×
Compute Distance To:
Author ID: pieprzyk.josef-p Recent zbMATH articles by "Pieprzyk, Josef P."
Published as: Pieprzyk, Josef; Pieprzyk, J.; Pieprzyk, Józef P.; Pieprzyk, Josef P.
Homepage: https://people.csiro.au/P/J/Josef-Pieprzyk
External Links: MGP · ORCID · Wikidata · Google Scholar · dblp · GND · IdRef
all top 5

Co-Authors

10 single-authored
43 Wang, Huaxiong
26 Steinfeld, Ron
19 Safavi-Naini, Reihaneh
15 Zhang, Xian-Mo
14 Seberry, Jennifer R.
12 Lai, Hong
11 Ghodosi, Hossein
11 Orgun, Mehmet Ali
6 Charnes, Chris
6 Ling, San
6 Matusiewicz, Krystian
6 Sadeghiyan, Babak
6 Xiao, Jinghua
5 Cho, Joo Yeon
5 Desmedt, Yvo G.
5 Luo, Mingxing
5 Nikolić, Ivica
5 Xue, Liyin
4 Contini, Scott
4 Martin, Keith M.
4 Orumiehchiha, Mohammad Ali
4 Susilo, Willy
4 Tartary, Christophe
4 Zheng, Yuliang
3 Asghar, Hassan Jameel
3 Bakhtiari, Shahram
3 Morawiecki, Paweł
3 Qu, Chengxin
3 Sepahi, Reza
3 Sokołowski, Przemysław
3 Srebrny, Marian
3 Wang, Peishun
2 Al-Ibrahim, Mohamed Hussain
2 Baraani-Dastjerdi, Ahmad
2 Duong, Dung Hoang
2 Emami, Sareh
2 Guo, Jian
2 Hardjono, Thomas
2 Khovratovich, Dmitry
2 Kwan, Matthew
2 Le, Huy Quoc
2 Li, Chih-Hung
2 Okamoto, Eiji
2 Pan, Lei
2 Pastuszak, Jarosław
2 Peyrin, Thomas
2 Pointcheval, David
2 Suriadi, Suriadi
2 Varadharajan, Vijay
2 Wei, Lei
2 Xia, Tianbing
2 Xiao, Fuyuan
2 Ye, Qingsong
2 Zhan, Cheng
1 Bansal, Tarun Kumar
1 Bartlett, Harry
1 Billet, Olivier
1 Biryukov, Alex
1 Boyen, Xavier
1 Brown, Lawrence Peter
1 Bull, Laurence
1 Courtois, Nicolas T.
1 Dawson, Edward
1 Dempwolff, Ulrich
1 Ding, Cunsheng
1 Dinur, Itai
1 Gaj, Kris
1 Gauravaram, Praveen
1 Getta, Janusz R.
1 Golić, Jovan Dj.
1 Homsirikamol, Ekawat
1 Jia, Zhongtian
1 Kaczorowski, Jerzy
1 Khoo, Khoongming
1 Ku, Bying-He
1 Li, Jing
1 Li, Shujun
1 Lim, Chu-Wee
1 Long, Shoulun
1 Manulis, Mark
1 Michałek, Darek
1 Michałek, Dariusz
1 Mu, Yi
1 Orgun, A. Mehmet
1 Pastuszak, Jarek
1 Plantard, Thomas
1 Pomykała, Jacek M.
1 Qu, Zhiguo
1 Rogawski, Marcin
1 Rostami, Saeed
1 Sadeghi, Ahmad-Reza
1 Schoenmakers, Berry
1 Shahandashti, Siamak F.
1 Shakour, Elham
1 Straus, Michał
1 Sun, Hung-Min
1 Sun, Xiaoming
1 Tran, Ha Thanh Nguyen
1 Trinh, Viet Cuong
1 van Tilborg, Henk C. A.
...and 9 more Co-Authors

Publications by Year

Citations contained in zbMATH Open

99 Publications have been cited 446 times in 374 Documents Cited by Year
Cryptanalysis of block ciphers with overdefined systems of equations. Zbl 1065.94543
Courtois, Nicolas T.; Pieprzyk, Josef
75
2002
Permutation polynomials of the \((x^p - x+\delta)^s+L(x)\). Zbl 1211.11136
Yuan, Jin; Ding, Cunsheng; Wang, Huaxiong; Pieprzyk, Josef
42
2008
HAVAL – a one-way hashing algorithm with variable length of output. (Extended abstract). Zbl 0869.94028
Zheng, Yuliang; Pieprzyk, Josef; Seberry, Jennifer
15
1993
Universal designated-verifier signatures. Zbl 1205.94112
Steinfeld, Ron; Bull, Laurence; Wang, Huaxiong; Pieprzyk, Josef
12
2003
Cube attacks and cube-attack-like cryptanalysis on the round-reduced Keccak sponge function. Zbl 1370.94506
Dinur, Itai; Morawiecki, Paweł; Pieprzyk, Josef; Srebrny, Marian; Straus, Michał
11
2015
Homogeneous bent functions. Zbl 1016.94029
Qu, Chengxin; Seberry, Jennifer; Pieprzyk, Josef
10
2000
Efficient extension of standard Schnorr/RSA signatures into universal designated-verifier signatures. Zbl 1198.94163
Steinfeld, Ron; Wang, Huaxiong; Pieprzyk, Josef
10
2004
On the provable security of an efficient RSA-based pseudorandom generator. Zbl 1172.94597
Steinfeld, Ron; Pieprzyk, Josef; Wang, Huaxiong
9
2006
Homogeneous bent functions of degree \(n\) in 2\(n\) variables do not exist for \(n>3\). Zbl 1048.94016
Xia, Tianbing; Seberry, Jennifer; Pieprzyk, Josef; Charnes, Chris
9
2004
How to strengthen any weakly unforgeable signature into a strongly unforgeable signature. Zbl 1177.94191
Steinfeld, Ron; Pieprzyk, Josef; Wang, Huaxiong
8
2006
Rotational cryptanalysis of round-reduced Keccak. Zbl 1321.94081
Morawiecki, Paweł; Pieprzyk, Josef; Srebrny, Marian
8
2014
Secret sharing in multilevel and compartmented groups. Zbl 0931.94022
Ghodosi, Hossein; Pieprzyk, Josef; Safavi-Naini, Rei
8
1998
Fundamentals of computer security. Zbl 1011.68034
Pieprzyk, Josef; Hardjono, Thomas; Seberry, Jennifer
8
2003
Changing thresholds in the absence of secure channels. Zbl 0919.94041
Martin, Keith M.; Pieprzyk, Josef; Safavi-Naini, Rei; Wang, Huaxiong
7
1999
Attacking the \(\mathrm{SL}_2\) hashing scheme. Zbl 1126.94323
Charnes, Chris; Pieprzyk, Josef
