• 2531 Citations
  • 22 h-Index
1979 …2019

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Outputs

Filter
Conference proceeding contribution
2016

Finding state collisions in the authenticated encryption stream cipher ACORN

Salam, M. I., Simpson, L., Wong, K. K. H., Dawson, E., Bartlett, H. & Pieprzyk, J., 1 Feb 2016, Proceedings of the Australasian Computer Science Week Multiconference, ACSW 2016. New York: Association for Computing Machinery, p. 1-10 10 p. 36

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

2 Citations (Scopus)

Investigating cube attacks on the authenticated encryption stream cipher ACORN

Salam, M. I., Bartlett, H., Dawson, E., Pieprzyk, J., Simpson, L. & Wong, K. K. H., 2016, Applications and Techniques in Information Security: 6th International Conference, ATIS 2016, Proceedings. Batten, L. & Li, G. (eds.). Singapore: Springer, Springer Nature, p. 15-26 12 p. (Communications in Computer and Information Science; vol. 651).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

17 Citations (Scopus)

State recovery attacks against π-cipher

Alley, J. & Pieprzyk, J., 1 Feb 2016, Proceedings of the Australasian Computer Science Week Multiconference, ACSW 2016. New York: Association for Computing Machinery, 6 p. 43

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

1 Citation (Scopus)
2015

Cube attacks and cube-attack-like cryptanalysis on the round-reduced Keccak sponge function

Dinur, I., Morawiecki, P., Pieprzyk, J., Srebrny, M. & Straus, M., 2015, Advances in Cryptology – EUROCRYPT 2015: 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings. Oswald, E. & Fischlin, M. (eds.). Heidelberg: Springer, Springer Nature, Vol. 9056. p. 733-761 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9056).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

36 Citations (Scopus)

Evaluating the performance of the practical lattice reduction algorithms

Haque, M. M. & Pieprzyk, J., 28 Jan 2015, 8th International Conference on Electrical and Computer Engineering: Advancing Technology for a Better Tomorrow, ICECE 2014. Picataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 341-344 4 p. 7026884

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

Optimizing preprocessing method of recursive-BKZ lattice reduction algorithm

Mokammel Haque, M. & Pieprzyk, J., 2015, EICT 2015: proceedings of the 2nd International Conference on Electrical Information and Communication Technologies. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 19-23 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

Rotational cryptanalysis of ARX revisited

Khovratovich, D., Nikolić, I., Pieprzyk, J., Sokołowski, P. & Steinfeld, R., 2015, Fast software encryption: 22nd international workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015: Revised Selected Papers. Leander, G. (ed.). Berlin: Springer, Springer Nature, p. 519-536 18 p. (Lecture Notes in Computer Science; vol. 9054).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

1 Citation (Scopus)
2014

A case study of user-level spam filtering

Bajaj, K. S. & Pieprzyk, J., 2014, Information Security 2014 - Proceedings of the Twelfth Australasian Information Security Conference, AISC 2014. Parampalli, U. & Welch, I. (eds.). Sydney, Australia: Australian Computer Society, Vol. 149. p. 67-75 9 p. (Conferences in Research and Practice in Information Technology - CRPIT).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

1 Citation (Scopus)

A survey: error control methods used in bio-cryptography

Pussewalage, H. S. G., Hu, J. & Pieprzyk, J., 9 Dec 2014, FSKD 2014: Proceedings of the 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 956-962 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

4 Citations (Scopus)

Can we CAN the email spam

Bajaj, S. K. & Pieprzyk, J., 6 Mar 2014, 2013 Fourth Cybercrime and Trustworthy Computing Workshop (CTC 2013). Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 36-43 8 p. 6754639

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

3 Citations (Scopus)

Dual compressible hybrid quantum secret sharing schemes based on extended unitary operations

Lai, H., Orgun, M., Xue, L., Xiao, J. & Pieprzyk, J., 2014, Quantum Information and Computation XII. Donkor, E., Pirich, A. R., Brandt, H. E., Frey, M. R., Lomonaco Jr., S. J. & Myers, J. M. (eds.). Washington, DC: SPIE, Vol. 9123. p. 1-13 13 p. 912309

