Josef Pieprzyk

According to our database1, Josef Pieprzyk authored at least 233 papers between 1984 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Broadcast Authentication in Latency-Critical Applications: On the Efficiency of IEEE 1609.2.
IEEE Trans. Vehicular Technology, 2019

Signcryption schemes with insider security in an ideal permutation model.
J. Mathematical Cryptology, 2019

S-boxes representation and efficiency of algebraic attack.
IET Information Security, 2019

Forward and Backward Private DSSE for Range Queries.
IACR Cryptology ePrint Archive, 2019

Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy.
IACR Cryptology ePrint Archive, 2019

Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward/Backward Privacy.
CoRR, 2019

Cryptanalysis of WG-8 and WG-16 stream ciphers.
Cryptography and Communications, 2019

2018
A large-alphabet three-party quantum key distribution protocol based on orbital and spin angular momenta hybrid entanglement.
Quantum Information Processing, 2018

Tunable multi-party high-capacity quantum key distribution based on m-generalized Fibonacci sequences using golden coding.
Quantum Information Processing, 2018

Efficient quantum key distribution using Fibonacci-number coding with a biased basis choice.
Inf. Process. Lett., 2018

Preprocessing optimisation: revisiting recursive-BKZ lattice reduction algorithm.
IET Information Security, 2018

High-rate and high-capacity measurement-device-independent quantum key distribution with Fibonacci matrix coding in free space.
SCIENCE CHINA Information Sciences, 2018

Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward (and Backward) Security.
Proceedings of the Computer Security, 2018

2017
Analysing recursive preprocessing of BKZ lattice reduction algorithm.
IET Information Security, 2017

Algebraic Attack Efficiency versus S-box Representation.
IACR Cryptology ePrint Archive, 2017

An efficient quantum blind digital signature scheme.
SCIENCE CHINA Information Sciences, 2017

Investigating Cube Attacks on the Authenticated Encryption Stream Cipher MORUS.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

2016
High-capacity quantum key distribution using Chebyshev-map values corresponding to Lucas numbers coding.
Quantum Information Processing, 2016

Investigating Cube Attacks on the Authenticated Encryption Stream Cipher ACORN.
IACR Cryptology ePrint Archive, 2016

SAT-based Cryptanalysis of Authenticated Ciphers from the CAESAR Competition.
IACR Cryptology ePrint Archive, 2016

State recovery attacks against π-cipher.
Proceedings of the Australasian Computer Science Week Multiconference, 2016

2015
A New Biocryptosystem-Oriented Security Analysis Framework and Implementation of Multibiometric Cryptosystems Based on Decision Level Fusion.
IEEE Trans. Information Forensics and Security, 2015

On the Linearization of Human Identification Protocols: Attacks Based on Linear Algebra, Coding Theory, and Lattices.
IEEE Trans. Information Forensics and Security, 2015

A hybrid quantum key distribution protocol based on extended unitary operations and fountain codes.
Quantum Information Processing, 2015

Finding State Collisions in the Authenticated Encryption Stream Cipher ACORN.
IACR Cryptology ePrint Archive, 2015

Applications of Key Recovery Cube-attack-like.
IACR Cryptology ePrint Archive, 2015

Rotational Cryptanalysis of ARX Revisited.
IACR Cryptology ePrint Archive, 2015

Special issue on trust and security in wireless sensor networks.
Concurrency and Computation: Practice and Experience, 2015

2014
Quantum direct secret sharing with efficient eavesdropping-check and authentication based on distributed fountain codes.
Quantum Information Processing, 2014

Practical attack on NLM-MAC scheme.
Inf. Process. Lett., 2014

Lattice-based certificateless public-key encryption in the standard model.
Int. J. Inf. Sec., 2014

ICEPOLE: High-speed, Hardware-oriented Authenticated Encryption.
IACR Cryptology ePrint Archive, 2014

Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128.
IACR Cryptology ePrint Archive, 2014

Cube Attacks and Cube-attack-like Cryptanalysis on the Round-reduced Keccak Sponge Function.
IACR Cryptology ePrint Archive, 2014

Practical Complexity Cube Attacks on Round-Reduced Keccak Sponge Function.
IACR Cryptology ePrint Archive, 2014

