×
Author ID: pieprzyk.josef-p Recent zbMATH articles by "Pieprzyk, Josef P."
Published as: Pieprzyk, Josef; Pieprzyk, J.; Pieprzyk, Józef P.; Pieprzyk, Josef P.
Homepage: https://people.csiro.au/P/J/Josef-Pieprzyk
External Links: MGP · ORCID · Wikidata · Google Scholar · dblp · GND · IdRef
all top 5

Co-Authors

10 single-authored
43 Wang, Huaxiong
26 Steinfeld, Ron
19 Safavi-Naini, Reihaneh
17 Lai, Hong
15 Zhang, Xian-Mo
14 Seberry, Jennifer R.
12 Orgun, Mehmet Ali
11 Ghodosi, Hossein
7 Pan, Lei
6 Charnes, Chris
6 Ling, San
6 Luo, Mingxing
6 Matusiewicz, Krystian
6 Sadeghiyan, Babak
6 Xiao, Jinghua
5 Cho, Joo Yeon
5 Desmedt, Yvo G.
5 Nikolić, Ivica
5 Susilo, Willy
5 Xue, Liyin
4 Contini, Scott
4 Martin, Keith M.
4 Orumiehchiha, Mohammad Ali
4 Tartary, Christophe
4 Zheng, Yuliang
3 Asghar, Hassan Jameel
3 Bakhtiari, Shahram
3 Duong, Dung Hoang
3 Le, Huy Quoc
3 Morawiecki, Paweł
3 Qu, Chengxin
3 Sepahi, Reza
3 Sokołowski, Przemysław
3 Srebrny, Marian
3 Wang, Peishun
3 Zhan, Cheng
2 Al-Ibrahim, Mohamed Hussain
2 Baraani-Dastjerdi, Ahmad
2 Emami, Sareh
2 Guo, Jian
2 Hardjono, Thomas
2 Khovratovich, Dmitry
2 Kwan, Matthew
2 Li, Chih-Hung
2 Liu, Joseph K. K.
2 Okamoto, Eiji
2 Pastuszak, Jarosław
2 Peyrin, Thomas
2 Pointcheval, David
2 Shao, Jun
2 Sun, Shifeng
2 Suriadi, Suriadi
2 Varadharajan, Vijay
2 Wei, Lei
2 Xia, Tianbing
2 Xiao, Fuyuan
2 Ye, Qingsong
2 Zuo, Cong
1 Bansal, Tarun Kumar
1 Bartlett, Harry
1 Billet, Olivier
1 Biryukov, Alex
1 Boyen, Xavier
1 Brown, Lawrence Peter
1 Bull, Laurence
1 Courtois, Nicolas T.
1 Dawson, Edward
1 Dempwolff, Ulrich
1 Ding, Cunsheng
1 Dinur, Itai
1 Gaj, Kris
1 Gauravaram, Praveen
1 Getta, Janusz R.
1 Golić, Jovan Dj.
1 Homsirikamol, Ekawat
1 Jia, Zhongtian
1 Kaczorowski, Jerzy
1 Khoo, Khoongming
1 Ku, Bying-He
1 Li, Jing
1 Li, Shujun
1 Li, Ya
1 Lim, Chu-Wee
1 Long, Shoulun
1 Manulis, Mark
1 Michałek, Darek
1 Michałek, Dariusz
1 Mu, Yi
1 Orgun, A. Mehmet
1 Pastuszak, Jarek
1 Plantard, Thomas
1 Pomykała, Jacek M.
1 Qu, Zhiguo
1 Rogawski, Marcin
1 Rostami, Saeed
1 Sadeghi, Ahmad-Reza
1 Schoenmakers, Berry
1 Shahandashti, Siamak F.
1 Shakour, Elham
1 Straus, Michał
...and 16 more Co-Authors

Publications by Year

Citations contained in zbMATH Open

114 Publications have been cited 601 times in 500 Documents Cited by Year
Cryptanalysis of block ciphers with overdefined systems of equations. Zbl 1065.94543
Courtois, Nicolas T.; Pieprzyk, Josef
99
2002
Permutation polynomials of the \((x^p - x+\delta)^s+L(x)\). Zbl 1211.11136
Yuan, Jin; Ding, Cunsheng; Wang, Huaxiong; Pieprzyk, Josef
43
2008
Universal designated-verifier signatures. Zbl 1205.94112
Steinfeld, Ron; Bull, Laurence; Wang, Huaxiong; Pieprzyk, Josef
22
2003
HAVAL – a one-way hashing algorithm with variable length of output. (Extended abstract). Zbl 0869.94028
Zheng, Yuliang; Pieprzyk, Josef; Seberry, Jennifer
19
1993
Rotational cryptanalysis of round-reduced Keccak. Zbl 1321.94081
Morawiecki, Paweł; Pieprzyk, Josef; Srebrny, Marian
18
2014
Efficient extension of standard Schnorr/RSA signatures into universal designated-verifier signatures. Zbl 1198.94163
Steinfeld, Ron; Wang, Huaxiong; Pieprzyk, Josef
15
2004
Cube attacks and cube-attack-like cryptanalysis on the round-reduced Keccak sponge function. Zbl 1370.94506
Dinur, Itai; Morawiecki, Paweł; Pieprzyk, Josef; Srebrny, Marian; Straus, Michał
15
2015
Homogeneous bent functions. Zbl 1016.94029
Qu, Chengxin; Seberry, Jennifer; Pieprzyk, Josef
13
2000
How to strengthen any weakly unforgeable signature into a strongly unforgeable signature. Zbl 1177.94191
Steinfeld, Ron; Pieprzyk, Josef; Wang, Huaxiong
12
2006
On the provable security of an efficient RSA-based pseudorandom generator. Zbl 1172.94597
Steinfeld, Ron; Pieprzyk, Josef; Wang, Huaxiong
11
2006
Fundamentals of computer security. Zbl 1011.68034
Pieprzyk, Josef; Hardjono, Thomas; Seberry, Jennifer
11
2003
Homogeneous bent functions of degree \(n\) in 2\(n\) variables do not exist for \(n>3\). Zbl 1048.94016
Xia, Tianbing; Seberry, Jennifer; Pieprzyk, Josef; Charnes, Chris
11
2004
Changing thresholds in the absence of secure channels. Zbl 0919.94041
Martin, Keith M.; Pieprzyk, Josef; Safavi-Naini, Rei; Wang, Huaxiong
10
1999
