


Остановите войну!
for scientists:


default search action
Josef Pieprzyk
Józef P. Pieprzyk
Person information

- affiliation: Macquarie University, Sydney, Australia
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j83]Hong Lai, Josef Pieprzyk
, Lei Pan:
Novel entanglement compression for QKD protocols using isometric tensors. Sci. China Inf. Sci. 66(8) (2023) - [j82]Josef Pieprzyk
, Jarek Duda
, Marcin Pawlowski
, Seyit Camtepe
, Arash Mahboubi
, Pawel Morawiecki
:
The Compression Optimality of Asymmetric Numeral Systems. Entropy 25(4): 672 (2023) - [j81]Iftekhar Salam
, Wei-Chuen Yau
, Raphaël C.-W. Phan, Josef Pieprzyk
:
Differential fault attacks on the lightweight authenticated encryption algorithm CLX-128. J. Cryptogr. Eng. 13(3): 265-281 (2023) - [j80]Hong Lai, Josef Pieprzyk
, Lei Pan, Ya Li:
Resource-saving quantum key distribution based on three-photon matrix product states. Quantum Inf. Process. 22(6): 235 (2023) - [j79]Mir Ali Rezazadeh Baee
, Leonie Simpson
, Xavier Boyen, Ernest Foo
, Josef Pieprzyk
:
ALI: Anonymous Lightweight Inter-Vehicle Broadcast Authentication With Encryption. IEEE Trans. Dependable Secur. Comput. 20(3): 1799-1817 (2023) - [c166]Muhammad Nauman Khan
, Asha Rao, Seyit Camtepe, Josef Pieprzyk:
Classical to Post-Quantum Secure ABE-IBE Proxy Re-Encryption Scheme. SECRYPT 2023: 85-98 - 2022
- [j78]Joanne R. Dawson
, George Hobbs
, Yansong Gao
, Seyit Camtepe
, Josef Pieprzyk
, Y. Feng, L. Tranfa, Sarah Bradbury
, Weiwei Zhu
, Di Li
:
Physical publicly verifiable randomness from pulsars. Astron. Comput. 38: 100549 (2022) - [j77]Seyit Camtepe
, Jarek Duda, Arash Mahboubi, Pawel Morawiecki, Surya Nepal
, Marcin Pawlowski, Josef Pieprzyk
:
ANS-based compression and encryption with 128-bit security. Int. J. Inf. Sec. 21(5): 1051-1067 (2022) - [j76]Hong Lai, Josef Pieprzyk
, Lei Pan:
Dynamic and compressed quantum many-body state secret sharing based on site-independent matrix product states. Quantum Inf. Process. 21(3): 83 (2022) - [j75]Qiang Zhang, Hong Lai, Josef Pieprzyk
, Lei Pan:
An improved quantum network communication model based on compressed tensor network states. Quantum Inf. Process. 21(7): 253 (2022) - [j74]Cong Zuo
, Shifeng Sun
, Joseph K. Liu
, Jun Shao
, Josef Pieprzyk
, Lei Xu
:
Forward and Backward Private DSSE for Range Queries. IEEE Trans. Dependable Secur. Comput. 19(1): 328-338 (2022) - [c165]Chandra Thapa
, Seung Ick Jang
, Muhammad Ejaz Ahmed
, Seyit Camtepe
, Josef Pieprzyk
, Surya Nepal
:
Transformer-Based Language Models for Software Vulnerability Detection. ACSAC 2022: 481-496 - [c164]Huy Quoc Le
, Dung Hoang Duong
, Willy Susilo
, Josef Pieprzyk
:
Spatial Encryption Revisited: From Delegatable Multiple Inner Product Encryption and More. ESORICS (1) 2022: 283-302 - [i58]Chandra Thapa, Seung Ick Jang
, Muhammad Ejaz Ahmed, Seyit Camtepe, Josef Pieprzyk
, Surya Nepal:
Transformer-Based Language Models for Software Vulnerability Detection: Performance, Model's Security and Platforms. CoRR abs/2204.03214 (2022) - [i57]Josef Pieprzyk
, Jarek Duda, Marcin Piotr Pawlowski, Seyit Camtepe, Arash Mahboubi, Pawel Morawiecki:
Compression Optimality of Asymmetric Numeral Systems. CoRR abs/2209.02228 (2022) - [i56]Josef Pieprzyk, Marcin Pawlowski, Pawel Morawiecki, Arash Mahboubi, Jarek Duda, Seyit Camtepe:
Pseudorandom Bit Generation with Asymmetric Numeral Systems. IACR Cryptol. ePrint Arch. 2022: 5 (2022) - [i55]Huy Quoc Le, Dung Hoang Duong, Willy Susilo, Josef Pieprzyk:
Spatial Encryption Revisited: From Delegatable Multiple Inner Product Encryption and More. IACR Cryptol. ePrint Arch. 2022: 95 (2022) - 2021
- [j73]Md. Iftekhar Salam
, Thian Hooi Ooi
, Luxin Xue, Wei-Chuen Yau
, Josef Pieprzyk
, Raphaël C.-W. Phan
:
Random Differential Fault Attacks on the Lightweight Authenticated Encryption Stream Cipher Grain-128AEAD. IEEE Access 9: 72568-72586 (2021) - [j72]Mir Ali Rezazadeh Baee
, Leonie Simpson
, Xavier Boyen, Ernest Foo
, Josef Pieprzyk
:
Authentication strategies in vehicular communications: a taxonomy and framework. EURASIP J. Wirel. Commun. Netw. 2021(1): 129 (2021) - [j71]Mir Ali Rezazadeh Baee
, Leonie Simpson
, Xavier Boyen, Ernest Foo
, Josef Pieprzyk
:
On the Efficiency of Pairing-Based Authentication for Connected Vehicles: Time is Not on Our Side! IEEE Trans. Inf. Forensics Secur. 16: 3678-3693 (2021) - [j70]Seyit Camtepe
, Jarek Duda
, Arash Mahboubi
, Pawel Morawiecki
, Surya Nepal
, Marcin Pawlowski
, Josef Pieprzyk
:
Compcrypt-Lightweight ANS-Based Compression and Encryption. IEEE Trans. Inf. Forensics Secur. 16: 3859-3873 (2021) - [j69]Mir Ali Rezazadeh Baee
, Leonie Simpson
, Xavier Boyen, Ernest Foo
, Josef Pieprzyk
:
A Model to Evaluate Reliability of Authentication Protocols in C-ITS Safety-Critical Applications. IEEE Trans. Veh. Technol. 70(9): 9306-9319 (2021) - [c163]Jongkil Kim, Seyit Camtepe, Joonsang Baek, Willy Susilo
, Josef Pieprzyk
, Surya Nepal:
P2DPI: Practical and Privacy-Preserving Deep Packet Inspection. AsiaCCS 2021: 135-146 - [i54]Seyit Camtepe, Jarek Duda, Arash Mahboubi, Pawel Morawiecki, Surya Nepal, Marcin Pawlowski, Josef Pieprzyk:
Compcrypt - Lightweight ANS-based Compression and Encryption. IACR Cryptol. ePrint Arch. 2021: 10 (2021) - [i53]Jongkil Kim, Seyit Camtepe, Joonsang Baek, Willy Susilo, Josef Pieprzyk, Surya Nepal:
P2DPI: Practical and Privacy-Preserving Deep Packet Inspection. IACR Cryptol. ePrint Arch. 2021: 789 (2021) - [i52]Seyit Camtepe, Jarek Duda, Arash Mahboubi, Pawel Morawiecki, Surya Nepal, Marcin Pawlowski, Josef Pieprzyk:
ANS-based Compression and Encryption with 128-bit Security. IACR Cryptol. ePrint Arch. 2021: 900 (2021) - [i51]Wil Liam Teng, Md. Iftekhar Salam, Wei-Chuen Yau, Josef Pieprzyk, Raphaël C.-W. Phan:
Cube Attacks on Round-Reduced TinyJAMBU. IACR Cryptol. ePrint Arch. 2021: 1164 (2021) - 2020
- [j68]Raphael C.-W. Phan, Masayuki Abe, Lynn Batten, Jung Hee Cheon, Ed Dawson, Steven D. Galbraith
, Jian Guo, Lucas C. K. Hui, Kwangjo Kim, Xuejia Lai, Dong Hoon Lee, Mitsuru Matsui, Tsutomu Matsumoto, Shiho Moriai, Phong Q. Nguyen, Dingyi Pei, Duong Hieu Phan
, Josef Pieprzyk
, Huaxiong Wang, Hank Wolfe, Duncan S. Wong, Tzong-Chen Wu, Bo-Yin Yang, Siu-Ming Yiu, Yu Yu, Jianying Zhou
:
Advances in security research in the Asiacrypt region. Commun. ACM 63(4): 76-81 (2020) - [j67]Mohammad Ali Orumiehchiha, Saeed Rostami
