Edit Profile (opens in new tab) Pieprzyk, Josef P. Co-Author Distance Author ID: pieprzyk.josef-p Published as: Pieprzyk, Josef; Pieprzyk, J.; Pieprzyk, Józef P.; Pieprzyk, Josef P. more...less Homepage: https://people.csiro.au/P/J/Josef-Pieprzyk External Links: MGP · ORCID · Wikidata · Google Scholar · dblp · GND · IdRef Documents Indexed: 156 Publications since 1979, including 3 Books 16 Contributions as Editor Co-Authors: 116 Co-Authors with 162 Joint Publications 3,304 Co-Co-Authors all top 5 Co-Authors 10 single-authored 43 Wang, Huaxiong 26 Steinfeld, Ron 19 Safavi-Naini, Reihaneh 17 Lai, Hong 15 Zhang, Xian-Mo 14 Seberry, Jennifer R. 12 Orgun, Mehmet Ali 11 Ghodosi, Hossein 7 Pan, Lei 6 Charnes, Chris 6 Ling, San 6 Luo, Mingxing 6 Matusiewicz, Krystian 6 Sadeghiyan, Babak 6 Xiao, Jinghua 5 Cho, Joo Yeon 5 Desmedt, Yvo G. 5 Nikolić, Ivica 5 Susilo, Willy 5 Xue, Liyin 4 Contini, Scott 4 Martin, Keith M. 4 Orumiehchiha, Mohammad Ali 4 Tartary, Christophe 4 Zheng, Yuliang 3 Asghar, Hassan Jameel 3 Bakhtiari, Shahram 3 Duong, Dung Hoang 3 Le, Huy Quoc 3 Morawiecki, Paweł 3 Qu, Chengxin 3 Sepahi, Reza 3 Sokołowski, Przemysław 3 Srebrny, Marian 3 Wang, Peishun 3 Zhan, Cheng 2 Al-Ibrahim, Mohamed Hussain 2 Baraani-Dastjerdi, Ahmad 2 Emami, Sareh 2 Guo, Jian 2 Hardjono, Thomas 2 Khovratovich, Dmitry 2 Kwan, Matthew 2 Li, Chih-Hung 2 Liu, Joseph K. K. 2 Okamoto, Eiji 2 Pastuszak, Jarosław 2 Peyrin, Thomas 2 Pointcheval, David 2 Shao, Jun 2 Sun, Shifeng 2 Suriadi, Suriadi 2 Varadharajan, Vijay 2 Wei, Lei 2 Xia, Tianbing 2 Xiao, Fuyuan 2 Ye, Qingsong 2 Zuo, Cong 1 Bansal, Tarun Kumar 1 Bartlett, Harry 1 Billet, Olivier 1 Biryukov, Alex 1 Boyen, Xavier 1 Brown, Lawrence Peter 1 Bull, Laurence 1 Courtois, Nicolas T. 1 Dawson, Edward 1 Dempwolff, Ulrich 1 Ding, Cunsheng 1 Dinur, Itai 1 Gaj, Kris 1 Gauravaram, Praveen 1 Getta, Janusz R. 1 Golić, Jovan Dj. 1 Homsirikamol, Ekawat 1 Jia, Zhongtian 1 Kaczorowski, Jerzy 1 Khoo, Khoongming 1 Ku, Bying-He 1 Li, Jing 1 Li, Shujun 1 Li, Ya 1 Lim, Chu-Wee 1 Long, Shoulun 1 Manulis, Mark 1 Michałek, Darek 1 Michałek, Dariusz 1 Mu, Yi 1 Orgun, A. Mehmet 1 Pastuszak, Jarek 1 Plantard, Thomas 1 Pomykała, Jacek M. 1 Qu, Zhiguo 1 Rogawski, Marcin 1 Rostami, Saeed 1 Sadeghi, Ahmad-Reza 1 Schoenmakers, Berry 1 Shahandashti, Siamak F. 1 Shakour, Elham 1 Straus, Michał ...and 16 more Co-Authors all top 5 Serials 16 Lecture Notes in Computer Science 10 Quantum Information Processing 4 Journal of Mathematical Cryptology 3 Designs, Codes and Cryptography 3 Cryptography and Communications 2 Archiwum Automatyki i Telemechaniki 2 Australian Computer Journal 2 Discrete Applied Mathematics 2 Information Processing Letters 2 Physica A 2 Physics Letters. A 2 Finite Fields and their Applications 2 Discrete Mathematics and Theoretical Computer Science. DMTCS 2 Journal of Universal Computer Science 1 IEEE Transactions on Information Theory 1 Journal of Complexity 1 SIAM Journal on Discrete Mathematics 1 Journal of Cryptology 1 Data & Knowledge Engineering 1 International Journal of Computer Mathematics 1 The Australasian Journal of Combinatorics 1 Informatica (Ljubljana) 1 Nonlinear Dynamics 1 Journal of Discrete Algorithms 1 Advances in Mathematics of Communications 1 International Journal of Applied Cryptography 1 Communications in Theoretical Physics all top 5 Fields 149 Information and communication theory, circuits (94-XX) 53 Computer science (68-XX) 16 General and overarching topics; collections (00-XX) 14 Quantum theory (81-XX) 13 Number theory (11-XX) 7 Combinatorics (05-XX) 5 Numerical analysis (65-XX) 4 Order, lattices, ordered algebraic structures (06-XX) 2 Group theory and generalizations (20-XX) 2 Probability theory and stochastic processes (60-XX) 2 Statistical mechanics, structure of matter (82-XX) 2 Operations research, mathematical programming (90-XX) 1 Special functions (33-XX) 1 Dynamical systems and ergodic theory (37-XX) 1 Approximations and expansions (41-XX) 1 General topology (54-XX) Publications by Year all cited Publications top 5 cited Publications Citations contained in zbMATH Open 114 Publications have been cited 601 times in 500 Documents Cited by ▼ Year ▼ Cryptanalysis of block ciphers with overdefined systems of equations. Zbl 1065.94543Courtois, Nicolas T.; Pieprzyk, Josef 99 2002 Permutation polynomials of the \((x^p - x+\delta)^s+L(x)\). Zbl 1211.11136Yuan, Jin; Ding, Cunsheng; Wang, Huaxiong; Pieprzyk, Josef 43 2008 Universal designated-verifier signatures. Zbl 1205.94112Steinfeld, Ron; Bull, Laurence; Wang, Huaxiong; Pieprzyk, Josef 22 2003 HAVAL – a one-way hashing algorithm with variable length of output. (Extended abstract). Zbl 0869.94028Zheng, Yuliang; Pieprzyk, Josef; Seberry, Jennifer 19 1993 Rotational cryptanalysis of round-reduced Keccak. Zbl 1321.94081Morawiecki, Paweł; Pieprzyk, Josef; Srebrny, Marian 18 2014 Efficient