2009 |
140 | EE | Hossein Ghodosi,
Josef Pieprzyk:
Multi-Party Computation with Omnipresent Adversary.
Public Key Cryptography 2009: 180-195 |
139 | EE | Gaurav Gupta,
Josef Pieprzyk:
Reversible and Blind Database Watermarking Using Difference Expansion.
IJDCF 1(2): 42-54 (2009) |
2008 |
138 | | Josef Pieprzyk:
Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings
Springer 2008 |
137 | EE | Qingsong Ye,
Huaxiong Wang,
Josef Pieprzyk,
Xian-Mo Zhang:
Efficient Disjointness Tests for Private Datasets.
ACISP 2008: 155-169 |
136 | EE | Peishun Wang,
Huaxiong Wang,
Josef Pieprzyk:
Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups.
CANS 2008: 178-195 |
135 | EE | Chiew Kang Leng,
Josef Pieprzyk:
Features-Pooling Blind JPEG Image Steganalysis.
DICTA 2008: 96-103 |
134 | EE | Ron Steinfeld,
Scott Contini,
Krystian Matusiewicz,
Josef Pieprzyk,
Jian Guo,
San Ling,
Huaxiong Wang:
Cryptanalysis of LASH.
FSE 2008: 207-223 |
133 | EE | Vijayakrishnan Pasupathinathan,
Josef Pieprzyk,
Huaxiong Wang:
An On-Line Secure E-Passport Protocol.
ISPEC 2008: 14-28 |
132 | EE | Jin Yuan,
Qingsong Ye,
Huaxiong Wang,
Josef Pieprzyk:
Secure Computation of the Vector Dominance Problem.
ISPEC 2008: 319-333 |
131 | EE | Qingsong Ye,
Huaxiong Wang,
Josef Pieprzyk:
Distributed Private Matching and Set Operations.
ISPEC 2008: 347-360 |
130 | EE | Peishun Wang,
Huaxiong Wang,
Josef Pieprzyk:
Threshold Privacy Preserving Keyword Searches.
SOFSEM 2008: 646-658 |
129 | EE | Peishun Wang,
Huaxiong Wang,
Josef Pieprzyk:
An Efficient Scheme of Common Secure Indices for Conjunctive Keyword-Based Retrieval on Encrypted Data.
WISA 2008: 145-159 |
128 | EE | Christophe Tartary,
Huaxiong Wang,
Josef Pieprzyk:
A coding approach to the multicast stream authentication problem.
Int. J. Inf. Sec. 7(4): 265-283 (2008) |
127 | EE | Chris Charnes,
Ulrich Dempwolff,
Josef Pieprzyk:
The eight variable homogeneous degree three bent functions.
J. Discrete Algorithms 6(1): 66-72 (2008) |
2007 |
126 | | Josef Pieprzyk,
Hossein Ghodosi,
Ed Dawson:
Information Security and Privacy, 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings
Springer 2007 |
125 | EE | Brian Curtis,
Josef Pieprzyk,
Jan Seruga:
An Efficient eAuction Protocol.
ARES 2007: 417-421 |
124 | EE | Yvo Desmedt,
Josef Pieprzyk,
Ron Steinfeld,
Huaxiong Wang:
On Secure Multi-party Computation in Black-Box Groups.
CRYPTO 2007: 591-612 |
123 | EE | Ron Steinfeld,
Josef Pieprzyk,
Huaxiong Wang:
How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature.
CT-RSA 2007: 357-371 |
122 | EE | Krystian Matusiewicz,
Thomas Peyrin,
Olivier Billet,
Scott Contini,
Josef Pieprzyk:
Cryptanalysis of FORK-256.
FSE 2007: 19-38 |
121 | EE | Scott Contini,
Krystian Matusiewicz,
Josef Pieprzyk:
Extending FORK-256 Attack to the Full Hash Function.
ICICS 2007: 296-305 |
120 | EE | Peishun Wang,
Huaxiong Wang,
Josef Pieprzyk:
A New Dynamic Accumulator for Batch Updates.