Lattice-based treshold-changeability for standard CRT secret-sharing schemes. Zbl 1156.94381
Steinfeld, Ron; Pieprzyk, Josef; Wang, Huaxiong
8
2006
ICEPOLE: high-speed, hardware-oriented authenticated encryption. Zbl 1396.94092
Morawiecki, Paweł; Gaj, Kris; Homsirikamol, Ekawat; Matusiewicz, Krystian; Pieprzyk, Josef; Rogawski, Marcin; Srebrny, Marian; Wójcik, Marcin
8
2014
Rotational cryptanalysis of ARX revisited. Zbl 1382.94128
Khovratovich, Dmitry; Nikolić, Ivica; Pieprzyk, Josef; Sokołowski, Przemysław; Steinfeld, Ron
8
2015
Efficient one-time proxy signatures. Zbl 1205.94115
Wang, Huaxiong; Pieprzyk, Josef
8
2003
Attacking the \(\mathrm{SL}_2\) hashing scheme. Zbl 1126.94323
Charnes, Chris; Pieprzyk, Josef
8
1995
Secret sharing in multilevel and compartmented groups. Zbl 0931.94022
Ghodosi, Hossein; Pieprzyk, Josef; Safavi-Naini, Rei
8
1998
Improving resistance to differential cryptanalysis and the redesign of LOKI. Zbl 0806.94015
Brown, Lawrence; Kwan, Matthew; Pieprzyk, Josef; Seberry, Jennifer
7
1993
Changing thresholds in the absence of secure channels. Zbl 0945.68055
Martin, Keith M.; Pieprzyk, Josef; Safavi-Naini, Rei; Wang, Huaxiong
7
1999
Lattice-based threshold-changeability for standard Shamir secret-sharing schemes. Zbl 1094.94039
Steinfeld, Ron; Wang, Huaxiong; Pieprzyk, Josef
7
2004
Lattice-based threshold changeability for standard Shamir secret-sharing schemes. Zbl 1326.94130
Steinfeld, Ron; Pieprzyk, Josef; Wang, Huaxiong
6
2007
Known and chosen key differential distinguishers for block ciphers. Zbl 1297.94094
Nikolić, Ivica; Pieprzyk, Josef; Sokołowski, Przemysław; Steinfeld, Ron
6
2011
Keyed hash functions. Zbl 1421.94037
Bakhtiari, S.; Safavi-Naini, R.; Pieprzyk, J.
6
1996
Cryptanalysis of WG-7: a lightweight stream cipher. Zbl 1285.94087
Orumiehchiha, Mohammad Ali; Pieprzyk, Josef; Steinfeld, Ron
5
2012
High-capacity (2,3) threshold quantum secret sharing based on asymmetric quantum lossy channels. Zbl 1508.81305
Lai, Hong; Pieprzyk, Josef; Luo, Ming-Xing; Zhan, Cheng; Pan, Lei; Orgun, Mehmet A.
5
2020
Multiple-time signature schemes against adaptive chosen message attacks. Zbl 1081.94553
Pieprzyk, Josef; Wang, Huaxiong; Xing, Chaoping
5
2004
On the symmetric property of homogeneous Boolean functions. Zbl 0919.94019
Qu, Chengxin; Seberry, Jennifer; Pieprzyk, Josef
5
1999
Controllable quantum private queries using an entangled Fibonacci-sequence spiral source. Zbl 1361.81023
Lai, Hong; Orgun, Mehmet A.; Pieprzyk, Josef; Xiao, Jinghua; Xue, Liyin; Jia, Zhongtian
5
2015
Novel quantum key distribution with shift operations based on Fibonacci and Lucas valued orbital angular momentum entangled states. Zbl 07528415
Lai, Hong; Pieprzyk, Josef; Orgun, Mehmet A.
5
2020
How to construct pseudorandom permutations from single pseudorandom functions. Zbl 0779.65005
Pieprzyk, Josef
4
1991
On algebraic immunity and annihilators. Zbl 1272.94071
Zhang, Xian-Mo; Pieprzyk, Josef; Zheng, Yuliang
4
2006
On necessary and sufficient conditions for the construction of super pseudorandom permutations. Zbl 0808.94025
Sadeghiyan, Babak; Pieprzyk, Josef
4
1993
On secure multi-party computation in black-box groups. Zbl 1215.94042
Desmedt, Yvo; Pieprzyk, Josef; Steinfeld, Ron; Wang, Huaxiong
4
2007
Cryptanalysis of FORK-256. Zbl 1186.94460
Matusiewicz, Krystian; Peyrin, Thomas; Billet, Olivier; Contini, Scott; Pieprzyk, Josef
4
2007
Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model. Zbl 1331.94060
Lai, Hong; Orgun, Mehmet A.; Xiao, Jinghua; Pieprzyk, Josef; Xue, Liyin; Yang, Yixian
4
2014
A construction of super pseudorandom permutations from a single pseudorandom function. Zbl 0801.65007
Sadeghiyan, Babak; Pieprzyk, Josef
4
1993
Ideal threshold schemes from MDS codes. Zbl 1031.94538
Pieprzyk, Josef; Zhang, Xian-Mo
4
2003
Cheating immune secret sharing. Zbl 1050.94543
Zhang, Xian-Mo; Pieprzyk, Josef
4
2001
Converse results to the Wiener attack on RSA. Zbl 1081.94537
Steinfeld, Ron; Contini, Scott; Wang, Huaxiong; Pieprzyk, Josef
4
2005
Algebraic attacks on SOBER-t32 and SOBER-t16 without stuttering. Zbl 1079.68540
Cho, Joo Yeon; Pieprzyk, Josef
4
2004
Two types of dynamic quantum state secret sharing based on tensor networks states. Zbl 07482426
Lai, Hong; Pieprzyk, Josef; Pan, Lei; Orgun, Mehmet A.