Algebraic Attacks on Human Identification Protocols.
IACR Cryptology ePrint Archive, 2014

A Subexponential Construction of Graph Coloring for Multiparty Computation.
IACR Cryptology ePrint Archive, 2014

Lattice-based completely non-malleable public-key encryption in the standard model.
Des. Codes Cryptogr., 2014

The resistance of PRESENT-80 against related-key differential attacks.
Cryptography and Communications, 2014

A survey: Error control methods used in bio-cryptography.
Proceedings of the 11th International Conference on Fuzzy Systems and Knowledge Discovery, 2014

A Case Study of User-Level Spam Filtering.
Proceedings of the Twelfth Australasian Information Security Conference, 2014

2013
Cryptanalysis of the convex hull click human identification protocol.
Int. J. Inf. Sec., 2013

Cryptanalysis of RC4(n, m) Stream Cipher.
IACR Cryptology ePrint Archive, 2013

Security Analysis of Linearly Filtered NLFSRs.
IACR Cryptology ePrint Archive, 2013

Breaking NLM-MAC Generator.
IACR Cryptology ePrint Archive, 2013

Preimage attacks on the round-reduced Keccak with the aid of differential cryptanalysis.
IACR Cryptology ePrint Archive, 2013

Parallel authenticated encryption with the duplex construction.
IACR Cryptology ePrint Archive, 2013

Truncated Differential Analysis of Reduced-Round LBlock.
Proceedings of the Cryptology and Network Security - 12th International Conference, 2013

2012
Graph Coloring Applied to Secure Computation in Non-Abelian Groups.
J. Cryptology, 2012

New security notions and relations for public-key encryption.
J. Mathematical Cryptology, 2012

On the (In)Security of IDEA in Various Hashing Modes.
IACR Cryptology ePrint Archive, 2012

Security Evaluation of Rakaposhi Stream Cipher.
IACR Cryptology ePrint Archive, 2012

Rotational cryptanalysis of round-reduced Keccak.
IACR Cryptology ePrint Archive, 2012

Does Counting Still Count? Revisiting the Security of Counting based User Authentication Protocols against Statistical Attacks.
IACR Cryptology ePrint Archive, 2012

Multi-party computation with conversion of secret sharing.
Des. Codes Cryptogr., 2012

Cryptanalysis of WG-7: a lightweight stream cipher.
Cryptography and Communications, 2012

Active Security in Multiparty Computation over Black-Box Groups.
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012

NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model.
Proceedings of the Public Key Cryptography - PKC 2012, 2012

Cryptanalysis of RC4-Based Hash Function.
Proceedings of the Tenth Australasian Information Security Conference, 2012

2011
Bucket attack on numeric set watermarking model and safeguards.
Inf. Sec. Techn. Report, 2011

Socio-technological phishing prevention.
Inf. Sec. Techn. Report, 2011

Möbius transforms, coincident Boolean functions and non-coincidence property of Boolean functions.
Int. J. Comput. Math., 2011

Cryptanalysis of WG-7 (A Lightweight Stream Cipher for RFID Encryption).
IACR Cryptology ePrint Archive, 2011

On the Hardness of the Sum of k Mins Problem.
Comput. J., 2011

Lattice-Based Completely Non-malleable PKE in the Standard Model (Poster).
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

2010
Parallel Signcryption.
Proceedings of the Practical Signcryption, 2010

Decomposition Construction for Secret Sharing Schemes with Graph Access Structures in Polynomial Time.
SIAM J. Discrete Math., 2010

A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm.
IACR Cryptology ePrint Archive, 2010

Evolution of cryptographic hashing.
Proceedings of the 3rd International Conference on Security of Information and Networks, 2010

Identifying Steganographic Payload Location in Binary Image.
Proceedings of the Advances in Multimedia Information Processing - PCM 2010, 2010

Binary Image Steganographic Techniques Classification Based on Multi-class Steganalysis.
Proceedings of the Information Security, 2010

Known and Chosen Key Differential Distinguishers for Block Ciphers.
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010

Secure Coprocessor-based Private Information Retrieval without Periodical Preprocessing.
Proceedings of the 8th Australasian Information Security Conference 2010, 2010

