dblp.uni-trier.dewww.uni-trier.de

Josef Pieprzyk Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo
Home Page

*2009
148 Atilla Elçi, Oleg B. Makarevich, Mehmet A. Orgun, Alexander Chefranov, Josef Pieprzyk, Yuri Anatolievich Bryukhomitsky, Siddika Berna Örs: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009 ACM 2009
147EEAlex Biryukov, Praveen Gauravaram, Jian Guo, Dmitry Khovratovich, San Ling, Krystian Matusiewicz, Ivica Nikolic, Josef Pieprzyk, Huaxiong Wang: Cryptanalysis of the LAKE Hash Family. FSE 2009: 156-179
146EEHossein Ghodosi, Josef Pieprzyk: Multi-Party Computation with Omnipresent Adversary. Public Key Cryptography 2009: 180-195
145 Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang: Certified Pseudonyms Colligated with Master Secret Key. SECRYPT 2009: 190-197
144 Gaurav Gupta, Josef Pieprzyk, Mohan S. Kankanhalli: Robust and Reversible Numerical Set Watermarking. SIGMAP 2009: 141-148
143EEQingsong Ye, Huaxiong Wang, Josef Pieprzyk, Xian-Mo Zhang: Unconditionally secure disjointness tests for private datasets. IJACT 1(3): 225-235 (2009)
142EEGaurav Gupta, Josef Pieprzyk: Reversible and Blind Database Watermarking Using Difference Expansion. IJDCF 1(2): 42-54 (2009)
2008
141 Josef Pieprzyk: Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings Springer 2008
140EEQingsong Ye, Huaxiong Wang, Josef Pieprzyk, Xian-Mo Zhang: Efficient Disjointness Tests for Private Datasets. ACISP 2008: 155-169
139EEPeishun Wang, Huaxiong Wang, Josef Pieprzyk: Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups. CANS 2008: 178-195
138EEChiew Kang Leng, Josef Pieprzyk: Features-Pooling Blind JPEG Image Steganalysis. DICTA 2008: 96-103
137EERon Steinfeld, Scott Contini, Krystian Matusiewicz, Josef Pieprzyk, Jian Guo, San Ling, Huaxiong Wang: Cryptanalysis of LASH. FSE 2008: 207-223
136EEVijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang: An On-Line Secure E-Passport Protocol. ISPEC 2008: 14-28
135EEJin Yuan, Qingsong Ye, Huaxiong Wang, Josef Pieprzyk: Secure Computation of the Vector Dominance Problem. ISPEC 2008: 319-333
134EEQingsong Ye, Huaxiong Wang, Josef Pieprzyk: Distributed Private Matching and Set Operations. ISPEC 2008: 347-360
133 Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang: A Fair e-Tendering Protocol. SECRYPT 2008: 294-299
132EEPeishun Wang, Huaxiong Wang, Josef Pieprzyk: Threshold Privacy Preserving Keyword Searches. SOFSEM 2008: 646-658
131EEPeishun Wang, Huaxiong Wang, Josef Pieprzyk: An Efficient Scheme of Common Secure Indices for Conjunctive Keyword-Based Retrieval on Encrypted Data. WISA 2008: 145-159
130EEChristophe Tartary, Huaxiong Wang, Josef Pieprzyk: A coding approach to the multicast stream authentication problem. Int. J. Inf. Sec. 7(4): 265-283 (2008)
129EEChris Charnes, Ulrich Dempwolff, Josef Pieprzyk: The eight variable homogeneous degree three bent functions. J. Discrete Algorithms 6(1): 66-72 (2008)
2007
128 Josef Pieprzyk, Hossein Ghodosi, Ed Dawson: Information Security and Privacy, 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings Springer 2007
127EEBrian Curtis, Josef Pieprzyk, Jan Seruga: An Efficient eAuction Protocol. ARES 2007: 417-421
126EEYvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Huaxiong Wang: On Secure Multi-party Computation in Black-Box Groups. CRYPTO 2007: 591-612
