Josef Pieprzyk, Huaxiong Wang, Duncan S. Wong: Generalised Cumulative Arrays in Secret Sharing. Des. Codes Cryptography 40(2): 191-209 (2006)
2005
102EEVijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang: Privacy Enhanced Electronic Cheque System. CEC 2005: 431-434
101EEJosef Pieprzyk, Xian-Mo Zhang, Jovan Dj. Golic: Characterisations of Extended Resiliency and Extended Immunity of S-Boxes. ICISC 2005: 210-228
100EERon Steinfeld, Scott Contini, Huaxiong Wang, Josef Pieprzyk: Converse Results to the Wiener Attack on RSA. Public Key Cryptography 2005: 184-198
99EEKrystian Matusiewicz, Josef Pieprzyk: Finding Good Differential Patterns for Attacks on SHA-1. WCC 2005: 164-177
98 Krystian Matusiewicz, Josef Pieprzyk, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen: Analysis of simplified variants of SHA-256. WEWoRC 2005: 123-134
2004
97 Huaxiong Wang, Josef Pieprzyk, Vijay Varadharajan: Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings Springer 2004
96EERon Steinfeld, Huaxiong Wang, Josef Pieprzyk: Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes. ASIACRYPT 2004: 170-186
95EEHartono Kurnio, Huaxiong Wang, Josef Pieprzyk, Kris Gaj: Securing Multicast Groups in Ad Hoc Networks. AWCC 2004: 194-207
94 Hossein Ghodosi, Josef Pieprzyk: A Modification to the 'Authentication of Concast Communication'. Cryptographic Algorithms and their Uses 2004: 72-77
93EEJoo Yeon Cho, Josef Pieprzyk: Algebraic Attacks on SOBER-t32 and SOBER-t16 without Stuttering. FSE 2004: 49-64
92EERon Steinfeld, Huaxiong Wang, Josef Pieprzyk: Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures. Public Key Cryptography 2004: 86-100
91EETianbing Xia, Jennifer Seberry, Josef Pieprzyk, Chris Charnes: Homogeneous bent functions of degree n in 2n variables do not exist for nge3. Discrete Applied Mathematics 142(1-3): 127-132 (2004)
90EEJosef Pieprzyk, Xian-Mo Zhang: On Cheating Immune Secret Sharing. Discrete Mathematics & Theoretical Computer Science 6(2): 253-264 (2004)
89EEJosef Pieprzyk, Xian-Mo Zhang: Characterisations of Ideal Threshold Schemes. Discrete Mathematics & Theoretical Computer Science 6(2): 471-482 (2004)
88EEHuaxiong Wang, Josef Pieprzyk: Shared generation of pseudo-random functions. J. Complexity 20(2-3): 458-472 (2004)
2003
87EEJosef Pieprzyk, David Pointcheval: Josef Pieprzyk, David Pointcheval. ACISP 2003: 387-401
86EEHuaxiong Wang, Josef Pieprzyk: Efficient One-Time Proxy Signatures. ASIACRYPT 2003: 507-522
85EERon Steinfeld, Laurence Bull, Huaxiong Wang, Josef Pieprzyk: Universal Designated-Verifier Signatures. ASIACRYPT 2003: 523-542
84EEHuaxiong Wang, Josef Pieprzyk: Shared Generation of Pseudo-Random Functions with Cumulative Maps. CT-RSA 2003: 281-294
83EEJosef Pieprzyk, Huaxiong Wang, Chaoping Xing: Multiple-Time Signature Schemes against Adaptive Chosen Message Attacks. Selected Areas in Cryptography 2003: 88-100
2002
82EEJosef Pieprzyk, Xian-Mo Zhang: Cheating Prevention in Linear Secret Sharing. ACISP 2002: 121-135
81EENicolas Courtois, Josef Pieprzyk: Cryptanalysis of Block Ciphers with Overdefined Systems of Equations. ASIACRYPT 2002: 267-287
80EEHuaxiong Wang, Josef Pieprzyk: A Combinatorial Approach to Anonymous Membership Broadcast. COCOON 2002: 162-170