7
1995
Lattice-based treshold-changeability for standard CRT secret-sharing schemes. Zbl 1156.94381
Steinfeld, Ron; Pieprzyk, Josef; Wang, Huaxiong
7
2006
Efficient one-time proxy signatures. Zbl 1205.94115
Wang, Huaxiong; Pieprzyk, Josef
6
2003
Lattice-based threshold-changeability for standard Shamir secret-sharing schemes. Zbl 1094.94039
Steinfeld, Ron; Wang, Huaxiong; Pieprzyk, Josef
6
2004
Changing thresholds in the absence of secure channels. Zbl 0945.68055
Martin, Keith M.; Pieprzyk, Josef; Safavi-Naini, Rei; Wang, Huaxiong
6
1999
Improving resistance to differential cryptanalysis and the redesign of LOKI. Zbl 0806.94015
Brown, Lawrence; Kwan, Matthew; Pieprzyk, Josef; Seberry, Jennifer
6
1993
Known and chosen key differential distinguishers for block ciphers. Zbl 1297.94094
Nikolić, Ivica; Pieprzyk, Josef; Sokołowski, Przemysław; Steinfeld, Ron
5
2011
On the symmetric property of homogeneous Boolean functions. Zbl 0919.94019
Qu, Chengxin; Seberry, Jennifer; Pieprzyk, Josef
5
1999
Lattice-based threshold changeability for standard Shamir secret-sharing schemes. Zbl 1326.94130
Steinfeld, Ron; Pieprzyk, Josef; Wang, Huaxiong
5
2007
Multiple-time signature schemes against adaptive chosen message attacks. Zbl 1081.94553
Pieprzyk, Josef; Wang, Huaxiong; Xing, Chaoping
5
2004
Controllable quantum private queries using an entangled Fibonacci-sequence spiral source. Zbl 1361.81023
Lai, Hong; Orgun, Mehmet A.; Pieprzyk, Josef; Xiao, Jinghua; Xue, Liyin; Jia, Zhongtian
5
2015
Cryptanalysis of WG-7: a lightweight stream cipher. Zbl 1285.94087
Orumiehchiha, Mohammad Ali; Pieprzyk, Josef; Steinfeld, Ron
4
2012
On the weaknesses of Gong’s collisionful hash function. Zbl 0960.68042
Bakhtiari, S.; Safavi-Naini, R.; Pieprzyk, J.
4
1997
A construction of super pseudorandom permutations from a single pseudorandom function. Zbl 0801.65007
Sadeghiyan, Babak; Pieprzyk, Josef
4
1993
Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model. Zbl 1331.94060
Lai, Hong; Orgun, Mehmet A.; Xiao, Jinghua; Pieprzyk, Josef; Xue, Liyin; Yang, Yixian
4
2014
Rotational cryptanalysis of ARX revisited. Zbl 1382.94128
Khovratovich, Dmitry; Nikolić, Ivica; Pieprzyk, Josef; Sokołowski, Przemysław; Steinfeld, Ron
4
2015
How to construct pseudorandom permutations from single pseudorandom functions. Zbl 0779.65005
Pieprzyk, Josef
4
1991
On secure multi-party computation in black-box groups. Zbl 1215.94042
Desmedt, Yvo; Pieprzyk, Josef; Steinfeld, Ron; Wang, Huaxiong
4
2007
Cheating immune secret sharing. Zbl 1050.94543
Zhang, Xian-Mo; Pieprzyk, Josef
4
2001
On necessary and sufficient conditions for the construction of super pseudorandom permutations. Zbl 0808.94025
Sadeghiyan, Babak; Pieprzyk, Josef
4
1993
Generalised cumulative arrays in secret sharing. Zbl 1261.94032
Long, Shoulun; Pieprzyk, Josef; Wang, Huaxiong; Wong, Duncan S.
3
2006
On algebraic immunity and annihilators. Zbl 1272.94071
Zhang, Xian-Mo; Pieprzyk, Josef; Zheng, Yuliang
3
2006
Multiple modular additions and crossword puzzle attack on NLSv2. Zbl 1138.94356
Cho, Joo Yeon; Pieprzyk, Josef
3
2007
Bent permutations. Zbl 0804.11068
Pieprzyk, Josef
3
1993
Ideal threshold schemes from MDS codes. Zbl 1031.94538
Pieprzyk, Josef; Zhang, Xian-Mo
3
2003
Shared generation of pseudo-random functions with cumulative maps. Zbl 1039.94521
Wang, Huaxiong; Pieprzyk, Josef
3
2003
ICEPOLE: high-speed, hardware-oriented authenticated encryption. Zbl 1396.94092
Morawiecki, Paweł; Gaj, Kris; Homsirikamol, Ekawat; Matusiewicz, Krystian; Pieprzyk, Josef; Rogawski, Marcin; Srebrny, Marian; Wójcik, Marcin
3
2014
Cryptography: an introduction to computer security. Zbl 0716.94008
Seberry, Jennifer; Pieprzyk, Josef
3
1989
Algebraic attacks on SOBER-t32 and SOBER-t16 without stuttering. Zbl 1079.68540
Cho, Joo Yeon; Pieprzyk, Josef
3
2004
Decomposition construction for secret sharing schemes with graph access structures in polynomial time. Zbl 1213.94137
Sun, Hung-Min; Wang, Huaxiong; Ku, Bying-He; Pieprzyk, Josef
3
2010
Constructions of cheating immune secret sharing. Zbl 0999.94552
Pieprzyk, Josef; Zhang, Xian-Mo
3
2002
A general purpose technique for locating key scheduling weaknes in DES- like cryptosystems. (Extended abstract). Zbl 0825.94204
Kwan, Matthew; Pieprzyk, Josef
3
1993
An improved coding method of quantum key distribution protocols based on Fibonacci-valued OAM entangled states. Zbl 1404.81081
Lai, Hong; Luo, Ming-Xing; Zhan, Cheng; Pieprzyk, Josef; Orgun, Mehmet A.