extension of standard Schnorr/RSA signatures into universal designated-verifier signatures. Zbl 1198.94163Steinfeld, Ron; Wang, Huaxiong; Pieprzyk, Josef 15 2004 Cube attacks and cube-attack-like cryptanalysis on the round-reduced Keccak sponge function. Zbl 1370.94506Dinur, Itai; Morawiecki, Paweł; Pieprzyk, Josef; Srebrny, Marian; Straus, Michał 15 2015 Homogeneous bent functions. Zbl 1016.94029Qu, Chengxin; Seberry, Jennifer; Pieprzyk, Josef 13 2000 How to strengthen any weakly unforgeable signature into a strongly unforgeable signature. Zbl 1177.94191Steinfeld, Ron; Pieprzyk, Josef; Wang, Huaxiong 12 2006 On the provable security of an efficient RSA-based pseudorandom generator. Zbl 1172.94597Steinfeld, Ron; Pieprzyk, Josef; Wang, Huaxiong 11 2006 Fundamentals of computer security. Zbl 1011.68034Pieprzyk, Josef; Hardjono, Thomas; Seberry, Jennifer 11 2003 Homogeneous bent functions of degree \(n\) in 2\(n\) variables do not exist for \(n>3\). Zbl 1048.94016Xia, Tianbing; Seberry, Jennifer; Pieprzyk, Josef; Charnes, Chris 11 2004 Changing thresholds in the absence of secure channels. Zbl 0919.94041Martin, Keith M.; Pieprzyk, Josef; Safavi-Naini, Rei; Wang, Huaxiong 10 1999 Lattice-based treshold-changeability for standard CRT secret-sharing schemes. Zbl 1156.94381Steinfeld, Ron; Pieprzyk, Josef; Wang, Huaxiong 8 2006 ICEPOLE: high-speed, hardware-oriented authenticated encryption. Zbl 1396.94092Morawiecki, Paweł; Gaj, Kris; Homsirikamol, Ekawat; Matusiewicz, Krystian; Pieprzyk, Josef; Rogawski, Marcin; Srebrny, Marian; Wójcik, Marcin 8 2014 Rotational cryptanalysis of ARX revisited. Zbl 1382.94128Khovratovich, Dmitry; Nikolić, Ivica; Pieprzyk, Josef; Sokołowski, Przemysław; Steinfeld, Ron 8 2015 Efficient one-time proxy signatures. Zbl 1205.94115Wang, Huaxiong; Pieprzyk, Josef 8 2003 Attacking the \(\mathrm{SL}_2\) hashing scheme. Zbl 1126.94323Charnes, Chris; Pieprzyk, Josef 8 1995 Secret sharing in multilevel and compartmented groups. Zbl 0931.94022Ghodosi, Hossein; Pieprzyk, Josef; Safavi-Naini, Rei 8 1998 Improving resistance to differential cryptanalysis and the redesign of LOKI. Zbl 0806.94015Brown, Lawrence; Kwan, Matthew; Pieprzyk, Josef; Seberry, Jennifer 7 1993 Changing thresholds in the absence of secure channels. Zbl 0945.68055Martin, Keith M.; Pieprzyk, Josef; Safavi-Naini, Rei; Wang, Huaxiong 7 1999 Lattice-based threshold-changeability for standard Shamir secret-sharing schemes. Zbl 1094.94039Steinfeld, Ron; Wang, Huaxiong; Pieprzyk, Josef 7 2004 Lattice-based threshold changeability for standard Shamir secret-sharing schemes. Zbl 1326.94130Steinfeld, Ron; Pieprzyk, Josef; Wang, Huaxiong 6 2007 Known and chosen key differential distinguishers for block ciphers. Zbl 1297.94094Nikolić, Ivica; Pieprzyk, Josef; Sokołowski, Przemysław; Steinfeld, Ron 6 2011 Keyed hash functions. Zbl 1421.94037Bakhtiari, S.; Safavi-Naini, R.; Pieprzyk, J. 6 1996 Cryptanalysis of WG-7: a lightweight stream cipher. Zbl 1285.94087Orumiehchiha, Mohammad Ali; Pieprzyk, Josef; Steinfeld, Ron 5 2012 High-capacity (2,3) threshold quantum secret sharing based on asymmetric quantum lossy channels. Zbl 1508.81305Lai, Hong; Pieprzyk, Josef; Luo, Ming-Xing; Zhan, Cheng; Pan, Lei; Orgun, Mehmet A. 5 2020 Multiple-time signature schemes against adaptive chosen message attacks. Zbl 1081.94553Pieprzyk, Josef; Wang, Huaxiong; Xing, Chaoping 5 2004 On the symmetric property of homogeneous Boolean functions. Zbl 0919.94019Qu, Chengxin; Seberry, Jennifer; Pieprzyk, Josef 5 1999 Controllable quantum private queries using an entangled Fibonacci-sequence spiral source. Zbl 1361.81023Lai, Hong; Orgun, Mehmet A.; Pieprzyk, Josef; Xiao, Jinghua; Xue, Liyin; Jia, Zhongtian 5 2015 Novel quantum key distribution with shift operations based on Fibonacci and Lucas valued orbital angular momentum entangled states. Zbl 07528415Lai, Hong; Pieprzyk, Josef; Orgun, Mehmet A. 5 2020 How to construct pseudorandom permutations from single pseudorandom functions. Zbl 0779.65005Pieprzyk, Josef 4 1991 On algebraic immunity and annihilators. Zbl 1272.94071Zhang, Xian-Mo; Pieprzyk, Josef; Zheng, Yuliang 4 2006 On necessary and sufficient conditions for the construction of super pseudorandom permutations. Zbl 0808.94025Sadeghiyan, Babak; Pieprzyk, Josef 4 1993 On secure multi-party computation in black-box groups. Zbl 1215.94042Desmedt, Yvo; Pieprzyk, Josef; Steinfeld, Ron; Wang, Huaxiong 4 2007 Cryptanalysis of FORK-256. Zbl 1186.94460Matusiewicz, Krystian; Peyrin, Thomas; Billet, Olivier; Contini, Scott; Pieprzyk, Josef 4 2007 Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model. Zbl 1331.94060Lai, Hong; Orgun, Mehmet A.; Xiao, Jinghua; Pieprzyk, Josef; Xue, Liyin; Yang, Yixian 4 2014 A construction of super pseudorandom permutations from a single pseudorandom function. Zbl 0801.65007Sadeghiyan, Babak; Pieprzyk, Josef 4 1993 