, Elham Shakour, Josef Pieprzyk
:
A differential fault attack on the WG family of stream ciphers. J. Cryptogr. Eng. 10(2): 189-195 (2020) - [j66]Hong Lai, Josef Pieprzyk
, Mingxing Luo, Cheng Zhan, Lei Pan
, Mehmet A. Orgun
:
High-capacity (2, 3) threshold quantum secret sharing based on asymmetric quantum lossy channels. Quantum Inf. Process. 19(5): 157 (2020) - [j65]Hong Lai, Josef Pieprzyk
, Lei Pan:
Analysis of weighted quantum secret sharing based on matrix product states. Quantum Inf. Process. 19(12): 418 (2020) - [j64]Basker Palaniswamy
, Seyit Camtepe
, Ernest Foo
, Josef Pieprzyk
:
An Efficient Authentication Scheme for Intra-Vehicular Controller Area Network. IEEE Trans. Inf. Forensics Secur. 15: 3107-3122 (2020) - [j63]Basker Palaniswamy
, Seyit Camtepe
, Ernest Foo
, Leonie Simpson
, Mir Ali Rezazadeh Baee
, Josef Pieprzyk
:
Continuous authentication for VANET. Veh. Commun. 25: 100255 (2020) - [c162]Huy Quoc Le
, Dung Hoang Duong, Willy Susilo
, Ha Thanh Nguyen Tran, Viet Cuong Trinh
, Josef Pieprzyk
, Thomas Plantard
:
Lattice Blind Signatures with Forward Security. ACISP 2020: 3-22 - [c161]Huy Quoc Le
, Dung Hoang Duong, Willy Susilo
, Josef Pieprzyk
:
Trapdoor Delegation and HIBE from Middle-Product LWE in Standard Model. ACNS (1) 2020: 130-149 - [c160]Willy Susilo
, Dung Hoang Duong, Huy Quoc Le
, Josef Pieprzyk
:
Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption. ESORICS (2) 2020: 107-127 - [i50]Willy Susilo
, Dung Hoang Duong, Huy Quoc Le, Josef Pieprzyk:
Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption. CoRR abs/2007.06353 (2020) - [i49]Huy Quoc Le, Dung Hoang Duong, Willy Susilo
, Josef Pieprzyk:
Trapdoor Delegation and HIBE from Middle-Product LWE in Standard Model. CoRR abs/2007.06881 (2020) - [i48]Huy Quoc Le, Dung Hoang Duong, Willy Susilo
, Ha Thanh Nguyen Tran, Viet Cuong Trinh, Josef Pieprzyk, Thomas Plantard:
Lattice Blind Signatures with Forward Security. CoRR abs/2007.06884 (2020) - [i47]Matthieu Monteiro, Kumara Kahatapitiya, Hassan Jameel Asghar, Kanchana Thilakarathna, Thierry Rakotoarivelo, Dali Kaafar, Shujun Li, Ron Steinfeld, Josef Pieprzyk:
Foxtail+: A Learning with Errors-based Authentication Protocol for Resource-Constrained Devices. IACR Cryptol. ePrint Arch. 2020: 261 (2020) - [i46]Willy Susilo, Dung Hoang Duong, Huy Quoc Le, Josef Pieprzyk:
Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2020: 882 (2020) - [i45]Hassan Jameel Asghar, Slawomir Matelski, Josef Pieprzyk:
The Topographic Signature (TopoSign) Protocol. IACR Cryptol. ePrint Arch. 2020: 1220 (2020) - [i44]Cong Zuo, Shifeng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk, Guiyi Wei:
Forward and Backward Private Dynamic Searchable Symmetric Encryption for Conjunctive Queries. IACR Cryptol. ePrint Arch. 2020: 1357 (2020)
2010 – 2019
- 2019
- [j62]Saeed Rostami
, Elham Shakour, Mohammad Ali Orumiehchiha, Josef Pieprzyk
:
Cryptanalysis of WG-8 and WG-16 stream ciphers. Cryptogr. Commun. 11(2): 351-362 (2019) - [j61]Hossein Arabnezhad-Khanoki, Babak Sadeghiyan, Josef Pieprzyk
:
S-boxes representation and efficiency of algebraic attack. IET Inf. Secur. 13(5): 448-458 (2019) - [j60]Tarun Kumar Bansal
, Xavier Boyen, Josef Pieprzyk
:
Signcryption schemes with insider security in an ideal permutation model. J. Math. Cryptol. 13(2): 117-150 (2019) - [j59]Mir Ali Rezazadeh Baee
, Leonie Simpson
, Ernest Foo
, Josef Pieprzyk
:
Broadcast Authentication in Latency-Critical Applications: On the Efficiency of IEEE 1609.2. IEEE Trans. Veh. Technol. 68(12): 11577-11587 (2019) - [c159]Cong Zuo, Shifeng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk
:
Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy. ESORICS (2) 2019: 283-303 - [i43]Cong Zuo, Shifeng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk:
Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward/Backward Privacy. CoRR abs/1905.08561 (2019) - [i42]Cong Zuo, Shifeng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk:
Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy. IACR Cryptol. ePrint Arch. 2019: 1055 (2019) - [i41]Cong Zuo, Shifeng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk, Lei Xu:
Forward and Backward Private DSSE for Range Queries. IACR Cryptol. ePrint Arch. 2019: 1240 (2019) - 2018
- [j58]Hong Lai, Mingxing Luo, Josef Pieprzyk
, Jun Zhang, Lei Pan
, Mehmet A. Orgun
:
High-rate and high-capacity measurement-device-independent quantum key distribution with Fibonacci matrix coding in free space. Sci. China Inf. Sci. 61(6): 062501:1-062501:11 (2018) - [j57]Md. Mokammel Haque
, Josef Pieprzyk
:
Preprocessing optimisation: revisiting recursive-BKZ lattice reduction algorithm. IET Inf. Secur. 12(6): 551-557 (2018) - [j56]Hong Lai, Mingxing Luo, Josef Pieprzyk
, Zhiguo Qu, Mehmet A. Orgun
:
Efficient quantum key distribution using Fibonacci-number coding with a biased basis choice. Inf. Process. Lett. 134: 24-30 (2018) - [j55]Hong Lai, Mingxing Luo, Jun Zhang, Josef Pieprzyk
, Lei Pan
, Mehmet A. Orgun
:
A large-alphabet three-party quantum key distribution protocol based on orbital and spin angular momenta hybrid entanglement. Quantum Inf. Process. 17(7): 162 (2018) - [j54]Hong Lai, Mingxing Luo, Mehmet A. Orgun
, Josef Pieprzyk
, Fuyuan Xiao, Cheng Zhan:
Tunable multi-party high-capacity quantum key distribution based on m-generalized Fibonacci sequences using golden coding. Quantum Inf. Process. 17(9): 246 (2018) - [c158]Cong Zuo, Shifeng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk
:
Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward (and Backward) Security. ESORICS (2) 2018: 228-246 - [e20]Jerzy Kaczorowski, Josef Pieprzyk, Jacek Pomykala:
Number-Theoretic Methods in Cryptology - First International Conference, NuTMiC 2017, Warsaw, Poland, September 11-13, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10737, Springer 2018, ISBN 978-3-319-76619-5 [contents] - 2017
- [j53]Hong Lai, Mingxing Luo, Josef Pieprzyk
, Zhiguo Qu, Shudong Li, Mehmet A. Orgun
:
An efficient quantum blind digital signature scheme. Sci. China Inf. Sci. 60(8): 082501:1-082501:14 (2017) - [j52]Md. Mokammel Haque
, Josef Pieprzyk
:
Analysing recursive preprocessing of BKZ lattice reduction algorithm. IET Inf. Secur. 11(2): 114-120 (2017) - [c157]Ashutosh Dhar Dwivedi