4
2021
On the (in)security of IDEA in various hashing modes. Zbl 1312.94099
Wei, Lei; Peyrin, Thomas; Sokołowski, Przemysław; Ling, San; Pieprzyk, Josef; Wang, Huaxiong
4
2012
Cryptography: an introduction to computer security. Zbl 0716.94008
Seberry, Jennifer; Pieprzyk, Josef
3
1989
Advances in cryptology – ASIACRYPT 2008. 14th international conference on the theory and application of cryptology and information security, Melbourne, Australia, December 7–11, 2008. Proceedings. Zbl 1155.94008
3
2008
On the weaknesses of Gong’s collisionful hash function. Zbl 0960.68042
Bakhtiari, S.; Safavi-Naini, R.; Pieprzyk, J.
3
1997
A general purpose technique for locating key scheduling weaknes in DES- like cryptosystems. (Extended abstract). Zbl 0825.94204
Kwan, Matthew; Pieprzyk, Josef
3
1993
Quantum direct secret sharing with efficient eavesdropping-check and authentication based on distributed fountain codes. Zbl 1291.81116
Lai, Hong; Xiao, Jinghua; Orgun, Mehmet A.; Xue, Liyin; Pieprzyk, Josef
3
2014
Threshold privacy preserving keyword searches. Zbl 1132.68378
Wang, Peishun; Wang, Huaxiong; Pieprzyk, Josef
3
2008
A non-malleable group key exchange protocol robust against active insiders. Zbl 1156.94410
Desmedt, Yvo; Pieprzyk, Josef; Steinfeld, Ron; Wang, Huaxiong
3
2006
Multiple modular additions and crossword puzzle attack on NLSv2. Zbl 1138.94356
Cho, Joo Yeon; Pieprzyk, Josef
3
2007
Bent permutations. Zbl 0804.11068
Pieprzyk, Josef
3
1993
Generalised cumulative arrays in secret sharing. Zbl 1261.94032
Long, Shoulun; Pieprzyk, Josef; Wang, Huaxiong; Wong, Duncan S.
3
2006
Decomposition construction for secret sharing schemes with graph access structures in polynomial time. Zbl 1213.94137
Sun, Hung-Min; Wang, Huaxiong; Ku, Bying-He; Pieprzyk, Josef
3
2010
An improved coding method of quantum key distribution protocols based on Fibonacci-valued OAM entangled states. Zbl 1404.81081
Lai, Hong; Luo, Ming-Xing; Zhan, Cheng; Pieprzyk, Josef; Orgun, Mehmet A.
3
2017
Topics in cryptology – CT-RSA 2010. The cryptographers’ track at the RSA conference 2010, San Francisco, CA, USA, March 1–5, 2010. Proceedings. Zbl 1182.94002
3
2010
Constructions of cheating immune secret sharing. Zbl 0999.94552
Pieprzyk, Josef; Zhang, Xian-Mo
3
2002
Identification of bad signatures in batches. Zbl 0966.94024
Pastuszak, Jarosław; Michałek, Dariusz; Pieprzyk, Josef; Seberry, Jennifer
3
2000
Shared generation of pseudo-random functions with cumulative maps. Zbl 1039.94521
Wang, Huaxiong; Pieprzyk, Josef
3
2003
Parallel authentication and public-key encryption. Zbl 1045.94541
Pieprzyk, Josef; Pointcheval, David
3
2003
Dynamic \((2, 3)\) threshold quantum secret sharing of secure direct communication. Zbl 1311.81096
Lai, Hong; Orgun, A. Mehmet; Xiao, Jing-Hua; Pieprzyk, Josef; Xue, Li-Yin
3
2015
Rotation-symmetric functions and fast hashing. Zbl 1097.94514
Pieprzyk, Josef; Qu, Cheng Xin
3
1998
Keyword field-free conjunctive keyword searches on encrypted data and extension for dynamic groups. Zbl 1362.94058
Wang, Peishun; Wang, Huaxiong; Pieprzyk, Josef
2
2008
Sibling intractable function families and their applications. (Extended abstract). Zbl 0805.94015
Zheng, Yuliang; Hardjono, Thomas; Pieprzyk, Josef
2
1993
Optimal perfect randomizers. Zbl 0808.94026
Pieprzyk, Josef; Sadeghiyan, Babak
2
1993
Non-linearity of exponent permutations. Zbl 0724.94010
Pieprzyk, Josef P.
2
1990
Lattice-based completely non-malleable public-key encryption in the standard model. Zbl 1342.94095
Sepahi, Reza; Steinfeld, Ron; Pieprzyk, Josef
2
2014
Crossword puzzle attack on NLS. Zbl 1161.94392
Cho, Joo Yeon; Pieprzyk, Josef
2
2007
A new dynamic accumulator for batch updates. Zbl 1285.94115
Wang, Peishun; Wang, Huaxiong; Pieprzyk, Josef
2
2008
Efficient disjointness tests for private datasets. Zbl 1279.94127
Ye, Qingsong; Wang, Huaxiong; Pieprzyk, Josef; Zhang, Xian-Mo
2
2008
The eight variable homogeneous degree three bent functions. Zbl 1147.94010
Charnes, C.; Dempwolff, U.; Pieprzyk, J.
2
2008
Finding good differential patterns for attacks on SHA-1. Zbl 1151.94545
Matusiewicz, Krystian; Pieprzyk, Josef
2
2006
A new human identification protocol and Coppersmith’s baby-step giant-step algorithm. Zbl 1350.94028
Asghar, Hassan Jameel; Pieprzyk, Josef; Wang, Huaxiong
2
2010
NTRUCCA: how to strengthen NTRUEncrypt to chosen-ciphertext security in the standard model. Zbl 1294.94079
Steinfeld, Ron; Ling, San; Pieprzyk, Josef; Tartary, Christophe; Wang, Huaxiong
2
2012
Multi-party computation with conversion of secret sharing. Zbl 1234.68151
Ghodosi, Hossein; Pieprzyk, Josef; Steinfeld, Ron
2
2012
Remarks on the multiple assignment secret sharing scheme. Zbl 0957.94026
Ghodosi, Hossein; Pieprzyk, Josef; Safavi-Naini, Rei
2
1997
On cheating immune secret sharing. Zbl 1064.94014
Pieprzyk, Josef; Zhang, Xian-Mo
2
2004
Construction of cubic homogeneous Boolean bent functions. Zbl 0984.94043
Seberry, Jennifer; Xia, Tianbing; Pieprzyk, Josef
2
2000
Codes identifying bad signatures in batches. Zbl 0963.94033
Pastuszak, Jarosław; Pieprzyk, Josef; Seberry, Jennifer
2
2000
Cheating prevention in linear secret sharing. Zbl 1020.94537
Pieprzyk, Josef; Zhang, Xian-Mo
2
2002
Threshold MACs. Zbl 1031.94522
Martin, Keith M.; Pieprzyk, Josef; Safavi-Naini, Rei; Wang, Huaxiong; Wild, Peter R.