Ideal threshold schemes from MDS codes. Zbl 1031.94538Pieprzyk, Josef; Zhang, Xian-Mo 4 2003 Cheating immune secret sharing. Zbl 1050.94543Zhang, Xian-Mo; Pieprzyk, Josef 4 2001 Converse results to the Wiener attack on RSA. Zbl 1081.94537Steinfeld, Ron; Contini, Scott; Wang, Huaxiong; Pieprzyk, Josef 4 2005 Algebraic attacks on SOBER-t32 and SOBER-t16 without stuttering. Zbl 1079.68540Cho, Joo Yeon; Pieprzyk, Josef 4 2004 Two types of dynamic quantum state secret sharing based on tensor networks states. Zbl 07482426Lai, Hong; Pieprzyk, Josef; Pan, Lei; Orgun, Mehmet A. 4 2021 On the (in)security of IDEA in various hashing modes. Zbl 1312.94099Wei, Lei; Peyrin, Thomas; Sokołowski, Przemysław; Ling, San; Pieprzyk, Josef; Wang, Huaxiong 4 2012 Cryptography: an introduction to computer security. Zbl 0716.94008Seberry, Jennifer; Pieprzyk, Josef 3 1989 Advances in cryptology – ASIACRYPT 2008. 14th international conference on the theory and application of cryptology and information security, Melbourne, Australia, December 7–11, 2008. Proceedings. Zbl 1155.94008 3 2008 On the weaknesses of Gong’s collisionful hash function. Zbl 0960.68042Bakhtiari, S.; Safavi-Naini, R.; Pieprzyk, J. 3 1997 A general purpose technique for locating key scheduling weaknes in DES- like cryptosystems. (Extended abstract). Zbl 0825.94204Kwan, Matthew; Pieprzyk, Josef 3 1993 Quantum direct secret sharing with efficient eavesdropping-check and authentication based on distributed fountain codes. Zbl 1291.81116Lai, Hong; Xiao, Jinghua; Orgun, Mehmet A.; Xue, Liyin; Pieprzyk, Josef 3 2014 Threshold privacy preserving keyword searches. Zbl 1132.68378Wang, Peishun; Wang, Huaxiong; Pieprzyk, Josef 3 2008 A non-malleable group key exchange protocol robust against active insiders. Zbl 1156.94410Desmedt, Yvo; Pieprzyk, Josef; Steinfeld, Ron; Wang, Huaxiong 3 2006 Multiple modular additions and crossword puzzle attack on NLSv2. Zbl 1138.94356Cho, Joo Yeon; Pieprzyk, Josef 3 2007 Bent permutations. Zbl 0804.11068Pieprzyk, Josef 3 1993 Generalised cumulative arrays in secret sharing. Zbl 1261.94032Long, Shoulun; Pieprzyk, Josef; Wang, Huaxiong; Wong, Duncan S. 3 2006 Decomposition construction for secret sharing schemes with graph access structures in polynomial time. Zbl 1213.94137Sun, Hung-Min; Wang, Huaxiong; Ku, Bying-He; Pieprzyk, Josef 3 2010 An improved coding method of quantum key distribution protocols based on Fibonacci-valued OAM entangled states. Zbl 1404.81081Lai, Hong; Luo, Ming-Xing; Zhan, Cheng; Pieprzyk, Josef; Orgun, Mehmet A. 3 2017 Topics in cryptology – CT-RSA 2010. The cryptographers’ track at the RSA conference 2010, San Francisco, CA, USA, March 1–5, 2010. Proceedings. Zbl 1182.94002 3 2010 Constructions of cheating immune secret sharing. Zbl 0999.94552Pieprzyk, Josef; Zhang, Xian-Mo 3 2002 Identification of bad signatures in batches. Zbl 0966.94024Pastuszak, Jarosław; Michałek, Dariusz; Pieprzyk, Josef; Seberry, Jennifer 3 2000 Shared generation of pseudo-random functions with cumulative maps. Zbl 1039.94521Wang, Huaxiong; Pieprzyk, Josef 3 2003 Parallel authentication and public-key encryption. Zbl 1045.94541Pieprzyk, Josef; Pointcheval, David 3 2003 Dynamic \((2, 3)\) threshold quantum secret sharing of secure direct communication. Zbl 1311.81096Lai, Hong; Orgun, A. Mehmet; Xiao, Jing-Hua; Pieprzyk, Josef; Xue, Li-Yin 3 2015 Rotation-symmetric functions and fast hashing. Zbl 1097.94514Pieprzyk, Josef; Qu, Cheng Xin 3 1998 Keyword field-free conjunctive keyword searches on encrypted data and extension for dynamic groups. Zbl 1362.94058Wang, Peishun; Wang, Huaxiong; Pieprzyk, Josef 2 2008 Sibling intractable function families and their applications. (Extended abstract). Zbl 0805.94015Zheng, Yuliang; Hardjono, Thomas; Pieprzyk, Josef 2 1993 Optimal perfect randomizers. Zbl 0808.94026Pieprzyk, Josef; Sadeghiyan, Babak 2 1993 Non-linearity of exponent permutations. Zbl 0724.94010Pieprzyk, Josef P. 2 1990 Lattice-based completely non-malleable public-key encryption in the standard model. Zbl 1342.94095Sepahi, Reza; Steinfeld, Ron; Pieprzyk, Josef 2 2014 Crossword puzzle attack on NLS. Zbl 1161.94392Cho, Joo Yeon; Pieprzyk, Josef 2 2007 A new dynamic accumulator for batch updates. Zbl 1285.94115Wang, Peishun; Wang, Huaxiong; Pieprzyk, Josef 2 2008 Efficient disjointness tests for private datasets. Zbl 1279.94127Ye, Qingsong; Wang, Huaxiong; Pieprzyk, Josef; Zhang, Xian-Mo 2 2008 The eight variable homogeneous degree three bent functions. Zbl 1147.94010Charnes, C.; Dempwolff, U.; Pieprzyk, J. 2 2008 Finding good differential patterns for attacks on SHA-1. Zbl 1151.94545Matusiewicz, Krystian; Pieprzyk, Josef 2 2006 A new human identification protocol and Coppersmith’s baby-step giant-step algorithm. Zbl 1350.94028Asghar, Hassan Jameel; Pieprzyk, Josef; Wang, Huaxiong 2 2010 NTRUCCA: how to strengthen NTRUEncrypt