Search filters

List of works by Josef Pieprzyk

A Combinatorial Approach to Anonymous Membership Broadcast

A Construction for One Way Hash Functions and Pseudorandom Bit Generators

A Construction for Super Pseudorandom Permutations from A Single Pseudorandom Function

A Critical Look at Cryptographic Hash Function Literature

A Low-Cost Attack on Branch-Based Software Watermarking Schemes

scientific article published in 2006

A Model to Evaluate Reliability of Authentication Protocols in C-ITS Safety-Critical Applications

scientific article published in September 2021

A New Biocryptosystem-Oriented Security Analysis Framework and Implementation of Multibiometric Cryptosystems Based on Decision Level Fusion

A New Dynamic Accumulator for Batch Updates

A New Human Identification Protocol and Coppersmith’s Baby-Step Giant-Step Algorithm

article by Hassan Jameel Asghar et al published 2010 in Lecture Notes in Computer Science

A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders

scientific article published in 2006

A Provably Secure and Efficient Cryptographic-Key Update Protocol for Connected Vehicles

scientific article published in July 2024

A Quantum Secret Sharing Scheme Using Orbital Angular Momentum onto Multiple Spin States Based on Fibonacci Compression Encoding

A Strong Lightweight Authentication Protocol for Low-cost RFID Systems

A coding approach to the multicast stream authentication problem

A differential fault attack on the WG family of stream ciphers

scientific article published in 2020

A general purpose technique for locating key scheduling weaknesses in DES-like cryptosystems

A hybrid quantum key distribution protocol based on extended unitary operations and fountain codes

A large-alphabet three-party quantum key distribution protocol based on orbital and spin angular momenta hybrid entanglement

article by Hong Lai et al published 18 May 2018 in Quantum Information Processing

A subexponential construction of graph coloring for multiparty computation

A survey: Error control methods used in bio-cryptography

scholarly article published August 2014

ALI: Anonymous Lightweight Inter-Vehicle Broadcast Authentication with Encryption

scientific article published in 2022

ANS-based compression and encryption with 128-bit security

scientific article published in 2022

Active Security in Multiparty Computation over Black-Box Groups

Advances in security research in the Asiacrypt region

scientific article published on 20 March 2020

Algebraic Attacks on SOBER-t32 and SOBER-t16 without Stuttering

scientific article published in 2004

An Efficient Authentication Scheme for Intra-Vehicular Controller Area Network

scientific article published in 2020

An Efficient Scheme of Common Secure Indices for Conjunctive Keyword-Based Retrieval on Encrypted Data

An Efficient eAuction Protocol

An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels

An Ideal and Robust Threshold RSA

An Improved Distinguisher for Dragon

An On-Line Secure E-Passport Protocol

An attack-localizing watermarking scheme for natural language documents

An efficient quantum blind digital signature scheme

An improved coding method of quantum key distribution protocols based on Fibonacci-valued OAM entangled states

An improved quantum network communication model based on compressed tensor network states

scientific article published in 2022

Analysing recursive preprocessing of BKZ lattice reduction algorithm

Analysis of weighted quantum secret sharing based on matrix product states

scientific article published on 17 November 2020

Authentication of Concast Communication

scientific article published in 2002

Authentication strategies in vehicular communications: a taxonomy and framework

scientific article published on 21 May 2021

Binary Image Steganographic Techniques Classification Based on Multi-class Steganalysis

Blind Steganalysis: A Countermeasure for Binary Image Steganography

Broadcast Authentication in Latency-Critical Applications: On the Efficiency of IEEE 1609.2

scientific article published in December 2019

Broadcast anti-jamming systems

Bucket attack on numeric set watermarking model and safeguards

article

Can We CAN the Email Spam

Characterisations of Extended Resiliency and Extended Immunity of S-Boxes

Characterising and predicting cyber attacks using the Cyber Attacker Model Profile (CAMP)

scientific article published on 5 October 2012

Cheating Immune Secret Sharing

Cheating Prevention in Linear Secret Sharing

Cheating Prevention in Secret Sharing

Cheating Prevention in Secret Sharing over GF(p t)

Codes Identifying Bad Signatures in Batches

scientific article published in 2000

Common Secure Index for Conjunctive Keyword-Based Retrieval over Encrypted Data

Compcrypt–Lightweight ANS-Based Compression and Encryption

scientific article published in 2021

Conditionally secure secret sharing schemes with disenrollment capability

Conference Key Agreement from Secret Sharing

Constructions of Cheating Immune Secret Sharing

scientific article published in 2002

Continuous authentication for VANET

scientific article published in October 2020

Controllable quantum private queries using an entangled Fibonacci-sequence spiral source

