Browse By Person: Pieprzyk, Josef

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | Date
Number of items: 176.

Book

Pieprzyk, Josef & Thomborson, Clark (Eds.) (2012) AISC '12 Proceedings of the Tenth Australasian Information Security Conference. Australian Computer Society, Inc, Darlinghurst, NSW.

Pieprzyk, Josef, Sadeghi, Ahmad-Reza, & Manulis, Mark (Eds.) (2012) Cryptology and network security. Lecture Notes in Computer Science, 7712. Springer, Belin.

Boyd, Colin & Pieprzyk, Josef (Eds.) (2011) AISC '11 Proceedings of the Ninth Australasian Information Security Conference. Australian Computer Society, Inc, Darlinghurst, NSW.

Wang, Huaxiong, Pieprzyk, Josef, & Varadharajan, Vijay (Eds.) (2004) Information Security and Privacy : Proceedings of the 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Lecture Notes in Computer Science, 3108. Springer, Berlin.

Pieprzyk, Josef, Hardjono, Thomas, & Seberry, Jennifer (2003) Fundamentals of Computer Security. Monographs in theoretical computer science. Springer Science+Business Media, New York.

Book Chapter

Bajaj, Kamini (Simi) & Pieprzyk, Josef (2012) Taxonomy and control measures of SPAM and SPIM. In Meghanathan, Natarajan, Chaki, Nabendu, & Nagamalai, Dhinaharan (Eds.) Advances in Computer Science and Information Technology. Computer Science and Information Technology. Springer Berlin Heidelberg, pp. 529-542.

Gupta, Gaurav & Pieprzyk, Josef (2011) Reversible and blind database watermarking using difference expansion. In Li, Chang-Tsun & Ho, Anthony T.S. (Eds.) New Technologies for Digital Crime and Forensics : Devices, Applications, and Software. IGI Global, The United States of America, pp. 190-201.

Pasupathinathan, Vijayakrishnan, Pieprzyk, Josef, & Wang, Huaxiong (2011) Privacy enhancements for hardware-based security modules. In Obaidat, Mohammad S. & Filipe, Joaquim (Eds.) e-Business and Telecommunications. Springer Berlin Heidelberg, pp. 224-236.

Seberry, Jennifer, Charnes, Chris, Pieprzyk, Josef, & Safavi-Naini, Rei (2010) Crypto Topics and Applications I. In Atallah, Mikhail J. & Blanton, Marina (Eds.) Algorithms and Theory of Computation Handbook. Chapman & Hall/CRC, 12.1-12.27.

Seberry, Jennifer, Charnes, Chris, Pieprzyk, Josef, & Safavi-Naini, Rei (2010) Crypto topics and applications II. In Atallah, Mikhail J. & Blanton, Marina (Eds.) Algorithms and Theory of Computation Handbook : Special Topics and Techniques [2nd edition]. Chapman & Hall/CRC, Boca Raton, Fla., pp. 13-1.

Pieprzyk, Josef & Pointcheval, David (2010) Parallel Signcryption. In Dent, Alexander W. & Zheng, Yuliang (Eds.) Practical Signcryption. Springer Berlin Heidelberg, pp. 175-192.

Wang, Peishun, Wang, Huaxiong, & Pieprzyk, Josef (2007) Common secure index for conjunctive keyword-based retrieval over encrypted data. In Jonker, Willem & Petković, Milan (Eds.) Secure Data Management. Springer, Belin, pp. 108-123.
Number of citations in Scopus 3
Number of citations in Web of Science® 6

Cho, Joo Yeon & Pieprzyk, Josef (2006) Crossword puzzle attack on NLS. In Biham, Eli & Youssef, Amr M. (Eds.) Lecture Notes in Computer Science : Selected Areas in Cryptography. Springer, pp. 249-265.

Al-Ibrahim, Mohamed & Pieprzyk, Josef (2001) Authenticating Multicast Streams in Lossy Channels Using Threshold Techniques. In Networking — ICN 2001. Springer Berlin Heidelberg, pp. 239-249.
Number of citations in Scopus 6
Number of citations in Web of Science® 10

Pieprzyk, Josef (2001) Multimedia copyright protection. In Syed, Mahbubur Rahman (Ed.) Design and Management of Multimedia Information Systems : Opportunities and Challenges. IGI Global Publishing, Hershey, PA, pp. 435-451.

Journal Article

Lai, Hong, Zhang, Jun, Luo, Ming-Xing, Pan, Lei, Pieprzyk, Josef, Xiao, Fuyuan, et al. (2016) Hybrid threshold adaptable quantum secret sharing scheme with reverse Huffman-Fibonacci-tree coding. Scientific Reports, 6, Article number-31350.
Number of full-text downloads 4
Number of citations in Web of Science® 1

Pieprzyk, Josef & Haque, Md. Mokammel (2016) Analysing recursive preprocessing of BKZ lattice reduction algorithm. IET Information Security. (In Press)

Lai, Hong, Orgun, Mehmet A., Pieprzyk, Josef, Li, Jing, Luo, Mingxing, Xiao, Jinghua, et al. (2016) High-capacity quantum key distribution using Chebyshev-map values corresponding to Lucas numbers coding. Quantum Information Processing, 15(11), pp. 4663-4679.

Lai, Hong, Luo, Ming-Xing, Pieprzyk, Josef, Tao, Li, Liu, Zhi-Ming, & Orgun, Mehmet A. (2016) Large-capacity three-party quantum digital secret sharing using three particular matrices coding. Communications in Theoretical Physics, 66(5), pp. 501-508.

Lai, Hong, Orgun, Mehmet, Pieprzyk, Josef, Xiao, Jinghua, Xue, Liyin, & Jia, Zhongtian (2015) Controllable quantum private queries using an entangled Fibonacci-sequence spiral source. Physics Letters, Section A: General, Atomic and Solid State Physics, 379(40-41), pp. 2561-2568.
Number of citations in Scopus 5
Number of citations in Web of Science® 4

Lai, Hong, Orgun, Mehmet, Xiao, Jinghua, Pieprzyk, Josef, & Xue, Liyin (2015) Dynamic (2, 3) threshold quantum secret sharing of secure direct communication. Communications in Theoretical Physics, 63(4), pp. 459-465.
Number of citations in Scopus 3

Asghar, Hassan Jameel, Steinfeld, Ron, Li, Shujun, Kaafar, Mohamed Ali, & Pieprzyk, Josef (2015) On the linearization of human identification protocols: Attacks based on linear algebra, coding theory, and lattices. IEEE Transactions on Information Forensics and Security, 10(8), pp. 1643-1655.
Number of citations in Scopus 1
Number of citations in Web of Science® 1

Lai, Hong, Xue, Liyin, Orgun, Mehmet, Xiao, Jinghua, & Pieprzyk, Josef (2015) A hybrid quantum key distribution protocol based on extended unitary operations and fountain codes. Quantum Information Processing, 14(2), pp. 697-713.