to chosen-ciphertext security in the standard model. Zbl 1294.94079Steinfeld, Ron; Ling, San; Pieprzyk, Josef; Tartary, Christophe; Wang, Huaxiong 2 2012 Multi-party computation with conversion of secret sharing. Zbl 1234.68151Ghodosi, Hossein; Pieprzyk, Josef; Steinfeld, Ron 2 2012 Remarks on the multiple assignment secret sharing scheme. Zbl 0957.94026Ghodosi, Hossein; Pieprzyk, Josef; Safavi-Naini, Rei 2 1997 On cheating immune secret sharing. Zbl 1064.94014Pieprzyk, Josef; Zhang, Xian-Mo 2 2004 Construction of cubic homogeneous Boolean bent functions. Zbl 0984.94043Seberry, Jennifer; Xia, Tianbing; Pieprzyk, Josef 2 2000 Codes identifying bad signatures in batches. Zbl 0963.94033Pastuszak, Jarosław; Pieprzyk, Josef; Seberry, Jennifer 2 2000 Cheating prevention in linear secret sharing. Zbl 1020.94537Pieprzyk, Josef; Zhang, Xian-Mo 2 2002 Threshold MACs. Zbl 1031.94522Martin, Keith M.; Pieprzyk, Josef; Safavi-Naini, Rei; Wang, Huaxiong; Wild, Peter R. 2 2003 Cheating prevention in secret sharing over \(\text{GF} (p^t)\). Zbl 1011.94559Pieprzyk, Josef; Zhang, Xian-Mo 2 2001 Conference key agreement from secret sharing. Zbl 0919.94040Li, Chih-Hung; Pieprzyk, Josef 2 1999 Fail-stop threshold signature schemes based on elliptic curves. Zbl 0919.94045Susilo, Willy; Safavi-Naini, Rei; Pieprzyk, Josef 2 1999 Möbius transforms, coincident Boolean functions and non-coincidence property of Boolean functions. Zbl 1232.06017Pieprzyk, Josef; Wang, Huaxiong; Zhang, Xian-Mo 2 2011 Graph coloring applied to secure computation in non-abelian groups. Zbl 1278.94046Desmedt, Yvo; Pieprzyk, Josef; Steinfeld, Ron; Sun, Xiaoming; Tartary, Christophe; Wang, Huaxiong; Yao, Andrew Chi-Chih 2 2012 Dynamic searchable symmetric encryption schemes supporting range queries with forward (and backward) security. Zbl 1496.68076Zuo, Cong; Sun, Shi-Feng; Liu, Joseph K.; Shao, Jun; Pieprzyk, Josef 2 2018 Nonlinear functions and their application to cryptography. Zbl 0584.94027Pieprzyk, Józef P. 1 1985 The resistance of PRESENT-80 against related-key differential attacks. Zbl 1291.94079Emami, Sareh; Ling, San; Nikolić, Ivica; Pieprzyk, Josef; Wang, Huaxiong 1 2014 Verifiable multi-secret sharing schemes for multiple threshold access structures. Zbl 1166.94341Tartary, Christophe; Pieprzyk, Josef; Wang, Huaxiong 1 2008 Multi-party computation with omnipresent adversary. Zbl 1227.68015Ghodosi, Hossein; Pieprzyk, Josef 1 2009 Unconditionally secure disjointness tests for private datasets. Zbl 1159.94374Ye, Qingsong; Wang, Huaxiong; Pieprzyk, Josef; Zhang, Xian-Mo 1 2009 Cryptanalysis of LASH. Zbl 1154.68411Steinfeld, Ron; Contini, Scott; Matusiewicz, Krystian; Pieprzyk, Josef; Guo, Jian; Ling, San; Wang, Huaxiong 1 2008 Cryptology and network security. 11th international conference, CANS 2012, Darmstadt, Germany, December 12–14, 2012. Proceedings. Zbl 1295.68028 1 2012 Low probability differentials and the cryptanalysis of full-round CLEFIA-128. Zbl 1306.94050Emami, Sareh; Ling, San; Nikolić, Ivica; Pieprzyk, Josef; Wang, Huaxiong 1 2014 Cryptanalysis of the convex hull click human identification protocol. Zbl 1371.94621Asghar, Hassan Jameel; Li, Shujun; Pieprzyk, Josef; Wang, Huaxiong 1 2011 Cryptanalysis of the LAKE hash family. Zbl 1248.94057Biryukov, Alex; Gauravaram, Praveen; Guo, Jian; Khovratovich, Dmitry; Ling, San; Matusiewicz, Krystian; Nikolić, Ivica; Pieprzyk, Josef; Wang, Huaxiong 1 2009 Dynamic and compressed quantum many-body state secret sharing based on site-independent matrix product states. Zbl 1508.81976Lai, Hong; Pieprzyk, Josef; Pan, Lei 1 2022 Trapdoor delegation and HIBE from middle-product LWE in standard model. Zbl 07314280Le, Huy Quoc; Duong, Dung Hoang; Susilo, Willy; Pieprzyk, Josef 1 2020 Dynamic and compressed quantum many-body state secret sharing based on site-independent matrix product states. Zbl 1508.81976Lai, Hong; Pieprzyk, Josef; Pan, Lei 1 2022 Two types of dynamic quantum state secret sharing based on tensor networks states. Zbl 07482426Lai, Hong; Pieprzyk, Josef; Pan, Lei; Orgun, Mehmet A. 4 2021 High-capacity (2,3) threshold quantum secret sharing based on asymmetric quantum lossy channels. Zbl 1508.81305Lai, Hong; Pieprzyk, Josef; Luo, Ming-Xing; Zhan, Cheng; Pan, Lei; Orgun, Mehmet A. 5 2020 Novel quantum key distribution with shift operations based on Fibonacci and Lucas valued orbital angular momentum entangled states. Zbl 07528415Lai, Hong; Pieprzyk, Josef; Orgun, Mehmet A. 5 2020 Trapdoor delegation and HIBE from middle-product LWE in standard model. Zbl 07314280Le, Huy Quoc; Duong, Dung Hoang; Susilo, Willy; Pieprzyk, Josef 1 2020 Analysis of weighted quantum secret sharing based on matrix product states. Zbl 1509.81385Lai, Hong; Pieprzyk, Josef; Pan, Lei 1 2020 Dynamic searchable symmetric encryption with forward and stronger backward privacy. Zbl 