2
2003
Cheating prevention in secret sharing over \(\text{GF} (p^t)\). Zbl 1011.94559
Pieprzyk, Josef; Zhang, Xian-Mo
2
2001
Conference key agreement from secret sharing. Zbl 0919.94040
Li, Chih-Hung; Pieprzyk, Josef
2
1999
Fail-stop threshold signature schemes based on elliptic curves. Zbl 0919.94045
Susilo, Willy; Safavi-Naini, Rei; Pieprzyk, Josef
2
1999
Möbius transforms, coincident Boolean functions and non-coincidence property of Boolean functions. Zbl 1232.06017
Pieprzyk, Josef; Wang, Huaxiong; Zhang, Xian-Mo
2
2011
Graph coloring applied to secure computation in non-abelian groups. Zbl 1278.94046
Desmedt, Yvo; Pieprzyk, Josef; Steinfeld, Ron; Sun, Xiaoming; Tartary, Christophe; Wang, Huaxiong; Yao, Andrew Chi-Chih
2
2012
Dynamic searchable symmetric encryption schemes supporting range queries with forward (and backward) security. Zbl 1496.68076
Zuo, Cong; Sun, Shi-Feng; Liu, Joseph K.; Shao, Jun; Pieprzyk, Josef
2
2018
Nonlinear functions and their application to cryptography. Zbl 0584.94027
Pieprzyk, Józef P.
1
1985
The resistance of PRESENT-80 against related-key differential attacks. Zbl 1291.94079
Emami, Sareh; Ling, San; Nikolić, Ivica; Pieprzyk, Josef; Wang, Huaxiong
1
2014
Verifiable multi-secret sharing schemes for multiple threshold access structures. Zbl 1166.94341
Tartary, Christophe; Pieprzyk, Josef; Wang, Huaxiong
1
2008
Multi-party computation with omnipresent adversary. Zbl 1227.68015
Ghodosi, Hossein; Pieprzyk, Josef
1
2009
Unconditionally secure disjointness tests for private datasets. Zbl 1159.94374
Ye, Qingsong; Wang, Huaxiong; Pieprzyk, Josef; Zhang, Xian-Mo
1
2009
Cryptanalysis of LASH. Zbl 1154.68411
Steinfeld, Ron; Contini, Scott; Matusiewicz, Krystian; Pieprzyk, Josef; Guo, Jian; Ling, San; Wang, Huaxiong
1
2008
Cryptology and network security. 11th international conference, CANS 2012, Darmstadt, Germany, December 12–14, 2012. Proceedings. Zbl 1295.68028
1
2012
Low probability differentials and the cryptanalysis of full-round CLEFIA-128. Zbl 1306.94050
Emami, Sareh; Ling, San; Nikolić, Ivica; Pieprzyk, Josef; Wang, Huaxiong
1
2014
Cryptanalysis of the convex hull click human identification protocol. Zbl 1371.94621
Asghar, Hassan Jameel; Li, Shujun; Pieprzyk, Josef; Wang, Huaxiong
1
2011
Cryptanalysis of the LAKE hash family. Zbl 1248.94057
Biryukov, Alex; Gauravaram, Praveen; Guo, Jian; Khovratovich, Dmitry; Ling, San; Matusiewicz, Krystian; Nikolić, Ivica; Pieprzyk, Josef; Wang, Huaxiong
1
2009
Dynamic and compressed quantum many-body state secret sharing based on site-independent matrix product states. Zbl 1508.81976
Lai, Hong; Pieprzyk, Josef; Pan, Lei
1
2022
Trapdoor delegation and HIBE from middle-product LWE in standard model. Zbl 07314280
Le, Huy Quoc; Duong, Dung Hoang; Susilo, Willy; Pieprzyk, Josef
1
2020
Dynamic and compressed quantum many-body state secret sharing based on site-independent matrix product states. Zbl 1508.81976
Lai, Hong; Pieprzyk, Josef; Pan, Lei
1
2022
Two types of dynamic quantum state secret sharing based on tensor networks states. Zbl 07482426
Lai, Hong; Pieprzyk, Josef; Pan, Lei; Orgun, Mehmet A.
4
2021
High-capacity (2,3) threshold quantum secret sharing based on asymmetric quantum lossy channels. Zbl 1508.81305
Lai, Hong; Pieprzyk, Josef; Luo, Ming-Xing; Zhan, Cheng; Pan, Lei; Orgun, Mehmet A.
5
2020
Novel quantum key distribution with shift operations based on Fibonacci and Lucas valued orbital angular momentum entangled states. Zbl 07528415
Lai, Hong; Pieprzyk, Josef; Orgun, Mehmet A.
5
2020
Trapdoor delegation and HIBE from middle-product LWE in standard model. Zbl 07314280
Le, Huy Quoc; Duong, Dung Hoang; Susilo, Willy; Pieprzyk, Josef
1
2020
Analysis of weighted quantum secret sharing based on matrix product states. Zbl 1509.81385
Lai, Hong; Pieprzyk, Josef; Pan, Lei
1
2020
Dynamic searchable symmetric encryption with forward and stronger backward privacy. Zbl 1496.68134
Zuo, Cong; Sun, Shi-Feng; Liu, Joseph K.; Shao, Jun; Pieprzyk, Josef
1
2019
Dynamic searchable symmetric encryption schemes supporting range queries with forward (and backward) security. Zbl 1496.68076
Zuo, Cong; Sun, Shi-Feng; Liu, Joseph K.; Shao, Jun; Pieprzyk, Josef
2
2018
An improved coding method of quantum key distribution protocols based on Fibonacci-valued OAM entangled states. Zbl 1404.81081
Lai, Hong; Luo, Ming-Xing; Zhan, Cheng; Pieprzyk, Josef; Orgun, Mehmet A.