ICICS 2007: 98-112 |
119 | EE | Joo Yeon Cho,
Josef Pieprzyk:
Multiple Modular Additions and Crossword Puzzle Attack on NLSv2.
ISC 2007: 230-248 |
118 | EE | Christophe Tartary,
Josef Pieprzyk,
Huaxiong Wang:
Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures.
Inscrypt 2007: 167-181 |
117 | EE | Christophe Tartary,
Huaxiong Wang,
Josef Pieprzyk:
An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels.
ProvSec 2007: 17-34 |
116 | EE | Peishun Wang,
Huaxiong Wang,
Josef Pieprzyk:
Common Secure Index for Conjunctive Keyword-Based Retrieval over Encrypted Data.
Secure Data Management 2007: 108-123 |
115 | EE | Ron Steinfeld,
Josef Pieprzyk,
Huaxiong Wang:
Lattice-Based Threshold Changeability for Standard Shamir Secret-Sharing Schemes.
IEEE Transactions on Information Theory 53(7): 2542-2559 (2007) |
114 | EE | Gaurav Gupta,
Josef Pieprzyk:
Software Watermarking Resilient to Debugging Attacks.
Journal of Multimedia 2(2): 10-16 (2007) |
2006 |
113 | EE | Joo Yeon Cho,
Josef Pieprzyk:
Distinguishing Attack on SOBER-128 with Linear Masking.
ACISP 2006: 29-39 |
112 | EE | Vijayakrishnan Pasupathinathan,
Josef Pieprzyk,
Huaxiong Wang,
Joo Yeon Cho:
Formal analysis of card-based payment systems in mobile devices.
ACSW Frontiers 2006: 213-220 |
111 | EE | Gaurav Gupta,
Josef Pieprzyk,
Huaxiong Wang:
An attack-localizing watermarking scheme for natural language documents.
ASIACCS 2006: 157-165 |
110 | EE | Ron Steinfeld,
Josef Pieprzyk,
Huaxiong Wang:
On the Provable Security of an Efficient RSA-Based Pseudorandom Generator.
ASIACRYPT 2006: 194-209 |
109 | EE | Xian-Mo Zhang,
Josef Pieprzyk,
Yuliang Zheng:
On Algebraic Immunity and Annihilators.
ICISC 2006: 65-80 |
108 | EE | Yvo Desmedt,
Josef Pieprzyk,
Ron Steinfeld,
Huaxiong Wang:
A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders.
ISC 2006: 459-475 |
107 | EE | Gaurav Gupta,
Josef Pieprzyk:
A Low-Cost Attack on Branch-Based Software Watermarking Schemes.
IWDW 2006: 282-293 |
106 | EE | Ron Steinfeld,
Josef Pieprzyk,
Huaxiong Wang:
Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption.
Public Key Cryptography 2006: 157-173 |
105 | EE | Joo Yeon Cho,
Josef Pieprzyk:
Crossword Puzzle Attack on NLS.
Selected Areas in Cryptography 2006: 249-265 |
104 | EE | Hossein Ghodosi,
Josef Pieprzyk:
An Ideal and Robust Threshold RSA.
VIETCRYPT 2006: 312-321 |
103 | EE | Shoulun Long,
Josef Pieprzyk,
Huaxiong Wang,
Duncan S. Wong:
Generalised Cumulative Arrays in Secret Sharing.
Des. Codes Cryptography 40(2): 191-209 (2006) |
2005 |
102 | EE | Vijayakrishnan Pasupathinathan,
Josef Pieprzyk,
Huaxiong Wang:
Privacy Enhanced Electronic Cheque System.
CEC 2005: 431-434 |
101 | EE | Josef Pieprzyk,
Xian-Mo Zhang,
Jovan Dj. Golic:
Characterisations of Extended Resiliency and Extended Immunity of S-Boxes.
ICISC 2005: 210-228 |
100 | EE | Ron Steinfeld,
Scott Contini,
Huaxiong Wang,
Josef Pieprzyk:
Converse Results to the Wiener Attack on RSA.