1496.68134Zuo, Cong; Sun, Shi-Feng; Liu, Joseph K.; Shao, Jun; Pieprzyk, Josef 1 2019 Dynamic searchable symmetric encryption schemes supporting range queries with forward (and backward) security. Zbl 1496.68076Zuo, Cong; Sun, Shi-Feng; Liu, Joseph K.; Shao, Jun; Pieprzyk, Josef 2 2018 An improved coding method of quantum key distribution protocols based on Fibonacci-valued OAM entangled states. Zbl 1404.81081Lai, Hong; Luo, Ming-Xing; Zhan, Cheng; Pieprzyk, Josef; Orgun, Mehmet A. 3 2017 Cube attacks and cube-attack-like cryptanalysis on the round-reduced Keccak sponge function. Zbl 1370.94506Dinur, Itai; Morawiecki, Paweł; Pieprzyk, Josef; Srebrny, Marian; Straus, Michał 15 2015 Rotational cryptanalysis of ARX revisited. Zbl 1382.94128Khovratovich, Dmitry; Nikolić, Ivica; Pieprzyk, Josef; Sokołowski, Przemysław; Steinfeld, Ron 8 2015 Controllable quantum private queries using an entangled Fibonacci-sequence spiral source. Zbl 1361.81023Lai, Hong; Orgun, Mehmet A.; Pieprzyk, Josef; Xiao, Jinghua; Xue, Liyin; Jia, Zhongtian 5 2015 Dynamic \((2, 3)\) threshold quantum secret sharing of secure direct communication. Zbl 1311.81096Lai, Hong; Orgun, A. Mehmet; Xiao, Jing-Hua; Pieprzyk, Josef; Xue, Li-Yin 3 2015 Rotational cryptanalysis of round-reduced Keccak. Zbl 1321.94081Morawiecki, Paweł; Pieprzyk, Josef; Srebrny, Marian 18 2014 ICEPOLE: high-speed, hardware-oriented authenticated encryption. Zbl 1396.94092Morawiecki, Paweł; Gaj, Kris; Homsirikamol, Ekawat; Matusiewicz, Krystian; Pieprzyk, Josef; Rogawski, Marcin; Srebrny, Marian; Wójcik, Marcin 8 2014 Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model. Zbl 1331.94060Lai, Hong; Orgun, Mehmet A.; Xiao, Jinghua; Pieprzyk, Josef; Xue, Liyin; Yang, Yixian 4 2014 Quantum direct secret sharing with efficient eavesdropping-check and authentication based on distributed fountain codes. Zbl 1291.81116Lai, Hong; Xiao, Jinghua; Orgun, Mehmet A.; Xue, Liyin; Pieprzyk, Josef 3 2014 Lattice-based completely non-malleable public-key encryption in the standard model. Zbl 1342.94095Sepahi, Reza; Steinfeld, Ron; Pieprzyk, Josef 2 2014 The resistance of PRESENT-80 against related-key differential attacks. Zbl 1291.94079Emami, Sareh; Ling, San; Nikolić, Ivica; Pieprzyk, Josef; Wang, Huaxiong 1 2014 Low probability differentials and the cryptanalysis of full-round CLEFIA-128. Zbl 1306.94050Emami, Sareh; Ling, San; Nikolić, Ivica; Pieprzyk, Josef; Wang, Huaxiong 1 2014 Cryptanalysis of WG-7: a lightweight stream cipher. Zbl 1285.94087Orumiehchiha, Mohammad Ali; Pieprzyk, Josef; Steinfeld, Ron 5 2012 On the (in)security of IDEA in various hashing modes. Zbl 1312.94099Wei, Lei; Peyrin, Thomas; Sokołowski, Przemysław; Ling, San; Pieprzyk, Josef; Wang, Huaxiong 4 2012 NTRUCCA: how to strengthen NTRUEncrypt to chosen-ciphertext security in the standard model. Zbl 1294.94079Steinfeld, Ron; Ling, San; Pieprzyk, Josef; Tartary, Christophe; Wang, Huaxiong 2 2012 Multi-party computation with conversion of secret sharing. Zbl 1234.68151Ghodosi, Hossein; Pieprzyk, Josef; Steinfeld, Ron 2 2012 Graph coloring applied to secure computation in non-abelian groups. Zbl 1278.94046Desmedt, Yvo; Pieprzyk, Josef; Steinfeld, Ron; Sun, Xiaoming; Tartary, Christophe; Wang, Huaxiong; Yao, Andrew Chi-Chih 2 2012 Cryptology and network security. 11th international conference, CANS 2012, Darmstadt, Germany, December 12–14, 2012. Proceedings. Zbl 1295.68028 1 2012 Known and chosen key differential distinguishers for block ciphers. Zbl 1297.94094Nikolić, Ivica; Pieprzyk, Josef; Sokołowski, Przemysław; Steinfeld, Ron 6 2011 Möbius transforms, coincident Boolean functions and non-coincidence property of Boolean functions. Zbl 1232.06017Pieprzyk, Josef; Wang, Huaxiong; Zhang, Xian-Mo 2 2011 Cryptanalysis of the convex hull click human identification protocol. Zbl 1371.94621Asghar, Hassan Jameel; Li, Shujun; Pieprzyk, Josef; Wang, Huaxiong 1 2011 Lattice-based completely non-malleable PKE in the standard model (poster). Zbl 1295.94144Sepahi, Reza; Steinfeld, Ron; Pieprzyk, Josef 1 2011 Decomposition construction for secret sharing schemes with graph access structures in polynomial time. Zbl 1213.94137Sun, Hung-Min; Wang, Huaxiong; Ku, Bying-He; Pieprzyk, Josef 3 2010 Topics in cryptology – CT-RSA 2010. The cryptographers’ track at the RSA conference 2010, San Francisco, CA, USA, March 1–5, 2010. Proceedings. Zbl 1182.94002 3 2010 A new human identification protocol and Coppersmith’s baby-step giant-step algorithm. Zbl 1350.94028Asghar, Hassan Jameel; Pieprzyk, Josef; Wang, Huaxiong 2 2010 Parallel signcryption. Zbl 1217.68089Pieprzyk, Josef; Pointcheval, David 1 2010 Multi-party computation with omnipresent adversary. Zbl 1227.68015Ghodosi, Hossein; Pieprzyk, Josef 1 2009 Unconditionally secure disjointness tests for private datasets. Zbl 1159.94374Ye, Qingsong; Wang, Huaxiong; Pieprzyk, Josef; Zhang, Xian-Mo 1 2009 Cryptanalysis of the LAKE hash family. Zbl 1248.94057Biryukov, Alex; Gauravaram, Praveen; Guo, Jian; Khovratovich, Dmitry; Ling, San; Matusiewicz, Krystian; Nikolić, Ivica; Pieprzyk, Josef; Wang, Huaxiong 1 2009 Permutation polynomials of the \((x^p - x+\delta)^s+L(x)\). Zbl 1211.11136Yuan, Jin; Ding, Cunsheng; Wang, Huaxiong; Pieprzyk, Josef 43 2008 Advances in cryptology – ASIACRYPT 2008. 