3
2017
Cube attacks and cube-attack-like cryptanalysis on the round-reduced Keccak sponge function. Zbl 1370.94506
Dinur, Itai; Morawiecki, Paweł; Pieprzyk, Josef; Srebrny, Marian; Straus, Michał
15
2015
Rotational cryptanalysis of ARX revisited. Zbl 1382.94128
Khovratovich, Dmitry; Nikolić, Ivica; Pieprzyk, Josef; Sokołowski, Przemysław; Steinfeld, Ron
8
2015
Controllable quantum private queries using an entangled Fibonacci-sequence spiral source. Zbl 1361.81023
Lai, Hong; Orgun, Mehmet A.; Pieprzyk, Josef; Xiao, Jinghua; Xue, Liyin; Jia, Zhongtian
5
2015
Dynamic \((2, 3)\) threshold quantum secret sharing of secure direct communication. Zbl 1311.81096
Lai, Hong; Orgun, A. Mehmet; Xiao, Jing-Hua; Pieprzyk, Josef; Xue, Li-Yin
3
2015
Rotational cryptanalysis of round-reduced Keccak. Zbl 1321.94081
Morawiecki, Paweł; Pieprzyk, Josef; Srebrny, Marian
18
2014
ICEPOLE: high-speed, hardware-oriented authenticated encryption. Zbl 1396.94092
Morawiecki, Paweł; Gaj, Kris; Homsirikamol, Ekawat; Matusiewicz, Krystian; Pieprzyk, Josef; Rogawski, Marcin; Srebrny, Marian; Wójcik, Marcin
8
2014
Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model. Zbl 1331.94060
Lai, Hong; Orgun, Mehmet A.; Xiao, Jinghua; Pieprzyk, Josef; Xue, Liyin; Yang, Yixian
4
2014
Quantum direct secret sharing with efficient eavesdropping-check and authentication based on distributed fountain codes. Zbl 1291.81116
Lai, Hong; Xiao, Jinghua; Orgun, Mehmet A.; Xue, Liyin; Pieprzyk, Josef
3
2014
Lattice-based completely non-malleable public-key encryption in the standard model. Zbl 1342.94095
Sepahi, Reza; Steinfeld, Ron; Pieprzyk, Josef
2
2014
The resistance of PRESENT-80 against related-key differential attacks. Zbl 1291.94079
Emami, Sareh; Ling, San; Nikolić, Ivica; Pieprzyk, Josef; Wang, Huaxiong
1
2014
Low probability differentials and the cryptanalysis of full-round CLEFIA-128. Zbl 1306.94050
Emami, Sareh; Ling, San; Nikolić, Ivica; Pieprzyk, Josef; Wang, Huaxiong
1
2014
Cryptanalysis of WG-7: a lightweight stream cipher. Zbl 1285.94087
Orumiehchiha, Mohammad Ali; Pieprzyk, Josef; Steinfeld, Ron
5
2012
On the (in)security of IDEA in various hashing modes. Zbl 1312.94099
Wei, Lei; Peyrin, Thomas; Sokołowski, Przemysław; Ling, San; Pieprzyk, Josef; Wang, Huaxiong
4
2012
NTRUCCA: how to strengthen NTRUEncrypt to chosen-ciphertext security in the standard model. Zbl 1294.94079
Steinfeld, Ron; Ling, San; Pieprzyk, Josef; Tartary, Christophe; Wang, Huaxiong
2
2012
Multi-party computation with conversion of secret sharing. Zbl 1234.68151
Ghodosi, Hossein; Pieprzyk, Josef; Steinfeld, Ron
2
2012
Graph coloring applied to secure computation in non-abelian groups. Zbl 1278.94046
Desmedt, Yvo; Pieprzyk, Josef; Steinfeld, Ron; Sun, Xiaoming; Tartary, Christophe; Wang, Huaxiong; Yao, Andrew Chi-Chih
2
2012
Cryptology and network security. 11th international conference, CANS 2012, Darmstadt, Germany, December 12–14, 2012. Proceedings. Zbl 1295.68028
1
2012
Known and chosen key differential distinguishers for block ciphers. Zbl 1297.94094
Nikolić, Ivica; Pieprzyk, Josef; Sokołowski, Przemysław; Steinfeld, Ron
6
2011
Möbius transforms, coincident Boolean functions and non-coincidence property of Boolean functions. Zbl 1232.06017
Pieprzyk, Josef; Wang, Huaxiong; Zhang, Xian-Mo
2
2011
Cryptanalysis of the convex hull click human identification protocol. Zbl 1371.94621
Asghar, Hassan Jameel; Li, Shujun; Pieprzyk, Josef; Wang, Huaxiong
1
2011
Lattice-based completely non-malleable PKE in the standard model (poster). Zbl 1295.94144
Sepahi, Reza; Steinfeld, Ron; Pieprzyk, Josef
1
2011
Decomposition construction for secret sharing schemes with graph access structures in polynomial time. Zbl 1213.94137
Sun, Hung-Min; Wang, Huaxiong; Ku, Bying-He; Pieprzyk, Josef
3
2010
Topics in cryptology – CT-RSA 2010. The cryptographers’ track at the RSA conference 2010, San Francisco, CA, USA, March 1–5, 2010. Proceedings. Zbl 1182.94002
3
2010
A new human identification protocol and Coppersmith’s baby-step giant-step algorithm. Zbl 1350.94028
Asghar, Hassan Jameel; Pieprzyk, Josef; Wang, Huaxiong
2
2010
Parallel signcryption. Zbl 1217.68089
Pieprzyk, Josef; Pointcheval, David
1
2010
Multi-party computation with omnipresent adversary. Zbl 1227.68015
Ghodosi, Hossein; Pieprzyk, Josef
1
2009
Unconditionally secure disjointness tests for private datasets. Zbl 1159.94374
Ye, Qingsong; Wang, Huaxiong; Pieprzyk, Josef; Zhang, Xian-Mo
1
2009
Cryptanalysis of the LAKE hash family. Zbl 1248.94057
Biryukov, Alex; Gauravaram, Praveen; Guo, Jian; Khovratovich, Dmitry; Ling, San; Matusiewicz, Krystian; Nikolić, Ivica; Pieprzyk, Josef; Wang, Huaxiong
1
2009
Permutation polynomials of the \((x^p - x+\delta)^s+L(x)\). Zbl 1211.11136