125EERon Steinfeld, Josef Pieprzyk, Huaxiong Wang: How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature. CT-RSA 2007: 357-371
124EEKrystian Matusiewicz, Thomas Peyrin, Olivier Billet, Scott Contini, Josef Pieprzyk: Cryptanalysis of FORK-256. FSE 2007: 19-38
123EEScott Contini, Krystian Matusiewicz, Josef Pieprzyk: Extending FORK-256 Attack to the Full Hash Function. ICICS 2007: 296-305
122EEPeishun Wang, Huaxiong Wang, Josef Pieprzyk: A New Dynamic Accumulator for Batch Updates. ICICS 2007: 98-112
121EEJoo Yeon Cho, Josef Pieprzyk: Multiple Modular Additions and Crossword Puzzle Attack on NLSv2. ISC 2007: 230-248
120EEChristophe Tartary, Josef Pieprzyk, Huaxiong Wang: Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures. Inscrypt 2007: 167-181
119EEChristophe Tartary, Huaxiong Wang, Josef Pieprzyk: An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels. ProvSec 2007: 17-34
118 Gaurav Gupta, Josef Pieprzyk: Reversible and Semi-Blind Relational Database Watermarking. SIGMAP 2007: 283-290
117EEPeishun Wang, Huaxiong Wang, Josef Pieprzyk: Common Secure Index for Conjunctive Keyword-Based Retrieval over Encrypted Data. Secure Data Management 2007: 108-123
116EERon Steinfeld, Josef Pieprzyk, Huaxiong Wang: Lattice-Based Threshold Changeability for Standard Shamir Secret-Sharing Schemes. IEEE Transactions on Information Theory 53(7): 2542-2559 (2007)
115EEGaurav Gupta, Josef Pieprzyk: Software Watermarking Resilient to Debugging Attacks. Journal of Multimedia 2(2): 10-16 (2007)
2006
114EEJoo Yeon Cho, Josef Pieprzyk: Distinguishing Attack on SOBER-128 with Linear Masking. ACISP 2006: 29-39
113EEVijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang, Joo Yeon Cho: Formal analysis of card-based payment systems in mobile devices. ACSW Frontiers 2006: 213-220
112EEGaurav Gupta, Josef Pieprzyk, Huaxiong Wang: An attack-localizing watermarking scheme for natural language documents. ASIACCS 2006: 157-165
111EERon Steinfeld, Josef Pieprzyk, Huaxiong Wang: On the Provable Security of an Efficient RSA-Based Pseudorandom Generator. ASIACRYPT 2006: 194-209
110EEXian-Mo Zhang, Josef Pieprzyk, Yuliang Zheng: On Algebraic Immunity and Annihilators. ICISC 2006: 65-80
109EEYvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Huaxiong Wang: A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders. ISC 2006: 459-475
108EEGaurav Gupta, Josef Pieprzyk: A Low-Cost Attack on Branch-Based Software Watermarking Schemes. IWDW 2006: 282-293
107EERon Steinfeld, Josef Pieprzyk, Huaxiong Wang: Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption. Public Key Cryptography 2006: 157-173
106EEJoo Yeon Cho, Josef Pieprzyk: Crossword Puzzle Attack on NLS. Selected Areas in Cryptography 2006: 249-265
105EEHossein Ghodosi, Josef Pieprzyk: An Ideal and Robust Threshold RSA. VIETCRYPT 2006: 312-321
104EEShoulun Long, Josef Pieprzyk, Huaxiong Wang, Duncan S. Wong: Generalised Cumulative Arrays in Secret Sharing. Des. Codes Cryptography 40(2): 191-209 (2006)
2005
103EEVijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang: Privacy Enhanced Electronic Cheque System. CEC 2005: 431-434
102EEJosef Pieprzyk, Xian-Mo Zhang, Jovan Dj. Golic: Characterisations of Extended Resiliency and Extended Immunity of S-Boxes. ICISC 2005: 210-228