Estimating Hidden Message Length in Binary Image Embedded by Using Boundary Pixels Steganography.
Proceedings of the ARES 2010, 2010

Blind Steganalysis: A Countermeasure for Binary Image Steganography.
Proceedings of the ARES 2010, 2010

2009
Reversible and Blind Database Watermarking Using Difference Expansion.
IJDCF, 2009

Unconditionally secure disjointness tests for private datasets.
IJACT, 2009

Extensions of the Cube Attack based on Low Degree Annihilators.
IACR Cryptology ePrint Archive, 2009

On the Security of PAS (Predicate-based Authentication Service).
IACR Cryptology ePrint Archive, 2009

Robust and Reversible Numerical Set Watermarking.
Proceedings of the SIGMAP 2009, 2009

Certified Pseudonyms Colligated with Master Secret Key.
Proceedings of the SECRYPT 2009, 2009

Multi-Party Computation with Omnipresent Adversary.
Proceedings of the Public Key Cryptography, 2009

Database Relation Watermarking Resilient against Secondary Watermarking Attacks.
Proceedings of the Information Systems Security, 5th International Conference, 2009

Efficient Fuzzy Matching and Intersection on Private Datasets.
Proceedings of the Information, Security and Cryptology, 2009

Privacy Enhancements for Hardware-Based Security Modules.
Proceedings of the e-Business and Telecommunications - 6th International Joint Conference, 2009

Robust Numeric Set Watermarking: Numbers Don't Lie.
Proceedings of the e-Business and Telecommunications - 6th International Joint Conference, 2009

Cryptanalysis of the LAKE Hash Family.
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009

2008
The eight variable homogeneous degree three bent functions.
J. Discrete Algorithms, 2008

A coding approach to the multicast stream authentication problem.
Int. J. Inf. Sec., 2008

Analysis of bilinear pairing-based accumulator for identity escrowing.
IET Information Security, 2008

Permutation polynomials of the form (xp-x+delta)s+L(x).
Finite Fields and Their Applications, 2008

Security Analysis of Australian and E.U. E-passport Implementation.
Journal of Research and Practice in Information Technology, 2008

An Efficient Scheme of Common Secure Indices for Conjunctive Keyword-Based Retrieval on Encrypted Data.
Proceedings of the Information Security Applications, 9th International Workshop, 2008

Threshold Privacy Preserving Keyword Searches.
Proceedings of the SOFSEM 2008: Theory and Practice of Computer Science, 2008

A Fair e-Tendering Protocol.
Proceedings of the SECRYPT 2008, 2008

Secure Computation of the Vector Dominance Problem.
Proceedings of the Information Security Practice and Experience, 2008

Distributed Private Matching and Set Operations.
Proceedings of the Information Security Practice and Experience, 2008

An On-Line Secure E-Passport Protocol.
Proceedings of the Information Security Practice and Experience, 2008

Source Code Watermarking Based on Function Dependency Oriented Sequencing.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Features-Pooling Blind JPEG Image Steganalysis.
Proceedings of the International Conference on Digital Image Computing: Techniques and Applications, 2008

Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008

Formal Security Analysis of Australian E-passport Implementation.
Proceedings of the Sixth Australasian Information Security Conference, 2008

Improvement of a Dynamic Accumulator at ICICS 07 and Its Application in Multi-user Keyword-Based Retrieval on Encrypted Data.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

Efficient Disjointness Tests for Private Datasets.
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008

2007
Lattice-Based Threshold Changeability for Standard Shamir Secret-Sharing Schemes.
IEEE Trans. Information Theory, 2007

Software Watermarking Resilient to Debugging Attacks.
Journal of Multimedia, 2007

An Algebraic Analysis of Trivium Ciphers based on the Boolean Satisfiability Problem.
IACR Cryptology ePrint Archive, 2007

Cryptanalysis of LASH.
IACR Cryptology ePrint Archive, 2007

An Improved Distinguisher for Dragon.
IACR Cryptology ePrint Archive, 2007

Multiple Modular Additions and Crossword Puzzle Attack on NLSv2.
IACR Cryptology ePrint Archive, 2007

New constructions of anonymous membership broadcasting schemes.
Adv. in Math. of Comm., 2007