Yuan, Jin; Ding, Cunsheng; Wang, Huaxiong; Pieprzyk, Josef
43
2008
Advances in cryptology – ASIACRYPT 2008. 14th international conference on the theory and application of cryptology and information security, Melbourne, Australia, December 7–11, 2008. Proceedings. Zbl 1155.94008
3
2008
Threshold privacy preserving keyword searches. Zbl 1132.68378
Wang, Peishun; Wang, Huaxiong; Pieprzyk, Josef
3
2008
Keyword field-free conjunctive keyword searches on encrypted data and extension for dynamic groups. Zbl 1362.94058
Wang, Peishun; Wang, Huaxiong; Pieprzyk, Josef
2
2008
A new dynamic accumulator for batch updates. Zbl 1285.94115
Wang, Peishun; Wang, Huaxiong; Pieprzyk, Josef
2
2008
Efficient disjointness tests for private datasets. Zbl 1279.94127
Ye, Qingsong; Wang, Huaxiong; Pieprzyk, Josef; Zhang, Xian-Mo
2
2008
The eight variable homogeneous degree three bent functions. Zbl 1147.94010
Charnes, C.; Dempwolff, U.; Pieprzyk, J.
2
2008
Verifiable multi-secret sharing schemes for multiple threshold access structures. Zbl 1166.94341
Tartary, Christophe; Pieprzyk, Josef; Wang, Huaxiong
1
2008
Cryptanalysis of LASH. Zbl 1154.68411
Steinfeld, Ron; Contini, Scott; Matusiewicz, Krystian; Pieprzyk, Josef; Guo, Jian; Ling, San; Wang, Huaxiong
1
2008
Lattice-based threshold changeability for standard Shamir secret-sharing schemes. Zbl 1326.94130
Steinfeld, Ron; Pieprzyk, Josef; Wang, Huaxiong
6
2007
On secure multi-party computation in black-box groups. Zbl 1215.94042
Desmedt, Yvo; Pieprzyk, Josef; Steinfeld, Ron; Wang, Huaxiong
4
2007
Cryptanalysis of FORK-256. Zbl 1186.94460
Matusiewicz, Krystian; Peyrin, Thomas; Billet, Olivier; Contini, Scott; Pieprzyk, Josef
4
2007
Multiple modular additions and crossword puzzle attack on NLSv2. Zbl 1138.94356
Cho, Joo Yeon; Pieprzyk, Josef
3
2007
Crossword puzzle attack on NLS. Zbl 1161.94392
Cho, Joo Yeon; Pieprzyk, Josef
2
2007
How to strengthen any weakly unforgeable signature into a strongly unforgeable signature. Zbl 1177.94191
Steinfeld, Ron; Pieprzyk, Josef; Wang, Huaxiong
12
2006
On the provable security of an efficient RSA-based pseudorandom generator. Zbl 1172.94597
Steinfeld, Ron; Pieprzyk, Josef; Wang, Huaxiong
11
2006
Lattice-based treshold-changeability for standard CRT secret-sharing schemes. Zbl 1156.94381
Steinfeld, Ron; Pieprzyk, Josef; Wang, Huaxiong
8
2006
On algebraic immunity and annihilators. Zbl 1272.94071
Zhang, Xian-Mo; Pieprzyk, Josef; Zheng, Yuliang
4
2006
A non-malleable group key exchange protocol robust against active insiders. Zbl 1156.94410
Desmedt, Yvo; Pieprzyk, Josef; Steinfeld, Ron; Wang, Huaxiong
3
2006
Generalised cumulative arrays in secret sharing. Zbl 1261.94032
Long, Shoulun; Pieprzyk, Josef; Wang, Huaxiong; Wong, Duncan S.
3
2006
Finding good differential patterns for attacks on SHA-1. Zbl 1151.94545
Matusiewicz, Krystian; Pieprzyk, Josef
2
2006
Converse results to the Wiener attack on RSA. Zbl 1081.94537
Steinfeld, Ron; Contini, Scott; Wang, Huaxiong; Pieprzyk, Josef
4
2005
Efficient extension of standard Schnorr/RSA signatures into universal designated-verifier signatures. Zbl 1198.94163
Steinfeld, Ron; Wang, Huaxiong; Pieprzyk, Josef
15
2004
Homogeneous bent functions of degree \(n\) in 2\(n\) variables do not exist for \(n>3\). Zbl 1048.94016
Xia, Tianbing; Seberry, Jennifer; Pieprzyk, Josef; Charnes, Chris
11
2004
Lattice-based threshold-changeability for standard Shamir secret-sharing schemes. Zbl 1094.94039
Steinfeld, Ron; Wang, Huaxiong; Pieprzyk, Josef
7
2004
Multiple-time signature schemes against adaptive chosen message attacks. Zbl 1081.94553
Pieprzyk, Josef; Wang, Huaxiong; Xing, Chaoping
5
2004
Algebraic attacks on SOBER-t32 and SOBER-t16 without stuttering. Zbl 1079.68540
Cho, Joo Yeon; Pieprzyk, Josef
4
2004
On cheating immune secret sharing. Zbl 1064.94014
Pieprzyk, Josef; Zhang, Xian-Mo
2
2004
Malleability attacks on multi-party key agreement protocols. Zbl 1060.94024
Pieprzyk, Josef; Wang, Huaxiong
1
2004
Universal designated-verifier signatures. Zbl 1205.94112
Steinfeld, Ron; Bull, Laurence; Wang, Huaxiong; Pieprzyk, Josef
22
2003
Fundamentals of computer security. Zbl 1011.68034
Pieprzyk, Josef; Hardjono, Thomas; Seberry, Jennifer
11
2003
Efficient one-time proxy signatures. Zbl 1205.94115
Wang, Huaxiong; Pieprzyk, Josef
8
2003
Ideal threshold schemes from MDS codes. Zbl 1031.94538
Pieprzyk, Josef; Zhang, Xian-Mo
4
2003
Shared generation of pseudo-random functions with cumulative maps. Zbl 1039.94521
Wang, Huaxiong; Pieprzyk, Josef
3
2003
Parallel authentication and public-key encryption. Zbl 1045.94541
Pieprzyk, Josef; Pointcheval, David
3
2003
Threshold MACs. Zbl 1031.94522
Martin, Keith M.; Pieprzyk, Josef; Safavi-Naini, Rei; Wang, Huaxiong; Wild, Peter R.