3
2017
NTRUCCA: how to strengthen NTRUEncrypt to chosen-ciphertext security in the standard model. Zbl 1294.94079
Steinfeld, Ron; Ling, San; Pieprzyk, Josef; Tartary, Christophe; Wang, Huaxiong
2
2012
Finding good differential patterns for attacks on SHA-1. Zbl 1151.94545
Matusiewicz, Krystian; Pieprzyk, Josef
2
2006
Topics in cryptology – CT-RSA 2010. The cryptographers’ track at the RSA conference 2010, San Francisco, CA, USA, March 1–5, 2010. Proceedings. Zbl 1182.94002
2
2010
Möbius transforms, coincident Boolean functions and non-coincidence property of Boolean functions. Zbl 1232.06017
Pieprzyk, Josef; Wang, Huaxiong; Zhang, Xian-Mo
2
2011
Crossword puzzle attack on NLS. Zbl 1161.94392
Cho, Joo Yeon; Pieprzyk, Josef
2
2007
A new dynamic accumulator for batch updates. Zbl 1285.94115
Wang, Peishun; Wang, Huaxiong; Pieprzyk, Josef
2
2008
A non-malleable group key exchange protocol robust against active insiders. Zbl 1156.94410
Desmedt, Yvo; Pieprzyk, Josef; Steinfeld, Ron; Wang, Huaxiong
2
2006
Graph coloring applied to secure computation in non-abelian groups. Zbl 1278.94046
Desmedt, Yvo; Pieprzyk, Josef; Steinfeld, Ron; Sun, Xiaoming; Tartary, Christophe; Wang, Huaxiong; Yao, Andrew Chi-Chih
2
2012
On the (in)security of IDEA in various hashing modes. Zbl 1312.94099
Wei, Lei; Peyrin, Thomas; Sokołowski, Przemysław; Ling, San; Pieprzyk, Josef; Wang, Huaxiong
2
2012
On cheating immune secret sharing. Zbl 1064.94014
Pieprzyk, Josef; Zhang, Xian-Mo
2
2004
Identification of bad signatures in batches. Zbl 0966.94024
Pastuszak, Jarosław; Michałek, Dariusz; Pieprzyk, Josef; Seberry, Jennifer
2
2000
Cheating prevention in secret sharing over \(\text{GF} (p^t)\). Zbl 1011.94559
Pieprzyk, Josef; Zhang, Xian-Mo
2
2001
Cheating prevention in linear secret sharing. Zbl 1020.94537
Pieprzyk, Josef; Zhang, Xian-Mo
2
2002
Threshold MACs. Zbl 1031.94522
Martin, Keith M.; Pieprzyk, Josef; Safavi-Naini, Rei; Wang, Huaxiong; Wild, Peter R.
2
2003
Conference key agreement from secret sharing. Zbl 0919.94040
Li, Chih-Hung; Pieprzyk, Josef
2
1999
Fail-stop threshold signature schemes based on elliptic curves. Zbl 0919.94045
Susilo, Willy; Safavi-Naini, Rei; Pieprzyk, Josef
2
1999
Remarks on the multiple assignment secret sharing scheme. Zbl 0957.94026
Ghodosi, Hossein; Pieprzyk, Josef; Safavi-Naini, Rei
2
1997
Efficient disjointness tests for private datasets. Zbl 1279.94127
Ye, Qingsong; Wang, Huaxiong; Pieprzyk, Josef; Zhang, Xian-Mo
2
2008
Advances in cryptology – ASIACRYPT 2008. 14th international conference on the theory and application of cryptology and information security, Melbourne, Australia, December 7–11, 2008. Proceedings. Zbl 1155.94008
2
2008
Converse results to the Wiener attack on RSA. Zbl 1081.94537
Steinfeld, Ron; Contini, Scott; Wang, Huaxiong; Pieprzyk, Josef
2
2005
Construction of cubic homogeneous Boolean bent functions. Zbl 0984.94043
Seberry, Jennifer; Xia, Tianbing; Pieprzyk, Josef
2
2000
Parallel authentication and public-key encryption. Zbl 1045.94541
Pieprzyk, Josef; Pointcheval, David
2
2003
Sibling intractable function families and their applications. (Extended abstract). Zbl 0805.94015
Zheng, Yuliang; Hardjono, Thomas; Pieprzyk, Josef
2
1993
Optimal perfect randomizers. Zbl 0808.94026
Pieprzyk, Josef; Sadeghiyan, Babak
2
1993
Lattice-based completely non-malleable public-key encryption in the standard model. Zbl 1342.94095
Sepahi, Reza; Steinfeld, Ron; Pieprzyk, Josef
1
2014
A new human identification protocol and Coppersmith’s baby-step giant-step algorithm. Zbl 1350.94028
Asghar, Hassan Jameel; Pieprzyk, Josef; Wang, Huaxiong
1
2010
Lattice-based completely non-malleable PKE in the standard model (poster). Zbl 1295.94144
Sepahi, Reza; Steinfeld, Ron; Pieprzyk, Josef
1
2011
Threshold privacy preserving keyword searches. Zbl 1132.68378
Wang, Peishun; Wang, Huaxiong; Pieprzyk, Josef
1
2008
Multi-party computation with conversion of secret sharing. Zbl 1234.68151
Ghodosi, Hossein; Pieprzyk, Josef; Steinfeld, Ron
1
2012
Parallel signcryption. Zbl 1217.68089
Pieprzyk, Josef; Pointcheval, David
1
2010
Dynamic \((2, 3)\) threshold quantum secret sharing of secure direct communication. Zbl 1311.81096
Lai, Hong; Orgun, A. Mehmet; Xiao, Jing-Hua; Pieprzyk, Josef; Xue, Li-Yin
1
2015
Malleability attacks on multi-party key agreement protocols. Zbl 1060.94024
Pieprzyk, Josef; Wang, Huaxiong
1
2004
A message authentication code based on Latin squares. Zbl 0989.94520
Bakhtiari, S.; Safavi-Naini, R.; Pieprzyk, J.
