• 2535 Citations
  • 22 h-Index
1979 …2019

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Outputs

Filter
Chapter
2012

Active security in multiparty computation over black-box groups

Desmedt, Y., Pieprzyk, J. & Steinfeld, R., 2012, Security and Cryptography for Networks - 8th International Conference, SCN 2012, Proceedings. Visconti, I. & De Prisco, R. (eds.). Berlin: Springer, Springer Nature, p. 503-521 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7485 LNCS).

Research output: Chapter in Book/Report/Conference proceedingChapter

2 Citations (Scopus)

NTRUCCA: How to strengthen NTRUEncrypt to chosen-ciphertext security in the standard model

Steinfeld, R., Ling, S., Pieprzyk, J., Tartary, C. & Wang, H., 2012, Public Key Cryptography, PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Proceedings. Fischlin, M., Buchmann, J. & Manulis, M. (eds.). Heidelberg: Springer, Springer Nature, p. 353-371 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7293 LNCS).

Research output: Chapter in Book/Report/Conference proceedingChapter

8 Citations (Scopus)

On the (in)security of IDEA in various hashing modes

Wei, L., Peyrin, T., Sokołowski, P., Ling, S., Pieprzyk, J. & Wang, H., 2012, Fast Software Encryption: 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers. Canteaut, A. (ed.). Berlin: Springer, Springer Nature, p. 163-179 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7549 LNCS).

Research output: Chapter in Book/Report/Conference proceedingChapter

8 Citations (Scopus)

Russia, Ukraine and global cybercrime: the Australian perspective

McCombie, S. & Pieprzyk, J., 2012, Issues in cybercrime, security and digital forensics. Weir, G. R. S. & Al-Nemrat, A. (eds.). University of Strathclyde, p. 197-210 14 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

2011

Privacy enhancements for hardware-based security modules

Pasupathinathan, V., Pieprzyk, J. & Wang, H., 2011, e-Business and Telecommunications: 6th International Joint Conference, ICETE 2009, Milan, Italy, July 7-10, 2009. Revised Selected Papers. Obaidat, M. S. & Filipe, J. (eds.). Heidelberg: Springer, Springer Nature, p. 224-236 13 p. (Communications in Computer and Information Science; vol. 130).

Research output: Chapter in Book/Report/Conference proceedingChapter

Reversible and blind database watermarking using difference expansion

Gupta, G. & Pieprzyk, J., 2011, New technologies for digital crime and forensics: devices, applications, and software. Li, C-T. & Ho, A. T. S. (eds.). Hershey, PA: Information Science Reference, p. 190-201 12 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

2010

Crypto topics and applications I

Seberry, J., Charnes, C., Pieprzyk, J. & Safavi-Naini, R., 2010, Algorithms and theory of computation handbook: special topics and techniques. Atallah, M. J. & Blanton, M. (eds.). 2nd ed. Boca Raton, Florida: CRC, Vol. 2. p. 12-01-12-31 31 p. (Chapman & Hall/CRC applied algorithms and data structures series).

Research output: Chapter in Book/Report/Conference proceedingChapter

Crypto topics and applications II

Seberry, J., Charnes, C., Pieprzyk, J. & Safavi-Naini, R., 2010, Algorithms and theory of computation handbook. Atallah, M. J. & Blanton, M. (eds.). 2nd ed. Boca Raton, Florida: CRC, p. 13-1-13-32 32 p. (Chapman & Hall/CRC applied algorithms and data structures series).

Research output: Chapter in Book/Report/Conference proceedingChapter

Parallel signcryption

Pieprzyk, J. & Pointcheval, D., 2010, Practical signcryption. Dent, A. W. & Zheng, Y. (eds.). Berlin: Springer, Springer Nature, p. 175-192 18 p. (Information Security and Cryptography; vol. 11).

Research output: Chapter in Book/Report/Conference proceedingChapter

1 Citation (Scopus)
2008

Efficient disjointness tests for private datasets

Ye, Q., Wang, H., Pieprzyk, J. & Zhang, X. M., 2008, Information Security and Privacy: 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings. Mu, Y., Susilo, W. & Seberry, J. (eds.). Berlin: Springer, Springer Nature, p. 155-169 15 p. (Lecture Notes in Computer Science; vol. 5107).

Research output: Chapter in Book/Report/Conference proceedingChapter

6 Citations (Scopus)

Secure computation of the vector dominance problem

Yuan, J., Ye, Q., Wang, H. & Pieprzyk, J., 2008, Information Security Practice and Experience - 4th International Conference, ISPEC 2008, Proceedings. Chen, L., Mu, Y. & Susilo, W. (eds.). Berlin: Springer, Springer Nature, p. 319-333 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4991 LNCS).

Research output: Chapter in Book/Report/Conference proceedingChapter

3 Citations (Scopus)

Threshold privacy preserving keyword searches

Wang, P., Wang, H. & Pieprzyk, J., 2008, SOFSEM 2008: Theory and Practice of Computer Science: 34th Conference on Current Trends in Theory and Practice of Computer Science, Nový Smokovec, Slovakia, January 19-25, 2008. Proceedings. Geffert, V., Karhumäki, J., Bertoni, A., Preneel, B., Návrat, P. & Bieliková, M. (eds.). Berlin: Springer, Springer Nature, p. 646-658 13 p. (Lecture Notes in Computer Science; vol. 4910).

Research output: Chapter in Book/Report/Conference proceedingChapter

25 Citations (Scopus)
2001

Multimedia copyright protection

Pieprzyk, J., 2001, Design and management of multimedia information systems: opportunities and challenges. Rahman, S. M. (ed.). Hershey, PA.: IDEA GROUP PUBLISHING, p. 435-451 17 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

1999

Changing thresholds in the absence of secure channels

Martin, K. M., Pieprzyk, J., Safavi-Naini, R. & Wang, H., 1999, Information Security and Privacy: 4th Australasian Conference, ACISP’99 Wollongong, NSW, Australia, April 7–9, 1999 Proceedings. Pieprzyk, J., Safavi-Naini, R. & Seberry, J. (eds.). Berlin: Springer, Springer Nature, p. 177-191 15 p. (Lecture Notes in Computer Science; vol. 1587).

Research output: Chapter in Book/Report/Conference proceedingChapter

26 Citations (Scopus)

Conference key agreement from secret sharing

Li, C. H. & Pieprzyk, J., 1999, Information Security and Privacy: 4th Australasian Conference, ACISP’99 Wollongong, NSW, Australia, April 7–9, 1999 Proceedings. Pieprzyk, J., Safavi-Naini, R. & Seberry, J. (eds.). Berlin: Springer, Springer Nature, p. 64-76 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1587).

Research output: Chapter in Book/Report/Conference proceedingChapter

32 Citations (Scopus)

Fail-stop threshold signature schemes based on elliptic curves

Susilo, W., Safavi-Naini, R. & Pieprzyk, J., 1999, Information Security and Privacy - 4th Australasian Conference, ACISP 1999, Proceedings. Berlin: Springer, Springer Nature, Vol. 1587. p. 103-116 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1587).

Research output: Chapter in Book/Report/Conference proceedingChapter

5 Citations (Scopus)

Linear secret sharing with divisible shares

Pieprzyk, J., 1999, Information and Communication Security: Second International Conference, ICICS’99, Sydney, Australia, November 9-11, 1999. Proceedings. Varadharajan, V. & Mu, Y. (eds.). Berlin: Springer, Springer Nature, p. 71-86 16 p. (Lecture Notes in Computer Science; vol. 1726).

Research output: Chapter in Book/Report/Conference proceedingChapter

1 Citation (Scopus)
1998

Rotation-symmetric functions and fast hashing

Pieprzyk, J. & Qu, C. X., 1998, Information Security and Privacy: Third Australasian Conference, ACISP’98 Brisbane, Australia, July 13–15, 1998 Proceedings. Boyd, C. & Dawson, E. (eds.). Berlin: Springer, Springer Nature, p. 169-180 12 p. (Lecture Notes in Computer Science; vol. 1438).

Research output: Chapter in Book/Report/Conference proceedingChapter

10 Citations (Scopus)