• Source: Scopus
  • Calculated based on no. of publications stored in Pure and citations from Scopus
1979 …2020

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Conference proceeding contribution

Search results

  • 2016

    Finding state collisions in the authenticated encryption stream cipher ACORN

    Salam, M. I., Simpson, L., Wong, K. K. H., Dawson, E., Bartlett, H. & Pieprzyk, J., 1 Feb 2016, Proceedings of the Australasian Computer Science Week Multiconference, ACSW 2016. New York: Association for Computing Machinery, p. 1-10 10 p. 36

    Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

    3 Citations (Scopus)
  • Investigating cube attacks on the authenticated encryption stream cipher ACORN

    Salam, M. I., Bartlett, H., Dawson, E., Pieprzyk, J., Simpson, L. & Wong, K. K. H., 2016, Applications and Techniques in Information Security: 6th International Conference, ATIS 2016, Proceedings. Batten, L. & Li, G. (eds.). Singapore: Springer, Springer Nature, p. 15-26 12 p. (Communications in Computer and Information Science; vol. 651).

    Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

    20 Citations (Scopus)
  • State recovery attacks against π-cipher

    Alley, J. & Pieprzyk, J., 1 Feb 2016, Proceedings of the Australasian Computer Science Week Multiconference, ACSW 2016. New York: Association for Computing Machinery, 6 p. 43

    Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

    1 Citation (Scopus)
  • 2015

    Cube attacks and cube-attack-like cryptanalysis on the round-reduced Keccak sponge function

    Dinur, I., Morawiecki, P., Pieprzyk, J., Srebrny, M. & Straus, M., 2015, Advances in Cryptology – EUROCRYPT 2015: 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings. Oswald, E. & Fischlin, M. (eds.). Heidelberg: Springer, Springer Nature, Vol. 9056. p. 733-761 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9056).

    Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

    46 Citations (Scopus)
  • Evaluating the performance of the practical lattice reduction algorithms

    Haque, M. M. & Pieprzyk, J., 28 Jan 2015, 8th International Conference on Electrical and Computer Engineering: Advancing Technology for a Better Tomorrow, ICECE 2014. Picataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 341-344 4 p. 7026884

    Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

  • Optimizing preprocessing method of recursive-BKZ lattice reduction algorithm

    Mokammel Haque, M. & Pieprzyk, J., 2015, EICT 2015: proceedings of the 2nd International Conference on Electrical Information and Communication Technologies. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 19-23 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

  • Rotational cryptanalysis of ARX revisited

    Khovratovich, D., Nikolić, I., Pieprzyk, J., Sokołowski, P. & Steinfeld, R., 2015, Fast software encryption: 22nd international workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015: Revised Selected Papers. Leander, G. (ed.). Berlin: Springer, Springer Nature, p. 519-536 18 p. (Lecture Notes in Computer Science; vol. 9054).

    Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

    7 Citations (Scopus)
  • 2014

    A case study of user-level spam filtering

    Bajaj, K. S. & Pieprzyk, J., 2014, Information Security 2014 - Proceedings of the Twelfth Australasian Information Security Conference, AISC 2014. Parampalli, U. & Welch, I. (eds.). Sydney, Australia: Australian Computer Society, Vol. 149. p. 67-75 9 p. (Conferences in Research and Practice in Information Technology - CRPIT).

    Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

    1 Citation (Scopus)
  • A survey: error control methods used in bio-cryptography

    Pussewalage, H. S. G., Hu, J. & Pieprzyk, J., 9 Dec 2014, FSKD 2014: Proceedings of the 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 956-962 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

    4 Citations (Scopus)
  • Can we CAN the email spam

    Bajaj, S. K. & Pieprzyk, J., 6 Mar 2014, 2013 Fourth Cybercrime and Trustworthy Computing Workshop (CTC 2013). Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 36-43 8 p. 6754639

    Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

    4 Citations (Scopus)
  • Dual compressible hybrid quantum secret sharing schemes based on extended unitary operations

    Lai, H., Orgun, M., Xue, L., Xiao, J. & Pieprzyk, J., 2014, Quantum Information and Computation XII. Donkor, E., Pirich, A. R., Brandt, H. E., Frey, M. R., Lomonaco Jr., S. J. & Myers, J. M. (eds.). Washington, DC: SPIE, Vol. 9123. p. 1-13 13 p. 912309

    Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

    Open Access
    File
    3 Citations (Scopus)
    25 Downloads (Pure)
  • Low probability differentials and the cryptanalysis of full-round CLEFIA-128

    Emami, S., Ling, S., Nikolić, I., Pieprzyk, J. & Wang, H., 2014, Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings, Part I. Sarkar, P. & Iwata, T. (eds.). Heidelberg: Springer, Springer Nature, Vol. 8873. p. 141-157 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8873).

    Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

    Open Access
    2 Citations (Scopus)
  • Predicting tours and probabilistic simulation for BKZ lattice reduction algorithm

    Haque, M. M., Pieprzyk, J. & Asaduzzaman, 17 Dec 2014, IFOST 2014: Proceedings of the 9th International Forum on Strategic Technology. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 1-4 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

  • Rotational cryptanalysis of round-reduced Keccak

    Morawiecki, P., Pieprzyk, J. & Srebrny, M., 2014, Fast Software Encryption - 20th International Workshop, FSE 2013, Revised Selected Papers. Moriai, S. (ed.). Heidelberg: Springer, Springer Nature, Vol. 8424 LNCS. p. 241-262 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8424 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

    27 Citations (Scopus)
  • 2013

    Cryptanalysis of RC4(n, m) stream cipher

    Orumiehchiha, M. A., Pieprzyk, J., Shakour, E. & Steinfeld, R., 2013, SIN 2013 - Proceedings of the 6th International Conference on Security of Information and Networks. Elçi, A., Chefranov, A., Gaur, M. S., Orgun, M. A., Makarevich, O. B. & Çelik, Y. (eds.). New York: ACM, p. 165-172 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

    7 Citations (Scopus)
  • Does counting still count? Revisiting the security of counting based user authentication protocols against statistical attacks

    Asghar, H. J., Li, S., Steinfeld, R. & Pieprzyk, J., 2013, NDSS 2013: 20th Annual Network & Distributed System Security Symposium : proceedings. Geneva, Switzerland: Internet Society, p. 1-18 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

  • Security evaluation of Rakaposhi stream cipher

    Orumiehchiha, M. A., Pieprzyk, J., Shakour, E. & Steinfeld, R., 2013, Information Security Practice and Experience - 9th International Conference, ISPEC 2013, Proceedings. Deng, R. H. & Feng, T. (eds.). Heidelberg: Springer, Springer Nature, Vol. 7863 LNCS. p. 361-371 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7863 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

    7 Citations (Scopus)
  • Truncated differential analysis of reduced-round LBlock

    Emami, S., McDonald, C., Pieprzyk, J. & Steinfeld, R., 2013, Cryptology and Network Security - 12th International Conference, CANS 2013, Proceedings. Abdalla, M., Nita-Rotaru, C. & Dahab, R. (eds.). Cham: Springer, Springer Nature, Vol. 8257. p. 291-308 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8257 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

    2 Citations (Scopus)
  • Welcome message from the CTC Steering Committee

    Brown, S., Layton, R., McCombie, S., Pieprzyk, J. & Watters, P. A., 2013, CTC 2013: Fourth Cybercrime and Trustworthy Computing Workshop. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. vi-vi 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

  • 2012

    Cryptanalysis of RC4-based hash function

    Orumiehchiha, M. A., Pieprzyk, J. & Steinfeld, R., 2012, Information Security 2012 - Proceedings of the Tenth Australasian Information Security Conference, AISC 2012. Pieprzyk, J. & Thomborson, C. (eds.). Sydney: Australian Computer Society, Vol. 125. p. 33-38 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

    1 Citation (Scopus)
  • Taxonomy and control measures of SPAM and SPIM

    Bajaj, K. & Pieprzyk, J., 2012, Advances in Computer Science and Information Technology. Computer Science and Information Technology: Second International Conference, CCSIT 2012, Bangalore, India, January 2-4, 2012.. Meghanathan, N. & Chaki, N. (eds.). Berlin; New York: Springer, Springer Nature, Vol. 86. p. 529-542 14 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; vol. 86).

    Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

  • 2011

    Critical analysis of spam prevention techniques

    Bajaj, K. S., Egbufor, F. & Pieprzyk, J., 2011, Proceedings of the 3rd International Workshop on Security and Communication Networks, IWSCN 2011. Piscataway, N.J.: Institute of Electrical and Electronics Engineers (IEEE), p. 83-87 5 p. 6827721

    Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

    2 Citations (Scopus)
  • Known and chosen key differential distinguishers for block ciphers

    Nikolić, I., Pieprzyk, J., Sokołowski, P. & Steinfeld, R., 2011, Information Security and Cryptology, ICISC 2010 - 13th International Conference, Revised Selected Papers. Rhee, K-H. & Nyang, D. (eds.). Heidelberg: Springer, Springer Nature, Vol. 6829. p. 29-48 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6829 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

    13 Citations (Scopus)
  • Lattice-based completely non-malleable PKE in the standard model (poster)

    Sepahi, R., Steinfeld, R. & Pieprzyk, J., 2011, Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Proceedings. Parampalli, U. & Hawkes, P. (eds.). Heidelberg: Springer, Springer Nature, Vol. 6812 LNCS. p. 407-411 5 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6812 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

    2 Citations (Scopus)
  • Robust numeric set watermarking: Numbers don't lie

    Gupta, G., Pieprzyk, J. & Kankanhalli, M., 2011, e-Business and Telecommunications - 6th International Joint Conference, ICETE 2009, Revised Selected Papers. Obaidat, M. S. & Filipe, J. (eds.). Heidelberg: Springer, Springer Nature, Vol. 130 CCIS. p. 253-265 13 p. (Communications in Computer and Information Science; vol. 130 CCIS).

    Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

    1 Citation (Scopus)
  • 2010

    A new human identification protocol and Coppersmith's baby-step giant-step algorithm

    Asghar, H. J., Pieprzyk, J. & Wang, H., Jun 2010, Applied Cryptography and Network Security - 8th International Conference, ACNS 2010, Proceedings. Zhou, J. & Yung, M. (eds.). Berlin; New York: Springer, Springer Nature, p. 349-366 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6123 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

    16 Citations (Scopus)
  • Binary image steganographic techniques classification based on multi-class steganalysis

    Chiew, K. L. & Pieprzyk, J., 2010, Information Security Practice and Experience: 6th International Conference, ISPEC 2010 Seoul, Korea, May 12-13, 2010 Proceedings. Kwak, J., Deng, R. H., Won, Y. & Wang, G. (eds.). Berlin; Heidelberg: Springer, Springer Nature, p. 341-358 18 p. (Lecture Notes in Computer Science; vol. 6047).

    Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

    21 Citations (Scopus)
  • Blind steganalysis: a countermeasure for binary image steganography

    Chiew, K. L. & Pieprzyk, J., Feb 2010, 2010 International Conference on Availability, Reliability and Security (ARES 2010) . Piscataway, N.J.: Institute of Electrical and Electronics Engineers (IEEE), p. 653-658 6 p. 5438022

    Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

    Open Access
    File
    19 Citations (Scopus)
    119 Downloads (Pure)
  • Cryptanalysis of the convex hull click human identification protocol

    Asghar, H. J., Li, S., Pieprzyk, J. & Wang, H., 2010, Information Security - 13th International Conference, ISC 2010, Revised Selected Papers. Burmester, M., Tsudik, G. & Magliveras, S. S. (eds.). Berlin: Springer, Springer Nature, Vol. 6531. p. 24-30 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6531 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

  • Efficient fuzzy matching and intersection on private datasets

    Ye, Q., Steinfeld, R., Pieprzyk, J. & Wang, H., 2010, Information Security and Cryptology - ICISC 2009 - 12th International Conference, Revised Selected Papers. Lee, D. & Hong, S. (eds.). Berlin; Heidelberg: Springer, Springer Nature, Vol. 5984 LNCS. p. 211-228 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5984 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

    6 Citations (Scopus)
  • Estimating hidden message length in binary image embedded by using boundary pixels steganography