2
2003
Cryptanalysis of block ciphers with overdefined systems of equations. Zbl 1065.94543
Courtois, Nicolas T.; Pieprzyk, Josef
99
2002
Constructions of cheating immune secret sharing. Zbl 0999.94552
Pieprzyk, Josef; Zhang, Xian-Mo
3
2002
Cheating prevention in linear secret sharing. Zbl 1020.94537
Pieprzyk, Josef; Zhang, Xian-Mo
2
2002
Authentication of concast communication. Zbl 1033.94551
Al-Ibrahim, Mohamed; Ghodosi, Hossein; Pieprzyk, Josef
1
2002
Cheating immune secret sharing. Zbl 1050.94543
Zhang, Xian-Mo; Pieprzyk, Josef
4
2001
Cheating prevention in secret sharing over \(\text{GF} (p^t)\). Zbl 1011.94559
Pieprzyk, Josef; Zhang, Xian-Mo
2
2001
Authenticating multicast streams in lossy channels using threshold techniques. Zbl 0980.68597
Al-Ibrahim, Mohamed; Pieprzyk, Josef
1
2001
Homogeneous bent functions. Zbl 1016.94029
Qu, Chengxin; Seberry, Jennifer; Pieprzyk, Josef
13
2000
Identification of bad signatures in batches. Zbl 0966.94024
Pastuszak, Jarosław; Michałek, Dariusz; Pieprzyk, Josef; Seberry, Jennifer
3
2000
Construction of cubic homogeneous Boolean bent functions. Zbl 0984.94043
Seberry, Jennifer; Xia, Tianbing; Pieprzyk, Josef
2
2000
Codes identifying bad signatures in batches. Zbl 0963.94033
Pastuszak, Jarosław; Pieprzyk, Josef; Seberry, Jennifer
2
2000
Changing thresholds in the absence of secure channels. Zbl 0919.94041
Martin, Keith M.; Pieprzyk, Josef; Safavi-Naini, Rei; Wang, Huaxiong
10
1999
Changing thresholds in the absence of secure channels. Zbl 0945.68055
Martin, Keith M.; Pieprzyk, Josef; Safavi-Naini, Rei; Wang, Huaxiong
7
1999
On the symmetric property of homogeneous Boolean functions. Zbl 0919.94019
Qu, Chengxin; Seberry, Jennifer; Pieprzyk, Josef
5
1999
Conference key agreement from secret sharing. Zbl 0919.94040
Li, Chih-Hung; Pieprzyk, Josef
2
1999
Fail-stop threshold signature schemes based on elliptic curves. Zbl 0919.94045
Susilo, Willy; Safavi-Naini, Rei; Pieprzyk, Josef
2
1999
Repudiation of cheating and non-repudiation of Zhang’s proxy signature schemes. Zbl 0919.94035
Ghodosi, Hossein; Pieprzyk, Josef
1
1999
Secret sharing in multilevel and compartmented groups. Zbl 0931.94022
Ghodosi, Hossein; Pieprzyk, Josef; Safavi-Naini, Rei
8
1998
Rotation-symmetric functions and fast hashing. Zbl 1097.94514
Pieprzyk, Josef; Qu, Cheng Xin
3
1998
On construction of cumulative secret sharing schemes. Zbl 0931.94023
Ghodosi, Hossein; Pieprzyk, Josef; Safavi-Naini, Rei; Wang, Huaxiong
1
1998
On the weaknesses of Gong’s collisionful hash function. Zbl 0960.68042
Bakhtiari, S.; Safavi-Naini, R.; Pieprzyk, J.
3
1997
Remarks on the multiple assignment secret sharing scheme. Zbl 0957.94026
Ghodosi, Hossein; Pieprzyk, Josef; Safavi-Naini, Rei
2
1997
Secret sharing in hierarchical groups. Zbl 0903.94029
Charnes, Chris; Martin, Keith; Pieprzyk, Josef; Safavi-Naini, Rei
1
1997
A message authentication code based on Latin squares. Zbl 0989.94520
Bakhtiari, S.; Safavi-Naini, R.; Pieprzyk, J.
1
1997
A multi-level view model for secure object-oriented databases. Zbl 0904.68082
Baraani-Dastjerdi, Ahmad; Pieprzyk, Josef; Safavi-Naini, Reihaneh
1
1997
Keyed hash functions. Zbl 1421.94037
Bakhtiari, S.; Safavi-Naini, R.; Pieprzyk, J.