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

Open Access
File
3 Citations (Scopus)
17 Downloads (Pure)

Low probability differentials and the cryptanalysis of full-round CLEFIA-128

Emami, S., Ling, S., Nikolić, I., Pieprzyk, J. & Wang, H., 2014, Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings, Part I. Sarkar, P. & Iwata, T. (eds.). Heidelberg: Springer, Springer Nature, Vol. 8873. p. 141-157 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8873).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

2 Citations (Scopus)

Predicting tours and probabilistic simulation for BKZ lattice reduction algorithm

Haque, M. M., Pieprzyk, J. & Asaduzzaman, 17 Dec 2014, IFOST 2014: Proceedings of the 9th International Forum on Strategic Technology. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 1-4 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

Rotational cryptanalysis of round-reduced Keccak

Morawiecki, P., Pieprzyk, J. & Srebrny, M., 2014, Fast Software Encryption - 20th International Workshop, FSE 2013, Revised Selected Papers. Moriai, S. (ed.). Heidelberg: Springer, Springer Nature, Vol. 8424 LNCS. p. 241-262 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8424 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

15 Citations (Scopus)
2013

Cryptanalysis of RC4(n, m) stream cipher

Orumiehchiha, M. A., Pieprzyk, J., Shakour, E. & Steinfeld, R., 2013, SIN 2013 - Proceedings of the 6th International Conference on Security of Information and Networks. Elçi, A., Chefranov, A., Gaur, M. S., Orgun, M. A., Makarevich, O. B. & Çelik, Y. (eds.). New York: ACM, p. 165-172 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

7 Citations (Scopus)

Does counting still count? Revisiting the security of counting based user authentication protocols against statistical attacks

Asghar, H. J., Li, S., Steinfeld, R. & Pieprzyk, J., 2013, NDSS 2013: 20th Annual Network & Distributed System Security Symposium : proceedings. Geneva, Switzerland: Internet Society, p. 1-18 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

Security evaluation of Rakaposhi stream cipher

Orumiehchiha, M. A., Pieprzyk, J., Shakour, E. & Steinfeld, R., 2013, Information Security Practice and Experience - 9th International Conference, ISPEC 2013, Proceedings. Deng, R. H. & Feng, T. (eds.). Heidelberg: Springer, Springer Nature, Vol. 7863 LNCS. p. 361-371 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7863 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

7 Citations (Scopus)

Truncated differential analysis of reduced-round LBlock

Emami, S., McDonald, C., Pieprzyk, J. & Steinfeld, R., 2013, Cryptology and Network Security - 12th International Conference, CANS 2013, Proceedings. Abdalla, M., Nita-Rotaru, C. & Dahab, R. (eds.). Cham: Springer, Springer Nature, Vol. 8257. p. 291-308 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8257 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

2 Citations (Scopus)

Welcome message from the CTC Steering Committee

Brown, S., Layton, R., McCombie, S., Pieprzyk, J. & Watters, P. A., 2013, CTC 2013: Fourth Cybercrime and Trustworthy Computing Workshop. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. vi-vi 1 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

2012

Cryptanalysis of RC4-based hash function

Orumiehchiha, M. A., Pieprzyk, J. & Steinfeld, R., 2012, Information Security 2012 - Proceedings of the Tenth Australasian Information Security Conference, AISC 2012. Pieprzyk, J. & Thomborson, C. (eds.). Sydney: Australian Computer Society, Vol. 125. p. 33-38 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

1 Citation (Scopus)

Taxonomy and control measures of SPAM and SPIM

Bajaj, K. & Pieprzyk, J., 2012, Advances in Computer Science and Information Technology. Computer Science and Information Technology: Second International Conference, CCSIT 2012, Bangalore, India, January 2-4, 2012.. Meghanathan, N. & Chaki, N. (eds.). Berlin; New York: Springer, Springer Nature, Vol. 86. p. 529-542 14 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; vol. 86).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

2011

Critical analysis of spam prevention techniques

Bajaj, K. S., Egbufor, F. & Pieprzyk, J., 2011, Proceedings of the 3rd International Workshop on Security and Communication Networks, IWSCN 2011. Piscataway, N.J.: Institute of Electrical and Electronics Engineers (IEEE), p. 83-87 5 p. 6827721

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

2 Citations (Scopus)

Known and chosen key differential distinguishers for block ciphers

Nikolić, I., Pieprzyk, J., Sokołowski, P. & Steinfeld, R., 2011, Information Security and Cryptology, ICISC 2010 - 13th International Conference, Revised Selected Papers. Rhee, K-H. & Nyang, D. (eds.). Heidelberg: Springer, Springer Nature, Vol. 6829. p. 29-48 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6829 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

13 Citations (Scopus)

Lattice-based completely non-malleable PKE in the standard model (poster)

Sepahi, R., Steinfeld, R. & Pieprzyk, J., 2011, Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Proceedings. Parampalli, U. & Hawkes, P. (eds.). Heidelberg: Springer, Springer Nature, Vol. 6812 LNCS. p. 407-411 5 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6812 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

2 Citations (Scopus)

Robust numeric set watermarking: Numbers don't lie

Gupta, G., Pieprzyk, J. & Kankanhalli, M., 2011, e-Business and Telecommunications - 6th International Joint Conference, ICETE 2009, Revised Selected Papers. Obaidat, M. S. & Filipe, J. (eds.). Heidelberg: Springer, Springer Nature, Vol. 130 CCIS. p. 253-265 13 p. (Communications in Computer and Information Science; vol. 130 CCIS).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

1 Citation (Scopus)
2010

A new human identification protocol and Coppersmith's baby-step giant-step algorithm

Asghar, H. J., Pieprzyk, J. & Wang, H., Jun 2010, Applied Cryptography and Network Security - 8th International Conference, ACNS 2010, Proceedings. Zhou, J. & Yung, M. (eds.). Berlin; New York: Springer, Springer Nature, p. 349-366 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6123 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

15 Citations (Scopus)

Binary image steganographic techniques classification based on multi-class steganalysis

Chiew, K. L. & Pieprzyk, J., 2010, Information Security Practice and Experience: 6th International Conference, ISPEC 2010 Seoul, Korea, May 12-13, 2010 Proceedings. Kwak, J., Deng, R. H., Won, Y. & Wang, G. (eds.). Berlin; Heidelberg: Springer, Springer Nature, p. 341-358 18 p. (Lecture Notes in Computer Science; vol. 6047).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

15 Citations (Scopus)

Blind steganalysis: a countermeasure for binary image steganography

Chiew, K. L. & Pieprzyk, J., Feb 2010, 2010 International Conference on Availability, Reliability and Security (ARES 2010) . Piscataway, N.J.: Institute of Electrical and Electronics Engineers (IEEE), p. 653-658 6 p. 5438022

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

Open Access
File
15 Citations (Scopus)
2 Downloads (Pure)

Cryptanalysis of the convex hull click human identification protocol

Asghar, H. J., Li, S., Pieprzyk, J. & Wang, H., 2010, Information Security - 13th International Conference, ISC 2010, Revised Selected Papers. Burmester, M., Tsudik, G. & Magliveras, S. S. (eds.). Berlin: Springer, Springer Nature, Vol. 6531. p. 24-30 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6531 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

13 Citations (Scopus)

Efficient fuzzy matching and intersection on private datasets

Ye, Q., Steinfeld, R., Pieprzyk, J. & Wang, H., 2010, Information Security and Cryptology - ICISC 2009 - 12th International Conference, Revised Selected Papers. Lee, D. & Hong, S. (eds.). Berlin; Heidelberg: Springer, Springer Nature, Vol. 5984 LNCS. p. 211-228 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5984 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

6 Citations (Scopus)

Estimating hidden message length in binary image embedded by using boundary pixels steganography

Chiew, K. L. & Pieprzyk, J., Feb 2010, 2010 International Conference on Availability, Reliability and Security (ARES 2010) . Piscataway, N.J.: Institute of Electrical and Electronics Engineers (IEEE), p. 683-688 6 p. 5438015

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

Open Access
File
13 Citations (Scopus)
8 Downloads (Pure)

Identifying steganographic payload location in binary image

Chiew, K. L. & Pieprzyk, J., 2010, Advances in Multimedia Information Processing - PCM 2010: 11th Pacific Rim Conference on Multimedia Shanghai, China, September 21-24, 2010 Proceedings, Part I. Qiu, G., Lam, K. M., Kiya, H., Xue, X-Y., Kuo, C-C. J. & Lew, M. S. (eds.). Berlin; Heidelberg: Springer, Springer Nature, p. 590-600 11 p. (Lecture Notes in Computer Science; vol. 6297, no. PART 1).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

3 Citations (Scopus)

Protecting web 2.0 services from botnet exploitations

Vo, N. H. & Pieprzyk, J., 2010, Proceedings - 2nd Cybercrime and Trustworthy Computing Workshop, CTC 2010. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 18-28 11 p. 5615134

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

Open Access
File
7 Citations (Scopus)
5 Downloads (Pure)

Secure coprocessor-based private information retrieval without periodical preprocessing

Wang, P., Wang, H. & Pieprzyk, J., 2010, Information Security 2010 - Proceedings of the Eighth Australasian Information Security Conference, AISC 2010. Boyd, C. & Susilo, W. (eds.). Sydney, Australia: Australian Computer Society, Vol. 105. p. 5-11 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

Winning the phishing war: A strategy for Australia

McCombie, S. & Pieprzyk, J., 2010, Proceedings - 2nd Cybercrime and Trustworthy Computing Workshop, CTC 2010. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 79-86 8 p. 5615076

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

Open Access
File
13 Citations (Scopus)
44 Downloads (Pure)
2009

An efficient scheme of common secure indices for conjunctive keyword-based retrieval on encrypted data

Wang, P., Wang, H. & Pieprzyk, J., 2009, Information Security Applications - 9th International Workshop, WISA 2008, Revised Selected Papers. Chung, K-I., Sohn, K. & Yung, M. (eds.). Heidelberg, Vol. 5379 LNCS. p. 145-159 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5379 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

23 Citations (Scopus)

Certified pseudonyms colligated with master secret key

Pasupathinathan, V., Pieprzyk, J. & Wang, H., 2009, SECRYPT 2009 - International Conference on Security and Cryptography, Proceedings. Fernández-Medina, E., Malek, M. & Hernando, J. (eds.). Setúbal, Portugal: INSTICC, p. 190-197 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

Cryptanalysis of the LAKE hash family

Biryukov, A., Gauravaram, P., Guo, J., Khovratovich, D., Ling, S., Matusiewicz, K., Nikolić, I., Pieprzyk, J. & Wang, H., 2009, Fast software encryption: 16th International Workshop, FSE 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers. Dunkelman, O. (ed.). Berlin: Springer, Springer Nature, p. 156-179 24 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5665 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

4 Citations (Scopus)

Cybercrime attribution: an Eastern European case study

McCombie, S., Pieprzyk, J. & Watters, P., 2009, Proceedings of the 7th Australian Digital Forensics Conference. Valli, C. (ed.). Perth, Australia: secAU - Security Research Centre, Edith Cowan University, p. 41-51 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

Open Access
File
8 Citations (Scopus)
4 Downloads (Pure)

Database relation watermarking resilient against secondary watermarking attacks

Gupta, G. & Pieprzyk, J., Dec 2009, Information Systems Security - 5th International Conference, ICISS 2009, Proceedings. Prakash, A. & Sen Gupta, I. (eds.). Berlin; Heidelberg: Springer, Springer Nature, Vol. 5905 LNCS. p. 222-236 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5905 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

24 Citations (Scopus)

Extensions of the cube attack based on low degree annihilators

Zhang, A., Lim, C. W., Khoo, K., Wei, L. & Pieprzyk, J., 2009, Cryptology and Network Security - 8th International Conference, CANS 2009, Proceedings. Garay, J. A., Miyaji, A. & Otsuka, A. (eds.). Berlin, Germany: Springer, Springer Nature, Vol. 5888 LNCS. p. 87-102 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5888 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

2 Citations (Scopus)

On the security of PAS (Predicate-based Authentication Service)

Li, S., Asghar, H. J., Pieprzyk, J., Sadeghi, A. R., Schmitz, R. & Wang, H., 2009, 25th Annual Computer Conference Security Applications, ACSAC 2009. Ceballos, S. (ed.). Pistacaway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 209-218 10 p. 5380509

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

Open Access
File
16 Citations (Scopus)
13 Downloads (Pure)

Robust and reversible numerical set watermarking

Gupta, G., Pieprzyk, J. & Kankanhalli, M., 2009, ICETE 2009 - International Joint Conference on e-Business and Telecommunications. Assunção, P. A. A. & Faria, S. M. M. (eds.). Setubal: INSTICC, p. 141-148 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

1 Citation (Scopus)
2008

A critical look at cryptographic hash function literature

Contini, S., Steinfeld, R., Pieprzyk, J. & Matusiewicz, K., 2008, Coding and cryptology: proceedings of the first international workshop Wuyi Mountain, Fujian, China, 11 – 15 June 2007. Li, Y., Ling, S., Niederreiter, H., Wang, H., Xing, C. & Zhang, S. (eds.). Toh Tuck Link, Singapore: World Scientific Publishing, p. 58-79 22 p. (Series on Coding Theory and Cryptology; vol. 4).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

A fair e-tendering protocol

Pasupathinathan, V., Pieprzyk, J. & Wang, H., 2008, SECRYPT 2008 - International Conference on Security and Cryptography, Proceedings. Fernández-Medina, E. (ed.). Portugal: Institute for Systems and Technologies of Information, Control and Communication, p. 294-299 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

Open Access
File
2 Citations (Scopus)
3 Downloads (Pure)

An Algebraic analysis of trivium ciphers based on the boolean satisfiability problem

Mcdonald, C., Charnes, C. & Pieprzyk, J., 2008, BFCA'08: Proceedings of Fourth International Workshop on Boolean Functions : Cryptography and Applications. Masnyk-Hansen, O., Michon, J-F., Valarcher, P. & Yunès, J-B. (eds.). p. 173-184 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

An improved distinguisher for Dragon

Cho, J. & Pieprzyk, J., 2008, Coding and cryptology: proceedings of the first international workshop Wuyi Mountain, Fujian, China, 11 – 15 June 2007. Li, Y., Ling, S., Niederreiter, H., Wang, H., Xing, C. & Zhang, S. (eds.). Singapore; London: World Scientific Publishing, Vol. 4. p. 91-108 18 p. (Series on coding theory and cryptology; vol. 4).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

An on-line secure e-passport protocol

Pasupathinathan, V., Pieprzyk, J. & Wang, H., 2008, Information Security Practice and Experience - 4th International Conference, ISPEC 2008, Proceedings. Chen, L., Mu, Y. & Susilo, W. (eds.). Berlin; New York: Springer, Springer Nature, Vol. 4991. p. 14-28 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4991 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

16 Citations (Scopus)

Cryptanalysis of LASH

Steinfeld, R., Contini, S., Matusiewicz, K., Pieprzyk, J., Guo, J., Ling, S. & Wang, H., 2008, Fast Software Encryption - 15th International Workshop, FSE 2008, Revised Selected Papers. Nyberg, K. (ed.). Berlin; New York: Springer, Springer Nature, Vol. 5086 LNCS. p. 207-223 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5086 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

1 Citation (Scopus)

Distributed private matching and set operations

Ye, Q., Wang, H. & Pieprzyk, J., 2008, Information Security Practice and Experience: 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings. Chen, L., Mu, