Search filters

List of works by Josef Pieprzyk

A Combinatorial Approach to Anonymous Membership Broadcast

A Construction for One Way Hash Functions and Pseudorandom Bit Generators

A Construction for Super Pseudorandom Permutations from A Single Pseudorandom Function

A Critical Look at Cryptographic Hash Function Literature

A New Biocryptosystem-Oriented Security Analysis Framework and Implementation of Multibiometric Cryptosystems Based on Decision Level Fusion

A New Dynamic Accumulator for Batch Updates

A New Human Identification Protocol and Coppersmith’s Baby-Step Giant-Step Algorithm

article by Hassan Jameel Asghar et al published 2010 in Lecture Notes in Computer Science

A Quantum Secret Sharing Scheme Using Orbital Angular Momentum onto Multiple Spin States Based on Fibonacci Compression Encoding

A Strong Lightweight Authentication Protocol for Low-cost RFID Systems

A coding approach to the multicast stream authentication problem

A general purpose technique for locating key scheduling weaknesses in DES-like cryptosystems

A hybrid quantum key distribution protocol based on extended unitary operations and fountain codes

A large-alphabet three-party quantum key distribution protocol based on orbital and spin angular momenta hybrid entanglement

article by Hong Lai et al published 18 May 2018 in Quantum Information Processing

A subexponential construction of graph coloring for multiparty computation

A survey: Error control methods used in bio-cryptography

scholarly article published August 2014

ANS-based compression and encryption with 128-bit security

scientific article published in 2022

Active Security in Multiparty Computation over Black-Box Groups

An Efficient Scheme of Common Secure Indices for Conjunctive Keyword-Based Retrieval on Encrypted Data

An Efficient eAuction Protocol

An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels

An Ideal and Robust Threshold RSA

An Improved Distinguisher for Dragon

An On-Line Secure E-Passport Protocol

An attack-localizing watermarking scheme for natural language documents

An efficient quantum blind digital signature scheme

An improved coding method of quantum key distribution protocols based on Fibonacci-valued OAM entangled states

Analysing recursive preprocessing of BKZ lattice reduction algorithm

Binary Image Steganographic Techniques Classification Based on Multi-class Steganalysis

Blind Steganalysis: A Countermeasure for Binary Image Steganography

Broadcast anti-jamming systems

Bucket attack on numeric set watermarking model and safeguards

article

Can We CAN the Email Spam

Characterisations of Extended Resiliency and Extended Immunity of S-Boxes

Cheating Immune Secret Sharing

Cheating Prevention in Linear Secret Sharing

Cheating Prevention in Secret Sharing

Cheating Prevention in Secret Sharing over GF(p t)

Common Secure Index for Conjunctive Keyword-Based Retrieval over Encrypted Data

Compcrypt–Lightweight ANS-Based Compression and Encryption

scientific article published in 2021

Conditionally secure secret sharing schemes with disenrollment capability

Conference Key Agreement from Secret Sharing

Controllable quantum private queries using an entangled Fibonacci-sequence spiral source

Critical analysis of spam prevention techniques

Crossword Puzzle Attack on NLS

Cryptanalysis of Block Ciphers with Overdefined Systems of Equations

Cryptanalysis of LASH

Cryptanalysis of RC4(n, m) stream cipher

Cryptanalysis of WG-7: a lightweight stream cipher

Cryptanalysis of WG-8 and WG-16 stream ciphers

Cryptanalysis of the Convex Hull Click Human Identification Protocol

Cryptanalysis of the LAKE Hash Family

article

Cryptanalysis of the convex hull click human identification protocol

Cube Attacks and Cube-Attack-Like Cryptanalysis on the Round-Reduced Keccak Sponge Function

Database Relation Watermarking Resilient against Secondary Watermarking Attacks

Decomposition Construction for Secret Sharing Schemes with Graph Access Structures in Polynomial Time

Democratic Systems

Distinguishing Attack on SOBER-128 with Linear Masking

article by Joo Yeon Cho & Josef Pieprzyk published 2006 in Lecture Notes in Computer Science