1
1997
Authentication of concast communication. Zbl 1033.94551
Al-Ibrahim, Mohamed; Ghodosi, Hossein; Pieprzyk, Josef
1
2002
Repudiation of cheating and non-repudiation of Zhang’s proxy signature schemes. Zbl 0919.94035
Ghodosi, Hossein; Pieprzyk, Josef
1
1999
Linear nonequivalence versus nonlinearity. Zbl 0869.94014
Charnes, Chris; Pieprzyk, Josef
1
1993
Comments on Soviet encryption algorithm. Zbl 0879.94033
Charnes, C.; O’Connor, L.; Pieprzyk, J.; Safavi-Naini, R.; Zheng, Y.
1
1995
Cryptanalysis of FORK-256. Zbl 1186.94460
Matusiewicz, Krystian; Peyrin, Thomas; Billet, Olivier; Contini, Scott; Pieprzyk, Josef
1
2007
Cryptanalysis of LASH. Zbl 1154.68411
Steinfeld, Ron; Contini, Scott; Matusiewicz, Krystian; Pieprzyk, Josef; Guo, Jian; Ling, San; Wang, Huaxiong
1
2008
The eight variable homogeneous degree three bent functions. Zbl 1147.94010
Charnes, C.; Dempwolff, U.; Pieprzyk, J.
1
2008
Keyword field-free conjunctive keyword searches on encrypted data and extension for dynamic groups. Zbl 1362.94058
Wang, Peishun; Wang, Huaxiong; Pieprzyk, Josef
1
2008
Nonlinear functions and their application to cryptography. Zbl 0584.94027
Pieprzyk, Józef P.
1
1985
Low probability differentials and the cryptanalysis of full-round CLEFIA-128. Zbl 1306.94050
Emami, Sareh; Ling, San; Nikolić, Ivica; Pieprzyk, Josef; Wang, Huaxiong
1
2014
Quantum direct secret sharing with efficient eavesdropping-check and authentication based on distributed fountain codes. Zbl 1291.81116
Lai, Hong; Xiao, Jinghua; Orgun, Mehmet A.; Xue, Liyin; Pieprzyk, Josef
1
2014
The resistance of PRESENT-80 against related-key differential attacks. Zbl 1291.94079
Emami, Sareh; Ling, San; Nikolić, Ivica; Pieprzyk, Josef; Wang, Huaxiong
1
2014
Codes identifying bad signatures in batches. Zbl 0963.94033
Pastuszak, Jarosław; Pieprzyk, Josef; Seberry, Jennifer
1
2000
Unconditionally secure disjointness tests for private datasets. Zbl 1159.94374
Ye, Qingsong; Wang, Huaxiong; Pieprzyk, Josef; Zhang, Xian-Mo
1
2009
Cryptanalysis of the LAKE hash family. Zbl 1248.94057
Biryukov, Alex; Gauravaram, Praveen; Guo, Jian; Khovratovich, Dmitry; Ling, San; Matusiewicz, Krystian; Nikolić, Ivica; Pieprzyk, Josef; Wang, Huaxiong
1
2009
Non-linearity of exponent permutations. Zbl 0724.94010
Pieprzyk, Josef P.
1
1990
Rotation-symmetric functions and fast hashing. Zbl 1097.94514
Pieprzyk, Josef; Qu, Cheng Xin
1
1998
On construction of cumulative secret sharing schemes. Zbl 0931.94023
Ghodosi, Hossein; Pieprzyk, Josef; Safavi-Naini, Rei; Wang, Huaxiong
1
1998
Keyed hash functions. Zbl 1421.94037
Bakhtiari, S.; Safavi-Naini, R.; Pieprzyk, J.
1
1996
An improved coding method of quantum key distribution protocols based on Fibonacci-valued OAM entangled states. Zbl 1404.81081
Lai, Hong; Luo, Ming-Xing; Zhan, Cheng; Pieprzyk, Josef; Orgun, Mehmet A.