    Chiew, K. L. & Pieprzyk, J., Feb 2010, 2010 International Conference on Availability, Reliability and Security (ARES 2010) . Piscataway, N.J.: Institute of Electrical and Electronics Engineers (IEEE), p. 683-688 6 p. 5438015

    Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

    Open Access
    File
    15 Citations (Scopus)
    12 Downloads (Pure)
  • Identifying steganographic payload location in binary image

    Chiew, K. L. & Pieprzyk, J., 2010, Advances in Multimedia Information Processing - PCM 2010: 11th Pacific Rim Conference on Multimedia Shanghai, China, September 21-24, 2010 Proceedings, Part I. Qiu, G., Lam, K. M., Kiya, H., Xue, X-Y., Kuo, C-C. J. & Lew, M. S. (eds.). Berlin; Heidelberg: Springer, Springer Nature, p. 590-600 11 p. (Lecture Notes in Computer Science; vol. 6297, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

    4 Citations (Scopus)
  • Protecting web 2.0 services from botnet exploitations

    Vo, N. H. & Pieprzyk, J., 2010, Proceedings - 2nd Cybercrime and Trustworthy Computing Workshop, CTC 2010. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 18-28 11 p. 5615134

    Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

    Open Access
    File
    8 Citations (Scopus)
    42 Downloads (Pure)
  • Secure coprocessor-based private information retrieval without periodical preprocessing

    Wang, P., Wang, H. & Pieprzyk, J., 2010, Information Security 2010 - Proceedings of the Eighth Australasian Information Security Conference, AISC 2010. Boyd, C. & Susilo, W. (eds.). Sydney, Australia: Australian Computer Society, Vol. 105. p. 5-11 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

  • Winning the phishing war: A strategy for Australia

    McCombie, S. & Pieprzyk, J., 2010, Proceedings - 2nd Cybercrime and Trustworthy Computing Workshop, CTC 2010. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 79-86 8 p. 5615076

    Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

    Open Access
    File
    13 Citations (Scopus)
    56 Downloads (Pure)
  • 2009

    An efficient scheme of common secure indices for conjunctive keyword-based retrieval on encrypted data

    Wang, P., Wang, H. & Pieprzyk, J., 2009, Information Security Applications - 9th International Workshop, WISA 2008, Revised Selected Papers. Chung, K-I., Sohn, K. & Yung, M. (eds.). Heidelberg, Vol. 5379 LNCS. p. 145-159 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5379 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

    25 Citations (Scopus)
  • Certified pseudonyms colligated with master secret key

    Pasupathinathan, V., Pieprzyk, J. & Wang, H., 2009, SECRYPT 2009 - International Conference on Security and Cryptography, Proceedings. Fernández-Medina, E., Malek, M. & Hernando, J. (eds.). Setúbal, Portugal: INSTICC, p. 190-197 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

  • Cryptanalysis of the LAKE hash family

    Biryukov, A., Gauravaram, P., Guo, J., Khovratovich, D., Ling, S., Matusiewicz, K., Nikolić, I., Pieprzyk, J. & Wang, H., 2009, Fast software encryption: 16th International Workshop, FSE 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers. Dunkelman, O. (ed.). Berlin: Springer, Springer Nature, p. 156-179 24 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5665 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

    4 Citations (Scopus)
  • Cybercrime attribution: an Eastern European case study

    McCombie, S., Pieprzyk, J. & Watters, P., 2009, Proceedings of the 7th Australian Digital Forensics Conference. Valli, C. (ed.). Perth, Australia: secAU - Security Research Centre, Edith Cowan University, p. 41-51 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

    Open Access
    File
    10 Citations (Scopus)
    14 Downloads (Pure)
  • Database relation watermarking resilient against secondary watermarking attacks

    Gupta, G. & Pieprzyk, J., Dec 2009, Information Systems Security - 5th International Conference, ICISS 2009, Proceedings. Prakash, A. & Sen Gupta, I. (eds.). Berlin; Heidelberg: Springer, Springer Nature, Vol. 5905 LNCS. p. 222-236 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5905 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