Distributed Private Matching and Set Operations

Dual compressible hybrid quantum secret sharing schemes based on extended unitary operations

Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward (and Backward) Security

Efficient Fuzzy Matching and Intersection on Private Datasets

Efficient quantum key distribution using Fibonacci-number coding with a biased basis choice

article

Estimating Hidden Message Length in Binary Image Embedded by Using Boundary Pixels Steganography

article

Evaluating the performance of the practical lattice reduction algorithms

scholarly article published December 2014

Evolution of cryptographic hashing

article published in 2010

Extending FORK-256 Attack to the Full Hash Function

scientific article (publication date: 2007)

Extensions of the Cube Attack Based on Low Degree Annihilators

Fast and simple high-capacity quantum cryptography with error detection

scientific article

Features-Pooling Blind JPEG Image Steganalysis

Finding state collisions in the authenticated encryption stream cipher ACORN

Fingerprints for Copyright Software Protection

scholarly article by Josef Pieprzyk published 1999 in Lecture Notes in Computer Science

Fundamentals of Computer Security

book by Josef Pieprzyk

Fundamentals of Computer Security

article published in 2003

Generalised Cumulative Arrays in Secret Sharing

Graph Coloring Applied to Secure Computation in Non-Abelian Groups

High-capacity quantum key distribution using Chebyshev-map values corresponding to Lucas numbers coding

High-rate and high-capacity measurement-device-independent quantum key distribution with Fibonacci matrix coding in free space

Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption

Homogeneous bent functions

Homogeneous bent functions of degree n in 2n variables do not exist for n>3

How to Construct Pseudorandom Permutations from Single Pseudorandom Functions

How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature

How to construct a family of strong one way permutations

article published in 1993

Hybrid threshold adaptable quantum secret sharing scheme with reverse Huffman-Fibonacci-tree coding

scientific article published on 12 August 2016

Ideal Threshold Schemes from Orthogonal Arrays

Identifying Steganographic Payload Location in Binary Image

Improvement of a Dynamic Accumulator at ICICS 07 and Its Application in Multi-user Keyword-Based Retrieval on Encrypted Data

Improving resistance to differential cryptanalysis and the redesign of LOKI

Introduction to the special issue on Next Generation Network Architectures, Protocols, Theory, Systems and Applications

Investigating Cube Attacks on the Authenticated Encryption Stream Cipher ACORN

Investigating Cube Attacks on the Authenticated Encryption Stream Cipher MORUS

JPEG Image Steganalysis Improvement Via Image-to-Image Variation Minimization

Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups

Known and Chosen Key Differential Distinguishers for Block Ciphers

LOKI — A cryptographic primitive for authentication and secrecy applications

Large-Capacity Three-Party Quantum Digital Secret Sharing Using Three Particular Matrices Coding

article by Hong Lai et al published 1 November 2016 in Communications in Theoretical Physics

Lattice-Based Completely Non-malleable PKE in the Standard Model (Poster)

article by Reza Sepahi et al published 2011 in Lecture Notes in Computer Science

Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes

article by Ron Steinfeld et al published 2004 in Lecture Notes in Computer Science

Lattice-based certificateless public-key encryption in the standard model

article

Lattice-based completely non-malleable public-key encryption in the standard model

Lattice-based threshold-changeability for standard CRT secret-sharing schemes

article by Ron Steinfeld et al published November 2006 in Finite Fields and Their Applications

Linear Secret Sharing with Divisible Shares

Linear nonequivalence versus nonlinearity

Malleability Attacks on Multi-Party Key Agreement Protocols

scholarly article published 2004

Multi-Party Computation with Omnipresent Adversary

article by Hossein Ghodosi & Josef Pieprzyk published 2009 in Lecture Notes in Computer Science

Multi-party computation with conversion of secret sharing

article by Hossein Ghodosi et al published 10 May 2011 in Designs, Codes and Cryptography