, Milos Kloucek, Pawel Morawiecki
, Ivica Nikolic
, Josef Pieprzyk
, Sebastian Wójtowicz:
SAT-based Cryptanalysis of Authenticated Ciphers from the CAESAR Competition. SECRYPT 2017: 237-246 - [c156]Md. Iftekhar Salam
, Leonie Simpson
, Harry Bartlett
, Ed Dawson
, Josef Pieprzyk
, Kenneth Koon-Ho Wong
:
Investigating Cube Attacks on the Authenticated Encryption Stream Cipher MORUS. TrustCom/BigDataSE/ICESS 2017: 961-966 - [e19]Josef Pieprzyk, Suriadi Suriadi:
Information Security and Privacy - 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part I. Lecture Notes in Computer Science 10342, Springer 2017, ISBN 978-3-319-60054-3 [contents] - [e18]Josef Pieprzyk, Suriadi Suriadi:
Information Security and Privacy - 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part II. Lecture Notes in Computer Science 10343, Springer 2017, ISBN 978-3-319-59869-7 [contents] - [i40]Hossein Arabnezhad-Khanoki, Babak Sadeghiyan, Josef Pieprzyk:
Algebraic Attack Efficiency versus S-box Representation. IACR Cryptol. ePrint Arch. 2017: 7 (2017) - 2016
- [j51]Hong Lai, Mehmet A. Orgun
, Josef Pieprzyk
, Jing Li, Mingxing Luo, Jinghua Xiao, Fuyuan Xiao:
High-capacity quantum key distribution using Chebyshev-map values corresponding to Lucas numbers coding. Quantum Inf. Process. 15(11): 4663-4679 (2016) - [c155]Md. Iftekhar Salam
, Kenneth Koon-Ho Wong
, Harry Bartlett
, Leonie Ruth Simpson
, Ed Dawson
, Josef Pieprzyk
:
Finding state collisions in the authenticated encryption stream cipher ACORN. ACSW 2016: 36 - [c154]Joseph Alley, Josef Pieprzyk
:
State recovery attacks against π-cipher. ACSW 2016: 43 - [c153]Md. Iftekhar Salam
, Harry Bartlett
, Ed Dawson
, Josef Pieprzyk
, Leonie Simpson
, Kenneth Koon-Ho Wong
:
Investigating Cube Attacks on the Authenticated Encryption Stream Cipher ACORN. ATIS 2016: 15-26 - [i39]Md. Iftekhar Salam, Harry Bartlett, Ed Dawson, Josef Pieprzyk, Leonie Simpson, Kenneth Koon-Ho Wong:
Investigating Cube Attacks on the Authenticated Encryption Stream Cipher ACORN. IACR Cryptol. ePrint Arch. 2016: 743 (2016) - [i38]Ashutosh Dhar Dwivedi, Milos Kloucek, Pawel Morawiecki, Ivica Nikolic, Josef Pieprzyk, Sebastian Wójtowicz:
SAT-based Cryptanalysis of Authenticated Ciphers from the CAESAR Competition. IACR Cryptol. ePrint Arch. 2016: 1053 (2016) - 2015
- [j50]Mehmet A. Orgun
, Atilla Elçi, Josef Pieprzyk
, Alexander G. Chefranov
, Rajan Shankaran
, Huaxiong Wang:
Special issue on trust and security in wireless sensor networks. Concurr. Comput. Pract. Exp. 27(15): 3791-3793 (2015) - [j49]Hong Lai, Liyin Xue, Mehmet A. Orgun
, Jinghua Xiao, Josef Pieprzyk
:
A hybrid quantum key distribution protocol based on extended unitary operations and fountain codes. Quantum Inf. Process. 14(2): 697-713 (2015) - [j48]Cai Li, Jiankun Hu
, Josef Pieprzyk
, Willy Susilo
:
A New Biocryptosystem-Oriented Security Analysis Framework and Implementation of Multibiometric Cryptosystems Based on Decision Level Fusion. IEEE Trans. Inf. Forensics Secur. 10(6): 1193-1206 (2015) - [j47]Hassan Jameel Asghar
, Ron Steinfeld, Shujun Li
, Mohamed Ali Kâafar
, Josef Pieprzyk