14th international conference on the theory and application of cryptology and information security, Melbourne, Australia, December 7–11, 2008. Proceedings. Zbl 1155.94008 3 2008 Threshold privacy preserving keyword searches. Zbl 1132.68378Wang, Peishun; Wang, Huaxiong; Pieprzyk, Josef 3 2008 Keyword field-free conjunctive keyword searches on encrypted data and extension for dynamic groups. Zbl 1362.94058Wang, Peishun; Wang, Huaxiong; Pieprzyk, Josef 2 2008 A new dynamic accumulator for batch updates. Zbl 1285.94115Wang, Peishun; Wang, Huaxiong; Pieprzyk, Josef 2 2008 Efficient disjointness tests for private datasets. Zbl 1279.94127Ye, Qingsong; Wang, Huaxiong; Pieprzyk, Josef; Zhang, Xian-Mo 2 2008 The eight variable homogeneous degree three bent functions. Zbl 1147.94010Charnes, C.; Dempwolff, U.; Pieprzyk, J. 2 2008 Verifiable multi-secret sharing schemes for multiple threshold access structures. Zbl 1166.94341Tartary, Christophe; Pieprzyk, Josef; Wang, Huaxiong 1 2008 Cryptanalysis of LASH. Zbl 1154.68411Steinfeld, Ron; Contini, Scott; Matusiewicz, Krystian; Pieprzyk, Josef; Guo, Jian; Ling, San; Wang, Huaxiong 1 2008 Lattice-based threshold changeability for standard Shamir secret-sharing schemes. Zbl 1326.94130Steinfeld, Ron; Pieprzyk, Josef; Wang, Huaxiong 6 2007 On secure multi-party computation in black-box groups. Zbl 1215.94042Desmedt, Yvo; Pieprzyk, Josef; Steinfeld, Ron; Wang, Huaxiong 4 2007 Cryptanalysis of FORK-256. Zbl 1186.94460Matusiewicz, Krystian; Peyrin, Thomas; Billet, Olivier; Contini, Scott; Pieprzyk, Josef 4 2007 Multiple modular additions and crossword puzzle attack on NLSv2. Zbl 1138.94356Cho, Joo Yeon; Pieprzyk, Josef 3 2007 Crossword puzzle attack on NLS. Zbl 1161.94392Cho, Joo Yeon; Pieprzyk, Josef 2 2007 How to strengthen any weakly unforgeable signature into a strongly unforgeable signature. Zbl 1177.94191Steinfeld, Ron; Pieprzyk, Josef; Wang, Huaxiong 12 2006 On the provable security of an efficient RSA-based pseudorandom generator. Zbl 1172.94597Steinfeld, Ron; Pieprzyk, Josef; Wang, Huaxiong 11 2006 Lattice-based treshold-changeability for standard CRT secret-sharing schemes. Zbl 1156.94381Steinfeld, Ron; Pieprzyk, Josef; Wang, Huaxiong 8 2006 On algebraic immunity and annihilators. Zbl 1272.94071Zhang, Xian-Mo; Pieprzyk, Josef; Zheng, Yuliang 4 2006 A non-malleable group key exchange protocol robust against active insiders. Zbl 1156.94410Desmedt, Yvo; Pieprzyk, Josef; Steinfeld, Ron; Wang, Huaxiong 3 2006 Generalised cumulative arrays in secret sharing. Zbl 1261.94032Long, Shoulun; Pieprzyk, Josef; Wang, Huaxiong; Wong, Duncan S. 3 2006 Finding good differential patterns for attacks on SHA-1. Zbl 1151.94545Matusiewicz, Krystian; Pieprzyk, Josef 2 2006 Converse results to the Wiener attack on RSA. Zbl 1081.94537Steinfeld, Ron; Contini, Scott; Wang, Huaxiong; Pieprzyk, Josef 4 2005 Efficient extension of standard Schnorr/RSA signatures into universal designated-verifier signatures. Zbl 1198.94163Steinfeld, Ron; Wang, Huaxiong; Pieprzyk, Josef 15 2004 Homogeneous bent functions of degree \(n\) in 2\(n\) variables do not exist for \(n>3\). Zbl 1048.94016Xia, Tianbing; Seberry, Jennifer; Pieprzyk, Josef; Charnes, Chris 11 2004 Lattice-based threshold-changeability for standard Shamir secret-sharing schemes. Zbl 1094.94039Steinfeld, Ron; Wang, Huaxiong; Pieprzyk, Josef 7 2004 Multiple-time signature schemes against adaptive chosen message attacks. Zbl 1081.94553Pieprzyk, Josef; Wang, Huaxiong; Xing, Chaoping 5 2004 Algebraic attacks on SOBER-t32 and SOBER-t16 without stuttering. Zbl 1079.68540Cho, Joo Yeon; Pieprzyk, Josef 4 2004 On cheating immune secret sharing. Zbl 1064.94014Pieprzyk, Josef; Zhang, Xian-Mo 2 2004 Malleability attacks on multi-party key agreement protocols. Zbl 1060.94024Pieprzyk, Josef; Wang, Huaxiong 1 2004 Universal designated-verifier signatures. Zbl 1205.94112Steinfeld, Ron; Bull, Laurence; Wang, Huaxiong; Pieprzyk, Josef 22 2003 Fundamentals of computer security. Zbl 1011.68034Pieprzyk, Josef; Hardjono, Thomas; Seberry, Jennifer 11 2003 Efficient one-time proxy signatures. Zbl 1205.94115Wang, Huaxiong; Pieprzyk, Josef 8 2003 Ideal threshold schemes from MDS codes. Zbl 1031.94538Pieprzyk, Josef; Zhang, Xian-Mo 4 2003 Shared generation of pseudo-random functions with cumulative maps. Zbl 1039.94521Wang, Huaxiong; Pieprzyk, Josef 3 2003 Parallel authentication and public-key encryption. Zbl 1045.94541Pieprzyk, Josef; Pointcheval, David 