79 Mohamed Al-Ibrahim, Josef Pieprzyk: Authentication of transit flows and k-siblings one-time signature. Communications and Multimedia Security 2002: 41-55
78EEJosef Pieprzyk, Xian-Mo Zhang: Ideal Threshold Schemes from Orthogonal Arrays. ICICS 2002: 469-479
77EEKeith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild: Threshold MACs. ICISC 2002: 237-252
76EEJosef Pieprzyk, Xian-Mo Zhang: Ideal Threshold Schemes from MDS Codes. ICISC 2002: 253-263
75EEMohamed Al-Ibrahim, Hossein Ghodosi, Josef Pieprzyk: Authentication of Concast Communication. INDOCRYPT 2002: 185-198
74EEKamil Kulesza, Zbigniew Kotulski, Josef Pieprzyk: On alternative approach for verifiable secret sharing CoRR math.CO/0211267: (2002)
73EESoroush Sedaghat, Josef Pieprzyk, Ehsan Vossough: On-the-fly web content integrity check boosts users's confidence. Commun. ACM 45(11): 33-37 (2002)
72 Josef Pieprzyk, Xian-Mo Zhang: Multisecret Sharing Immune Against Cheating. Informatica (Slovenia) 26(3): (2002)
2001
71EEHossein Ghodosi, Josef Pieprzyk: Democratic Systems. ACISP 2001: 392-402
70EESoroush Sedaghat, Josef Pieprzyk, Ehsan Vossough: A Dynamic Web Agent for Verifying the Security and Integrity of a Web Site's Contents. CSCWD 2001: 330-337
69EEXian-Mo Zhang, Josef Pieprzyk: Cheating Immune Secret Sharing. ICICS 2001: 144-149
68EEJaroslaw Pastuszak, Darek Michalek, Josef Pieprzyk: Copyright Protection of Object-Oriented Software. ICISC 2001: 186-199
67EEJosef Pieprzyk, Xian-Mo Zhang: Constructions of Cheating Immune Secret Sharing. ICISC 2001: 226-243
66EEMohamed Al-Ibrahim, Josef Pieprzyk: Authenticating Multicast Streams in Lossy Channels Using Threshold Techniques. ICN (2) 2001: 239-249
65EEJosef Pieprzyk, Xian-Mo Zhang: Cheating Prevention in Secret Sharing over GF(pt). INDOCRYPT 2001: 79-90
64EEYvo Desmedt, Reihaneh Safavi-Naini, Huaxiong Wang, Lynn Margaret Batten, Chris Charnes, Josef Pieprzyk: Broadcast anti-jamming systems. Computer Networks 35(2-3): 223-236 (2001)
2000
63 Josef Pieprzyk, Eiji Okamoto, Jennifer Seberry: Information Security, Third International Workshop, ISW 2000, Wollongong, NSW, Australia, December 20-21, 2000, Proceedings Springer 2000
62 Hossein Ghodosi, Josef Pieprzyk: Cheating Prevention in Secret Sharing. ACISP 2000: 328-341
61EEJaroslaw Pastuszak, Josef Pieprzyk, Jennifer Seberry: Codes Identifying Bad Signature in Batches. INDOCRYPT 2000: 143-154
60 Jaroslaw Pastuszak, Dariusz Michatek, Josef Pieprzyk, Jennifer Seberry: Identification of Bad Signatures in Batches. Public Key Cryptography 2000: 28-45
59 Chengxin Qu, Jennifer Seberry, Josef Pieprzyk: Homogeneous bent functions. Discrete Applied Mathematics 102(1-2): 133-139 (2000)
1999
58 Josef Pieprzyk, Reihaneh Safavi-Naini, Jennifer Seberry: Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings Springer 1999
57EEWilly Susilo, Reihaneh Safavi-Naini, Josef Pieprzyk: Fail-Stop Threshold Signature Schemes Based on Elliptic Curves. ACISP 1999: 103-116
56EEHossein Ghodosi, Josef Pieprzyk: Repudiation of Cheating and Non-repudiation of Zhang's Proxy Signature Schemes. ACISP 1999: 129-134
55EEKeith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang: Changing Thresholds in the Absence of Secure Channels. ACISP 1999: 177-191
54EEChengxin Qu, Jennifer Seberry, Josef Pieprzyk: On the Symmetric Property of Homogeneous Boolean Functions. ACISP 1999: 26-35