Public Key Cryptography 2005: 184-198 |
99 | EE | Krystian Matusiewicz,
Josef Pieprzyk:
Finding Good Differential Patterns for Attacks on SHA-1.
WCC 2005: 164-177 |
98 | | Krystian Matusiewicz,
Josef Pieprzyk,
Norbert Pramstaller,
Christian Rechberger,
Vincent Rijmen:
Analysis of simplified variants of SHA-256.
WEWoRC 2005: 123-134 |
2004 |
97 | | Huaxiong Wang,
Josef Pieprzyk,
Vijay Varadharajan:
Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings
Springer 2004 |
96 | EE | Ron Steinfeld,
Huaxiong Wang,
Josef Pieprzyk:
Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes.
ASIACRYPT 2004: 170-186 |
95 | EE | Hartono Kurnio,
Huaxiong Wang,
Josef Pieprzyk,
Kris Gaj:
Securing Multicast Groups in Ad Hoc Networks.
AWCC 2004: 194-207 |
94 | | Hossein Ghodosi,
Josef Pieprzyk:
A Modification to the 'Authentication of Concast Communication'.
Cryptographic Algorithms and their Uses 2004: 72-77 |
93 | EE | Joo Yeon Cho,
Josef Pieprzyk:
Algebraic Attacks on SOBER-t32 and SOBER-t16 without Stuttering.
FSE 2004: 49-64 |
92 | EE | Ron Steinfeld,
Huaxiong Wang,
Josef Pieprzyk:
Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures.
Public Key Cryptography 2004: 86-100 |
91 | EE | Tianbing Xia,
Jennifer Seberry,
Josef Pieprzyk,
Chris Charnes:
Homogeneous bent functions of degree n in 2n variables do not exist for nge3.
Discrete Applied Mathematics 142(1-3): 127-132 (2004) |
90 | EE | Josef Pieprzyk,
Xian-Mo Zhang:
On Cheating Immune Secret Sharing.
Discrete Mathematics & Theoretical Computer Science 6(2): 253-264 (2004) |
89 | EE | Josef Pieprzyk,
Xian-Mo Zhang:
Characterisations of Ideal Threshold Schemes.
Discrete Mathematics & Theoretical Computer Science 6(2): 471-482 (2004) |
88 | EE | Huaxiong Wang,
Josef Pieprzyk:
Shared generation of pseudo-random functions.
J. Complexity 20(2-3): 458-472 (2004) |
2003 |
87 | EE | Josef Pieprzyk,
David Pointcheval:
Josef Pieprzyk, David Pointcheval.
ACISP 2003: 387-401 |
86 | EE | Huaxiong Wang,
Josef Pieprzyk:
Efficient One-Time Proxy Signatures.
ASIACRYPT 2003: 507-522 |
85 | EE | Ron Steinfeld,
Laurence Bull,
Huaxiong Wang,
Josef Pieprzyk:
Universal Designated-Verifier Signatures.
ASIACRYPT 2003: 523-542 |
84 | EE | Huaxiong Wang,
Josef Pieprzyk:
Shared Generation of Pseudo-Random Functions with Cumulative Maps.
CT-RSA 2003: 281-294 |
83 | EE | Josef Pieprzyk,
Huaxiong Wang,
Chaoping Xing:
Multiple-Time Signature Schemes against Adaptive Chosen Message Attacks.
Selected Areas in Cryptography 2003: 88-100 |
2002 |
82 | EE | Josef Pieprzyk,
Xian-Mo Zhang:
Cheating Prevention in Linear Secret Sharing.
ACISP 2002: 121-135 |
81 | EE | Nicolas Courtois,
Josef Pieprzyk:
Cryptanalysis of Block Ciphers with Overdefined Systems of Equations.
ASIACRYPT 2002: 267-287 |
80 | EE | Huaxiong Wang,
Josef Pieprzyk:
A Combinatorial Approach to Anonymous Membership Broadcast.
COCOON 2002: 162-170 |
79 | | Mohamed Al-Ibrahim,
Josef Pieprzyk:
Authentication of transit flows and k-siblings one-time signature.
Communications and Multimedia Security 2002: 41-55 |
78 | EE | Josef Pieprzyk,
Xian-Mo Zhang:
Ideal Threshold Schemes from Orthogonal Arrays.
ICICS 2002: 469-479 |
77 | EE | Keith M. Martin,
Josef Pieprzyk,
Reihaneh Safavi-Naini,
Huaxiong Wang,
Peter R. Wild:
Threshold MACs.
ICISC 2002: 237-252 |
76 | EE | Josef Pieprzyk,
Xian-Mo Zhang:
Ideal Threshold Schemes from MDS Codes.
ICISC 2002: 253-263 |
75 | EE | Mohamed Al-Ibrahim,
Hossein Ghodosi,
Josef Pieprzyk:
Authentication of Concast Communication.
INDOCRYPT 2002: 185-198 |
74 | EE | Kamil Kulesza,
Zbigniew Kotulski,
Josef Pieprzyk:
On alternative approach for verifiable secret sharing
CoRR math.CO/0211267: (2002) |
73 | EE | Soroush Sedaghat,
Josef Pieprzyk,
Ehsan Vossough:
On-the-fly web content integrity check boosts users's confidence.
Commun. ACM 45(11): 33-37 (2002) |
72 | | Josef Pieprzyk,
Xian-Mo Zhang:
Multisecret Sharing Immune Against Cheating.
Informatica (Slovenia) 26(3): (2002) |
2001 |
71 | EE | Hossein Ghodosi,
Josef Pieprzyk:
Democratic Systems.
ACISP 2001: 392-402 |
70 | EE | Soroush Sedaghat,
Josef Pieprzyk,
Ehsan Vossough:
A Dynamic Web Agent for Verifying the Security and Integrity of a Web Site's Contents.
CSCWD 2001: 330-337 |
69 | EE | Xian-Mo Zhang,
Josef Pieprzyk:
Cheating Immune Secret Sharing.
ICICS 2001: 144-149 |
68 | EE | Jaroslaw Pastuszak,
Darek Michalek,
Josef Pieprzyk:
Copyright Protection of Object-Oriented Software.
ICISC 2001: 186-199 |
67 | EE | Josef Pieprzyk,
Xian-Mo Zhang:
Constructions of Cheating Immune Secret Sharing.
ICISC 2001: 226-243 |
66 | EE | Mohamed Al-Ibrahim,
Josef Pieprzyk:
Authenticating Multicast Streams in Lossy Channels Using Threshold Techniques.
ICN (2) 2001: 239-249 |
65 | EE | Josef Pieprzyk,
Xian-Mo Zhang:
Cheating Prevention in Secret Sharing over GF(pt).
INDOCRYPT 2001: 79-90 |
64 | EE | Yvo Desmedt,
Reihaneh Safavi-Naini,
Huaxiong Wang,
Lynn Margaret Batten,
Chris Charnes,
Josef Pieprzyk:
Broadcast anti-jamming systems.
Computer Networks 35(2-3): 223-236 (2001) |
2000 |
63 | | Josef Pieprzyk,
Eiji Okamoto,
Jennifer Seberry:
Information Security, Third International Workshop, ISW 2000, Wollongong, NSW, Australia, December 20-21, 2000, Proceedings
Springer 2000 |
62 | | Hossein Ghodosi,
Josef Pieprzyk:
Cheating Prevention in Secret Sharing.
ACISP 2000: 328-341 |
61 | EE | Jaroslaw Pastuszak,
Josef Pieprzyk,
Jennifer Seberry:
Codes Identifying Bad Signature in Batches.
INDOCRYPT 2000: 143-154 |
60 | | Jaroslaw Pastuszak,
Dariusz Michatek,
Josef Pieprzyk,
Jennifer Seberry:
Identification of Bad Signatures in Batches.
Public Key Cryptography 2000: 28-45 |
59 | | Chengxin Qu,
Jennifer Seberry,
Josef Pieprzyk:
Homogeneous bent functions.