3
2017
Cube attacks and cube-attack-like cryptanalysis on the round-reduced Keccak sponge function. Zbl 1370.94506
Dinur, Itai; Morawiecki, Paweł; Pieprzyk, Josef; Srebrny, Marian; Straus, Michał
11
2015
Controllable quantum private queries using an entangled Fibonacci-sequence spiral source. Zbl 1361.81023
Lai, Hong; Orgun, Mehmet A.; Pieprzyk, Josef; Xiao, Jinghua; Xue, Liyin; Jia, Zhongtian
5
2015
Rotational cryptanalysis of ARX revisited. Zbl 1382.94128
Khovratovich, Dmitry; Nikolić, Ivica; Pieprzyk, Josef; Sokołowski, Przemysław; Steinfeld, Ron
4
2015
Dynamic \((2, 3)\) threshold quantum secret sharing of secure direct communication. Zbl 1311.81096
Lai, Hong; Orgun, A. Mehmet; Xiao, Jing-Hua; Pieprzyk, Josef; Xue, Li-Yin
1
2015
Rotational cryptanalysis of round-reduced Keccak. Zbl 1321.94081
Morawiecki, Paweł; Pieprzyk, Josef; Srebrny, Marian
8
2014
Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model. Zbl 1331.94060
Lai, Hong; Orgun, Mehmet A.; Xiao, Jinghua; Pieprzyk, Josef; Xue, Liyin; Yang, Yixian
4
2014
ICEPOLE: high-speed, hardware-oriented authenticated encryption. Zbl 1396.94092
Morawiecki, Paweł; Gaj, Kris; Homsirikamol, Ekawat; Matusiewicz, Krystian; Pieprzyk, Josef; Rogawski, Marcin; Srebrny, Marian; Wójcik, Marcin
3
2014
Lattice-based completely non-malleable public-key encryption in the standard model. Zbl 1342.94095
Sepahi, Reza; Steinfeld, Ron; Pieprzyk, Josef
1
2014
Low probability differentials and the cryptanalysis of full-round CLEFIA-128. Zbl 1306.94050
Emami, Sareh; Ling, San; Nikolić, Ivica; Pieprzyk, Josef; Wang, Huaxiong
1
2014
Quantum direct secret sharing with efficient eavesdropping-check and authentication based on distributed fountain codes. Zbl 1291.81116
Lai, Hong; Xiao, Jinghua; Orgun, Mehmet A.; Xue, Liyin; Pieprzyk, Josef
1
2014
The resistance of PRESENT-80 against related-key differential attacks. Zbl 1291.94079
Emami, Sareh; Ling, San; Nikolić, Ivica; Pieprzyk, Josef; Wang, Huaxiong
1
2014
Cryptanalysis of WG-7: a lightweight stream cipher. Zbl 1285.94087
Orumiehchiha, Mohammad Ali; Pieprzyk, Josef; Steinfeld, Ron
4
2012
NTRUCCA: how to strengthen NTRUEncrypt to chosen-ciphertext security in the standard model. Zbl 1294.94079
Steinfeld, Ron; Ling, San; Pieprzyk, Josef; Tartary, Christophe; Wang, Huaxiong
2
2012
Graph coloring applied to secure computation in non-abelian groups. Zbl 1278.94046
Desmedt, Yvo; Pieprzyk, Josef; Steinfeld, Ron; Sun, Xiaoming; Tartary, Christophe; Wang, Huaxiong; Yao, Andrew Chi-Chih
2
2012
On the (in)security of IDEA in various hashing modes. Zbl 1312.94099
Wei, Lei; Peyrin, Thomas; Sokołowski, Przemysław; Ling, San; Pieprzyk, Josef; Wang, Huaxiong
2
2012
Multi-party computation with conversion of secret sharing. Zbl 1234.68151
Ghodosi, Hossein; Pieprzyk, Josef; Steinfeld, Ron
1
2012
Known and chosen key differential distinguishers for block ciphers. Zbl 1297.94094
Nikolić, Ivica; Pieprzyk, Josef; Sokołowski, Przemysław; Steinfeld, Ron
5
2011
Möbius transforms, coincident Boolean functions and non-coincidence property of Boolean functions. Zbl 1232.06017
Pieprzyk, Josef; Wang, Huaxiong; Zhang, Xian-Mo
2
2011
Lattice-based completely non-malleable PKE in the standard model (poster). Zbl 1295.94144
Sepahi, Reza; Steinfeld, Ron; Pieprzyk, Josef
1
2011
Decomposition construction for secret sharing schemes with graph access structures in polynomial time. Zbl 1213.94137
Sun, Hung-Min; Wang, Huaxiong; Ku, Bying-He; Pieprzyk, Josef
3
2010
Topics in cryptology – CT-RSA 2010. The cryptographers’ track at the RSA conference 2010, San Francisco, CA, USA, March 1–5, 2010. Proceedings. Zbl 1182.94002
2
2010
A new human identification protocol and Coppersmith’s baby-step giant-step algorithm. Zbl 1350.94028
Asghar, Hassan Jameel; Pieprzyk, Josef; Wang, Huaxiong
1
2010
Parallel signcryption. Zbl 1217.68089
Pieprzyk, Josef; Pointcheval, David
1
2010
Unconditionally secure disjointness tests for private datasets. Zbl 1159.94374
Ye, Qingsong; Wang, Huaxiong; Pieprzyk, Josef; Zhang, Xian-Mo
1
2009
Cryptanalysis of the LAKE hash family. Zbl 1248.94057
Biryukov, Alex; Gauravaram, Praveen; Guo, Jian; Khovratovich, Dmitry; Ling, San; Matusiewicz, Krystian; Nikolić, Ivica; Pieprzyk, Josef; Wang, Huaxiong
1
2009
Permutation polynomials of the \((x^p - x+\delta)^s+L(x)\). Zbl 1211.11136
Yuan, Jin; Ding, Cunsheng; Wang, Huaxiong; Pieprzyk, Josef
42
2008
A new dynamic accumulator for batch updates. Zbl 1285.94115
Wang, Peishun; Wang, Huaxiong; Pieprzyk, Josef
2
2008
Efficient disjointness tests for private datasets. Zbl 1279.94127
Ye, Qingsong; Wang, Huaxiong; Pieprzyk, Josef; Zhang, Xian-Mo
2
2008
Advances in cryptology – ASIACRYPT 2008. 14th international conference on the theory and application of cryptology and information security, Melbourne, Australia, December 7–11, 2008. Proceedings. Zbl 1155.94008
2
2008
Threshold privacy preserving keyword searches. Zbl 1132.68378
Wang, Peishun; Wang, Huaxiong; Pieprzyk, Josef
1
2008
Cryptanalysis of LASH. Zbl 1154.68411
Steinfeld, Ron; Contini, Scott; Matusiewicz, Krystian; Pieprzyk, Josef; Guo, Jian; Ling, San; Wang, Huaxiong
1
2008
The eight variable homogeneous degree three bent functions. Zbl 1147.94010
Charnes, C.; Dempwolff, U.; Pieprzyk, J.