53EEChih-Hung Li, Josef Pieprzyk: Conference Key Agreement from Secret Sharing. ACISP 1999: 64-76
52 Josef Pieprzyk: Linear Secret Sharing with Divisible Shares. ICICS 1999: 71-86
51 Josef Pieprzyk, Eiji Okamoto: Verfiable Secret Sharing and Time Capsules. ICISC 1999: 169-183
50EEWilly Susilo, Reihaneh Safavi-Naini, Josef Pieprzyk: RSA-Based Fail-Stop Signature Schemes. ICPP Workshops 1999: 161-166
49EEJosef Pieprzyk: Fingerprints for Copyright Software Protection. ISW 1999: 178-190
48 Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang: Changing Thresholds in the Absence of Secure Channels. Australian Computer Journal 31(2): 34-43 (1999)
47EEJosef Pieprzyk, Cheng Xin Qu: Rotation-Symmetric Functions and Fast Hashing. J. UCS 5(1): 20-31 (1999)
1998
46EEJosef Pieprzyk, Cheng Xin Qu: Rotation-Symmetric Functions and Fast Hashing. ACISP 1998: 169-180
45EEHossein Ghodosi, Josef Pieprzyk, Reihaneh Safavi-Naini: Secret Sharing in Multilevel and Compartmented Groups. ACISP 1998: 367-378
44EEHossein Ghodosi, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang: On Construction of Cumulative Secret Sharing Schemes. ACISP 1998: 379-390
1997
43 Vijay Varadharajan, Josef Pieprzyk, Yi Mu: Information Security and Privacy, Second Australasian Conference, ACISP'97, Syndey, NSW, Australia, July 7-9, 1997, Proceedings Springer 1997
42 Shahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk: A Message Authentication Code Based on Latin Squares. ACISP 1997: 194-203
41 Hossein Ghodosi, Josef Pieprzyk, Reihaneh Safavi-Naini: Remarks on the multiple assignment secret sharing scheme. ICICS 1997: 72-80
40 Chris Charnes, Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini: Secret sharing in hierarchical groups. ICICS 1997: 81-86
39EEAhmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini: A Multi-Level View Model for Secure Object-Oriented Databases. Data Knowl. Eng. 23(2): 97-117 (1997)
38EEShahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk: On the Weakness of Gong's Collisionful Hash Functions. J. UCS 3(3): 185-196 (1997)
37EEAhmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini, Janusz R. Getta: Using Cryptographic Hash Functions for Discretionary Access Control in Object-Oriented Databases. J. UCS 3(6): 730-753 (1997)
1996
36 Josef Pieprzyk, Jennifer Seberry: Information Security and Privacy, First Australasian Conference, ACISP'96, Wollongong, NSW, Australia, June 24-26, 1996, Proceedings Springer 1996
35 Ahmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini: Modeling a multi-level secure object-oriented database using views. ACISP 1996: 190-206
34 Mansour Esmaili, Reihaneh Safavi-Naini, Josef Pieprzyk: Evidential reasoning in network intrusion detection systems. ACISP 1996: 253-265
33 Hossein Ghodosi, Josef Pieprzyk, Chris Charnes, Reihaneh Safavi-Naini: Cryptosystems for hierarchical groups. ACISP 1996: 275-286
32 Shahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk: On selectable collisionful hash functions. ACISP 1996: 287-298
31 Shahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk: On password-based authenticated key exchange using collisionful hash functions. ACISP 1996: 299-310
30 Josef Pieprzyk, Hossein Ghodosi, Chris Charnes, Reihaneh Safavi-Naini: Cryptography based on transcendental numbers. ACISP 1996: 96-107