101EERon Steinfeld, Scott Contini, Huaxiong Wang, Josef Pieprzyk: Converse Results to the Wiener Attack on RSA. Public Key Cryptography 2005: 184-198
100EEKrystian Matusiewicz, Josef Pieprzyk: Finding Good Differential Patterns for Attacks on SHA-1. WCC 2005: 164-177
99 Krystian Matusiewicz, Josef Pieprzyk, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen: Analysis of simplified variants of SHA-256. WEWoRC 2005: 123-134
2004
98 Huaxiong Wang, Josef Pieprzyk, Vijay Varadharajan: Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings Springer 2004
97EERon Steinfeld, Huaxiong Wang, Josef Pieprzyk: Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes. ASIACRYPT 2004: 170-186
96EEHartono Kurnio, Huaxiong Wang, Josef Pieprzyk, Kris Gaj: Securing Multicast Groups in Ad Hoc Networks. AWCC 2004: 194-207
95 Hossein Ghodosi, Josef Pieprzyk: A Modification to the 'Authentication of Concast Communication'. Cryptographic Algorithms and their Uses 2004: 72-77
94EEJoo Yeon Cho, Josef Pieprzyk: Algebraic Attacks on SOBER-t32 and SOBER-t16 without Stuttering. FSE 2004: 49-64
93EERon Steinfeld, Huaxiong Wang, Josef Pieprzyk: Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures. Public Key Cryptography 2004: 86-100
92EETianbing Xia, Jennifer Seberry, Josef Pieprzyk, Chris Charnes: Homogeneous bent functions of degree n in 2n variables do not exist for nge3. Discrete Applied Mathematics 142(1-3): 127-132 (2004)
91EEJosef Pieprzyk, Xian-Mo Zhang: On Cheating Immune Secret Sharing. Discrete Mathematics & Theoretical Computer Science 6(2): 253-264 (2004)
90EEJosef Pieprzyk, Xian-Mo Zhang: Characterisations of Ideal Threshold Schemes. Discrete Mathematics & Theoretical Computer Science 6(2): 471-482 (2004)
89EEHuaxiong Wang, Josef Pieprzyk: Shared generation of pseudo-random functions. J. Complexity 20(2-3): 458-472 (2004)
2003
88EEJosef Pieprzyk, David Pointcheval: Josef Pieprzyk, David Pointcheval. ACISP 2003: 387-401
87EEHuaxiong Wang, Josef Pieprzyk: Efficient One-Time Proxy Signatures. ASIACRYPT 2003: 507-522
86EERon Steinfeld, Laurence Bull, Huaxiong Wang, Josef Pieprzyk: Universal Designated-Verifier Signatures. ASIACRYPT 2003: 523-542
85EEHuaxiong Wang, Josef Pieprzyk: Shared Generation of Pseudo-Random Functions with Cumulative Maps. CT-RSA 2003: 281-294
84EEJosef Pieprzyk, Huaxiong Wang, Chaoping Xing: Multiple-Time Signature Schemes against Adaptive Chosen Message Attacks. Selected Areas in Cryptography 2003: 88-100
2002
83EEJosef Pieprzyk, Xian-Mo Zhang: Cheating Prevention in Linear Secret Sharing. ACISP 2002: 121-135
82EENicolas Courtois, Josef Pieprzyk: Cryptanalysis of Block Ciphers with Overdefined Systems of Equations. ASIACRYPT 2002: 267-287
81EEHuaxiong Wang, Josef Pieprzyk: A Combinatorial Approach to Anonymous Membership Broadcast. COCOON 2002: 162-170
80 Mohamed Al-Ibrahim, Josef Pieprzyk: Authentication of transit flows and k-siblings one-time signature. Communications and Multimedia Security 2002: 41-55
79EEJosef Pieprzyk, Xian-Mo Zhang: Ideal Threshold Schemes from Orthogonal Arrays. ICICS 2002: 469-479
78EEKeith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild: Threshold MACs. ICISC 2002: 237-252
77EEJosef Pieprzyk, Xian-Mo Zhang: Ideal Threshold Schemes from MDS Codes. ICISC 2002: 253-263
76EEMohamed Al-Ibrahim, Hossein Ghodosi, Josef Pieprzyk: Authentication of Concast Communication. INDOCRYPT 2002: 185-198
75EEKamil Kulesza, Zbigniew Kotulski, Josef Pieprzyk: On alternative approach for verifiable secret sharing CoRR math.CO/0211267: (2002)
74EESoroush Sedaghat, Josef Pieprzyk, Ehsan Vossough: On-the-fly web content integrity check boosts users's confidence. Commun. ACM 45(11): 33-37 (2002)
73 Josef Pieprzyk, Xian-Mo Zhang: Multisecret Sharing Immune Against Cheating. Informatica (Slovenia) 26(3): (2002)
2001
72EEHossein Ghodosi, Josef Pieprzyk: Democratic Systems. ACISP 2001: 392-402
71EESoroush Sedaghat, Josef Pieprzyk, Ehsan Vossough: A Dynamic Web Agent for Verifying the Security and Integrity of a Web Site's Contents. CSCWD 2001: 330-337
70EEXian-Mo Zhang, Josef Pieprzyk: Cheating Immune Secret Sharing. ICICS 2001: 144-149
69EEJaroslaw Pastuszak, Darek Michalek, Josef Pieprzyk: Copyright Protection of Object-Oriented Software. ICISC 2001: 186-199
68EEJosef Pieprzyk, Xian-Mo Zhang: Constructions of Cheating Immune Secret Sharing. ICISC 2001: 226-243
67EEMohamed Al-Ibrahim, Josef Pieprzyk: Authenticating Multicast Streams in Lossy Channels Using Threshold Techniques. ICN (2) 2001: 239-249
66EEJosef Pieprzyk, Xian-Mo Zhang: Cheating Prevention in Secret Sharing over GF(pt). INDOCRYPT 2001: 79-90
65EEYvo Desmedt, Reihaneh Safavi-Naini, Huaxiong Wang, Lynn Margaret Batten, Chris Charnes, Josef Pieprzyk: Broadcast anti-jamming systems. Computer Networks 35(2-3): 223-236 (2001)
2000
64 Josef Pieprzyk, Eiji Okamoto, Jennifer Seberry: Information Security, Third International Workshop, ISW 2000, Wollongong, NSW, Australia, December 20-21, 2000, Proceedings Springer 2000
63 Hossein Ghodosi, Josef Pieprzyk: Cheating Prevention in Secret Sharing. ACISP 2000: 328-341
62EEJaroslaw Pastuszak, Josef Pieprzyk, Jennifer Seberry: Codes Identifying Bad Signature in Batches. INDOCRYPT 2000: 143-154
61 Jaroslaw Pastuszak, Dariusz Michatek, Josef Pieprzyk, Jennifer Seberry: Identification of Bad Signatures in Batches. Public Key Cryptography 2000: 28-45
60 Chengxin Qu, Jennifer Seberry, Josef Pieprzyk: Homogeneous bent functions. Discrete Applied Mathematics 102(1-2): 133-139 (2000)
1999
59 Josef Pieprzyk, Reihaneh Safavi-Naini, Jennifer Seberry: Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings Springer 1999
58EEWilly Susilo, Reihaneh Safavi-Naini, Josef Pieprzyk: Fail-Stop Threshold Signature Schemes Based on Elliptic Curves. ACISP 1999: 103-116
57EEHossein Ghodosi, Josef Pieprzyk: Repudiation of Cheating and Non-repudiation of Zhang's Proxy Signature Schemes. ACISP 1999: 129-134
56EEKeith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang: Changing Thresholds in the Absence of Secure Channels. ACISP 1999: 177-191
55EEChengxin Qu, Jennifer Seberry, Josef Pieprzyk: On the Symmetric Property of Homogeneous Boolean Functions. ACISP 1999: 26-35
54EEChih-Hung Li, Josef Pieprzyk: Conference Key Agreement from Secret Sharing. ACISP 1999: 64-76
53 Josef Pieprzyk: Linear Secret Sharing with Divisible Shares. ICICS 1999: 71-86
52 Josef Pieprzyk, Eiji Okamoto: Verfiable Secret Sharing and Time Capsules. ICISC 1999: 169-183
51EEWilly Susilo, Reihaneh Safavi-Naini, Josef Pieprzyk: RSA-Based Fail-Stop Signature Schemes. ICPP Workshops 1999: 161-166
50EEJosef Pieprzyk: Fingerprints for Copyright Software Protection. ISW 1999: 178-190