1
2008
Keyword field-free conjunctive keyword searches on encrypted data and extension for dynamic groups. Zbl 1362.94058
Wang, Peishun; Wang, Huaxiong; Pieprzyk, Josef
1
2008
Lattice-based threshold changeability for standard Shamir secret-sharing schemes. Zbl 1326.94130
Steinfeld, Ron; Pieprzyk, Josef; Wang, Huaxiong
5
2007
On secure multi-party computation in black-box groups. Zbl 1215.94042
Desmedt, Yvo; Pieprzyk, Josef; Steinfeld, Ron; Wang, Huaxiong
4
2007
Multiple modular additions and crossword puzzle attack on NLSv2. Zbl 1138.94356
Cho, Joo Yeon; Pieprzyk, Josef
3
2007
Crossword puzzle attack on NLS. Zbl 1161.94392
Cho, Joo Yeon; Pieprzyk, Josef
2
2007
Cryptanalysis of FORK-256. Zbl 1186.94460
Matusiewicz, Krystian; Peyrin, Thomas; Billet, Olivier; Contini, Scott; Pieprzyk, Josef
1
2007
On the provable security of an efficient RSA-based pseudorandom generator. Zbl 1172.94597
Steinfeld, Ron; Pieprzyk, Josef; Wang, Huaxiong
9
2006
How to strengthen any weakly unforgeable signature into a strongly unforgeable signature. Zbl 1177.94191
Steinfeld, Ron; Pieprzyk, Josef; Wang, Huaxiong
8
2006
Lattice-based treshold-changeability for standard CRT secret-sharing schemes. Zbl 1156.94381
Steinfeld, Ron; Pieprzyk, Josef; Wang, Huaxiong
7
2006
Generalised cumulative arrays in secret sharing. Zbl 1261.94032
Long, Shoulun; Pieprzyk, Josef; Wang, Huaxiong; Wong, Duncan S.
3
2006
On algebraic immunity and annihilators. Zbl 1272.94071
Zhang, Xian-Mo; Pieprzyk, Josef; Zheng, Yuliang
3
2006
Finding good differential patterns for attacks on SHA-1. Zbl 1151.94545
Matusiewicz, Krystian; Pieprzyk, Josef
2
2006
A non-malleable group key exchange protocol robust against active insiders. Zbl 1156.94410
Desmedt, Yvo; Pieprzyk, Josef; Steinfeld, Ron; Wang, Huaxiong
2
2006
Converse results to the Wiener attack on RSA. Zbl 1081.94537
Steinfeld, Ron; Contini, Scott; Wang, Huaxiong; Pieprzyk, Josef
2
2005
Efficient extension of standard Schnorr/RSA signatures into universal designated-verifier signatures. Zbl 1198.94163
Steinfeld, Ron; Wang, Huaxiong; Pieprzyk, Josef
10
2004
Homogeneous bent functions of degree \(n\) in 2\(n\) variables do not exist for \(n>3\). Zbl 1048.94016
Xia, Tianbing; Seberry, Jennifer; Pieprzyk, Josef; Charnes, Chris
9
2004
Lattice-based threshold-changeability for standard Shamir secret-sharing schemes. Zbl 1094.94039
Steinfeld, Ron; Wang, Huaxiong; Pieprzyk, Josef
6
2004
Multiple-time signature schemes against adaptive chosen message attacks. Zbl 1081.94553
Pieprzyk, Josef; Wang, Huaxiong; Xing, Chaoping
5
2004
Algebraic attacks on SOBER-t32 and SOBER-t16 without stuttering. Zbl 1079.68540
Cho, Joo Yeon; Pieprzyk, Josef
3
2004
On cheating immune secret sharing. Zbl 1064.94014
Pieprzyk, Josef; Zhang, Xian-Mo
2
2004
Malleability attacks on multi-party key agreement protocols. Zbl 1060.94024
Pieprzyk, Josef; Wang, Huaxiong
1
2004
Universal designated-verifier signatures. Zbl 1205.94112
Steinfeld, Ron; Bull, Laurence; Wang, Huaxiong; Pieprzyk, Josef
12
2003
Fundamentals of computer security. Zbl 1011.68034
Pieprzyk, Josef; Hardjono, Thomas; Seberry, Jennifer
8
2003
Efficient one-time proxy signatures. Zbl 1205.94115
Wang, Huaxiong; Pieprzyk, Josef
6
2003
Ideal threshold schemes from MDS codes. Zbl 1031.94538
Pieprzyk, Josef; Zhang, Xian-Mo
3
2003
Shared generation of pseudo-random functions with cumulative maps. Zbl 1039.94521
Wang, Huaxiong; Pieprzyk, Josef
3
2003
Threshold MACs. Zbl 1031.94522
Martin, Keith M.; Pieprzyk, Josef; Safavi-Naini, Rei; Wang, Huaxiong; Wild, Peter R.
2
2003
Parallel authentication and public-key encryption. Zbl 1045.94541
Pieprzyk, Josef; Pointcheval, David
2
2003
Cryptanalysis of block ciphers with overdefined systems of equations. Zbl 1065.94543
Courtois, Nicolas T.; Pieprzyk, Josef
75
2002
Constructions of cheating immune secret sharing. Zbl 0999.94552
Pieprzyk, Josef; Zhang, Xian-Mo
3
2002
Cheating prevention in linear secret sharing. Zbl 1020.94537
Pieprzyk, Josef; Zhang, Xian-Mo
2
2002
Authentication of concast communication. Zbl 1033.94551
Al-Ibrahim, Mohamed; Ghodosi, Hossein; Pieprzyk, Josef
1
2002
Cheating immune secret sharing. Zbl 1050.94543
Zhang, Xian-Mo; Pieprzyk, Josef
4
2001
Cheating prevention in secret sharing over \(\text{GF} (p^t)\). Zbl 1011.94559
Pieprzyk, Josef; Zhang, Xian-Mo
2
2001
Homogeneous bent functions. Zbl 1016.94029
Qu, Chengxin; Seberry, Jennifer; Pieprzyk, Josef
10
2000
Identification of bad signatures in batches. Zbl 0966.94024
Pastuszak, Jarosław; Michałek, Dariusz; Pieprzyk, Josef; Seberry, Jennifer
2
2000
Construction of cubic homogeneous Boolean bent functions. Zbl 0984.94043
Seberry, Jennifer; Xia, Tianbing; Pieprzyk, Josef
2
2000
Codes identifying bad signatures in batches. Zbl 0963.94033
Pastuszak, Jarosław; Pieprzyk, Josef; Seberry, Jennifer
1
2000
Changing thresholds in the absence of secure channels. Zbl 0919.94041
Martin, Keith M.; Pieprzyk, Josef; Safavi-Naini, Rei; Wang, Huaxiong
7
1999
Changing thresholds in the absence of secure channels. Zbl 0945.68055
Martin, Keith M.; Pieprzyk, Josef; Safavi-Naini, Rei; Wang, Huaxiong
6
1999
On the symmetric property of homogeneous Boolean functions. Zbl 0919.94019
Qu, Chengxin; Seberry, Jennifer; Pieprzyk, Josef
5
1999
Conference key agreement from secret sharing. Zbl 0919.94040
Li, Chih-Hung; Pieprzyk, Josef
2
1999
Fail-stop threshold signature schemes based on elliptic curves. Zbl 0919.94045
Susilo, Willy; Safavi-Naini, Rei; Pieprzyk, Josef
2
1999
Repudiation of cheating and non-repudiation of Zhang’s proxy signature schemes. Zbl 0919.94035
Ghodosi, Hossein; Pieprzyk, Josef
1
1999
Secret sharing in multilevel and compartmented groups. Zbl 0931.94022
Ghodosi, Hossein; Pieprzyk, Josef; Safavi-Naini, Rei
8
1998
Rotation-symmetric functions and fast hashing. Zbl 1097.94514
Pieprzyk, Josef; Qu, Cheng Xin
1
1998
On construction of cumulative secret sharing schemes. Zbl 0931.94023
Ghodosi, Hossein; Pieprzyk, Josef; Safavi-Naini, Rei; Wang, Huaxiong
1
1998
On the weaknesses of Gong’s collisionful hash function. Zbl 0960.68042
Bakhtiari, S.; Safavi-Naini, R.; Pieprzyk, J.
4
1997
Remarks on the multiple assignment secret sharing scheme. Zbl 0957.94026
Ghodosi, Hossein; Pieprzyk, Josef; Safavi-Naini, Rei
2
1997
A message authentication code based on Latin squares. Zbl 0989.94520
Bakhtiari, S.; Safavi-Naini, R.; Pieprzyk, J.
1
1997
Keyed hash functions. Zbl 1421.94037
Bakhtiari, S.; Safavi-Naini, R.; Pieprzyk, J.
1
1996
Attacking the \(\mathrm{SL}_2\) hashing scheme. Zbl 1126.94323
Charnes, Chris; Pieprzyk, Josef
7
1995
Comments on Soviet encryption algorithm. Zbl 0879.94033
Charnes, C.; O’Connor, L.; Pieprzyk, J.; Safavi-Naini, R.; Zheng, Y.
1
1995
HAVAL – a one-way hashing algorithm with variable length of output. (Extended abstract). Zbl 0869.94028
Zheng, Yuliang; Pieprzyk, Josef; Seberry, Jennifer
15
1993
Improving resistance to differential cryptanalysis and the redesign of LOKI. Zbl 0806.94015
Brown, Lawrence; Kwan, Matthew; Pieprzyk, Josef; Seberry, Jennifer
6
1993
A construction of super pseudorandom permutations from a single pseudorandom function. Zbl 0801.65007
Sadeghiyan, Babak; Pieprzyk, Josef
4
1993
On necessary and sufficient conditions for the construction of super pseudorandom permutations. Zbl 0808.94025
Sadeghiyan, Babak; Pieprzyk, Josef
4
1993
Bent permutations. Zbl 0804.11068
Pieprzyk, Josef
3
1993
A general purpose technique for locating key scheduling weaknes in DES- like cryptosystems. (Extended abstract). Zbl 0825.94204
Kwan, Matthew; Pieprzyk, Josef
3
1993
Sibling intractable function families and their applications. (Extended abstract). Zbl 0805.94015
Zheng, Yuliang; Hardjono, Thomas; Pieprzyk, Josef
2
1993
Optimal perfect randomizers. Zbl 0808.94026
Pieprzyk, Josef; Sadeghiyan, Babak
2
1993
Linear nonequivalence versus nonlinearity. Zbl 0869.94014
Charnes, Chris; Pieprzyk, Josef
1
1993
How to construct pseudorandom permutations from single pseudorandom functions. Zbl 0779.65005
Pieprzyk, Josef
4
1991
Non-linearity of exponent permutations. Zbl 0724.94010
Pieprzyk, Josef P.
1
1990
Cryptography: an introduction to computer security. Zbl 0716.94008
Seberry, Jennifer; Pieprzyk, Josef
3
1989
Nonlinear functions and their application to cryptography. Zbl 0584.94027
Pieprzyk, Józef P.