Li, Cai, Hu, Jiankun, Pieprzyk, Josef, & Susilo, Willy (2015) A new biocryptosystem-oriented security analysis framework and implementation of multibiometric cryptosystems based on decision level fusion. IEEE Transactions on Information Forensics and Security, 10(6), pp. 1193-1206.
Number of citations in Scopus 6
Number of citations in Web of Science® 4

Asghar, Hassan Jameel, Desmedt, Yvo, Pieprzyk, Josef, & Steinfeld, Ron (2014) A subexponential construction of graph coloring for multiparty computation. Journal of Mathematical Cryptology, 8(4), pp. 363-403.
Number of full-text downloads 14

Orumiehchiha, Mohammad Ali, Pieprzyk, Josef, & Steinfeld, Ron (2014) Practical attack on NLM-MAC scheme. Information Processing Letters, 114(10), pp. 547-550.
Number of full-text downloads 5

Sepahi, Reza, Steinfeld, Ron, & Pieprzyk, Josef (2014) Lattice-based completely non-malleable public-key encryption in the standard model. Designs, Codes and Cryptography, 71(2), pp. 293-313.
Number of citations in Scopus 2
Number of citations in Web of Science® 1

Morawiecki, Pawel, Gaj, Kris, Homsirikamol, Ekawat, Matusiewicz, Krystian, Pieprzyk, Josef, Rogawski, Marcin, et al. (2014) ICEPOLE: High-speed, hardware-oriented authenticated encryption. Lecture Notes in Computer Science [Proceedings of the 16th International Workshop on Cryptographic Hardware and Embedded Systems - CHES 2014], 8731, pp. 392-413.
Number of full-text downloads 50
Number of citations in Web of Science® 3

Emami, Sareh, Ling, San, Nikolić, Ivica, Pieprzyk, Josef, & Wang, Huaxiong (2014) Low probability differentials and the cryptanalysis of full-round CLEFIA-128. Lecture Notes in Computer Science [Proceedings of the 20th International Conference on the Theory and Application of Cryptology and Information Security], 8873, pp. 141-157.
Number of full-text downloads 61
Number of citations in Web of Science® 1

Morawiecki, Pawel, Pieprzyk, Josef, & Srebrny, Marian (2014) Rotational cryptanalysis of round-reduced Keccak. Lecture Notes in Computer Science [Proceedings of the 20th International Workshop on Fast Software Encryption - FSE 2013], 8424, pp. 241-262.
Number of full-text downloads 40
Number of citations in Scopus 3

Emami, Sareh, Ling, San, Nikolić, Ivica, Pieprzyk, Josef, & Wang, Huzxiong (2014) The resistance of PRESENT-80 against related-key differential attacks. Cryptography and Communications, 16(3), pp. 171-187.
Number of full-text downloads 17
Number of citations in Scopus 3
Number of citations in Web of Science® 2

Shi, Zhicai, Pieprzyk, Josef, Doche, Christophe, Xia, Yongxiang, Zhang, Yu, & Dai, Jian (2014) A strong lightweight authentication protocol for low-cost RFID systems. International Journal of Security and Its Applications, 8(6), pp. 225-234.
Number of full-text downloads 1
Number of citations in Scopus 2

Orumiehchiha, Mohammad Ali, Pieprzyk, Josef, Steinfeld, Ron, & Bartlett, Harry (2013) Security analysis of linearly filtered NLFSRs. Journal of Mathematical Cryptology, 7(4), pp. 313-332.

Ashgar, Hassan Jameel, Li, Shujun, Pieprzyk, Josef, & Wang, Huaxiong (2013) Cryptanalysis of the convex hull click human identification protocol. International Journal of Information Security, 12(2), pp. 83-96.
Number of full-text downloads 44
Number of citations in Scopus 4
Number of citations in Web of Science® 2

Orgun, Mehmet A., Pieprzyk, Josef, Elçi, Atilla, Shankaran, Rajan, Xu, Ming, & Wang, Huaxiong (2013) Introduction to the special issue on next generation network architectures, protocols, theory, systems and applications. Networking Science, 2(3-4), pp. 67-68.

Sepahi, Reza, Steinfeld, Ron, & Pieprzyk, Josef (2013) Lattice-based certificateless public-key encryption in the standard model. International Journal of Information Security.
Number of citations in Scopus 2

Lai, Hong, Xiao, Jinghua, Orgun, Michael A., Xue, Liyin, & Pieprzyk, Josef (2013) Quantum direct secret sharing with efficient eavesdropping-check and authentication based on distributed fountain codes. Quantum Information Processing, 13(4), pp. 895-907.
Number of citations in Scopus 5
Number of citations in Web of Science® 3

Orumiehchiha, Mohammad Ali, Pieprzyk, Josef, Shakour, Elham, & Steinfeld, Ron (2013) Security evaluation of Rakaposhi Stream Cipher. Lecture Notes in Computer Science : Information Security Practice and Experience, 7863, pp. 361-371.
Number of full-text downloads 50
Number of citations in Scopus 5

Emami, Sareh, McDonald, Cameron, Pieprzyk, Josef, & Steinfeld, Ron (2013) Truncated differential analysis of reduced-round LBlock. Lecture Notes in Computer Science : Cryptology and Network Security, 8257, pp. 291-308.
Number of citations in Scopus 1

Mohammad Ali, Orumiehchiha, Pieprzyk, Josef, & Steinfeld, Ron (2012) Cryptanalysis of WG-7 : a lightweight stream cipher. Cryptography and Communications, 4(3-4), pp. 277-285.
Number of full-text downloads 59
Number of citations in Scopus 11
Number of citations in Web of Science® 6

Sepahi, Reza, Pieprzyk, Josef, Shahandashti, Siamak F., & Schoenmakers, Berry (2012) New security notions and relations for public-key encryption. Journal of Mathematical Cryptology, 6(3-4), pp. 183-227.
Number of citations in Scopus 1

Desmedt, Yvo, Pieprzyk, Josef, Steinfeld, Ron, Sun, Xiaoming, Tartary, Chrisophe, Wang, Huaxiong, et al. (2012) Graph coloring applied to secure computation in non-Abelian groups. Journal of Cryptology, 25(4), pp. 557-600.
Number of citations in Scopus 3
Number of citations in Web of Science® 2

Ghodosi, Hossein, Pieprzyk, Josef, & Steinfeld, Ron (2012) Multi-party computation with conversion of secret sharing. Designs, Codes and Cryptography, 62(3), pp. 259-272.
Number of citations in Scopus 2
Number of citations in Web of Science® 1

Desmedt, Yvo, Pieprzyk, Josef, & Steinfeld, Ron (2012) Active security in multiparty computation over black-box groups. Lecture Notes in Computer Science : Security and Cryptography for Networks, 7485, pp. 503-521.
Number of full-text downloads 25
Number of citations in Scopus 1

Watters, Paul A., McCombie, Stephen, Layton, Robert, & Pieprzyk, Josef (2012) Characterising and predicting cyber attacks using the Cyber Attacker Model Profile (CAMP). Journal of Money Laundering Control, 15(4), pp. 430-441.

Steinfeld, Ron, Ling, San, Pieprzyk, Josef, Tartary, Christophe, & Wang, Huaxiong (2012) NTRUCCA : how to strengthen NTRUEncrypt to chosen-ciphertext security in the standard model. Lecture Notes in Computer Science : Public Key Cryptography – PKC 2012, 7293, pp. 353-371.
Number of full-text downloads 79
Number of citations in Scopus 3

Wei, Lei, Peyrin, Thomas, Sokołowski, Przemysław, San, Ling, Pieprzyk, Josef, & Wang, Huaxiong (2012) On the (in)security of IDEA in various hashing modes. Lecture Notes in Computer Science : Fast Software Encryption, 7549, pp. 163-179.
Number of full-text downloads 33
Number of citations in Scopus 7

Asghar, Hassan Jameel, Pieprzyk, Josef, & Wang, Huaxiong (2011) On the hardness of the sum of K mins problem. The Computer Journal, 54(10), pp. 1652-1660.
Number of citations in Scopus 1
Number of citations in Web of Science® 1

Gupta, Gaurav, Pieprzyk, Josef, & Hamey, Len (2011) Bucket attack on numeric set watermarking model and safeguards. Information Security Technical Report, 16(2), pp. 59-66.

Pieprzyk, Josef, Wang, Huaxiong, & Zhang, Xian-Mo (2011) Möbius transforms, coincident Boolean functions and non-coincidence property of Boolean functions. International Journal of Computer Mathematics, 88(7), pp. 1398-1416.
Number of citations in Scopus 1
Number of citations in Web of Science® 1

Gupta, Gaurav & Pieprzyk, Josef (2011) Socio-technological phishing prevention. Information Security Technical Report, 16(2), pp. 67-73.
Number of citations in Scopus 1

Asghar, Hassan Jameel, Li, Shujun, Pieprzyk, Josef, & Wang, Huaxiong (2011) Cryptanalysis of the convex hull click human identification protocol. Lecture Notes in Computer Science : Information Security, 6531, pp. 24-30.
Number of citations in Scopus 9
Number of citations in Web of Science® 3

Nikolić, Ivica, Pieprzyk, Josef, Sokołowski, Przemysław, & Steinfeld, Ron (2011) Known and chosen key differential distinguishers for block ciphers. Lecture Notes in Computer Science : Information Security and Cryptology - ICISC 2010, 6829, pp. 29-48.
Number of full-text downloads 48
Number of citations in Scopus 12
Number of citations in Web of Science® 3

Sepahi, Reza, Steinfeld, Ron, & Pieprzyk, Josef (2011) Lattice-based completely non-malleable PKE in the standard model. Lecture Notes in Computer Science : Information Security and Privacy, 6812, pp. 407-411.
Number of citations in Scopus 2
Number of citations in Web of Science® 1

Gupta, Gaurav, Pieprzyk, Josef, & Kankanhalli, Mohan (2011) Robust numeric set watermarking : numbers don’t lie. Communications in Computer and Information Science : e-Business and Telecommunications, 130, pp. 253-265.

Sun, Hung-Min, Wang, Huaxiong, Ku, Bying-He, & Pieprzyk, Josef (2010) Decomposition construction for secret sharing schemes with graph access structures in polynomial time. SIAM Journal on Discrete Mathematics, 24(2), pp. 617-638.
Number of citations in Scopus 3
Number of citations in Web of Science® 3

Chiew, Kang Leng & Pieprzyk, Josef (2010) Binary image steganographic techniques classification based on multi-class steganalysis. Lecture Notes in Computer Science : Information Security, Practice and Experience, 6047, pp. 341-358.
Number of citations in Scopus 6
Number of citations in Web of Science® 4

Ye, Qingsong, Steinfeld, Ron, Pieprzyk, Josef, & Wang, Huaxiong (2010) Efficient fuzzy matching and intersection on private datasets. Lecture Notes in Computer Science : Information, Security and Cryptology – ICISC 2009, 5984, pp. 211-228.
Number of full-text downloads 43
Number of citations in Scopus 6

Leng Chiew, Kang & Pieprzyk, Josef (2010) Identifying steganographic payload location in binary image. Lecture Notes in Computer Science : Advances in Multimedia Information Processing - PCM 2010, 6297, pp. 590-600.

Asghar, Hassan Jameel, Pieprzyk, Josef, & Wang, Huaxiong (2010) A new human identification protocol and Coppersmith's baby-step giant-step algorithm. Lecture Notes in Computer Science : Applied Cryptography and Network Security, 6123, pp. 349-366.
Number of full-text downloads 141
Number of citations in Scopus 3
Number of citations in Web of Science® 4

Biryukov, Alex, Gauravaram, Praveen, Guo, Jian, Khovratovich, Dmitry, Ling, San, Matusiewicz, Krystian, et al. (2009) Cryptanalysis of the LAKE hash family. Lecture Notes in Computer Science : Fast Software Encryption, 5665, pp. 156-179.
Number of full-text downloads 26
Number of citations in Scopus 4
Number of citations in Web of Science® 2

Gupta, Gaurav & Pieprzyk, Josef (2009) Database relation watermarking resilient against secondary watermarking attacks. Lecture Notes in Computer Science : Information Systems Security, 5905, pp. 222-236.
Number of citations in Scopus 15
Number of citations in Web of Science® 11

Zhang, Aileen, Lim, Chu-Wee, Khoo, Khoongming, Wei, Lei, & Pieprzyk, Josef (2009) Extensions of the cube attack based on low degree annihilators. Lecture Notes in Computer Science : Cryptology and Network Security, 5888, pp. 87-102.
Number of full-text downloads 22
Number of citations in Scopus 1

Ghodosi, Hossein & Pieprzyk, Josef (2009) Multi-party computation with omnipresent adversary. Lecture Notes in Computer Science : Public Key Cryptography - PKC 2009, 5443, pp. 180-195.
Number of full-text downloads 36
Number of citations in Web of Science® 1

Gupta, Gaurav & Pieprzyk, Josef (2009) Reversible and blind database watermarking using difference expansion. International Journal of Digital Crime and Forensics, 1(2), pp. 1-13.
Number of citations in Scopus 12

Ye, Qingsong, Wang, Huaxiong, Pieprzyk, Josef, & Zhang, Xian-Mo (2009) Unconditionally secure disjointness tests for private datasets. International Journal of Applied Cryptography, 1(3/2009), pp. 225-235.
Number of citations in Scopus 4

Wang, Peishun , Wang, Huaxiong , & Pieprzyk, Josef (2009) An efficient scheme of common secure indices for conjunctive keyword-based retrieval on encrypted data. Lecture Notes in Computer Science, 5379, pp. 145-159.
Number of citations in Scopus 7
Number of citations in Web of Science® 6