29EEMansour Esmaili, Bala Balachandran, Reihaneh Safavi-Naini, Josef Pieprzyk: Case-Based Reasoning for Intrusion Detection. ACSAC 1996: 214-223
1995
28 Josef Pieprzyk, Reihaneh Safavi-Naini: Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28 - December 1, 1994, Proceedings Springer 1995
27 Ahmad Baraani-Dastjerdi, Janusz R. Getta, Josef Pieprzyk, Reihaneh Safavi-Naini: A Cryptographic Solution to Discretionary Access Control in Structurally Object-Oriented Databases. Australasian Database Conference 1995: 0-
26 Shahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk: Keyed Hash Functions. Cryptography: Policy and Algorithms 1995: 201-214
25 Ahmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini, Janusz R. Getta: A Model of Authorization for Object-Oriented Databases based on Object Views. DOOD 1995: 503-520
24EEAhmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini, Janusz R. Getta: A Cryptographic Mechanism for Object-Instance-Based Authorization in Object-Oriented Database Systems. OOER 1995: 44-54
1994
23EEChris Charnes, Josef Pieprzyk, Reihaneh Safavi-Naini: Conditionally Secure Secret Sharing Schemes with Disenrollment Capability. ACM Conference on Computer and Communications Security 1994: 89-95
22 Chris Charnes, Josef Pieprzyk: Attacking the SL2 Hashing Scheme. ASIACRYPT 1994: 322-330
21EEChris Charnes, Luke O'Connor, Josef Pieprzyk, Reihaneh Safavi-Naini, Yuliang Zheng: Comments on Soviet Encryption Algorithm. EUROCRYPT 1994: 433-438
1993
20 Josef Pieprzyk, Babak Sadeghiyan: Design of Hashing Algorithms Springer 1993
1992
19 Chris Charnes, Josef Pieprzyk: Linear Nonequivalence versus Nonlinearity. AUSCRYPT 1992: 156-164
18 Yuliang Zheng, Josef Pieprzyk, Jennifer Seberry: HAVAL - A One-Way Hashing Algorithm with Variable Length of Output. AUSCRYPT 1992: 83-104
17EEBabak Sadeghiyan, Josef Pieprzyk: A Construction for Super Pseudorandom Permutations from A Single Pseudorandom Function. EUROCRYPT 1992: 267-284
1991
16 Yuliang Zheng, Thomas Hardjono, Josef Pieprzyk: Sibling Intractable Function Families and Their Applications (Extended Abstract). ASIACRYPT 1991: 124-138
15 Babak Sadeghiyan, Josef Pieprzyk: On Necessary and Sufficient Conditions for the Construction of Super Pseudorandom Permutations. ASIACRYPT 1991: 194-209
14 Josef Pieprzyk, Babak Sadeghiyan: Optima Perfect Randomizers. ASIACRYPT 1991: 225-236
13 Matthew Kwan, Josef Pieprzyk: A General Purpose Technique for Locating Key Scheduling Weakness in DES-like Cryptosystems (Extended Abstract). ASIACRYPT 1991: 237-246
12 Lawrence Brown, Matthew Kwan, Josef Pieprzyk, Jennifer Seberry: Improving Resistance to Differential Cryptanalysis and the Redesign of LOKI. ASIACRYPT 1991: 36-50
11 Babak Sadeghiyan, Yuliang Zheng, Josef Pieprzyk: How to Construct A Family of Strong One Way Permutations. ASIACRYPT 1991: 97-110
10EEBabak Sadeghiyan, Josef Pieprzyk: A Construction for One Way Hash Functions and Pseudorandom Bit Generators. EUROCRYPT 1991: 431-445
9EEJosef Pieprzyk, Reihaneh Safavi-Naini: Randomized Authentication Systems. EUROCRYPT 1991: 472-481
8EEJosef Pieprzyk: Probabilistic Analysis of Elementary Randimizers. EUROCRYPT 1991: 542-546
1990
7 Jennifer Seberry, Josef Pieprzyk: Advances in Cryptology - AUSCRYPT '90, International Conference on Cryptology, Sydney, Australia, January 8-11, 1990, Proceedings Springer 1990
