• 2601 Citations
  • 22 h-Index
1979 …2020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Outputs

2020

High-capacity (2,3) threshold quantum secret sharing based on asymmetric quantum lossy channels

Lai, H., Pieprzyk, J., Luo, M. X., Zhan, C., Pan, L. & Orgun, M. A., May 2020, In : Quantum Information Processing. 19, 5, 13 p., 157.

Research output: Contribution to journalArticle

1 Citation (Scopus)
2019

Efficient quantum private queries based on quantum key distribution with pulse-position modulation

Lai, H., Luo, M., Xu, Y., Pieprzyk, J., Pan, L., Zhang, J. & Orgun, M. A., May 2019, In : Laser Physics. 29, 5, p. 1-7 7 p., 055201.

Research output: Contribution to journalArticle

Open Access
File
2018

A large-alphabet three-party quantum key distribution protocol based on orbital and spin angular momenta hybrid entanglement

Lai, H., Luo, M., Zhang, J., Pieprzyk, J., Pan, L. & Orgun, M. A., 1 Jul 2018, In : Quantum Information Processing. 17, 7, p. 1-11 11 p., 162.

Research output: Contribution to journalArticle

1 Citation (Scopus)

A quantum secret sharing scheme using orbital angular momentum onto multiple spin states based on Fibonacci compression encoding

Lai, H., Luo, M-X., Xu, Y-J., Pieprzyk, J., Zhang, J., Pan, L. & Orgun, M. A., 1 Oct 2018, In : Communications in Theoretical Physics. 70, 4, p. 384-390 7 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Efficient quantum key distribution using Fibonacci-number coding with a biased basis choice

Lai, H., Luo, M., Pieprzyk, J., Qu, Z. & Orgun, M. A., 1 Jun 2018, In : Information Processing Letters. 134, p. 24-30 7 p.

Research output: Contribution to journalArticle

High-rate and high-capacity measurement-device-independent quantum key distribution with Fibonacci matrix coding in free space

Lai, H., Luo, M., Pieprzyk, J., Zhang, J., Pan, L. & Orgun, M. A., 1 Jun 2018, In : Science China Information Sciences. 61, 6, p. 1-11 11 p., 062501.

Research output: Contribution to journalArticle

3 Citations (Scopus)

Preprocessing optimisation: revisiting recursive-BKZ lattice reduction algorithm

Haque, M. M. & Pieprzyk, J., 1 Nov 2018, In : IET Information Security. 12, 6, p. 551-557 7 p.

Research output: Contribution to journalArticle

Round-robin-differential-phase-shift quantum key distribution based on wavelength division multiplexing

Lai, H., Luo, M., Xu, Y., Pieprzyk, J., Zhang, J., Pan, L. & Orgun, M. A., 1 Nov 2018, In : Laser Physics Letters. 15, 11, p. 1-7 7 p., 115201.

Research output: Contribution to journalArticle

3 Citations (Scopus)

Tunable multi-party high-capacity quantum key distribution based on m-generalized Fibonacci sequences using golden coding

Lai, H., Luo, M., Orgun, M. A., Pieprzyk, J., Xiao, F. & Zhan, C., 1 Sep 2018, In : Quantum Information Processing. 17, 9, p. 1-12 12 p., 246.

Research output: Contribution to journalArticle

2017

Analysing recursive preprocessing of BKZ lattice reduction algorithm

Haque, M. M. & Pieprzyk, J., 1 Mar 2017, In : IET Information Security. 11, 2, p. 114-120 7 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

An efficient quantum blind digital signature scheme

Lai, H., Luo, M., Pieprzyk, J., Qu, Z., Li, S. & Orgun, M. A., 1 Aug 2017, In : Science China Information Sciences. 60, 8, p. 082501:1–082501:14 14 p., 082501.

Research output: Contribution to journalArticle

7 Citations (Scopus)
7 Citations (Scopus)

Fast and simple high-capacity quantum cryptography with error detection

Lai, H., Luo, M-X., Pieprzyk, J., Zhang, J., Pan, L., Li, S. & Orgun, M. A., 13 Apr 2017, In : Scientific Reports. 7, p. 1-11 11 p., 46302.

Research output: Contribution to journalArticle

Open Access
File
5 Citations (Scopus)
12 Downloads (Pure)

Preface

Pieprzyk, J. & Suriadi, S., 2017, Information Security and Privacy: 22nd Australasian conference : proceedings. Pieprzyk, J. & Suriadi, S. (eds.). Cham, Switzerland: Springer, Springer Nature, Vol. Part 1. p. V 1 p. (Lecture Notes in Computer Science; vol. 10342).

Research output: Chapter in Book/Report/Conference proceedingForeword/postscript/introduction

Preface

Pieprzyk, J. & Suriadi, S., 2017, Information Security and Privacy: 22nd Australasian conference : proceedings. Pieprzyk, J. & Suriadi, S. (eds.). Cham, Switzerland: Springer, Springer Nature, Vol. Part 2. p. V 1 p. (Lecture Notes in Computer Science; vol. 10343).

Research output: Chapter in Book/Report/Conference proceedingForeword/postscript/introduction

2016

Finding state collisions in the authenticated encryption stream cipher ACORN

Salam, M. I., Simpson, L., Wong, K. K. H., Dawson, E., Bartlett, H. & Pieprzyk, J., 1 Feb 2016, Proceedings of the Australasian Computer Science Week Multiconference, ACSW 2016. New York: Association for Computing Machinery, p. 1-10 10 p. 36

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

2 Citations (Scopus)

High-capacity quantum key distribution using Chebyshev-map values corresponding to Lucas numbers coding

Lai, H., Orgun, M. A., Pieprzyk, J., Li, J., Luo, M., Xiao, J. & Xiao, F., 1 Nov 2016, In : Quantum Information Processing. 15, 11, p. 4663-4679 17 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Hybrid threshold adaptable quantum secret sharing scheme with reverse Huffman-Fibonacci-tree coding

Lai, H., Zhang, J., Luo, M. X., Pan, L., Pieprzyk, J., Xiao, F. & Orgun, M. A., 12 Aug 2016, In : Scientific Reports. 6, p. 1-12 12 p., 31350.

Research output: Contribution to journalArticle

Open Access
File
12 Citations (Scopus)
20 Downloads (Pure)

Investigating cube attacks on the authenticated encryption stream cipher ACORN

Salam, M. I., Bartlett, H., Dawson, E., Pieprzyk, J., Simpson, L. & Wong, K. K. H., 2016, Applications and Techniques in Information Security: 6th International Conference, ATIS 2016, Proceedings. Batten, L. & Li, G. (eds.). Singapore: Springer, Springer Nature, p. 15-26 12 p. (Communications in Computer and Information Science; vol. 651).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

19 Citations (Scopus)

Large-capacity three-party quantum digital secret sharing using three particular matrices coding

Lai, H., Luo, M. X., Pieprzyk, J., Tao, L., Liu, Z. M. & Orgun, M. A., 1 Nov 2016, In : Communications in Theoretical Physics. 66, 5, p. 501-508 8 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

State recovery attacks against π-cipher

Alley, J. & Pieprzyk, J., 1 Feb 2016, Proceedings of the Australasian Computer Science Week Multiconference, ACSW 2016. New York: Association for Computing Machinery, 6 p. 43

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

1 Citation (Scopus)
2015

A hybrid quantum key distribution protocol based on extended unitary operations and fountain codes

Lai, H., Xue, L., Orgun, M. A., Xiao, J. & Pieprzyk, J., Feb 2015, In : Quantum Information Processing. 14, 2, p. 697-713 17 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)
38 Citations (Scopus)

Controllable quantum private queries using an entangled Fibonacci-sequence spiral source

Lai, H., Orgun, M. A., Pieprzyk, J., Xiao, J., Xue, L. & Jia, Z., 23 Oct 2015, In : Physics Letters, Section A: General, Atomic and Solid State Physics. 379, 40-41, p. 2561-2568 8 p.

Research output: Contribution to journalArticle

13 Citations (Scopus)

Cube attacks and cube-attack-like cryptanalysis on the round-reduced Keccak sponge function

Dinur, I., Morawiecki, P., Pieprzyk, J., Srebrny, M. & Straus, M., 2015, Advances in Cryptology – EUROCRYPT 2015: 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings. Oswald, E. & Fischlin, M. (eds.). Heidelberg: Springer, Springer Nature, Vol. 9056. p. 733-761 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9056).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

37 Citations (Scopus)

Dynamic (2,3) Threshold Quantum Secret Sharing of Secure Direct Communication

Lai, H., Mehmet, O. A., Xiao, J. H., Josef, P. & Xue, L. Y., 1 Apr 2015, In : Communications in Theoretical Physics. 63, 4, p. 459-465 7 p., 459.

Research output: Contribution to journalArticle

6 Citations (Scopus)

Evaluating the performance of the practical lattice reduction algorithms

Haque, M. M. & Pieprzyk, J., 28 Jan 2015, 8th International Conference on Electrical and Computer Engineering: Advancing Technology for a Better Tomorrow, ICECE 2014. Picataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 341-344 4 p. 7026884

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

On the linearization of human identification protocols: Attacks based on linear algebra, coding theory, and lattices

Asghar, H. J., Steinfeld, R., Li, S., Kaafar, M. A. & Pieprzyk, J., 1 Aug 2015, In : IEEE Transactions on Information Forensics and Security. 10, 8, p. 1643-1655 13 p., 7083737.

Research output: Contribution to journalArticle

6 Citations (Scopus)

Optimizing preprocessing method of recursive-BKZ lattice reduction algorithm

Mokammel Haque, M. & Pieprzyk, J., 2015, EICT 2015: proceedings of the 2nd International Conference on Electrical Information and Communication Technologies. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 19-23 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

Rotational cryptanalysis of ARX revisited

Khovratovich, D., Nikolić, I., Pieprzyk, J., Sokołowski, P. & Steinfeld, R., 2015, Fast software encryption: 22nd international workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015: Revised Selected Papers. Leander, G. (ed.). Berlin: Springer, Springer Nature, p. 519-536 18 p. (Lecture Notes in Computer Science; vol. 9054).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

1 Citation (Scopus)

Special issue on trust and security in wireless sensor networks

Orgun, M. A., Elçi, A., Pieprzyk, J., Chefranov, A., Shankaran, R. & Wang, H., 1 Oct 2015, In : Concurrency Computation. 27, 15, p. 3791-3793 3 p.

Research output: Contribution to journalEditorial

Welcome message

Brown, S., Layton, R., McCombie, S., Pieprzyk, J. & Watters, P. A., 2015, Proceedings: Fifth Cybercrime and Trustworthy Computing Conference: CTC 2014. Piscataway, USA: Institute of Electrical and Electronics Engineers (IEEE), p. vi 1 p.

Research output: Chapter in Book/Report/Conference proceedingForeword/postscript/introduction

2014

A case study of user-level spam filtering

Bajaj, K. S. & Pieprzyk, J., 2014, Information Security 2014 - Proceedings of the Twelfth Australasian Information Security Conference, AISC 2014. Parampalli, U. & Welch, I. (eds.). Sydney, Australia: Australian Computer Society, Vol. 149. p. 67-75 9 p. (Conferences in Research and Practice in Information Technology - CRPIT).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

1 Citation (Scopus)

A strong lightweight authentication protocol for low-cost RFID systems

Shi, Z., Pieprzyk, J., Doche, C., Xia, Y., Zhang, Y. & Dai, J., 2014, In : International Journal of Security and its Applications. 8, 6, p. 225-234 10 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)

A subexponential construction of graph coloring for multiparty computation

Asghar, H. J., Desmedt, Y., Pieprzyk, J. & Steinfeld, R., 1 Dec 2014, In : Journal of Mathematical Cryptology. 8, 4, p. 363-403 41 p.

Research output: Contribution to journalArticle

A survey: error control methods used in bio-cryptography

Pussewalage, H. S. G., Hu, J. & Pieprzyk, J., 9 Dec 2014, FSKD 2014: Proceedings of the 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 956-962 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

4 Citations (Scopus)

Can we CAN the email spam

Bajaj, S. K. & Pieprzyk, J., 6 Mar 2014, 2013 Fourth Cybercrime and Trustworthy Computing Workshop (CTC 2013). Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 36-43 8 p. 6754639

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

3 Citations (Scopus)

Dual compressible hybrid quantum secret sharing schemes based on extended unitary operations

Lai, H., Orgun, M., Xue, L., Xiao, J. & Pieprzyk, J., 2014, Quantum Information and Computation XII. Donkor, E., Pirich, A. R., Brandt, H. E., Frey, M. R., Lomonaco Jr., S. J. & Myers, J. M. (eds.). Washington, DC: SPIE, Vol. 9123. p. 1-13 13 p. 912309

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

Open Access
File
3 Citations (Scopus)
17 Downloads (Pure)

ICEPOLE: high-speed, hardware-oriented authenticated encryption

Morawiecki, P., Gaj, K., Homsirikamol, E., Matusiewicz, K., Pieprzyk, J., Rogawski, M., Srebrny, M. & Wójcik, M., 2014, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8731, p. 392-413 22 p.

Research output: Contribution to journalConference paper

12 Citations (Scopus)

Lattice-based certificateless public-key encryption in the standard model

Sepahi, R., Steinfeld, R. & Pieprzyk, J., 2014, In : International Journal of Information Security. 13, 4, p. 315-333 19 p.

Research output: Contribution to journalArticle

8 Citations (Scopus)

Lattice-based completely non-malleable public-key encryption in the standard model

Sepahi, R., Steinfeld, R. & Pieprzyk, J., 2014, In : Designs, Codes and Cryptography. 71, 2, p. 293-313 21 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

Low probability differentials and the cryptanalysis of full-round CLEFIA-128

Emami, S., Ling, S., Nikolić, I., Pieprzyk, J. & Wang, H., 2014, Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings, Part I. Sarkar, P. & Iwata, T. (eds.). Heidelberg: Springer, Springer Nature, Vol. 8873. p. 141-157 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8873).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

2 Citations (Scopus)

Practical attack on NLM-MAC scheme

Orumiehchiha, M. A., Pieprzyk, J. & Steinfeld, R., 2014, In : Information Processing Letters. 114, 10, p. 547-550 4 p.

Research output: Contribution to journalArticle

Predicting tours and probabilistic simulation for BKZ lattice reduction algorithm

Haque, M. M., Pieprzyk, J. & Asaduzzaman, 17 Dec 2014, IFOST 2014: Proceedings of the 9th International Forum on Strategic Technology. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 1-4 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model

Lai, H., Orgun, M. A., Xiao, J., Pieprzyk, J., Xue, L. & Yang, Y., Sep 2014, In : Nonlinear Dynamics. 77, 4, p. 1427-1439 13 p.

Research output: Contribution to journalArticle

19 Citations (Scopus)

Quantum direct secret sharing with efficient eavesdropping-check and authentication based on distributed fountain codes

Lai, H., Xiao, J., Orgun, M. A., Xue, L. & Pieprzyk, J., 2014, In : Quantum Information Processing. 13, 4, p. 895-907 13 p.

Research output: Contribution to journalArticle

11 Citations (Scopus)

Rotational cryptanalysis of round-reduced Keccak

Morawiecki, P., Pieprzyk, J. & Srebrny, M., 2014, Fast Software Encryption - 20th International Workshop, FSE 2013, Revised Selected Papers. Moriai, S. (ed.). Heidelberg: Springer, Springer Nature, Vol. 8424 LNCS. p. 241-262 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8424 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

15 Citations (Scopus)

Special Issue on the design and engineering of cryptographic solutions for secure information systems

Elçi, A., Pieprzyk, J., Orgun, M. A. & Chefranov, A., 2014, In : Security and Communication Networks. 7, 1, p. 33-35 3 p.

Research output: Contribution to journalEditorial

The resistance of PRESENT-80 against related-key differential attacks

Emami, S., Ling, S., Nikolić, I., Pieprzyk, J. & Wang, H., 2014, In : Cryptography and Communications. 6, 3, p. 171-187 17 p.

Research output: Contribution to journalArticle

7 Citations (Scopus)