Discrete Applied Mathematics 102(1-2): 133-139 (2000) |
1999 |
58 | | Josef Pieprzyk,
Reihaneh Safavi-Naini,
Jennifer Seberry:
Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings
Springer 1999 |
57 | EE | Willy Susilo,
Reihaneh Safavi-Naini,
Josef Pieprzyk:
Fail-Stop Threshold Signature Schemes Based on Elliptic Curves.
ACISP 1999: 103-116 |
56 | EE | Hossein Ghodosi,
Josef Pieprzyk:
Repudiation of Cheating and Non-repudiation of Zhang's Proxy Signature Schemes.
ACISP 1999: 129-134 |
55 | EE | Keith M. Martin,
Josef Pieprzyk,
Reihaneh Safavi-Naini,
Huaxiong Wang:
Changing Thresholds in the Absence of Secure Channels.
ACISP 1999: 177-191 |
54 | EE | Chengxin Qu,
Jennifer Seberry,
Josef Pieprzyk:
On the Symmetric Property of Homogeneous Boolean Functions.
ACISP 1999: 26-35 |
53 | EE | Chih-Hung Li,
Josef Pieprzyk:
Conference Key Agreement from Secret Sharing.
ACISP 1999: 64-76 |
52 | | Josef Pieprzyk:
Linear Secret Sharing with Divisible Shares.
ICICS 1999: 71-86 |
51 | | Josef Pieprzyk,
Eiji Okamoto:
Verfiable Secret Sharing and Time Capsules.
ICISC 1999: 169-183 |
50 | EE | Willy Susilo,
Reihaneh Safavi-Naini,
Josef Pieprzyk:
RSA-Based Fail-Stop Signature Schemes.
ICPP Workshops 1999: 161-166 |
49 | EE | Josef Pieprzyk:
Fingerprints for Copyright Software Protection.
ISW 1999: 178-190 |
48 | | Keith M. Martin,
Josef Pieprzyk,
Reihaneh Safavi-Naini,
Huaxiong Wang:
Changing Thresholds in the Absence of Secure Channels.
Australian Computer Journal 31(2): 34-43 (1999) |
47 | EE | Josef Pieprzyk,
Cheng Xin Qu:
Rotation-Symmetric Functions and Fast Hashing.
J. UCS 5(1): 20-31 (1999) |
1998 |
46 | EE | Josef Pieprzyk,
Cheng Xin Qu:
Rotation-Symmetric Functions and Fast Hashing.
ACISP 1998: 169-180 |
45 | EE | Hossein Ghodosi,
Josef Pieprzyk,
Reihaneh Safavi-Naini:
Secret Sharing in Multilevel and Compartmented Groups.
ACISP 1998: 367-378 |
44 | EE | Hossein Ghodosi,
Josef Pieprzyk,
Reihaneh Safavi-Naini,
Huaxiong Wang:
On Construction of Cumulative Secret Sharing Schemes.
ACISP 1998: 379-390 |
1997 |
43 | | Vijay Varadharajan,
Josef Pieprzyk,
Yi Mu:
Information Security and Privacy, Second Australasian Conference, ACISP'97, Syndey, NSW, Australia, July 7-9, 1997, Proceedings
Springer 1997 |
42 | | Shahram Bakhtiari,
Reihaneh Safavi-Naini,
Josef Pieprzyk:
A Message Authentication Code Based on Latin Squares.
ACISP 1997: 194-203 |
41 | | Hossein Ghodosi,
Josef Pieprzyk,
Reihaneh Safavi-Naini:
Remarks on the multiple assignment secret sharing scheme.
ICICS 1997: 72-80 |
40 | | Chris Charnes,
Keith M. Martin,
Josef Pieprzyk,
Reihaneh Safavi-Naini:
Secret sharing in hierarchical groups.
ICICS 1997: 81-86 |
39 | EE | Ahmad Baraani-Dastjerdi,
Josef Pieprzyk,
Reihaneh Safavi-Naini:
A Multi-Level View Model for Secure Object-Oriented Databases.