Converse Results to the Wiener Attack on RSA

scientific article published in 2005

Copyright Protection of Object-Oriented Software

scientific article published in 2002

Critical analysis of spam prevention techniques

Crossword Puzzle Attack on NLS

Cryptanalysis of Block Ciphers with Overdefined Systems of Equations

Cryptanalysis of FORK-256

Cryptanalysis of LASH

Cryptanalysis of RC4(n, m) stream cipher

Cryptanalysis of WG-7: a lightweight stream cipher

Cryptanalysis of WG-8 and WG-16 stream ciphers

Cryptanalysis of the Convex Hull Click Human Identification Protocol

Cryptanalysis of the LAKE Hash Family

article

Cryptanalysis of the convex hull click human identification protocol

Cube Attacks and Cube-Attack-Like Cryptanalysis on the Round-Reduced Keccak Sponge Function

Cube attacks on round-reduced TinyJAMBU

scientific article published on 29 March 2022

Database Relation Watermarking Resilient against Secondary Watermarking Attacks

Decomposition Construction for Secret Sharing Schemes with Graph Access Structures in Polynomial Time

Democratic Systems

Differential fault attacks on the lightweight authenticated encryption algorithm CLX-128

scientific article published on 26 June 2023

Digital Immunity Module: Preventing Unwanted Encryption using Source Coding

scientific article published on 7 January 2022

Distinguishing Attack on SOBER-128 with Linear Masking

article by Joo Yeon Cho & Josef Pieprzyk published 2006 in Lecture Notes in Computer Science

Distributed Private Matching and Set Operations

Dual compressible hybrid quantum secret sharing schemes based on extended unitary operations

Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward (and Backward) Security

Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy

scientific article published in 2019

Dynamic and compressed quantum many-body state secret sharing based on site-independent matrix product states

scientific article published on 17 February 2022

Dynamic hierarchical quantum secret sharing based on the multiscale entanglement renormalization ansatz

scientific article published on 2 November 2022

Efficient Disjointness Tests for Private Datasets

Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures

scientific article published in 2004

Efficient Fuzzy Matching and Intersection on Private Datasets

Efficient One-Time Proxy Signatures

scientific article published in 2003

Efficient quantum key distribution using Fibonacci-number coding with a biased basis choice

article

Efficient quantum private queries based on quantum key distribution with pulse-position modulation

scholarly article

Estimating Hidden Message Length in Binary Image Embedded by Using Boundary Pixels Steganography

article

Evaluating the performance of the practical lattice reduction algorithms

scholarly article published December 2014

Evolution of cryptographic hashing

article published in 2010

Extending FORK-256 Attack to the Full Hash Function

scientific article (publication date: 2007)

Extensions of the Cube Attack Based on Low Degree Annihilators

Fast and simple high-capacity quantum cryptography with error detection

scientific article

Features-Pooling Blind JPEG Image Steganalysis

File System Shield (FSS): A Pass-Through Strategy Against Unwanted Encryption in Network File Systems

scientific article published in 2024

Finding Good Differential Patterns for Attacks on SHA-1

scientific article published in 2006

Finding state collisions in the authenticated encryption stream cipher ACORN

Fingerprints for Copyright Software Protection

scholarly article by Josef Pieprzyk published 1999 in Lecture Notes in Computer Science

Forward and Backward Private DSSE for Range Queries

scientific article published in January 2022

Fundamentals of Computer Security

book by Josef Pieprzyk

Fundamentals of Computer Security

article published in 2003

Generalised Cumulative Arrays in Secret Sharing

Graph Coloring Applied to Secure Computation in Non-Abelian Groups

High-capacity (2,3) threshold quantum secret sharing based on asymmetric quantum lossy channels

scientific article published on 31 March 2020

High-capacity quantum key distribution using Chebyshev-map values corresponding to Lucas numbers coding

High-rate and high-capacity measurement-device-independent quantum key distribution with Fibonacci matrix coding in free space

Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption

Homogeneous bent functions

Homogeneous bent functions of degree n in 2n variables do not exist for n>3

How to Construct Pseudorandom Permutations from Single Pseudorandom Functions

How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature

How to construct a family of strong one way permutations

article published in 1993

Hybrid threshold adaptable quantum secret sharing scheme with reverse Huffman-Fibonacci-tree coding

scientific article published on 12 August 2016

ICEPOLE: High-Speed, Hardware-Oriented Authenticated Encryption

scientific article published in 2014

Ideal Threshold Schemes from MDS Codes

scientific article published in 2003

Ideal Threshold Schemes from Orthogonal Arrays

Identification of Bad Signatures in Batches

scientific article published in 2000

Identifying Steganographic Payload Location in Binary Image

Improvement of a Dynamic Accumulator at ICICS 07 and Its Application in Multi-user Keyword-Based Retrieval on Encrypted Data

Improving resistance to differential cryptanalysis and the redesign of LOKI

Introduction to the special issue on Next Generation Network Architectures, Protocols, Theory, Systems and Applications

Investigating Cube Attacks on the Authenticated Encryption Stream Cipher ACORN

Investigating Cube Attacks on the Authenticated Encryption Stream Cipher MORUS

JPEG Image Steganalysis Improvement Via Image-to-Image Variation Minimization

Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups

Known and Chosen Key Differential Distinguishers for Block Ciphers

LOKI — A cryptographic primitive for authentication and secrecy applications

Large-Capacity Three-Party Quantum Digital Secret Sharing Using Three Particular Matrices Coding

article by Hong Lai et al published 1 November 2016 in Communications in Theoretical Physics

Lattice Blind Signatures with Forward Security

scientific article published in 2020

Lattice-Based Completely Non-malleable PKE in the Standard Model (Poster)

article by Reza Sepahi et al published 2011 in Lecture Notes in Computer Science

Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes

article by Ron Steinfeld et al published 2004 in Lecture Notes in Computer Science

Lattice-based ABE-IBE Proxy Re-Encryption for IoT Systems

scientific article published on 16 March 2022

Lattice-based certificateless public-key encryption in the standard model

article

Lattice-based completely non-malleable public-key encryption in the standard model

Lattice-based threshold-changeability for standard CRT secret-sharing schemes

article by Ron Steinfeld et al published November 2006 in Finite Fields and Their Applications

Linear Secret Sharing with Divisible Shares

Linear nonequivalence versus nonlinearity

Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128

scientific article published in 2014

Malleability Attacks on Multi-Party Key Agreement Protocols

scholarly article published 2004

Multi-Party Computation with Omnipresent Adversary

article by Hossein Ghodosi & Josef Pieprzyk published 2009 in Lecture Notes in Computer Science

Multi-party computation with conversion of secret sharing

article by Hossein Ghodosi et al published 10 May 2011 in Designs, Codes and Cryptography

Multimedia Copyright Protection

Multimedia Copyright Protection

Multimedia Copyright Protection

Multimedia Copyright Protection

Multiple Modular Additions and Crossword Puzzle Attack on NLSv2

Multiple-Time Signature Schemes against Adaptive Chosen Message Attacks

scientific article published in 2004

Möbius transforms, coincident Boolean functions and non-coincidence property of Boolean functions

NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model

article by Ron Steinfeld et al published 2012 in Lecture Notes in Computer Science

New security notions and relations for public-key encryption

Novel entanglement compression for QKD protocols using isometric tensors

scientific article published on 26 June 2023

Novel quantum key distribution with shift operations based on Fibonacci and Lucas valued orbital angular momentum entangled states

scientific article published in September 2020

On Algebraic Immunity and Annihilators

scientific article published in 2006

On Secure Multi-party Computation in Black-Box Groups

On necessary and sufficient conditions for the construction of super pseudorandom permutations

On the (In)Security of IDEA in Various Hashing Modes

On the Efficiency of Pairing-Based Authentication for Connected Vehicles: Time is Not on Our Side!

scientific article published in 2021

On the Linearization of Human Identification Protocols: Attacks Based on Linear Algebra, Coding Theory, and Lattices

scholarly article by Hassan Jameel Asghar et al published August 2015 in IEEE Transactions on Information Forensics and Security

On the Provable Security of an Efficient RSA-Based Pseudorandom Generator

On the Security of PAS (Predicate-Based Authentication Service)

On-the-fly web content integrity check boosts users' confidence

article by Soroush Sedaghat et al published 1 November 2002 in Communications of the ACM