49 Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang: Changing Thresholds in the Absence of Secure Channels. Australian Computer Journal 31(2): 34-43 (1999)
48EEJosef Pieprzyk, Cheng Xin Qu: Rotation-Symmetric Functions and Fast Hashing. J. UCS 5(1): 20-31 (1999)
1998
47EEJosef Pieprzyk, Cheng Xin Qu: Rotation-Symmetric Functions and Fast Hashing. ACISP 1998: 169-180
46EEHossein Ghodosi, Josef Pieprzyk, Reihaneh Safavi-Naini: Secret Sharing in Multilevel and Compartmented Groups. ACISP 1998: 367-378
45EEHossein Ghodosi, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang: On Construction of Cumulative Secret Sharing Schemes. ACISP 1998: 379-390
1997
44 Vijay Varadharajan, Josef Pieprzyk, Yi Mu: Information Security and Privacy, Second Australasian Conference, ACISP'97, Syndey, NSW, Australia, July 7-9, 1997, Proceedings Springer 1997
43 Shahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk: A Message Authentication Code Based on Latin Squares. ACISP 1997: 194-203
42 Hossein Ghodosi, Josef Pieprzyk, Reihaneh Safavi-Naini: Remarks on the multiple assignment secret sharing scheme. ICICS 1997: 72-80
41 Chris Charnes, Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini: Secret sharing in hierarchical groups. ICICS 1997: 81-86
40EEAhmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini: A Multi-Level View Model for Secure Object-Oriented Databases. Data Knowl. Eng. 23(2): 97-117 (1997)
39EEShahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk: On the Weakness of Gong's Collisionful Hash Functions. J. UCS 3(3): 185-196 (1997)
38EEAhmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini, Janusz R. Getta: Using Cryptographic Hash Functions for Discretionary Access Control in Object-Oriented Databases. J. UCS 3(6): 730-753 (1997)
1996
37 Josef Pieprzyk, Jennifer Seberry: Information Security and Privacy, First Australasian Conference, ACISP'96, Wollongong, NSW, Australia, June 24-26, 1996, Proceedings Springer 1996
36 Ahmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini: Modeling a multi-level secure object-oriented database using views. ACISP 1996: 190-206
35 Mansour Esmaili, Reihaneh Safavi-Naini, Josef Pieprzyk: Evidential reasoning in network intrusion detection systems. ACISP 1996: 253-265
34 Hossein Ghodosi, Josef Pieprzyk, Chris Charnes, Reihaneh Safavi-Naini: Cryptosystems for hierarchical groups. ACISP 1996: 275-286
33 Shahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk: On selectable collisionful hash functions. ACISP 1996: 287-298
32 Shahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk: On password-based authenticated key exchange using collisionful hash functions. ACISP 1996: 299-310
31 Josef Pieprzyk, Hossein Ghodosi, Chris Charnes, Reihaneh Safavi-Naini: Cryptography based on transcendental numbers. ACISP 1996: 96-107
30EEMansour Esmaili, Bala Balachandran, Reihaneh Safavi-Naini, Josef Pieprzyk: Case-Based Reasoning for Intrusion Detection. ACSAC 1996: 214-223
29 Mansour Esmaili, Reihaneh Safavi-Naini, Josef Pieprzyk: Computer Intrusion Detection and Incomplete Information. IEA/AIE 1996: 778
1995
28 Josef Pieprzyk, Reihaneh Safavi-Naini: Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28 - December 1, 1994, Proceedings Springer 1995