:
On the Linearization of Human Identification Protocols: Attacks Based on Linear Algebra, Coding Theory, and Lattices. IEEE Trans. Inf. Forensics Secur. 10(8): 1643-1655 (2015) - [c152]Itai Dinur, Pawel Morawiecki, Josef Pieprzyk
, Marian Srebrny, Michal Straus:
Cube Attacks and Cube-Attack-Like Cryptanalysis on the Round-Reduced Keccak Sponge Function. EUROCRYPT (1) 2015: 733-761 - [c151]Dmitry Khovratovich, Ivica Nikolic, Josef Pieprzyk
, Przemyslaw Sokolowski, Ron Steinfeld:
Rotational Cryptanalysis of ARX Revisited. FSE 2015: 519-536 - [e17]Oleg B. Makarevich, Ron Poet, Atilla Elçi, Manoj Singh Gaur, Mehmet A. Orgun, Ludmila K. Babenko, Md. Sadek Ferdous, Anthony T. S. Ho, Vijay Laxmi, Josef Pieprzyk:
Proceedings of the 8th International Conference on Security of Information and Networks, SIN 2015, Sochi, Russian Federation, September 8-10, 2015. ACM 2015, ISBN 978-1-4503-3453-2 [contents] - [i37]Dmitry Khovratovich, Ivica Nikolic, Josef Pieprzyk, Przemyslaw Sokolowski, Ron Steinfeld:
Rotational Cryptanalysis of ARX Revisited. IACR Cryptol. ePrint Arch. 2015: 95 (2015) - [i36]Md. Iftekhar Salam, Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson, Josef Pieprzyk:
Finding State Collisions in the Authenticated Encryption Stream Cipher ACORN. IACR Cryptol. ePrint Arch. 2015: 918 (2015) - [i35]Pawel Morawiecki, Josef Pieprzyk, Michal Straus, Marian Srebrny:
Applications of Key Recovery Cube-attack-like. IACR Cryptol. ePrint Arch. 2015: 1009 (2015) - 2014
- [j46]Sareh Emami, San Ling
, Ivica Nikolic
, Josef Pieprzyk
, Huaxiong Wang:
The resistance of PRESENT-80 against related-key differential attacks. Cryptogr. Commun. 6(3): 171-187 (2014) - [j45]Reza Sepahi, Ron Steinfeld, Josef Pieprzyk
:
Lattice-based completely non-malleable public-key encryption in the standard model. Des. Codes Cryptogr. 71(2): 293-313 (2014) - [j44]Reza Sepahi, Ron Steinfeld, Josef Pieprzyk
:
Lattice-based certificateless public-key encryption in the standard model. Int. J. Inf. Sec. 13(4): 315-333 (2014) - [j43]Mohammad Ali Orumiehchiha, Josef Pieprzyk
, Ron Steinfeld:
Practical attack on NLM-MAC scheme. Inf. Process. Lett. 114(10): 547-550 (2014) - [j42]Hassan Jameel Asghar, Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld:
A subexponential construction of graph coloring for multiparty computation. J. Math. Cryptol. 8(4): 363-403 (2014) - [j41]Hong Lai, Jinghua Xiao, Mehmet A. Orgun
, Liyin Xue, Josef Pieprzyk
:
Quantum direct secret sharing with efficient eavesdropping-check and authentication based on distributed fountain codes. Quantum Inf. Process. 13(4): 895-907 (2014) - [c150]Sareh Emami, San Ling
, Ivica Nikolic, Josef Pieprzyk
, Huaxiong Wang:
Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128. ASIACRYPT (1) 2014: 141-157 - [c149]Kamini Bajaj, Josef Pieprzyk:
A Case Study of User-Level Spam Filtering. AISC 2014: 67-75 - [c148]Pawel Morawiecki, Kris Gaj, Ekawat Homsirikamol, Krystian Matusiewicz, Josef Pieprzyk
, Marcin Rogawski, Marian Srebrny, Marcin Wójcik:
ICEPOLE: High-Speed, Hardware-Oriented Authenticated Encryption. CHES 2014: 392-413 - [c147]Harsha S. Gardiyawasam Pussewalage, Jiankun Hu