Data Knowl. Eng. 23(2): 97-117 (1997) |
38 | EE | Shahram Bakhtiari,
Reihaneh Safavi-Naini,
Josef Pieprzyk:
On the Weakness of Gong's Collisionful Hash Functions.
J. UCS 3(3): 185-196 (1997) |
37 | EE | Ahmad Baraani-Dastjerdi,
Josef Pieprzyk,
Reihaneh Safavi-Naini,
Janusz R. Getta:
Using Cryptographic Hash Functions for Discretionary Access Control in Object-Oriented Databases.
J. UCS 3(6): 730-753 (1997) |
1996 |
36 | | Josef Pieprzyk,
Jennifer Seberry:
Information Security and Privacy, First Australasian Conference, ACISP'96, Wollongong, NSW, Australia, June 24-26, 1996, Proceedings
Springer 1996 |
35 | | Ahmad Baraani-Dastjerdi,
Josef Pieprzyk,
Reihaneh Safavi-Naini:
Modeling a multi-level secure object-oriented database using views.
ACISP 1996: 190-206 |
34 | | Mansour Esmaili,
Reihaneh Safavi-Naini,
Josef Pieprzyk:
Evidential reasoning in network intrusion detection systems.
ACISP 1996: 253-265 |
33 | | Hossein Ghodosi,
Josef Pieprzyk,
Chris Charnes,
Reihaneh Safavi-Naini:
Cryptosystems for hierarchical groups.
ACISP 1996: 275-286 |
32 | | Shahram Bakhtiari,
Reihaneh Safavi-Naini,
Josef Pieprzyk:
On selectable collisionful hash functions.
ACISP 1996: 287-298 |
31 | | Shahram Bakhtiari,
Reihaneh Safavi-Naini,
Josef Pieprzyk:
On password-based authenticated key exchange using collisionful hash functions.
ACISP 1996: 299-310 |
30 | | Josef Pieprzyk,
Hossein Ghodosi,
Chris Charnes,
Reihaneh Safavi-Naini:
Cryptography based on transcendental numbers.
ACISP 1996: 96-107 |
29 | EE | Mansour Esmaili,
Bala Balachandran,
Reihaneh Safavi-Naini,
Josef Pieprzyk:
Case-Based Reasoning for Intrusion Detection.
ACSAC 1996: 214-223 |
1995 |
28 | | Josef Pieprzyk,
Reihaneh Safavi-Naini:
Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28 - December 1, 1994, Proceedings
Springer 1995 |
27 | | Ahmad Baraani-Dastjerdi,
Janusz R. Getta,
Josef Pieprzyk,
Reihaneh Safavi-Naini:
A Cryptographic Solution to Discretionary Access Control in Structurally Object-Oriented Databases.
Australasian Database Conference 1995: 0- |
26 | | Shahram Bakhtiari,
Reihaneh Safavi-Naini,
Josef Pieprzyk:
Keyed Hash Functions.
Cryptography: Policy and Algorithms 1995: 201-214 |
25 | | Ahmad Baraani-Dastjerdi,
Josef Pieprzyk,
Reihaneh Safavi-Naini,
Janusz R. Getta:
A Model of Authorization for Object-Oriented Databases based on Object Views.
DOOD 1995: 503-520 |
24 | EE | Ahmad Baraani-Dastjerdi,
Josef Pieprzyk,
Reihaneh Safavi-Naini,
Janusz R. Getta:
A Cryptographic Mechanism for Object-Instance-Based Authorization in Object-Oriented Database Systems.
OOER 1995: 44-54 |
1994 |
23 | EE | Chris Charnes,
Josef Pieprzyk,
Reihaneh Safavi-Naini:
Conditionally Secure Secret Sharing Schemes with Disenrollment Capability.
ACM Conference on Computer and Communications Security 1994: 89-95 |
22 | | Chris Charnes,
Josef Pieprzyk:
Attacking the SL2 Hashing Scheme.