Optimal perfect randomizers

Optimizing preprocessing method of recursive-BKZ lattice reduction algorithm

P2DPI: Practical and Privacy-Preserving Deep Packet Inspection

scientific article published on 04 June 2021

Parallel Authentication and Public-Key Encryption

Parallel Signcryption

Permutation generators of alternating groups

Permutation polynomials of the form ( x p − x + δ ) s + L ( x )

Pervasive User Data Collection from Cyberspace: Privacy Concerns and Countermeasures

scholarly article

Practical attack on NLM-MAC scheme

scholarly article by Mohammad Ali Orumiehchiha et al published October 2014 in Information Processing Letters

Predicting tours and probabilistic simulation for BKZ lattice reduction algorithm

Preprocessing optimisation: revisiting recursive-BKZ lattice reduction algorithm

Privacy Enhancements for Hardware-Based Security Modules

Probabilistic Analysis of Elementary Randomizers

Protecting Web 2.0 Services from Botnet Exploitations

Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model

article

Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption

scientific article published in 2020

Quantum direct secret sharing with efficient eavesdropping-check and authentication based on distributed fountain codes

Quantum-key-expansion protocol based on number-state-entanglement-preserving tensor network with compression

scientific article published on 24 March 2022

Random Differential Fault Attacks on the Lightweight Authenticated Encryption Stream Cipher Grain-128AEAD

scientific article published in 2021

Randomized Authentication Systems

Repudiation of Cheating and Non-repudiation of Zhang’s Proxy Signature Schemes

Resource-saving quantum key distribution based on three-photon matrix product states

scientific article published on 7 June 2023

Reversible And Blind Database Watermarking Using Difference Expansion

Reversible and Blind Database Watermarking Using Difference Expansion

Reversible and Blind Database Watermarking Using Difference Expansion

Robust Numeric Set Watermarking: Numbers Don’t Lie

Rotational Cryptanalysis of ARX Revisited

Rotational Cryptanalysis of Round-Reduced Keccak

Round-robin-differential-phase-shift quantum key distribution based on wavelength division multiplexing

SAT-based Cryptanalysis of Authenticated Ciphers from the CAESAR Competition

scientific article published in 2017

Secure Computation of the Vector Dominance Problem

Securing Multicast Groups in Ad Hoc Networks

scientific article published in 2004

Security Evaluation of Rakaposhi Stream Cipher

Security analysis of linearly filtered NLFSRs

Shared Generation of Pseudo-Random Functions with Cumulative Maps

Shared file protection against unauthorised encryption using a Buffer-Based Signature Verification Method

scientific article published in November 2024

Shared generation of pseudo-random functions

Sibling intractable function families and their applications

Signcryption schemes with insider security in an ideal permutation model

scholarly article

Socio-technological phishing prevention

Software Watermarking Resilient to Debugging Attacks

Source Code Watermarking Based on Function Dependency Oriented Sequencing

Spatial Encryption Revisited: From Delegatable Multiple Inner Product Encryption and More

scientific article published in 2022

Special issue on trust and security in wireless sensor networks

article by Mehmet A Orgun et al published 20 May 2015 in Concurrency and Computation: Practice and Experience

State recovery attacks against π-cipher

S‐boxes representation and efficiency of algebraic attack

scientific article published in September 2019

Taxonomy and Control Measures of SPAM and SPIM

The Compression Optimality of Asymmetric Numeral Systems

scientific article published on 17 April 2023

The Security of “2FLIP” Authentication Scheme for VANETs: Attacks and Rectifications

scientific article published in 2023

The resistance of PRESENT-80 against related-key differential attacks

Threshold MACs

scientific article published in 2003

Threshold Privacy Preserving Keyword Searches

Transformer-Based Language Models for Software Vulnerability Detection

scientific article published on 03 December 2022

Trapdoor Delegation and HIBE from Middle-Product LWE in Standard Model

scientific article published in 2020

Truncated Differential Analysis of Reduced-Round LBlock

Tunable multi-party high-capacity quantum key distribution based on m-generalized Fibonacci sequences using golden coding

article by Hong Lai et al published 11 August 2018 in Quantum Information Processing

Two types of dynamic quantum state secret sharing based on tensor networks states

scientific article published in November 2021

Unconditionally secure disjointness tests for private datasets

Universal Designated-Verifier Signatures

Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures

Verifiable Secret Sharing and Time Capsules

article published in 2000

Winning the Phishing War: A Strategy for Australia

article