6 Lawrence Brown, Josef Pieprzyk, Jennifer Seberry: LOKI - A Cryptographic Primitive for Authentication and Secrecy Applications. AUSCRYPT 1990: 229-236
5 Josef Pieprzyk, Xian-Mo Zhang: Permutation Generators of Alternating Groups. AUSCRYPT 1990: 237-244
4EEJosef Pieprzyk: How to Construct Pseudorandom Permutations from Single Pseudorandom Functions. EUROCRYPT 1990: 140-150
1989
3EEJosef Pieprzyk: Non-linearity of Exponent Permutations. EUROCRYPT 1989: 80-92
1985
2EEJosef Pieprzyk: On Public-Key Cryptosystems Built using Polynomial Rings. EUROCRYPT 1985: 73-78
1984
1EEJosef Pieprzyk: Algebraical Structures of Cryptographic Transformations. EUROCRYPT 1984: 16-24

Coauthor Index

1Mohamed Al-Ibrahim [66] [75] [79]
2Shahram Bakhtiari [26] [31] [32] [38] [42]
3Bala Balachandran [29]
4Ahmad Baraani-Dastjerdi [24] [25] [27] [35] [37] [39]
5Lynn Margaret Batten [64]
6Olivier Billet [122]
7Lawrence Brown [6] [12]
8Laurence Bull [85]
9Chris Charnes [19] [21] [22] [23] [30] [33] [40] [64] [91] [127]
10Joo Yeon Cho [93] [105] [112] [113] [119]
11Scott Contini [100] [121] [122] [134]
12Nicolas Courtois [81]
13Brian Curtis [125]
14Ed Dawson [126]
15Ulrich Dempwolff [127]
16Yvo Desmedt [64] [108] [124]
17Mansour Esmaili [29] [34]
18Kris Gaj [95]
19Janusz R. Getta [24] [25] [27] [37]
20Hossein Ghodosi [30] [33] [41] [44] [45] [56] [62] [71] [75] [94] [104] [126] [140]
21Jovan Dj. Golic [101]
22Jian Guo [134]
23Gaurav Gupta [107] [111] [114] [139]
24Thomas Hardjono [16]
25Zbigniew Kotulski [74]
26Kamil Kulesza [74]
27Hartono Kurnio [95]
28Matthew Kwan [12] [13]
29Chiew Kang Leng [135]
30Chih-Hung Li [53]
31San Ling [134]
32Shoulun Long [103]
33Keith M. Martin [40] [48] [55] [77]
34Krystian Matusiewicz [98] [99] [121] [122] [134]
35Darek Michalek [68]
36Dariusz Michatek [60]
37Yi Mu [43]
38Luke O'Connor [21]
39Eiji Okamoto [51] [63]
40Jaroslaw Pastuszak [60] [61] [68]
41Vijayakrishnan Pasupathinathan [102] [112] [133]
42Thomas Peyrin [122]
43David Pointcheval [87]
44Norbert Pramstaller [98]
45Chengxin Qu (Cheng Xin Qu) [46] [47] [54] [59]
46Christian Rechberger [98]
47Vincent Rijmen [98]
48Babak Sadeghiyan [10] [11] [14] [15] [17] [20]
49Reihaneh Safavi-Naini [9] [21] [23] [24] [25] [26] [27] [28] [29] [30] [31] [32] [33] [34] [35] [37] [38] [39] [40] [41] [42] [44] [45] [48] [50] [55] [57] [58] [64] [77]
50Jennifer Seberry (Jennifer Seberry Wallis) [6] [7] [12] [18] [36] [54] [58] [59] [60] [61] [63] [91]
51Soroush Sedaghat [70] [73]
52Jan Seruga [125]
53Ron Steinfeld [85] [92] [96] [100] [106] [108] [110] [115] [123] [124] [134]
54Willy Susilo [50] [57]
55Christophe Tartary [117] [118] [128]
56Vijay Varadharajan [43] [97]
57Ehsan Vossough [70] [73]
58Huaxiong Wang [44] [48] [55] [64] [77] [80] [83] [84] [85] [86] [88] [92] [95] [96] [97] [100] [102] [103] [106] [108] [110] [111] [112] [115] [116] [117] [118] [120] [123] [124] [128] [129] [130] [131] [132] [133] [134] [136] [137]
59Peishun Wang [116] [120] [129] [130] [136]
60Peter R. Wild [77]
61Duncan S. Wong [103]
62Tianbing Xia [91]
63Chaoping Xing [83]
64Qingsong Ye [131] [132] [137]
65Jin Yuan [132]
66Xian-Mo Zhang [5] [65] [67] [69] [72] [76] [78] [82] [89] [90] [101] [109] [137]
67Yuliang Zheng [11] [16] [18] [21] [109]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)