1
1985
all top 5

Cited by 731 Authors

15 Pieprzyk, Josef P.
11 Zeng, Xiangyong
10 Hu, Lei
9 Wang, Huaxiong
8 Hou, Xiang-Dong
7 Li, Chao
6 Carlet, Claude
6 Mesnager, Sihem
5 Biham, Eli
5 Gong, Guang
5 Harn, Lein
5 Meier, Willi
5 Qu, Longjiang
5 Semaev, Igor A.
5 Steinfeld, Ron
5 Wang, Xiaoyun
5 Zha, Zhengbang
4 Cao, Xiwang
4 Fu, Shaojing
4 Guo, Chun
4 Guo, Jian
4 Li, Chunlei
4 Liu, MeiCheng
4 Maitra, Subhamoy
4 Quisquater, Jean-Jacques
4 Rijmen, Vincent
4 Sasaki, Yu
4 Seberry, Jennifer R.
4 Stinson, Douglas Robert
4 Susilo, Willy
4 Tartary, Christophe
4 Tu, Ziran
4 Zhang, Huanguo
3 Albrecht, Martin R.
3 Courtois, Nicolas T.
3 Desmedt, Yvo G.
3 Dong, Xiaoyang
3 Fernando, Neranga
3 Helleseth, Tor
3 Horák, Peter
3 Hsu, Chingfang
3 Hu, Yupu
3 Knudsen, Lars Ramkilde
3 Lai, Hong
3 Li, Zheng
3 Lin, Dongdai
3 Nikolić, Ivica
3 Nyberg, Kaisa
3 Petit, Christophe
3 Preneel, Bart
3 Raddum, Håvard
3 Safavi-Naini, Reihaneh
3 Shim, Kyungah
3 Tokareva, Natalia Nikolaevna
3 Wang, Meiqin
3 Xu, Guangkui
3 Yuan, Pingzhi
3 Zhang, Weiguo
3 Zhu, Xishun
2 Aagaard, Mark D.
2 Adams, Carlisle M.
2 Bellare, Mihir
2 Bi, Wenquan
2 Blondeau, Celine
2 Cao, Zhenfu
2 Chand Gupta, Kishan
2 Charnes, Chris
2 Charpin, Pascale
2 Chen, Rafi
2 Chen, Shiyao
2 Chen, Xiaofeng
2 Chen, Xiu-Bo
2 Chew, Guanhan
2 Choy, Jiali
2 Climent, Joan-Josep
2 Cui, Jingsong
2 Dakhilalian, Mohammad
2 Dalai, Deepak Kumar
2 Derler, David
2 Dinur, Itai
2 Dunkelman, Orr
2 Fan, Xinxin
2 Faugère, Jean-Charles
2 Feng, Xiutao
2 Ghodosi, Hossein
2 Huang, Wenchao
2 Hyun, Jong-Yoon
2 Jean, Jérémy
2 Joux, Antoine
2 Kelarev, Andrei Vladimirovich
2 Khoo, Khoongming
2 Khovratovich, Dmitry
2 Kim, Kwangjo
2 Lai, Xuejia
2 Lappano, Stephen D.
2 Lee, Heisook
2 Lee, Yoonjin
2 Li, Jin
2 Li, Nian
2 Lin, Changlu
...and 631 more Authors
all top 5

Cited in 75 Serials

45 Designs, Codes and Cryptography
29 Finite Fields and their Applications
18 Journal of Cryptology
17 Cryptography and Communications
16 Information Processing Letters
15 Information Sciences
10 Discrete Applied Mathematics
9 Applicable Algebra in Engineering, Communication and Computing
6 International Journal of Theoretical Physics
5 Wuhan University Journal of Natural Sciences (WUJNS)
5 Quantum Information Processing
4 Discrete Mathematics
4 Applied Mathematics and Computation
4 Theoretical Computer Science
4 Nonlinear Dynamics
3 Journal of Symbolic Computation
3 International Journal of Computer Mathematics
3 Rad Hrvatske Akademije Znanosti i Umjetnosti. Matematičke Znanosti
3 Journal of Applied Mathematics and Computing
3 Journal of Discrete Algorithms
3 Science in China. Series F
3 Journal of Mathematical Cryptology
3 Advances in Mathematics of Communications
3 Prikladnaya Diskretnaya Matematika
3 Matematicheskie Voprosy Kriptografii
2 Physics Letters. A
2 Journal of Computer and System Sciences
2 Journal of Complexity
2 Journal of Computer Science and Technology
2 Information and Computation
2 Discrete Mathematics and Applications
2 Pattern Recognition
2 Mathematics in Computer Science
2 Science China. Mathematics
1 Computers & Mathematics with Applications
1 IEEE Transactions on Information Theory
1 Linear and Multilinear Algebra
1 Mathematical Biosciences
1 Periodica Mathematica Hungarica
1 Problems of Information Transmission
1 Mathematics of Computation
1 Chaos, Solitons and Fractals
1 ACM Transactions on Mathematical Software
1 Computing
1 Journal of Algebra
1 Mathematica Slovaca
1 Proceedings of the Japan Academy. Series A
1 Synthese
1 Cryptologia
1 Algorithmica
1 Applied Mathematics Letters
1 Mathematical and Computer Modelling
1 MSCS. Mathematical Structures in Computer Science
1 International Journal of Foundations of Computer Science
1 Journal of Global Optimization
1 Linear Algebra and its Applications
1 The Journal of Analysis
1 Mathematical Problems in Engineering
1 Journal of Discrete Mathematical Sciences & Cryptography
1 International Journal of Applied Mathematics and Computer Science
1 Journal of Systems Science and Complexity
1 Journal of Algebra and its Applications
1 Journal of Zhejiang University. Science A
1 Annales Universitatis Mariae Curie-Skłodowska. Sectio A1. Informatica
1 Journal of Statistical Theory and Practice
1 Asian-European Journal of Mathematics
1 Discrete Mathematics, Algorithms and Applications
1 São Paulo Journal of Mathematical Sciences
1 Science China. Information Sciences
1 Central European Journal of Computer Science
1 Frontiers of Computer Science in China
1 Frontiers of Computer Science
1 Axioms
1 Algebra
1 Vestnik Samarskogo Universiteta. Estestvennonauchnaya Seriya

Citations by Year

Wikidata Timeline

The data are displayed as stored in Wikidata under a Creative Commons CC0 License. Updates and corrections should be made in Wikidata.