Reversible and Semi-Blind Relational Database Watermarking.
Proceedings of the SIGMAP 2007, 2007

Common Secure Index for Conjunctive Keyword-Based Retrieval over Encrypted Data.
Proceedings of the Secure Data Management, 4th VLDB Workshop, SDM 2007, Vienna, Austria, 2007

An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels.
Proceedings of the Provable Security, 2007

A New Dynamic Accumulator for Batch Updates.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

Extending FORK-256 Attack to the Full Hash Function.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

Cryptanalysis of FORK-256.
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007

How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature.
Proceedings of the Topics in Cryptology, 2007

On Secure Multi-party Computation in Black-Box Groups.
Proceedings of the Advances in Cryptology, 2007

Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

An Efficient eAuction Protocol.
Proceedings of the The Second International Conference on Availability, 2007

2006
Ideal Secret Sharing Schemes from Permutations.
I. J. Network Security, 2006

On the Provable Security of an Efficient RSA-Based Pseudorandom Generator.
IACR Cryptology ePrint Archive, 2006

Weaknesses of the FORK-256 compression function.
IACR Cryptology ePrint Archive, 2006

Crossword Puzzle Attack on NLS.
IACR Cryptology ePrint Archive, 2006

Lattice-based threshold-changeability for standard CRT secret-sharing schemes.
Finite Fields and Their Applications, 2006

Generalised Cumulative Arrays in Secret Sharing.
Des. Codes Cryptogr., 2006

An Ideal and Robust Threshold RSA.
Proceedings of the Progressin Cryptology, 2006

Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption.
Proceedings of the Public Key Cryptography, 2006

A Low-Cost Attack on Branch-Based Software Watermarking Schemes.
Proceedings of the Digital Watermarking, 5th International Workshop, 2006

A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders.
Proceedings of the Information Security, 9th International Conference, 2006

On Algebraic Immunity and Annihilators.
Proceedings of the Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30, 2006

An attack-localizing watermarking scheme for natural language documents.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

Formal analysis of card-based payment systems in mobile devices.
Proceedings of the proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), 2006

Distinguishing Attack on SOBER-128 with Linear Masking.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006

2005
Analysis of simplified variants of SHA-256.
Proceedings of the WEWoRC 2005, 2005

Privacy Enhanced Electronic Cheque System.
Proceedings of the 7th IEEE International Conference on E-Commerce Technology (CEC 2005), 2005

Converse Results to the Wiener Attack on RSA.
Proceedings of the Public Key Cryptography, 2005

Characterisations of Extended Resiliency and Extended Immunity of S-Boxes.
Proceedings of the Information Security and Cryptology, 2005

2004
Shared generation of pseudo-random functions.
J. Complexity, 2004

Finding good differential patterns for attacks on SHA-1.
IACR Cryptology ePrint Archive, 2004

Characterisations of Ideal Threshold Schemes.
Discrete Mathematics & Theoretical Computer Science, 2004

On Cheating Immune Secret Sharing.
Discrete Mathematics & Theoretical Computer Science, 2004

Homogeneous bent functions of degree n in 2n variables do not exist for nge3.
Discrete Applied Mathematics, 2004

Algebraic Attacks on SOBER-t32 and SOBER-t16 without Stuttering.
Proceedings of the Fast Software Encryption, 11th International Workshop, 2004

A Modification to the 'Authentication of Concast Communication'.
Proceedings of the Cryptographic Algorithms and their Uses, 2004

Securing Multicast Groups in Ad Hoc Networks.
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004

2003
Efficient Extension of Standard Schnorr/RSA signatures into Universal Designated-Verifier Signatures.
IACR Cryptology ePrint Archive, 2003

Universal Designated-Verifier Signatures.
IACR Cryptology ePrint Archive, 2003

On alternative approach for verifiable secret sharing.
IACR Cryptology ePrint Archive, 2003

Multiple-Time Signature Schemes against Adaptive Chosen Message Attacks.
Proceedings of the Selected Areas in Cryptography, 10th Annual International Workshop, 2003

Shared Generation of Pseudo-Random Functions with Cumulative Maps.
Proceedings of the Topics in Cryptology, 2003

Efficient One-Time Proxy Signatures.
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003

Josef Pieprzyk, David Pointcheval.
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003

Fundamentals of computer security.
Springer, ISBN: 978-3-540-43101-5, 2003

2002
Multisecret Sharing Immune Against Cheating.
Informatica (Slovenia), 2002

Cryptanalysis of Block Ciphers with Overdefined Systems of Equations.
IACR Cryptology ePrint Archive, 2002

On-the-fly web content integrity check boosts users's confidence.
Commun. ACM, 2002

Authentication of Concast Communication.
Proceedings of the Progress in Cryptology, 2002

Ideal Threshold Schemes from MDS Codes.
Proceedings of the Information Security and Cryptology, 2002

Threshold MACs.
Proceedings of the Information Security and Cryptology, 2002

Ideal Threshold Schemes from Orthogonal Arrays.
Proceedings of the Information and Communications Security, 4th International Conference, 2002

A Combinatorial Approach to Anonymous Membership Broadcast.
Proceedings of the Computing and Combinatorics, 8th Annual International Conference, 2002

Authentication of transit flows and k-siblings one-time signature.
Proceedings of the Advanced Communications and Multimedia Security, 2002

Cheating Prevention in Linear Secret Sharing.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002

2001
Broadcast anti-jamming systems.
Computer Networks, 2001

Cheating Prevention in Secret Sharing over GF(pt).
Proceedings of the Progress in Cryptology, 2001

Authenticating Multicast Streams in Lossy Channels Using Threshold Techniques.
Proceedings of the Networking, 2001

Constructions of Cheating Immune Secret Sharing.
Proceedings of the Information Security and Cryptology, 2001

Copyright Protection of Object-Oriented Software.
Proceedings of the Information Security and Cryptology, 2001

A Dynamic Web Agent for Verifying the Security and Integrity of a Web Site's Contents.
Proceedings of the Sixth International Conference on Computer Supported Cooperative Work in Design, 2001

Democratic Systems.
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001

2000
Homogeneous bent functions.
Discrete Applied Mathematics, 2000

Construction of cubic homogeneous boolean bent functions.
Australasian J. Combinatorics, 2000

Identification of Bad Signatures in Batches.
Proceedings of the Public Key Cryptography, 2000

Codes Identifying Bad Signature in Batches.
Proceedings of the Progress in Cryptology, 2000

Cheating Prevention in Secret Sharing.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

1999
Rotation-Symmetric Functions and Fast Hashing.
J. UCS, 1999

Changing Thresholds in the Absence of Secure Channels.
Australian Computer Journal, 1999

Fingerprints for Copyright Software Protection.
Proceedings of the Information Security, Second International Workshop, 1999

RSA-Based Fail-Stop Signature Schemes.
Proceedings of the 1999 International Conference on Parallel Processing Workshops, 1999

Broadcast anti-jamming systems.
Proceedings of the IEEE International Conference on Networks 1999, 1999

Verfiable Secret Sharing and Time Capsules.
Proceedings of the Information Security and Cryptology, 1999

Linear Secret Sharing with Divisible Shares.
Proceedings of the Information and Communication Security, Second International Conference, 1999

Fail-Stop Threshold Signature Schemes Based on Elliptic Curves.
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999

On the Symmetric Property of Homogeneous Boolean Functions.
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999

Conference Key Agreement from Secret Sharing.
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999

Repudiation of Cheating and Non-repudiation of Zhang's Proxy Signature Schemes.
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999

1998
On Construction of Cumulative Secret Sharing Schemes.
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998

Secret Sharing in Multilevel and Compartmented Groups.
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998

1997
Using Cryptographic Hash Functions for Discretionary Access Control in Object-Oriented Databases.
J. UCS, 1997

On the Weakness of Gong's Collisionful Hash Functions.
J. UCS, 1997

A Multi-Level View Model for Secure Object-Oriented Databases.
Data Knowl. Eng., 1997

Remarks on the multiple assignment secret sharing scheme.
Proceedings of the Information and Communication Security, First International Conference, 1997

Secret sharing in hierarchical groups.
Proceedings of the Information and Communication Security, First International Conference, 1997

A Message Authentication Code Based on Latin Squares.
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997

1996
Computer Intrusion Detection and Incomplete Information.
Proceedings of the Industrial and Engineering Applications of Artificial Intelligence and Expert Systems, 1996

Case-Based Reasoning for Intrusion Detection.
Proceedings of the 12th Annual Computer Security Applications Conference (ACSAC 1996), 1996

Cryptography based on transcendental numbers.
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996

Cryptosystems for hierarchical groups.
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996

Evidential reasoning in network intrusion detection systems.
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996

Modeling a multi-level secure object-oriented database using views.
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996

On password-based authenticated key exchange using collisionful hash functions.
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996

On selectable collisionful hash functions.
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996

1995
A Cryptographic Mechanism for Object-Instance-Based Authorization in Object-Oriented Database Systems.
Proceedings of the OOER'95: Object-Oriented and Entity-Relationship Modelling, 1995

A Model of Authorization for Object-Oriented Databases based on Object Views.
Proceedings of the Deductive and Object-Oriented Databases, 1995

Keyed Hash Functions.
Proceedings of the Cryptography: Policy and Algorithms, 1995

A Cryptographic Solution to Discretionary Access Control in Structurally Object-Oriented Databases.
Proceedings of the Sixth Australasian Database Conference, 1995

1994
Comments on Soviet Encryption Algorithm.
Proceedings of the Advances in Cryptology, 1994

Conditionally Secure Secret Sharing Schemes with Disenrollment Capability.
Proceedings of the CCS '94, 1994

Attacking the SL2 Hashing Scheme.
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994

1993
Design of Hashing Algorithms
Lecture Notes in Computer Science 756, Springer, ISBN: 3-540-57500-6, 1993

1992
A Construction for Super Pseudorandom Permutations from A Single Pseudorandom Function.
Proceedings of the Advances in Cryptology, 1992

HAVAL - A One-Way Hashing Algorithm with Variable Length of Output.
Proceedings of the Advances in Cryptology, 1992

Linear Nonequivalence versus Nonlinearity.
Proceedings of the Advances in Cryptology, 1992

1991
A Construction for One Way Hash Functions and Pseudorandom Bit Generators.
Proceedings of the Advances in Cryptology, 1991

Randomized Authentication Systems.
Proceedings of the Advances in Cryptology, 1991

Probabilistic Analysis of Elementary Randimizers.
Proceedings of the Advances in Cryptology, 1991

Sibling Intractable Function Families and Their Applications (Extended Abstract).
Proceedings of the Advances in Cryptology, 1991

How to Construct A Family of Strong One Way Permutations.
Proceedings of the Advances in Cryptology, 1991

On Necessary and Sufficient Conditions for the Construction of Super Pseudorandom Permutations.
Proceedings of the Advances in Cryptology, 1991

Optima Perfect Randomizers.
Proceedings of the Advances in Cryptology, 1991

A General Purpose Technique for Locating Key Scheduling Weakness in DES-like Cryptosystems (Extended Abstract).
Proceedings of the Advances in Cryptology, 1991

Improving Resistance to Differential Cryptanalysis and the Redesign of LOKI.
Proceedings of the Advances in Cryptology, 1991

Cryptography - an introduction to computer security.
Advances in computer science series, Prentice Hall, ISBN: 978-0-13-194986-7, 1991

1990
How to Construct Pseudorandom Permutations from Single Pseudorandom Functions.
Proceedings of the Advances in Cryptology, 1990

Permutation Generators of Alternating Groups.
Proceedings of the Advances in Cryptology, 1990

LOKI - A Cryptographic Primitive for Authentication and Secrecy Applications.
Proceedings of the Advances in Cryptology, 1990

1989
Non-linearity of Exponent Permutations.
Proceedings of the Advances in Cryptology, 1989

1985
Design of public key cryptosystems using idempotent elements.
Computers & Security, 1985

Modular design of information encipherment for computer systems.
Computers & Security, 1985

On Public-Key Cryptosystems Built using Polynomial Rings.
Proceedings of the Advances in Cryptology, 1985

1984
Algebraical Structures of Cryptographic Transformations.
Proceedings of the Advances in Cryptology: Proceedings of EUROCRYPT 84, 1984


  Loading...