Tartary, Christophe, Zhou, Sujing, Lin, DongDai, Wang, Huaxiong, & Pieprzyk, Josef (2008) Analysis of bilinear pairing-based accumulator for identity escrowing. IET Information Security, 2(4), pp. 99-107.
Number of full-text downloads 104
Number of citations in Scopus 6
Number of citations in Web of Science® 3

Pasupathinathan, Vijayakrishnan, Pieprzyk, Josef, & Wang, Huaxiong (2008) Security analysis of Australian and E.U. e-passport implementation. Journal of Research and Practice in Information Technology, 40(3), pp. 187-205.
Number of citations in Scopus 4
Number of citations in Web of Science® 3

Yuan, Jin, Ding, Cunsheng, Wang, Huaxiong, & Pieprzyk, Josef (2008) Permutation polynomials of the form (xp −x +δ)s +L(x). Finite Fields and Their Applications, 14(2), pp. 482-493.
Number of citations in Scopus 27
Number of citations in Web of Science® 25

Steinfeld, Ron, Contini, Scott, Matusiewicz, Krystian, Pieprzyk, Josef, Guo, Jian, Ling, San, et al. (2008) Cryptanalysis of LASH. Lecture Notes in Computer Science : Fast Software Encryption, 5086, pp. 207-223.
Number of full-text downloads 43
Number of citations in Scopus 1

Ye, Qingsong , Wang, Huaxiong , & Pieprzyk, Josef (2008) Distributed private matching and set operations. Lecture Notes in Computer Science, 4991, pp. 347-360.
Number of citations in Scopus 14
Number of citations in Web of Science® 19

Ye, Qingsong , Wang, Huaxiong , Pieprzyk, Josef, & Zhang, Xian-Mo (2008) Efficient disjointness tests for private datasets. Lecture Notes in Computer Science, 5107, pp. 155-169.
Number of citations in Scopus 4
Number of citations in Web of Science® 3

Wang, Peishun, Wang, Huaxiong, & Pieprzyk, Josef (2008) Keyword field-free conjunctive keyword searches on encrypted data and extension for dynamic groups. Lecture Notes in Computer Science : Cryptology and Network Security, 5339, pp. 178-195.
Number of citations in Scopus 16
Number of citations in Web of Science® 10

Yuan, Jin, Ye, Qingsong, Wang, Huaxiong, & Pieprzyk, Josef (2008) Secure computation of the vector dominance problem. Lecture Notes in Computer Science : Information Security Practice and Experience, 4991, pp. 319-333.
Number of citations in Scopus 2
Number of citations in Web of Science® 1

Wang, Peishun , Wang, Huaxiong , & Pieprzyk, Josef (2008) Threshold privacy preserving keyword searches. Lecture Notes in Computer Science : SOFSEM 2008: Theory and Practice of Computer Science, 4910, pp. 646-658.
Number of citations in Scopus 15
Number of citations in Web of Science® 9

Tartary, Christophe, Pieprzyk, Josef, & Wang, Huaxiong (2008) Verifiable multi-secret sharing schemes for multiple threshold access structures. Lecture Notes in Computer Science : Information Security and Cryptology, 4990, pp. 167-181.
Number of full-text downloads 118
Number of citations in Scopus 6
Number of citations in Web of Science® 2

Tartary, Christophe , Wang, Huaxiong , & Pieprzyk, Josef (2008) A coding approach to the multicast stream authentication problem. International Journal of Information Security, 7(4), pp. 265-283.
Number of citations in Scopus 1
Number of citations in Web of Science® 1

Charnes, C., Dempwolff, U., & Pieprzyk, J. (2008) The eight variable homogeneous degree three bent functions. Journal of Discrete Algorithms, 6(1), pp. 66-72.
Number of citations in Scopus 1

Pasupathinathan, Vijayakrishnan, Pieprzyk, Josef, & Wang , Huaxiong (2008) An on-line secure e-passport protocol. Lecture Notes in Computer Science : Information Security Practice and Experience, 4991, pp. 14-28.
Number of citations in Scopus 9
Number of citations in Web of Science® 4

Steinfeld, Ron, Pieprzyk, Josef, & Wang, Huaxiong (2007) Lattice-based threshold changeability for standard shamir sectret-sharing schemes. IEEE Transactions on Information Theory, 53(7), pp. 2542-2559.
Number of full-text downloads 40
Number of citations in Scopus 14
Number of citations in Web of Science® 8

Matusiewicz, Krystian, Peyrin, Thomas, Billet, Olivier, Contini, Scott, & Pieprzyk, Josef (2007) Cryptanalysis of FORK-256. Fast Software Encryption, 4593, pp. 19-38.
Number of citations in Scopus 5
Number of citations in Web of Science® 4

Contini, Scott, Matusiewicz, Krystian, & Pieprzyk, Josef (2007) Extending FORK-256 attack to the full hash function. Lecture Notes in Computer Science, 4861, pp. 296-305.
Number of citations in Scopus 1

Cho, Joo Yeon & Pieprzyk, Josef (2007) Multiple modular additions and crossword puzzle attack on NLSv2. Lecture Notes in Computer Science : Information Security, 4779, pp. 230-248.
Number of citations in Scopus 3
Number of citations in Web of Science® 3

van Tilborg, Henk, Pieprzyk, Josef, Steinfeld, Ron, & Wang, Huaxiong (2007) New constructions of anonymous membership broadcasting schemes. Advances in Mathematics of Communications, 1(1), pp. 29-44.
Number of citations in Web of Science® 17

Desmedt, Yvo, Pieprzyk, Josef, Steinfeld, Ron, & Wang, Huaxiong (2007) On secure multi-party computation in black-box groups. Lecture Notes in Computer Science : Advances in Cryptology, 4622, pp. 591-612.
Number of citations in Scopus 8
Number of citations in Web of Science® 6

Gupta, Gaurav & Pieprzyk, Josef (2007) Software watermarking resilient to debugging attacks. Journal of Multimedia, 2(2), pp. 10-16.
Number of full-text downloads 78
Number of citations in Scopus 2

Tartary, Christophe, Wang, Huaxiong, & Pieprzyk, Josef (2007) An hybrid approach for efficient multicast stream authentication over unsecured channels. Lecture Notes in Computer Science : Provable Security, 4784, pp. 17-34.
Number of citations in Scopus 1
Number of citations in Web of Science® 1

Wang, Peishun , Wang, Huaxiong , & Pieprzyk, Josef (2007) A new dynamic accumulator for batch updates. Lecture Notes in Computer Science : Information and Communications Security, 4861, pp. 98-112.
Number of citations in Scopus 11
Number of citations in Web of Science® 2

Pieprzyk, Josef, Zhang, Xian-Mo, & Golić, Jovan Dj (2006) Characterisations of extended resiliency and extended immunity of S-boxes. Lecture Notes in Computer Science : Information Security and Cryptology, 3935, pp. 210-228.