3 2003 Threshold MACs. Zbl 1031.94522Martin, Keith M.; Pieprzyk, Josef; Safavi-Naini, Rei; Wang, Huaxiong; Wild, Peter R. 2 2003 Cryptanalysis of block ciphers with overdefined systems of equations. Zbl 1065.94543Courtois, Nicolas T.; Pieprzyk, Josef 99 2002 Constructions of cheating immune secret sharing. Zbl 0999.94552Pieprzyk, Josef; Zhang, Xian-Mo 3 2002 Cheating prevention in linear secret sharing. Zbl 1020.94537Pieprzyk, Josef; Zhang, Xian-Mo 2 2002 Authentication of concast communication. Zbl 1033.94551Al-Ibrahim, Mohamed; Ghodosi, Hossein; Pieprzyk, Josef 1 2002 Cheating immune secret sharing. Zbl 1050.94543Zhang, Xian-Mo; Pieprzyk, Josef 4 2001 Cheating prevention in secret sharing over \(\text{GF} (p^t)\). Zbl 1011.94559Pieprzyk, Josef; Zhang, Xian-Mo 2 2001 Authenticating multicast streams in lossy channels using threshold techniques. Zbl 0980.68597Al-Ibrahim, Mohamed; Pieprzyk, Josef 1 2001 Homogeneous bent functions. Zbl 1016.94029Qu, Chengxin; Seberry, Jennifer; Pieprzyk, Josef 13 2000 Identification of bad signatures in batches. Zbl 0966.94024Pastuszak, Jarosław; Michałek, Dariusz; Pieprzyk, Josef; Seberry, Jennifer 3 2000 Construction of cubic homogeneous Boolean bent functions. Zbl 0984.94043Seberry, Jennifer; Xia, Tianbing; Pieprzyk, Josef 2 2000 Codes identifying bad signatures in batches. Zbl 0963.94033Pastuszak, Jarosław; Pieprzyk, Josef; Seberry, Jennifer 2 2000 Changing thresholds in the absence of secure channels. Zbl 0919.94041Martin, Keith M.; Pieprzyk, Josef; Safavi-Naini, Rei; Wang, Huaxiong 10 1999 Changing thresholds in the absence of secure channels. Zbl 0945.68055Martin, Keith M.; Pieprzyk, Josef; Safavi-Naini, Rei; Wang, Huaxiong 7 1999 On the symmetric property of homogeneous Boolean functions. Zbl 0919.94019Qu, Chengxin; Seberry, Jennifer; Pieprzyk, Josef 5 1999 Conference key agreement from secret sharing. Zbl 0919.94040Li, Chih-Hung; Pieprzyk, Josef 2 1999 Fail-stop threshold signature schemes based on elliptic curves. Zbl 0919.94045Susilo, Willy; Safavi-Naini, Rei; Pieprzyk, Josef 2 1999 Repudiation of cheating and non-repudiation of Zhang’s proxy signature schemes. Zbl 0919.94035Ghodosi, Hossein; Pieprzyk, Josef 1 1999 Secret sharing in multilevel and compartmented groups. Zbl 0931.94022Ghodosi, Hossein; Pieprzyk, Josef; Safavi-Naini, Rei 8 1998 Rotation-symmetric functions and fast hashing. Zbl 1097.94514Pieprzyk, Josef; Qu, Cheng Xin 3 1998 On construction of cumulative secret sharing schemes. Zbl 0931.94023Ghodosi, Hossein; Pieprzyk, Josef; Safavi-Naini, Rei; Wang, Huaxiong 1 1998 On the weaknesses of Gong’s collisionful hash function. Zbl 0960.68042Bakhtiari, S.; Safavi-Naini, R.; Pieprzyk, J. 3 1997 Remarks on the multiple assignment secret sharing scheme. Zbl 0957.94026Ghodosi, Hossein; Pieprzyk, Josef; Safavi-Naini, Rei 2 1997 Secret sharing in hierarchical groups. Zbl 0903.94029Charnes, Chris; Martin, Keith; Pieprzyk, Josef; Safavi-Naini, Rei 1 1997 A message authentication code based on Latin squares. Zbl 0989.94520Bakhtiari, S.; Safavi-Naini, R.; Pieprzyk, J. 1 1997 A multi-level view model for secure object-oriented databases. Zbl 0904.68082Baraani-Dastjerdi, Ahmad; Pieprzyk, Josef; Safavi-Naini, Reihaneh 1 1997 Keyed hash functions. Zbl 1421.94037Bakhtiari, S.; Safavi-Naini, R.; Pieprzyk, J. 6 1996 Attacking the \(\mathrm{SL}_2\) hashing scheme. Zbl 1126.94323Charnes, Chris; Pieprzyk, Josef 8 1995 ...and 14 more Documents all cited Publications top 5 cited Publications all top 5 Cited by 952 Authors 21 Pieprzyk, Josef P. 14 Wang, Huaxiong 12 Hu, Lei 11 Zeng, Xiangyong 10 Li, Chao 9 Meier, Willi 8 Hou, Xiang-Dong 7 Carlet, Claude 7 Susilo, Willy 7 Wang, Xiaoyun 6 Courtois, Nicolas T. 6 Gong, Guang 6 Guo, Jian 6 Harn, Lein 6 Maitra, Subhamoy 6 Mesnager, Sihem 6 Qu, Longjiang 6 Tartary, Christophe 5 Biham, Eli 5 Lai, Hong 5 Liu, MeiCheng 5 Raddum, Håvard 5 Rijmen, Vincent 5 Sasaki, Yu 5 Seberry, Jennifer R. 5 Semaev, Igor A. 5 Steinfeld, Ron 5 Zha, Zhengbang 5 Zhang, Huanguo 4 Cao, Xiwang 4 Dong, Xiaoyang 4 Fu, Shaojing 4 Guo, Chun 4 Hsu, Chingfang 4 Li, Chunlei 4 Li, Fulin 4 Lin, Changlu 4 Lin, Dongdai 4 Liu, Yunwen 4 Matsuura, Kanta 4 Orgun, Mehmet Ali 4 Quisquater, Jean-Jacques 4 Safavi-Naini, Reihaneh 4 Sarkar, Santanu 4 Song, Ling 4 Stinson, Douglas Robert 4 Sun, Siwei 4 Tokareva, Natalia Nikolaevna 4 Tu, Ziran 4 Zhu, Shixin 3 Adams, Carlisle M. 3 Albrecht, Martin R. 3 Aumasson, Jean-Philippe 3 Chand Gupta, Kishan 3 Charpin, Pascale 3 Chen, Xiaofeng 3 Derler, David 3 Desmedt, Yvo G. 3 Dinur, Itai 3 Dunkelman, Orr 3 Fernando, Neranga 3 Helleseth, Tor 3 Horák, Peter 3 Hu, Yupu 3 Huang, Xinyi 3 Isobe, Takanori 3 Kim, Kwangjo 3 Knudsen, Lars Ramkilde 3 Li, Jin 3 Li, Zheng 3 Ling, San 3 Liu, Fukang 3 Mandal, Kalikinkar 3 Maurer, Ueli M. 3 Mendel, Florian 3 Mennink, Bart 3 Miao, Fuyou 3 Nikolić, Ivica 3 Nyberg, Kaisa 3 