27 Ahmad Baraani-Dastjerdi, Janusz R. Getta, Josef Pieprzyk, Reihaneh Safavi-Naini: A Cryptographic Solution to Discretionary Access Control in Structurally Object-Oriented Databases. Australasian Database Conference 1995: 0-
26 Shahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk: Keyed Hash Functions. Cryptography: Policy and Algorithms 1995: 201-214
25EEAhmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini, Janusz R. Getta: A Model of Authorization for Object-Oriented Databases based on Object Views. DOOD 1995: 503-520
24EEAhmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini, Janusz R. Getta: A Cryptographic Mechanism for Object-Instance-Based Authorization in Object-Oriented Database Systems. OOER 1995: 44-54
1994
23EEChris Charnes, Josef Pieprzyk, Reihaneh Safavi-Naini: Conditionally Secure Secret Sharing Schemes with Disenrollment Capability. ACM Conference on Computer and Communications Security 1994: 89-95
22EEChris Charnes, Josef Pieprzyk: Attacking the SL2 Hashing Scheme. ASIACRYPT 1994: 322-330
21EEChris Charnes, Luke O'Connor, Josef Pieprzyk, Reihaneh Safavi-Naini, Yuliang Zheng: Comments on Soviet Encryption Algorithm. EUROCRYPT 1994: 433-438
1993
20 Josef Pieprzyk, Babak Sadeghiyan: Design of Hashing Algorithms Springer 1993
1992
19 Chris Charnes, Josef Pieprzyk: Linear Nonequivalence versus Nonlinearity. AUSCRYPT 1992: 156-164
18 Yuliang Zheng, Josef Pieprzyk, Jennifer Seberry: HAVAL - A One-Way Hashing Algorithm with Variable Length of Output. AUSCRYPT 1992: 83-104
17EEBabak Sadeghiyan, Josef Pieprzyk: A Construction for Super Pseudorandom Permutations from A Single Pseudorandom Function. EUROCRYPT 1992: 267-284
1991
16EEYuliang Zheng, Thomas Hardjono, Josef Pieprzyk: Sibling Intractable Function Families and Their Applications (Extended Abstract). ASIACRYPT 1991: 124-138
15EEBabak Sadeghiyan, Josef Pieprzyk: On Necessary and Sufficient Conditions for the Construction of Super Pseudorandom Permutations. ASIACRYPT 1991: 194-209
14EEJosef Pieprzyk, Babak Sadeghiyan: Optima Perfect Randomizers. ASIACRYPT 1991: 225-236
13EEMatthew Kwan, Josef Pieprzyk: A General Purpose Technique for Locating Key Scheduling Weakness in DES-like Cryptosystems (Extended Abstract). ASIACRYPT 1991: 237-246
12EELawrence Brown, Matthew Kwan, Josef Pieprzyk, Jennifer Seberry: Improving Resistance to Differential Cryptanalysis and the Redesign of LOKI. ASIACRYPT 1991: 36-50
11EEBabak Sadeghiyan, Yuliang Zheng, Josef Pieprzyk: How to Construct A Family of Strong One Way Permutations. ASIACRYPT 1991: 97-110
10EEBabak Sadeghiyan, Josef Pieprzyk: A Construction for One Way Hash Functions and Pseudorandom Bit Generators. EUROCRYPT 1991: 431-445
9EEJosef Pieprzyk, Reihaneh Safavi-Naini: Randomized Authentication Systems. EUROCRYPT 1991: 472-481
8EEJosef Pieprzyk: Probabilistic Analysis of Elementary Randimizers. EUROCRYPT 1991: 542-546
1990
7 Jennifer Seberry, Josef Pieprzyk: Advances in Cryptology - AUSCRYPT '90, International Conference on Cryptology, Sydney, Australia, January 8-11, 1990, Proceedings Springer 1990
6EELawrence Brown, Josef Pieprzyk, Jennifer Seberry: LOKI - A Cryptographic Primitive for Authentication and Secrecy Applications. AUSCRYPT 1990: 229-236
5EEJosef Pieprzyk, Xian-Mo Zhang: Permutation Generators of Alternating Groups. AUSCRYPT 1990: 237-244
4EEJosef Pieprzyk: How to Construct Pseudorandom Permutations from Single Pseudorandom Functions. EUROCRYPT 1990: 140-150