Cho, Joo Yeon & Pieprzyk, Josef (2006) Distinguishing attack on SOBER-128 with linear masking. Information Security and Privacy : Information Security and Privacy, 4058, pp. 29-39.
Number of citations in Scopus 6
Number of citations in Web of Science® 4

Matusiewicz, Krystian & Pieprzyk, Josef (2006) Finding good differential patterns for attacks on SHA-1. Lecture Notes in Computer Science, 3969, pp. 164-177.
Number of citations in Scopus 8
Number of citations in Web of Science® 3

Long, Shoulun, Pieprzyk, Josef, Wang, Huaxiong, & Wong, Duncan S. (2006) Generalised cumulative arrays in secret sharing. Designs, Codes and Cryptography, 40(2), pp. 191-209.
Number of citations in Scopus 4
Number of citations in Web of Science® 3

Steinfeld, Ron, Pieprzyk, Josef, & Wang, Huaxiong (2006) Higher order universal one-way hash functions from the subset sum assumption. Lecture Notes in Computer Science : Public Key Cryptography - PKC 2006, 3958, pp. 157-173.

Steinfeld, Ron, Pieprzyk, Josef, & Wang, Huaxiong (2006) How to strengthen any weakly unforgeable signature into a strongly unforgeable signature. Lecture Notes in Computer Science : Topics in Cryptology – CT-RSA 2007, 4377, pp. 357-371.

Pieprzyk, Josef & Zhang, Xian-Mo (2006) Ideal secret sharing schemes from permutations. International Journal of Network Security, 2(3), pp. 238-244.
Number of full-text downloads 100
Number of citations in Scopus 6

Steinfeld, Ron, Pieprzyk, Josef, & Wang, Huaxiong (2006) Lattice-based threshold-changeability for standard CRT secret-sharing schemes. Finite Fields and Their Applications, 12(4), pp. 653-680.
Number of citations in Scopus 12
Number of citations in Web of Science® 9

Zhang, Xian-Mo, Pieprzyk, Josef, & Zheng, Yuliang (2006) On algebraic immunity and annihilators. Lecture Notes in Computer Science : Information Security and Cryptology, 4296, pp. 65-80.
Number of citations in Scopus 11
Number of citations in Web of Science® 9

Steinfeld, Ron, Pieprzyk, Josef, & Wang, Huaxiong (2006) On the provable security of an efficient RSA-based pseudorandom generator. Lecture Notes in Computer Science : Advances in Cryptology, 4284, pp. 194-209.
Number of citations in Scopus 10
Number of citations in Web of Science® 14

Ghodosi, Hossein & Pieprzyk, Josef (2006) An ideal and robust threshold RSA. Lecture Notes in Computer Science : Progress in Cryptology - VIETCRYPT 2006, 4341, pp. 312-321.
Number of citations in Scopus 2

Gupta, Gaurav & Pieprzyk, Josef (2006) A low-cost attack on branch-based software watermarking schemes. Lecture Notes in Computer Science : Digital Watermarking, 4283, pp. 282-293.
Number of citations in Scopus 1
Number of citations in Web of Science® 1

Desmedt, Yvo, Pieprzyk, Josef, Steinfeld, Ron, & Wang, Huaxiong (2006) A non-malleable group key exchange protocol robust against active insiders. Lecture Notes in Computer Science Volume : Information Security, 4176, pp. 459-475.
Number of citations in Scopus 15
Number of citations in Web of Science® 12

Steinfeld, Ron, Contini, Scott, Wang, Huaxiong, & Pieprzyk, Josef (2005) Converse results to the Wiener attack on RSA. Public Key Cryptography - PKC 2005, 3386, pp. 184-198.
Number of citations in Scopus 6
Number of citations in Web of Science® 6

Cho, Joo Yeon & Pieprzyk, Josef (2004) Algebraic attacks on SOBER-t32 and SOBER-t16 without stuttering. Lecture Notes in Computer Science : Fast Software Encryption, 3017, pp. 49-64.
Number of citations in Scopus 15

Pieprzyk, Josef & Zhang, Xian-Mo (2004) Characterisations of ideal threshold schemes. Discrete Mathematics and Theoretical Computer Science, 6(2), pp. 471-482.
Number of full-text downloads 16
Number of citations in Scopus 1
Number of citations in Web of Science® 2

Steinfeld, Ron, Wang, Huaxiong, & Pieprzyk, Josef (2004) Efficient extension of standard Schnorr/RSA signatures into Universal Designated-Verifier Signatures. Lecture Notes in Computer Science : Public Key Cryptography – PKC 2004, 2947, pp. 86-100.
Number of citations in Scopus 81
Number of citations in Web of Science® 60

Xia, Tianbing, Seberry, Jennifer, Pieprzyk, Josef, & Charnes, Chris (2004) Homogeneous bent functions of degree n in 2n variables do not exist for n>3. Discrete Applied Mathematics, 142(1-3), pp. 127-132.
Number of citations in Scopus 16
Number of citations in Web of Science® 11

Steinfeld, Ron, Wang, Huaxiong, & Pieprzyk, Josef (2004) Lattice-based threshold-changeability for standard Shamir secret-sharing schemes. Lecture Notes in Computer Science : Advances in Cryptology - ASIACRYPT 2004, 3329, pp. 170-186.
Number of citations in Scopus 11
Number of citations in Web of Science® 11

Pieprzyk, Josef, Wang, Huaxiong, & Xing, Chaoping (2004) Multiple-time signature schemes against adaptive chosen message attacks. Lecture Notes in Computer Science : Selected Areas in Cryptography, 3006, pp. 88-100.
Number of citations in Scopus 17
Number of citations in Web of Science® 7

Pieprzyk, Josef & Zhang, Xian-Mo (2004) On cheating immune secret sharing. Discrete Mathematics and Theoretical Computer Science, 6(2), pp. 253-264.
Number of full-text downloads 22
Number of citations in Scopus 8
Number of citations in Web of Science® 4

Kurnio, Hartono, Wang, Huaxiong, Pieprzyk, Josef, & Gaj, Kris (2004) Securing multicast groups in ad hoc networks. Lecture Notes in Computer Science : Content Computing, 3309, pp. 194-207.
Number of citations in Web of Science® 1

Wang, Huaxiong & Pieprzyk, Josef (2004) Shared generation of pseudo-random functions. Journal of Complexity, 20(2-3), pp. 458-472.

Wang, Huaxiong & Pieprzyk, Josef (2003) Efficient one-time proxy signatures. Lecture Notes in Computer Science : Advances in Cryptology - ASIACRYPT 2003, 2894, pp. 507-522.
Number of citations in Scopus 23
Number of citations in Web of Science® 20

Pieprzyk, Josef & Zhang, Xian-Mo (2003) Ideal threshold schemes from MDS codes. Lecture Notes in Computer Science : Information Security and Cryptology — ICISC 2002, 2587, pp. 253-263.
Number of citations in Scopus 10

Pieprzyk, Josef & Pointcheval, David (2003) Parallel authentication and public-key encryption. Lecture Notes in Computer Science, 2727, pp. 387-401.
Number of citations in Scopus 13
Number of citations in Web of Science® 5

Wang, Huaxiong & Pieprzyk, Josef (2003) Shared generation of pseudo-random functions with cumulative maps. Lecture Notes in Computer Science : Topics in Cryptology, 2612, pp. 281-295.
Number of citations in Scopus 3
Number of citations in Web of Science® 3

Steinfeld, Ron, Bull, Laurence, Wang, Huaxiong, & Pieprzyk, Josef (2003) Universal designated-verifier signatures. Lecture Notes in Computer Science : Advances in Cryptology, 2894, pp. 523-542.
Number of citations in Scopus 115
Number of citations in Web of Science® 96

Al-Ibrahim, Mohamed, Ghodosi, Hossein, & Pieprzyk, Josef (2002) Authentication of concast communication. Lecture Notes in Computer Science, 2551, pp. 185-198.
Number of citations in Scopus 4
Number of citations in Web of Science® 3

Pieprzyk, Josef & Zhang, Xian-Mo (2002) Cheating prevention in linear secret sharing. Lecture Notes in Computer Science : Information Security and Privacy, 2384, pp. 121-135.
Number of citations in Scopus 1
Number of citations in Web of Science® 4

Pastuszak, Jarek, Michałek, Darek, & Pieprzyk, Josef (2002) Copyright Protection of object-oriented software. Information Security and Cryptology — ICISC 2001, 2288, pp. 186-199.
Number of citations in Scopus 2

Courtois, Nicolas T. & Pieprzyk, Josef (2002) Cryptanalysis of block ciphers with overdefined systems of equations. Advances in Cryptology — ASIACRYPT 2002, 2501, pp. 267-287.
Number of citations in Scopus 360
Number of citations in Web of Science® 235

Pieprzyk, Josef & Zhang, Xiam-Mo (2002) Ideal threshold schemes from orthogonal arrays. Lecture Notes in Computer Science : Information and Communications Security, 2513, pp. 469-479.
Number of citations in Scopus 1
Number of citations in Web of Science® 1

Sedaghat, Soroush, Pieprzyk, Josef, & Vossough, Ehsan (2002) On-the-fly web content integrity check boosts users' confidence. Communications of the ACM, 45(11), pp. 33-37.
Number of citations in Scopus 8
Number of citations in Web of Science® 6

Martin, Keith M., Pieprzyk, Josef, Savafi-Naini, Rei, Wang, Huaxiong, & Wild, Peter R. (2002) Threshold MACs. Lecture Notes in Computer Science : Information Security and Cryptology, 2589, pp. 237-252.
Number of citations in Web of Science® 3

Wang, Huaxiong & Pieprzyk, Josef (2002) A combinatorial approach to anonymous membership broadcast. Lecture Notes in Computer Science : Computing and Combinatorics, 2387, pp. 162-170.
Number of citations in Scopus 2

Desmedt, Yvo, Safavi-Naini, Rei, Wang, Huaxiong, Batten, Lynn, Charnes, Chris, & Pieprzyk, Josef (2001) Broadcast anti-jamming systems. Computer Networks, 35(2-3), pp. 223-236.
Number of citations in Scopus 15
Number of citations in Web of Science® 14

Zhang, Xian-Mo & Pieprzyk, Josef (2001) Cheating immune secret sharing. Lecture Notes in Computer Science : Information and Communications Security, 2229, pp. 144-149.
Number of citations in Scopus 10

Ghodosi, Hossein & Pieprzyk, Josef (2001) Democratic systems. Lecture Notes in Computer Science : Information Security and Privacy, 2119, pp. 392-402.
Number of citations in Scopus 2
Number of citations in Web of Science® 1

Pieprzyk, Josef & Pastuszak, Jaroslaw (2001) Identyfikacja blednych podpisow w kolekcjach. Telekomunikacja i techniki informacyjne, 2, pp. 46-60.

Conference Paper

Salam, Md Iftekhar, Bartlett, Harry, Dawson, Ed, Pieprzyk, Josef, Simpson, Leonie, & Wong, Kenneth Koon-Ho (2016) Investigating cube attacks on the authenticated encryption stream cipher ACORN. In International Conference on Applications and Techniques in Information Security (ATIS 2016), 26-28 October 2016, Cairns, Qld.

Salam, Md Iftekhar, Wong, Kenneth Koon-Ho, Bartlett, Harry, Simpson, Leonie, Dawson, Ed, & Pieprzyk, Josef (2016) Finding state collisions in the authenticated encryption stream cipher ACORN. In ACSW '16 Australasian Computer Science Week, 2 - 5 February 2016, Canberra, A.C.T.

Alley, Joseph & Pieprzyk, Josef (2016) State recovery attacks against π-cipher. In Australasian Computer Science Week Multiconference (ACSW16), 1-5 February 2016, Canberra, A.C.T.
Number of full-text downloads 4

Haque, M. Mokammel & Pieprzyk, Josef (2015) Optimizing preprocessing method of recursive-BKZ lattice reduction algorithm. In 2nd International Conference on Electrical Information and Communication Technologies (EICT 2015), 10-12 December 2015, Kuet, Khulna, Bangladesh.

Dinur, Itai, Morawiecki, Pawel, Pieprzyk, Josef, Srebrny, Marian, & Straus, Michal (2015) Cube attacks and cube-attack-like cryptanalysis on the round-reduced Keccak sponge function. In Advances in Cryptology - EUROCRYPT 2015: 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings, Part I [Lecture Notes in Computer Science, Volume 9056], Springer, Bulgaria, pp. 733-761.
Number of citations in Scopus 6
Number of citations in Web of Science® 4

Khovratovich, Dmitry, Nikolic, Ivica, Pieprzyk, Josef, Sokolowski, Przemyslaw, & Steinfeld, Ron (2015) Rotational cryptanalysis of ARX revisited. In Fast Software Encryption: 22nd International Workshop, FSE 2015 Revised Selected Papers [Lecture Notes in Computer Science, Volume 9054], Springer, Turkey, pp. 519-536.
Number of citations in Web of Science® 1

Lai, Hong, Orgun, Mehmet A., Xue, Liyin, Xiao, Jinghua, & Pieprzyk, Josef (2014) Dual compressible hybrid quantum secret sharing schemes based on extended unitary operations. In Frey, Michael R., Lomonaco, Samuel J., Myers, John M., Donkor, Eric, Pirich, Andrew R., & Brandt, Howard E. (Eds.) Proceedings of SPIE, Bellingham, WA, Baltimore, MD, The United States of America, pp. 1-13.
Number of citations in Scopus 3

Haque, Md Mokammel, Pieprzyk, Josef, & Asaduzzaman (2014) Predicting tours and probabilistic simulation for BKZ lattice reduction algorithm. In Alam, M. (Ed.) Proceedings of 9th International Forum on Strategic Technology (IFOST 2014), IEEE, Cox's Bazar, Bangladesh, pp. 1-4.