Petit, Christophe 3 Peyrin, Thomas 3 Pointcheval, David 3 Preneel, Bart 3 Shi, Weimin 3 Shim, Kyungah 3 Slamanig, Daniel 3 Wang, Gaoli 3 Wang, Meiqin 3 Wang, Tianyin 3 Wu, Baofeng 3 Xiong, Yan 3 Xu, Guangkui 3 Yang, Yuguang 3 Yuan, Pingzhi 3 Zhang, Fangguo 3 Zhou, Yihua 3 Zhu, Xishun 2 Aagaard, Mark D. 2 Andreeva, Elena Anatol’evna 2 Armknecht, Frederik ...and 852 more Authors all top 5 Cited in 84 Serials 48 Designs, Codes and Cryptography 30 Finite Fields and their Applications 21 Journal of Cryptology 17 Information Sciences 17 Cryptography and Communications 16 Information Processing Letters 14 Quantum Information Processing 10 Discrete Applied Mathematics 10 Applicable Algebra in Engineering, Communication and Computing 9 International Journal of Theoretical Physics 8 Physica A 6 Theoretical Computer Science 5 Nonlinear Dynamics 5 Wuhan University Journal of Natural Sciences (WUJNS) 5 Advances in Mathematics of Communications 4 Discrete Mathematics 4 Applied Mathematics and Computation 4 Journal of Mathematical Cryptology 4 Matematicheskie Voprosy Kriptografii 3 Chaos, Solitons and Fractals 3 Journal of Symbolic Computation 3 Information and Computation 3 International Journal of Computer Mathematics 3 Rad Hrvatske Akademije Znanosti i Umjetnosti. Matematičke Znanosti 3 Journal of Applied Mathematics and Computing 3 Journal of Discrete Algorithms 3 Science in China. Series F 3 Prikladnaya Diskretnaya Matematika 2 Physics Letters. A 2 Journal of Computer and System Sciences 2 Journal of Complexity 2 Journal of Computer Science and Technology 2 Discrete Mathematics and Applications 2 Pattern Recognition 2 Journal of Discrete Mathematical Sciences & Cryptography 2 Journal of Systems Science and Complexity 2 Mathematics in Computer Science 2 Science China. Mathematics 1 Computers & Mathematics with Applications 1 IEEE Transactions on Information Theory 1 Linear and Multilinear Algebra 1 Mathematical Biosciences 1 Periodica Mathematica Hungarica 1 Problems of Information Transmission 1 Mathematics of Computation 1 ACM Transactions on Mathematical Software 1 Computing 1 Journal of Algebra 1 Journal of Number Theory 1 Mathematica Slovaca 1 Proceedings of the Japan Academy. Series A 1 Synthese 1 Cryptologia 1 Acta Applicandae Mathematicae 1 Algorithmica 1 Applied Mathematics Letters 1 Mathematical and Computer Modelling 1 MSCS. Mathematical Structures in Computer Science 1 International Journal of Foundations of Computer Science 1 Journal of Global Optimization 1 Linear Algebra and its Applications 1 The Journal of Analysis 1 Mathematical Problems in Engineering 1 International Journal of Applied Mathematics and Computer Science 1 Journal of Algebra and its Applications 1 Mathematical Biosciences and Engineering 1 Sibirskie Èlektronnye Matematicheskie Izvestiya 1 Journal of Zhejiang University. Science A 1 Annales Universitatis Mariae Curie-Skłodowska. Sectio A1. Informatica 1 Journal of Physics A: Mathematical and Theoretical 1 Journal of Statistical Theory and Practice 1 Involve 1 Asian-European Journal of Mathematics 1 Discrete Mathematics, Algorithms and Applications 1 São Paulo Journal of Mathematical Sciences 1 Science China. Information Sciences 1 Diskretnyĭ Analiz i Issledovanie Operatsiĭ 1 Central European Journal of Computer Science 1 Frontiers of Computer Science in China 1 Frontiers of Computer Science 1 Palestine Journal of Mathematics 1 Axioms 1 Algebra 1 Vestnik Samarskogo Universiteta. Estestvennonauchnaya Seriya all top 5 Cited in 30 Fields 417 Information and communication theory, circuits (94-XX) 95 Computer science (68-XX) 93 Number theory (11-XX) 34 Quantum theory (81-XX) 33 Order, lattices, ordered algebraic structures (06-XX) 22 Combinatorics (05-XX) 10 Commutative algebra (13-XX) 10 Algebraic geometry (14-XX) 8 Dynamical systems and ergodic theory (37-XX) 6 Field theory and polynomials (12-XX) 6 Numerical analysis (65-XX) 6 Statistical mechanics, structure of matter (82-XX) 5 Group theory and generalizations (20-XX) 4 Linear and multilinear algebra; matrix theory (15-XX) 4 Operations research, mathematical programming (90-XX) 3 Probability theory and stochastic processes (60-XX) 2 Functional analysis (46-XX) 2 Geometry (51-XX) 1 Mathematical logic and foundations (03-XX) 1 Associative rings and algebras (16-XX) 1 Real functions (26-XX) 1 Special functions (33-XX) 1 Ordinary differential equations (34-XX) 1 Approximations and expansions (41-XX) 1 Harmonic analysis on Euclidean spaces (42-XX) 1 Operator theory (47-XX) 1 Statistics (62-XX) 1 Game theory, economics, finance, and other social and behavioral sciences (91-XX) 1 Biology and other natural sciences (92-XX) 1 Systems theory; control (93-XX) Citations by Year Wikidata Timeline The data are displayed as stored in Wikidata under a Creative Commons CC0 License. Updates and corrections should be made in Wikidata.