6
1996
Attacking the \(\mathrm{SL}_2\) hashing scheme. Zbl 1126.94323
Charnes, Chris; Pieprzyk, Josef
8
1995
...and 14 more Documents
all top 5

Cited by 952 Authors

21 Pieprzyk, Josef P.
14 Wang, Huaxiong
12 Hu, Lei
11 Zeng, Xiangyong
10 Li, Chao
9 Meier, Willi
8 Hou, Xiang-Dong
7 Carlet, Claude
7 Susilo, Willy
7 Wang, Xiaoyun
6 Courtois, Nicolas T.
6 Gong, Guang
6 Guo, Jian
6 Harn, Lein
6 Maitra, Subhamoy
6 Mesnager, Sihem
6 Qu, Longjiang
6 Tartary, Christophe
5 Biham, Eli
5 Lai, Hong
5 Liu, MeiCheng
5 Raddum, Håvard
5 Rijmen, Vincent
5 Sasaki, Yu
5 Seberry, Jennifer R.
5 Semaev, Igor A.
5 Steinfeld, Ron
5 Zha, Zhengbang
5 Zhang, Huanguo
4 Cao, Xiwang
4 Dong, Xiaoyang
4 Fu, Shaojing
4 Guo, Chun
4 Hsu, Chingfang
4 Li, Chunlei
4 Li, Fulin
4 Lin, Changlu
4 Lin, Dongdai
4 Liu, Yunwen
4 Matsuura, Kanta
4 Orgun, Mehmet Ali
4 Quisquater, Jean-Jacques
4 Safavi-Naini, Reihaneh
4 Sarkar, Santanu
4 Song, Ling
4 Stinson, Douglas Robert
4 Sun, Siwei
4 Tokareva, Natalia Nikolaevna
4 Tu, Ziran
4 Zhu, Shixin
3 Adams, Carlisle M.
3 Albrecht, Martin R.
3 Aumasson, Jean-Philippe
3 Chand Gupta, Kishan
3 Charpin, Pascale
3 Chen, Xiaofeng
3 Derler, David
3 Desmedt, Yvo G.
3 Dinur, Itai
3 Dunkelman, Orr
3 Fernando, Neranga
3 Helleseth, Tor
3 Horák, Peter
3 Hu, Yupu
3 Huang, Xinyi
3 Isobe, Takanori
3 Kim, Kwangjo
3 Knudsen, Lars Ramkilde
3 Li, Jin
3 Li, Zheng
3 Ling, San
3 Liu, Fukang
3 Mandal, Kalikinkar
3 Maurer, Ueli M.
3 Mendel, Florian
3 Mennink, Bart
3 Miao, Fuyou
3 Nikolić, Ivica
3 Nyberg, Kaisa
3 Petit, Christophe
3 Peyrin, Thomas
3 Pointcheval, David
3 Preneel, Bart
3 Shi, Weimin
3 Shim, Kyungah
3 Slamanig, Daniel
3 Wang, Gaoli
3 Wang, Meiqin
3 Wang, Tianyin
3 Wu, Baofeng
3 Xiong, Yan
3 Xu, Guangkui
3 Yang, Yuguang
3 Yuan, Pingzhi
3 Zhang, Fangguo
3 Zhou, Yihua
3 Zhu, Xishun
2 Aagaard, Mark D.
2 Andreeva, Elena Anatol’evna
2 Armknecht, Frederik
...and 852 more Authors
all top 5

Cited in 84 Serials

48 Designs, Codes and Cryptography
30 Finite Fields and their Applications
21 Journal of Cryptology
17 Information Sciences
17 Cryptography and Communications
16 Information Processing Letters
14 Quantum Information Processing
10 Discrete Applied Mathematics
10 Applicable Algebra in Engineering, Communication and Computing
9 International Journal of Theoretical Physics
8 Physica A
6 Theoretical Computer Science
5 Nonlinear Dynamics
5 Wuhan University Journal of Natural Sciences (WUJNS)
5 Advances in Mathematics of Communications
4 Discrete Mathematics
4 Applied Mathematics and Computation
4 Journal of Mathematical Cryptology
4 Matematicheskie Voprosy Kriptografii
3 Chaos, Solitons and Fractals
3 Journal of Symbolic Computation
3 Information and Computation
3 International Journal of Computer Mathematics
3 Rad Hrvatske Akademije Znanosti i Umjetnosti. Matematičke Znanosti
3 Journal of Applied Mathematics and Computing
3 Journal of Discrete Algorithms
3 Science in China. Series F
3 Prikladnaya Diskretnaya Matematika
2 Physics Letters. A
2 Journal of Computer and System Sciences
2 Journal of Complexity
2 Journal of Computer Science and Technology
2 Discrete Mathematics and Applications
2 Pattern Recognition
2 Journal of Discrete Mathematical Sciences & Cryptography
2 Journal of Systems Science and Complexity
2 Mathematics in Computer Science
2 Science China. Mathematics
1 Computers & Mathematics with Applications
1 IEEE Transactions on Information Theory
1 Linear and Multilinear Algebra
1 Mathematical Biosciences
1 Periodica Mathematica Hungarica
1 Problems of Information Transmission
1 Mathematics of Computation
1 ACM Transactions on Mathematical Software
1 Computing
1 Journal of Algebra
1 Journal of Number Theory
1 Mathematica Slovaca
1 Proceedings of the Japan Academy. Series A
1 Synthese
1 Cryptologia
1 Acta Applicandae Mathematicae
1 Algorithmica
1 Applied Mathematics Letters
1 Mathematical and Computer Modelling
1 MSCS. Mathematical Structures in Computer Science
1 International Journal of Foundations of Computer Science
1 Journal of Global Optimization
1 Linear Algebra and its Applications
1 The Journal of Analysis
1 Mathematical Problems in Engineering
1 International Journal of Applied Mathematics and Computer Science
1 Journal of Algebra and its Applications
1 Mathematical Biosciences and Engineering
1 Sibirskie Èlektronnye Matematicheskie Izvestiya
1 Journal of Zhejiang University. Science A
1 Annales Universitatis Mariae Curie-Skłodowska. Sectio A1. Informatica
1 Journal of Physics A: Mathematical and Theoretical
1 Journal of Statistical Theory and Practice
1 Involve
1 Asian-European Journal of Mathematics
1 Discrete Mathematics, Algorithms and Applications
1 São Paulo Journal of Mathematical Sciences
1 Science China. Information Sciences
1 Diskretnyĭ Analiz i Issledovanie Operatsiĭ
1 Central European Journal of Computer Science
1 Frontiers of Computer Science in China
1 Frontiers of Computer Science
1 Palestine Journal of Mathematics
1 Axioms
1 Algebra
1 Vestnik Samarskogo Universiteta. Estestvennonauchnaya Seriya

Citations by Year

The data are displayed as stored in Wikidata under a Creative Commons CC0 License. Updates and corrections should be made in Wikidata.