Pussewalage, H.S.G., Hu, Jiankum, & Pieprzyk, Josef (2014) A survey: Error control methods used in bio-cryptography. In Proceedings of the 11th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), IEEE, Xiamen, China, pp. 956-962.
Number of citations in Web of Science® 1

Orumiehchiha, Mohammad Ali, Pieprzyk, Josef, Shakour, Elham, & Steinfeld, Ron (2013) Cryptanalysis of RC4(n, m) stream cipher. In Elçi, Atilla, Chefranov, Alexander, Gaur, Manoj Singh, Orgun, Mehmet A., Makarevich, Oleg B., & Çelik, Yasin (Eds.) SIN '13 Proceedings of the 6th International Conference on Security of Information and Networks, ACM, Aksaray, Turkey, pp. 165-172.
Number of full-text downloads 65

Asghar, Hassan Jameel, Li, Shujun, Steinfeld, Ron, & Pieprzyk, Josef (2013) Does counting still count? Revisiting the security of counting based user authentication protocols against statistical attacks. In Hutton, Thomas (Ed.) Proceedings of the 20th Annual Network and Distributed System Security Symposium (NDSS 2013), The Internet Society 2013, San Diego, California, pp. 1-18.
Number of full-text downloads 56

Orumiehchiha, Mohammad Ali, Pieprzyk, Josef, & Steinfeld, Ron (2012) Cryptanalysis of RC4-based hash function. In Pieprzyk, Josef & Thomborson, Clark (Eds.) Proceedings of the 10th Australasian Information Security Conference (AISC '12), Australian Computer Society, Inc., RMIT University, Melbourne, VIC, pp. 33-38.
Number of citations in Scopus 1

Bajaj, Simi, Egbufor, Fidelis, & Pieprzyk, Josef (2011) Critical analysis of spam prevention techniques. In IWSCN 2011 : International Workshop on Security and Communication Networks : Proceedings, Gjovik, Norway, pp. 1-15.

Chiew, Kang Leng & Pieprzyk, Josef (2010) Blind steganalysis : a countermeasure for binary image steganography. In Proceedings of the ARES '10 International Conference on Availability, Reliability, and Security, IEEE, Krakow, Poland, pp. 653-658.
Number of citations in Scopus 7
Number of citations in Web of Science® 4

Chiew, Kang Leng & Pieprzyk, Josef (2010) Estimating hidden message length in binary image embedded by using boundary pixels steganography. In Proceedings of the ARES '10 International Conference on Availability, Reliability, and Security, IEEE, Krakow, Poland, pp. 683-688.
Number of citations in Scopus 3
Number of citations in Web of Science® 2

Vo, Nguyen H. & Pieprzyk, Josef (2010) Protecting web 2.0 services from botnet exploitations. In O'Conner, Lisa (Ed.) Proceedings of the Second Cybercrime and Trustworthy Computing Workshop, IEEE, Ballarat, Victoria, Australia, pp. 18-28.
Number of citations in Scopus 2

Wang, Peishun, Wang, Huaxiong, & Pieprzyk, Josef (2010) Secure coprocessor-based private information retrieval without periodical preprocessing. In Boyd, Colin & Susilo, Willy (Eds.) Proceedings of the Eighth Australasian Conference on Information Security, Australian Computer Society, Inc., Brisbane, Queensland, Australia, pp. 5-11.

McCombie, Stephen & Pieprzyk, Josef (2010) Winning the phishing war : a strategy for Australia. In O'Conner, Lisa (Ed.) Proceedings of the Second Cybercrime and Trustworthy Computing Workshop, IEEE, Ballarat, Victoria, Australia, pp. 79-86.
Number of citations in Scopus 5

Pasupathinathan, Vijayakrishnan, Pieprzyk, Josef, & Wang, Huaxiong (2009) Certified pseudonyms colligated with master secret key. In Fernández-Medina, Eduardo, Malek, Manu, & Hernando, Javier (Eds.) Proceeding of the International Conference on Security and Cryptography (SECRYPT 2009), INSTICC Press, Setúbal, Milan, Italy, pp. 190-197.
Number of full-text downloads 119

McCombie, Stephen, Pieprzyk, Josef, & Watters, Paul (2009) Cybercrime attribution : an Eastern European case study. In 7th Australian Digital Forensics Conference, 3 December 2009, Edith Cowan University, Perth, WA.
Number of full-text downloads 692
Number of citations in Scopus 5

Li, Shujun, Asghar, Hassan Jameel, Pieprzyk, Josef, Sadeghi, Ahmad-Reza, Schmitz, Roland, & Wang, Huaxiong (2009) On the security of PAS (predicate-based authentication service). In Proceedings of 2009 Annual Computer Security Applications Conference (ACSAC '09), IEEE, Honolulu, Hawaii, pp. 209-218.
Number of citations in Scopus 11
Number of citations in Web of Science® 7

Gupta, Gaurav, Pieprzyk, Josef, & Kankanhalli, Mohan (2009) Robust and reversible numerical set watermarking. In Fernández-Medina, Eduardo , Malek, Manu , & Hernando , Javier (Eds.) Proceedings of the International Conference on Signal Processing and Multimedia Applications (SIGMAP 2009), INSTICC Press, Portugal , Milan, Italy, pp. 141-148.

Leng, Chiew Kang & Pieprzyk, Josef (2008) Features-pooling blind jpeg image steganalysis. In Proceedings of Digital Image Computing: Techniques and Applications (DICTA), 2008, IEEE, Canberra, ACT, pp. 96-103.

Pasupathinathan, Vijayakrishnan, Pieprzyk, Josef, & Wang, Huaxiong (2008) Formal security analysis of Australian e-passport implementation. In Brankovic, Ljiljana & Miller, Mirka (Eds.) AISC '08 Proceedings of the Sixth Australasian Conference on Information Security - (CRPIT Volume 81 - Information Security 2008), Australian Computer Society, Inc, Wollongong, NSW, Australia, pp. 75-82.
Number of citations in Web of Science® 3

Wang, Peishun, Wang, Huaxiong, & Pieprzyk, Josef (2008) Improvement of a dynamic accumulator at ICICS 07 and its application in multi-user keyword-based retrieval on encrypted data. In IEEE Asia-Pacific Services Computing Conference (APSCC 2008), 9-12 December 2008, Yilan.
Number of citations in Scopus 2

Leng, Chiew Kang & Pieprzyk, Josef (2008) JPEG image steganalysis improvement via image-to-image variation minimization. In Proceedings of the 2008 International Conference on Advanced Computer Theory and Engineering (ICACTE '08), IEEE Computer Society, Phuket, Thailand, pp. 223-227.

Pieprzyk, Josef, Wang, Huaxiong, & Zhang, Xian-Mo (2008) MöBIUS-α commutative functions and partially coincident functions. In Masnyk-Hansen, Olga, Michon, Jean-Francis, Valarcher, Pierre, & Yunès, Jean-Baptiste (Eds.) Proceedings of the Fourth International Workshop on Boolean Functions : Cryptography and Applications, Rouen University Press, Copenhagen, Denmark, pp. 135-150.

Gupta, Gaurav & Pieprzyk, Josef (2008) Reversible and blind database watermarking using difference expansion. In Sorell, Matthew (Ed.) Proceedings of the 1st International Conference on Forensic Applications and Techniques in Telecommunications, Information, and Multimedia and Workshop (e-Forensics '08), ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), Adelaide, Australia, pp. 1-6.

Gupta, Gaurav & Pieprzyk, Josef (2008) Source code watermarking based on function dependency oriented sequencing. In Pan, Jeng-Shyang, Niu, Xia-Mu, Huang, Hsiang-Cheh, & Jain, Lakhmi C (Eds.) Proceedings of the 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP '08), IEEE Computer Society, Harbin, China, pp. 965-968.
Number of citations in Scopus 3
Number of citations in Web of Science® 2

McDonald, Cameron, Charnes, Chris, & Pieprzyk, Josef (2008) An algebraic analysis of trivium ciphers based on the boolean satisfiability problem. In Masnyk-Hansen, Olga, Michon, Jean-Francis, Valarcher, Pierre, & Yunes, Jean-Baptiste (Eds.) Proceedings of the 4th International Workshop on Boolean Functions : Cryptography and Applications, Copenhagen, Denmark, pp. 173-184.
Number of full-text downloads 48

Contini, Scott, Steinfeld, Ron, Pieprzyk, Josef, & Matusiewicz, Krystian (2008) A critical look at cryptographic hash function literature. In Li, Yongqing, Ling, San, Niederreiter, Harald, Wang, Huaxiong, Xing, Chaoping, & Zhang, Shengyuan (Eds.) Proceedings of the First International Workshop on Coding and Cryptology, World Scientific Publishing, Wuyi Mountain, Fujian, China, pp. 58-79.

Pasupathinathan, Vijayakrishnan, Pieprzyk, Josef, & Wang, Huaxiong (2008) A fair e-tendering protocol. In Fernández-Medina, Eduardo (Ed.) Proceedings of the International Conference on Security and Cryptography, Institute for Systems and Technologies of Information, Control and Communication, Porto, Portugal, pp. 294-299.
Number of full-text downloads 269
Number of citations in Scopus 1
Number of citations in Web of Science® 1

Cho, Joo Yeon & Pieprzyk, Josef (2008) An improved distinguisher for dragon. In Li, Yongqing, Ling, San, Niederreiter, Harald, Wang, Huaxiong, Xing, Chaoping, & Zhang, Shengyuan (Eds.) Proceedings of the First International Workshop on Coding and Cryptology, World Scientific Publishing, Wuyi Mountain, Fujian, China, pp. 91-108.
Number of full-text downloads 35

Gupta, Gaurav & Pieprzyk, Josef (2007) Reversible and semi-blind relational database watermarking. In Second International Conference on Signal Processing and Multimedia Applications (SIGMAP 2007), 28 - 31 July 2007, Barcelona, Spain.
Number of citations in Scopus 5

Curtis, Brian, Pieprzyk, Josef, & Seruga, Jan (2007) An efficient eAuction potocol. In The Second International Conference on Availability, Reliability and Security (ARES'07), IEEE, Vienna, pp. 417-421.
Number of citations in Scopus 5

Pasupathinathan, Vijayakrishnan, Pieprzyk, Josef, Wang, Huaxiong, & Cho, Joo Yeon (2006) Formal analysis of card-based payment systems in mobile devices. In ACSW Frontiers 2006 : Proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), Australian Computer Society published in association with the ACM Digital LIbrary, Hobart, Tasmania, Australia, pp. 213-220.
Number of citations in Scopus 4

Gupta, Gaurav, Pieprzyk, Josef, & Wang, Huaxiong (2006) An attack-localizing watermarking scheme for natural language documents. In Lin, Ferng-Ching, Lee, Der-Tsai, & Lin, Bao-Shuh (Eds.) Proceedings ASIACCS '06 Symposium on Information, Computer and Communications Security, ACM, Taipei, Taiwan, pp. 157-165.
Number of citations in Scopus 13

Matusiewicz, Krystian, Pieprzyk, Josef, Pramstaller, Norbert, Rechberger, Christian, & Rijmen, Vincent (2005) Analysis of simplified variants of SHA-256. In Western European Workshop on Research in Cryptology, 5 - 7 July 2005, Louvain, Belgium.
Number of citations in Scopus 3

Pasupathinathan, Vijay, Pieprzyk, Josef, & Wang, Huaxiong (2005) Privacy enhanced electronic cheque system. In Proceedings of the Seventh IEEE International Conference on E-Commerce Technology (CEC’05), IEEE, Technische Universität München, Germany, pp. 431-434.
Number of citations in Scopus 8
Number of citations in Web of Science® 1

Pieprzyk, Josef & Zhang, Xian-Mo (2003) An equivalent expression of Rijndael algorithm. In DMS 2003 Proceedings : The 9th International Conference on Distributed Multimedia Systems, Knowledge Systems Institute, Miami, Florida, USA, pp. 668-672.

Al-Ibrahim, Mohamed & Pieprzyk, Josef (2002) Authentication of transit flows and k-siblings one-time signature. In Jerman-Blažič, Borka & Klobučar, Tomaž (Eds.) Advanced communications and multimedia security : IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security, Kluwer Academic, Portorož, Slovenia, pp. 41-55.
Number of citations in Web of Science® 1

Pieprzyk, Josef & Zhang, Xian-Mo (2002) Constructions of cheating immune secret sharing. In ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology, Seoul, South Korea, pp. 226-243.
Number of citations in Scopus 12
Number of citations in Web of Science® 4

Pieprzyk, Josef & Zhang, Xian-Mo (2001) Cheating prevention in secret sharing over GF(pt). In Pandu Rangan, C. & Ding, C. (Eds.) Progress in Cryptology - INDOCRYPT 2001, Springer, Chennai, India, pp. 79-90.
Number of citations in Scopus 7
Number of citations in Web of Science® 4

Pieprzyk, Josef & Zhang, Xian-Mo (2001) Nonlinear secret sharing immune against cheating. In International Workshop on Cryptology and Network Security, 26 - 28 September 2001, Taipei, Taiwan.

Sedaghat, S., Pieprzyk, Josef, & Vossough, E. (2001) A dynamic Web agent for verifying the security and integrity of a Web site's contents. In Proceedings of the Sixth International Conference on Computer Supported Cooperative Work in Design (IEEE Cat. No.01EX472), IEEE, London, Ont, pp. 330-337.

Report

Camtepe, Seyit, Tian, Yu-Chu, Jayalath, Dhammika, & Pieprzyk, Josef (2016) Combinatorial Design of Secure Lightweight Data Dispersal Schemes (Work in Progress). (Unpublished)
Number of full-text downloads 46

This list was generated on Tue Apr 25 01:42:37 2017 AEST.