, Josef Pieprzyk
:
A survey: Error control methods used in bio-cryptography. FSKD 2014: 956-962 - [i34]Sareh Emami, San Ling, Ivica Nikolic, Josef Pieprzyk, Huaxiong Wang:
Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128. IACR Cryptol. ePrint Arch. 2014: 56 (2014) - [i33]Hassan Jameel Asghar, Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld:
A Subexponential Construction of Graph Coloring for Multiparty Computation. IACR Cryptol. ePrint Arch. 2014: 66 (2014) - [i32]Itai Dinur, Pawel Morawiecki, Josef Pieprzyk, Marian Srebrny, Michal Straus:
Practical Complexity Cube Attacks on Round-Reduced Keccak Sponge Function. IACR Cryptol. ePrint Arch. 2014: 259 (2014) - [i31]Pawel Morawiecki, Kris Gaj, Ekawat Homsirikamol, Krystian Matusiewicz, Josef Pieprzyk, Marcin Rogawski, Marian Srebrny, Marcin Wójcik:
ICEPOLE: High-speed, Hardware-oriented Authenticated Encryption. IACR Cryptol. ePrint Arch. 2014: 266 (2014) - [i30]Itai Dinur, Pawel Morawiecki, Josef Pieprzyk, Marian Srebrny, Michal Straus:
Cube Attacks and Cube-attack-like Cryptanalysis on the Round-reduced Keccak Sponge Function. IACR Cryptol. ePrint Arch. 2014: 736 (2014) - [i29]Hassan Jameel Asghar, Ron Steinfeld, Shujun Li, Dali Kaafar, Josef Pieprzyk:
Algebraic Attacks on Human Identification Protocols. IACR Cryptol. ePrint Arch. 2014: 767 (2014) - 2013
- [j40]Hassan Jameel Asghar
, Shujun Li
, Josef Pieprzyk
, Huaxiong Wang:
Cryptanalysis of the convex hull click human identification protocol. Int. J. Inf. Sec. 12(2): 83-96 (2013) - [j39]Mohammad Ali Orumiehchiha, Josef Pieprzyk
, Ron Steinfeld, Harry Bartlett
:
Security analysis of linearly filtered NLFSRs. J. Math. Cryptol. 7(4): 313-332 (2013) - [c146]Sareh Emami, Cameron McDonald, Josef Pieprzyk
, Ron Steinfeld:
Truncated Differential Analysis of Reduced-Round LBlock. CANS 2013: 291-308 - [c145]Pawel Morawiecki, Josef Pieprzyk
, Marian Srebrny:
Rotational Cryptanalysis of Round-Reduced Keccak. FSE 2013: 241-262 - [c144]Mohammad Ali Orumiehchiha, Josef Pieprzyk
, Elham Shakour, Ron Steinfeld:
Security Evaluation of Rakaposhi Stream Cipher. ISPEC 2013: 361-371 - [c143]Hassan Jameel Asghar, Shujun Li, Ron Steinfeld, Josef Pieprzyk:
Does Counting Still Count? Revisiting the Security of Counting based User Authentication Protocols against Statistical Attacks. NDSS 2013 - [c142]Mohammad Ali Orumiehchiha, Josef Pieprzyk
, Elham Shakour, Ron Steinfeld:
Cryptanalysis of RC4(n, m) stream cipher. SIN 2013: 165-172 - [i28]Mohammad Ali Orumiehchiha, Josef Pieprzyk, Elham Shakour, Ron Steinfeld:
Cryptanalysis of RC4(n, m) Stream Cipher. IACR Cryptol. ePrint Arch. 2013: 178 (2013) - [i27]Mohammad Ali Orumiehchiha, Josef Pieprzyk, Ron Steinfeld, Harry Bartlett:
Security Analysis of Linearly Filtered NLFSRs. IACR Cryptol. ePrint Arch. 2013: 185 (2013) - [i26]Mohammad Ali Orumiehchiha, Josef Pieprzyk, Ron Steinfeld:
Breaking NLM-MAC Generator. IACR Cryptol. ePrint Arch. 2013: 202 (2013) - [i25]Sareh Emami, San Ling, Ivica Nikolic, Josef Pieprzyk, Huaxiong Wang:
The Resistance of PRESENT-80 Against Related-Key Differential Attacks. IACR Cryptol. ePrint Arch. 2013: 522 (2013) - [i24]