    27 Citations (Scopus)
  • Extensions of the cube attack based on low degree annihilators

    Zhang, A., Lim, C. W., Khoo, K., Wei, L. & Pieprzyk, J., 2009, Cryptology and Network Security - 8th International Conference, CANS 2009, Proceedings. Garay, J. A., Miyaji, A. & Otsuka, A. (eds.). Berlin, Germany: Springer, Springer Nature, Vol. 5888 LNCS. p. 87-102 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5888 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

    2 Citations (Scopus)
  • On the security of PAS (Predicate-based Authentication Service)

    Li, S., Asghar, H. J., Pieprzyk, J., Sadeghi, A. R., Schmitz, R. & Wang, H., 2009, 25th Annual Computer Conference Security Applications, ACSAC 2009. Ceballos, S. (ed.). Pistacaway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 209-218 10 p. 5380509

    Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

    Open Access
    File
    16 Citations (Scopus)
    21 Downloads (Pure)
  • Robust and reversible numerical set watermarking

    Gupta, G., Pieprzyk, J. & Kankanhalli, M., 2009, ICETE 2009 - International Joint Conference on e-Business and Telecommunications. Assunção, P. A. A. & Faria, S. M. M. (eds.). Setubal: INSTICC, p. 141-148 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

    1 Citation (Scopus)
  • 2008

    A critical look at cryptographic hash function literature

    Contini, S., Steinfeld, R., Pieprzyk, J. & Matusiewicz, K., 2008, Coding and cryptology: proceedings of the first international workshop Wuyi Mountain, Fujian, China, 11 – 15 June 2007. Li, Y., Ling, S., Niederreiter, H., Wang, H., Xing, C. & Zhang, S. (eds.). Toh Tuck Link, Singapore: World Scientific Publishing, p. 58-79 22 p. (Series on Coding Theory and Cryptology; vol. 4).

    Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

  • A fair e-tendering protocol

    Pasupathinathan, V., Pieprzyk, J. & Wang, H., 2008, SECRYPT 2008 - International Conference on Security and Cryptography, Proceedings. Fernández-Medina, E. (ed.). Portugal: Institute for Systems and Technologies of Information, Control and Communication, p. 294-299 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

    Open Access
    File
    2 Citations (Scopus)
    6 Downloads (Pure)
  • An Algebraic analysis of trivium ciphers based on the boolean satisfiability problem

    Mcdonald, C., Charnes, C. & Pieprzyk, J., 2008, BFCA'08: Proceedings of Fourth International Workshop on Boolean Functions : Cryptography and Applications. Masnyk-Hansen, O., Michon, J-F., Valarcher, P. & Yunès, J-B. (eds.). p. 173-184 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

  • An improved distinguisher for Dragon

    Cho, J. & Pieprzyk, J., 2008, Coding and cryptology: proceedings of the first international workshop Wuyi Mountain, Fujian, China, 11 – 15 June 2007. Li, Y., Ling, S., Niederreiter, H., Wang, H., Xing, C. & Zhang, S. (eds.). Singapore; London: World Scientific Publishing, Vol. 4. p. 91-108 18 p. (Series on coding theory and cryptology; vol. 4).

    Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

  • An on-line secure e-passport protocol

    Pasupathinathan, V., Pieprzyk, J. & Wang, H., 2008, Information Security Practice and Experience - 4th International Conference, ISPEC 2008, Proceedings. Chen, L., Mu, Y. & Susilo, W. (eds.). Berlin; New York: Springer, Springer Nature, Vol. 4991. p. 14-28 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4991 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

    17 Citations (Scopus)
  • Cryptanalysis of LASH

    Steinfeld, R., Contini, S., Matusiewicz, K., Pieprzyk, J., Guo, J., Ling, S. & Wang, H., 2008, Fast Software Encryption - 15th International Workshop, FSE 2008, Revised Selected Papers. Nyberg, K. (ed.). Berlin; New York: Springer, Springer Nature, Vol. 5086 LNCS. p. 207-223 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5086 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

    2 Citations (Scopus)
  • Distributed private matching and set operations

    Ye, Q., Wang, H. & Pieprzyk, J., 2008, Information Security Practice and Experience: 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings. Chen, L., Mu, Y. & Susilo, W. (eds.). Berlin: Springer, Springer Nature, p. 347-360 14 p. (Lecture Notes in Computer Science; vol. 4991).

    Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

    34 Citations (Scopus)