ASIACRYPT 1994: 322-330 |
21 | EE | Chris Charnes,
Luke O'Connor,
Josef Pieprzyk,
Reihaneh Safavi-Naini,
Yuliang Zheng:
Comments on Soviet Encryption Algorithm.
EUROCRYPT 1994: 433-438 |
1993 |
20 | | Josef Pieprzyk,
Babak Sadeghiyan:
Design of Hashing Algorithms
Springer 1993 |
1992 |
19 | | Chris Charnes,
Josef Pieprzyk:
Linear Nonequivalence versus Nonlinearity.
AUSCRYPT 1992: 156-164 |
18 | | Yuliang Zheng,
Josef Pieprzyk,
Jennifer Seberry:
HAVAL - A One-Way Hashing Algorithm with Variable Length of Output.
AUSCRYPT 1992: 83-104 |
17 | EE | Babak Sadeghiyan,
Josef Pieprzyk:
A Construction for Super Pseudorandom Permutations from A Single Pseudorandom Function.
EUROCRYPT 1992: 267-284 |
1991 |
16 | | Yuliang Zheng,
Thomas Hardjono,
Josef Pieprzyk:
Sibling Intractable Function Families and Their Applications (Extended Abstract).
ASIACRYPT 1991: 124-138 |
15 | | Babak Sadeghiyan,
Josef Pieprzyk:
On Necessary and Sufficient Conditions for the Construction of Super Pseudorandom Permutations.
ASIACRYPT 1991: 194-209 |
14 | | Josef Pieprzyk,
Babak Sadeghiyan:
Optima Perfect Randomizers.
ASIACRYPT 1991: 225-236 |
13 | | Matthew Kwan,
Josef Pieprzyk:
A General Purpose Technique for Locating Key Scheduling Weakness in DES-like Cryptosystems (Extended Abstract).
ASIACRYPT 1991: 237-246 |
12 | | Lawrence Brown,
Matthew Kwan,
Josef Pieprzyk,
Jennifer Seberry:
Improving Resistance to Differential Cryptanalysis and the Redesign of LOKI.
ASIACRYPT 1991: 36-50 |
11 | | Babak Sadeghiyan,
Yuliang Zheng,
Josef Pieprzyk:
How to Construct A Family of Strong One Way Permutations.
ASIACRYPT 1991: 97-110 |
10 | EE | Babak Sadeghiyan,
Josef Pieprzyk:
A Construction for One Way Hash Functions and Pseudorandom Bit Generators.
EUROCRYPT 1991: 431-445 |
9 | EE | Josef Pieprzyk,
Reihaneh Safavi-Naini:
Randomized Authentication Systems.
EUROCRYPT 1991: 472-481 |
8 | EE | Josef Pieprzyk:
Probabilistic Analysis of Elementary Randimizers.
EUROCRYPT 1991: 542-546 |
1990 |
7 | | Jennifer Seberry,
Josef Pieprzyk:
Advances in Cryptology - AUSCRYPT '90, International Conference on Cryptology, Sydney, Australia, January 8-11, 1990, Proceedings
Springer 1990 |
6 | | Lawrence Brown,
Josef Pieprzyk,
Jennifer Seberry:
LOKI - A Cryptographic Primitive for Authentication and Secrecy Applications.
AUSCRYPT 1990: 229-236 |
5 | | Josef Pieprzyk,
Xian-Mo Zhang:
Permutation Generators of Alternating Groups.
AUSCRYPT 1990: 237-244 |
4 | EE | Josef Pieprzyk:
How to Construct Pseudorandom Permutations from Single Pseudorandom Functions.
EUROCRYPT 1990: 140-150 |
1989 |
3 | EE | Josef Pieprzyk:
Non-linearity of Exponent Permutations.
EUROCRYPT 1989: 80-92 |
1985 |
2 | EE | Josef Pieprzyk:
On Public-Key Cryptosystems Built using Polynomial Rings.
EUROCRYPT 1985: 73-78 |
1984 |
1 | EE | Josef Pieprzyk:
Algebraical Structures of Cryptographic Transformations.
EUROCRYPT 1984: 16-24 |