Multimedia Copyright Protection

Multimedia Copyright Protection

Multimedia Copyright Protection

Multimedia Copyright Protection

Möbius transforms, coincident Boolean functions and non-coincidence property of Boolean functions

NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model

article by Ron Steinfeld et al published 2012 in Lecture Notes in Computer Science

New security notions and relations for public-key encryption

On necessary and sufficient conditions for the construction of super pseudorandom permutations

On the (In)Security of IDEA in Various Hashing Modes

On the Linearization of Human Identification Protocols: Attacks Based on Linear Algebra, Coding Theory, and Lattices

scholarly article by Hassan Jameel Asghar et al published August 2015 in IEEE Transactions on Information Forensics and Security

On the Provable Security of an Efficient RSA-Based Pseudorandom Generator

On the Security of PAS (Predicate-Based Authentication Service)

On-the-fly web content integrity check boosts users' confidence

article by Soroush Sedaghat et al published 1 November 2002 in Communications of the ACM

Optimal perfect randomizers

Optimizing preprocessing method of recursive-BKZ lattice reduction algorithm

Parallel Authentication and Public-Key Encryption

Parallel Signcryption

Permutation generators of alternating groups

Permutation polynomials of the form ( x p − x + δ ) s + L ( x )

Practical attack on NLM-MAC scheme

scholarly article by Mohammad Ali Orumiehchiha et al published October 2014 in Information Processing Letters

Predicting tours and probabilistic simulation for BKZ lattice reduction algorithm

Preprocessing optimisation: revisiting recursive-BKZ lattice reduction algorithm

Privacy Enhancements for Hardware-Based Security Modules

Probabilistic Analysis of Elementary Randomizers

Protecting Web 2.0 Services from Botnet Exploitations

Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model

article

Quantum direct secret sharing with efficient eavesdropping-check and authentication based on distributed fountain codes

Quantum-key-expansion protocol based on number-state-entanglement-preserving tensor network with compression

scientific article published on 24 March 2022

Random Differential Fault Attacks on the Lightweight Authenticated Encryption Stream Cipher Grain-128AEAD

scientific article published in 2021

Randomized Authentication Systems

Repudiation of Cheating and Non-repudiation of Zhang’s Proxy Signature Schemes

Reversible And Blind Database Watermarking Using Difference Expansion

Reversible and Blind Database Watermarking Using Difference Expansion

Reversible and Blind Database Watermarking Using Difference Expansion

Robust Numeric Set Watermarking: Numbers Don’t Lie

Rotational Cryptanalysis of ARX Revisited

Rotational Cryptanalysis of Round-Reduced Keccak

Round-robin-differential-phase-shift quantum key distribution based on wavelength division multiplexing

Secure Computation of the Vector Dominance Problem

Security Evaluation of Rakaposhi Stream Cipher

Security analysis of linearly filtered NLFSRs

Shared Generation of Pseudo-Random Functions with Cumulative Maps

Shared generation of pseudo-random functions

Sibling intractable function families and their applications

Socio-technological phishing prevention

Software Watermarking Resilient to Debugging Attacks

Source Code Watermarking Based on Function Dependency Oriented Sequencing

Special issue on trust and security in wireless sensor networks

article by Mehmet A Orgun et al published 20 May 2015 in Concurrency and Computation: Practice and Experience

State recovery attacks against π-cipher

Taxonomy and Control Measures of SPAM and SPIM

The resistance of PRESENT-80 against related-key differential attacks

Threshold Privacy Preserving Keyword Searches

Transformer-Based Language Models for Software Vulnerability Detection

scientific article published on 03 December 2022

Truncated Differential Analysis of Reduced-Round LBlock

Tunable multi-party high-capacity quantum key distribution based on m-generalized Fibonacci sequences using golden coding

article by Hong Lai et al published 11 August 2018 in Quantum Information Processing

Unconditionally secure disjointness tests for private datasets

Universal Designated-Verifier Signatures

Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures

Verifiable Secret Sharing and Time Capsules

article published in 2000

Winning the Phishing War: A Strategy for Australia

article