• Source: Scopus
  • Calculated based on no. of publications stored in Pure and citations from Scopus
1979 …2020

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Chapter

Search results

  • 2012

    Active security in multiparty computation over black-box groups

    Desmedt, Y., Pieprzyk, J. & Steinfeld, R., 2012, Security and Cryptography for Networks - 8th International Conference, SCN 2012, Proceedings. Visconti, I. & De Prisco, R. (eds.). Berlin: Springer, Springer Nature, p. 503-521 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7485 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    2 Citations (Scopus)
  • NTRUCCA: How to strengthen NTRUEncrypt to chosen-ciphertext security in the standard model

    Steinfeld, R., Ling, S., Pieprzyk, J., Tartary, C. & Wang, H., 2012, Public Key Cryptography, PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Proceedings. Fischlin, M., Buchmann, J. & Manulis, M. (eds.). Heidelberg: Springer, Springer Nature, p. 353-371 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7293 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    9 Citations (Scopus)
  • On the (in)security of IDEA in various hashing modes

    Wei, L., Peyrin, T., Sokołowski, P., Ling, S., Pieprzyk, J. & Wang, H., 2012, Fast Software Encryption: 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers. Canteaut, A. (ed.). Berlin: Springer, Springer Nature, p. 163-179 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7549 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    9 Citations (Scopus)
  • Russia, Ukraine and global cybercrime: the Australian perspective

    McCombie, S. & Pieprzyk, J., 2012, Issues in cybercrime, security and digital forensics. Weir, G. R. S. & Al-Nemrat, A. (eds.). University of Strathclyde, p. 197-210 14 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • 2011

    Privacy enhancements for hardware-based security modules

    Pasupathinathan, V., Pieprzyk, J. & Wang, H., 2011, e-Business and Telecommunications: 6th International Joint Conference, ICETE 2009, Milan, Italy, July 7-10, 2009. Revised Selected Papers. Obaidat, M. S. & Filipe, J. (eds.). Heidelberg: Springer, Springer Nature, p. 224-236 13 p. (Communications in Computer and Information Science; vol. 130).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • Reversible and blind database watermarking using difference expansion

    Gupta, G. & Pieprzyk, J., 2011, New technologies for digital crime and forensics: devices, applications, and software. Li, C-T. & Ho, A. T. S. (eds.). Hershey, PA: Information Science Reference, p. 190-201 12 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • 2010

    Crypto topics and applications I

    Seberry, J., Charnes, C., Pieprzyk, J. & Safavi-Naini, R., 2010, Algorithms and theory of computation handbook: special topics and techniques. Atallah, M. J. & Blanton, M. (eds.). 2nd ed. Boca Raton, Florida: CRC, Vol. 2. p. 12-01-12-31 31 p. (Chapman & Hall/CRC applied algorithms and data structures series).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • Crypto topics and applications II

    Seberry, J., Charnes, C., Pieprzyk, J. & Safavi-Naini, R., 2010, Algorithms and theory of computation handbook. Atallah, M. J. & Blanton, M. (eds.). 2nd ed. Boca Raton, Florida: CRC, p. 13-1-13-32 32 p. (Chapman & Hall/CRC applied algorithms and data structures series).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • Parallel signcryption

    Pieprzyk, J. & Pointcheval, D., 2010, Practical signcryption. Dent, A. W. & Zheng, Y. (eds.). Berlin: Springer, Springer Nature, p. 175-192 18 p. (Information Security and Cryptography; vol. 11).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    1 Citation (Scopus)
  • 2008

    Efficient disjointness tests for private datasets

    Ye, Q., Wang, H., Pieprzyk, J. & Zhang, X. M., 2008, Information Security and Privacy: 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings. Mu, Y., Susilo, W. & Seberry, J. (eds.). Berlin: Springer, Springer Nature, p. 155-169 15 p. (Lecture Notes in Computer Science; vol. 5107).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    6 Citations (Scopus)
  • Secure computation of the vector dominance problem

    Yuan, J., Ye, Q., Wang, H. & Pieprzyk, J., 2008, Information Security Practice and Experience - 4th International Conference, ISPEC 2008, Proceedings. Chen, L., Mu, Y. & Susilo, W. (eds.). Berlin: Springer, Springer Nature, p. 319-333 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4991 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    4 Citations (Scopus)
  • Threshold privacy preserving keyword searches

    Wang, P., Wang, H. & Pieprzyk, J., 2008, SOFSEM 2008: Theory and Practice of Computer Science: 34th Conference on Current Trends in Theory and Practice of Computer Science, Nový Smokovec, Slovakia, January 19-25, 2008. Proceedings. Geffert, V., Karhumäki, J., Bertoni, A., Preneel, B., Návrat, P. & Bieliková, M. (eds.). Berlin: Springer, Springer Nature, p. 646-658 13 p. (Lecture Notes in Computer Science; vol. 4910).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    33 Citations (Scopus)
  • 2001

    Multimedia copyright protection

    Pieprzyk, J., 2001, Design and management of multimedia information systems: opportunities and challenges. Rahman, S. M. (ed.). Hershey, PA.: IDEA GROUP PUBLISHING, p. 435-451 17 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • 1999

    Changing thresholds in the absence of secure channels

    Martin, K. M., Pieprzyk, J., Safavi-Naini, R. & Wang, H., 1999, Information Security and Privacy: 4th Australasian Conference, ACISP’99 Wollongong, NSW, Australia, April 7–9, 1999 Proceedings. Pieprzyk, J., Safavi-Naini, R. & Seberry, J. (eds.). Berlin: Springer, Springer Nature, p. 177-191 15 p. (Lecture Notes in Computer Science; vol. 1587).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    29 Citations (Scopus)
  • Conference key agreement from secret sharing

    Li, C. H. & Pieprzyk, J., 1999, Information Security and Privacy: 4th Australasian Conference, ACISP’99 Wollongong, NSW, Australia, April 7–9, 1999 Proceedings. Pieprzyk, J., Safavi-Naini, R. & Seberry, J. (eds.). Berlin: Springer, Springer Nature, p. 64-76 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1587).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    36 Citations (Scopus)
  • Fail-stop threshold signature schemes based on elliptic curves

    Susilo, W., Safavi-Naini, R. & Pieprzyk, J., 1999, Information Security and Privacy - 4th Australasian Conference, ACISP 1999, Proceedings. Berlin: Springer, Springer Nature, Vol. 1587. p. 103-116 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1587).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    6 Citations (Scopus)
  • Linear secret sharing with divisible shares

    Pieprzyk, J., 1999, Information and Communication Security: Second International Conference, ICICS’99, Sydney, Australia, November 9-11, 1999. Proceedings. Varadharajan, V. & Mu, Y. (eds.). Berlin: Springer, Springer Nature, p. 71-86 16 p. (Lecture Notes in Computer Science; vol. 1726).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    1 Citation (Scopus)
  • 1998

    Rotation-symmetric functions and fast hashing

    Pieprzyk, J. & Qu, C. X., 1998, Information Security and Privacy: Third Australasian Conference, ACISP’98 Brisbane, Australia, July 13–15, 1998 Proceedings. Boyd, C. & Dawson, E. (eds.). Berlin: Springer, Springer Nature, p. 169-180 12 p. (Lecture Notes in Computer Science; vol. 1438).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    10 Citations (Scopus)