1989
3EEJosef Pieprzyk: Non-linearity of Exponent Permutations. EUROCRYPT 1989: 80-92
1985
2EEJosef Pieprzyk: On Public-Key Cryptosystems Built using Polynomial Rings. EUROCRYPT 1985: 73-78
1984
1EEJosef Pieprzyk: Algebraical Structures of Cryptographic Transformations. EUROCRYPT 1984: 16-24

Coauthor Index

1Mohamed Al-Ibrahim [67] [76] [80]
2Shahram Bakhtiari [26] [32] [33] [39] [43]
3Bala Balachandran [30]
4Ahmad Baraani-Dastjerdi [24] [25] [27] [36] [38] [40]
5Lynn Margaret Batten [65]
6Olivier Billet [124]
7Alex Biryukov [147]
8Lawrence Brown [6] [12]
9Yuri Anatolievich Bryukhomitsky [148]
10Laurence Bull [86]
11Chris Charnes [19] [21] [22] [23] [31] [34] [41] [65] [92] [129]
12Alexander Chefranov [148]
13Joo Yeon Cho [94] [106] [113] [114] [121]
14Scott Contini [101] [123] [124] [137]
15Nicolas Courtois [82]
16Brian Curtis [127]
17Ed Dawson [128]
18Ulrich Dempwolff [129]
19Yvo Desmedt [65] [109] [126]
20Atilla Elçi [148]
21Mansour Esmaili [29] [30] [35]
22Kris Gaj [96]
23Praveen Gauravaram [147]
24Janusz R. Getta [24] [25] [27] [38]
25Hossein Ghodosi [31] [34] [42] [45] [46] [57] [63] [72] [76] [95] [105] [128] [146]
26Jovan Dj. Golic [102]
27Jian Guo [137] [147]
28Gaurav Gupta [108] [112] [115] [118] [142] [144]
29Thomas Hardjono [16]
30Mohan S. Kankanhalli [144]
31Dmitry Khovratovich [147]
32Zbigniew Kotulski [75]
33Kamil Kulesza [75]
34Hartono Kurnio [96]
35Matthew Kwan [12] [13]
36Chiew Kang Leng [138]
37Chih-Hung Li [54]
38San Ling [137] [147]
39Shoulun Long [104]
40Oleg B. Makarevich [148]
41Keith M. Martin [41] [49] [56] [78]
42Krystian Matusiewicz [99] [100] [123] [124] [137] [147]
43Darek Michalek [69]
44Dariusz Michatek [61]
45Yi Mu [44]
46Ivica Nikolic [147]
47Luke O'Connor [21]
48Eiji Okamoto [52] [64]
49Mehmet A. Orgun [148]
50Siddika Berna Örs [148]
51Jaroslaw Pastuszak [61] [62] [69]
52Vijayakrishnan Pasupathinathan [103] [113] [133] [136] [145]
53Thomas Peyrin [124]
54David Pointcheval [88]
55Norbert Pramstaller [99]
56Chengxin Qu (Cheng Xin Qu) [47] [48] [55] [60]
57Christian Rechberger [99]
58Vincent Rijmen [99]
59Babak Sadeghiyan [10] [11] [14] [15] [17] [20]
60Reihaneh Safavi-Naini [9] [21] [23] [24] [25] [26] [27] [28] [29] [30] [31] [32] [33] [34] [35] [36] [38] [39] [40] [41] [42] [43] [45] [46] [49] [51] [56] [58] [59] [65] [78]
61Jennifer Seberry (Jennifer Seberry Wallis) [6] [7] [12] [18] [37] [55] [59] [60] [61] [62] [64] [92]
62Soroush Sedaghat [71] [74]
63Jan Seruga [127]
64Ron Steinfeld [86] [93] [97] [101] [107] [109] [111] [116] [125] [126] [137]
65Willy Susilo [51] [58]
66Christophe Tartary [119] [120] [130]
67Vijay Varadharajan [44] [98]
68Ehsan Vossough [71] [74]
69Huaxiong Wang [45] [49] [56] [65] [78] [81] [84] [85] [86] [87] [89] [93] [96] [97] [98] [101] [103] [104] [107] [109] [111] [112] [113] [116] [117] [119] [120] [122] [125] [126] [130] [131] [132] [133] [134] [135] [136] [137] [139] [140] [143] [145] [147]
70Peishun Wang [117] [122] [131] [132] [139]
71Peter R. Wild [78]
72Duncan S. Wong [104]
73Tianbing Xia [92]
74Chaoping Xing [84]
75Qingsong Ye [134] [135] [140] [143]
76Jin Yuan [135]
77Xian-Mo Zhang [5] [66] [68] [70] [73] [77] [79] [83] [90] [91] [102] [110] [140] [143]
78Yuliang Zheng [11] [16] [18] [21] [110]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)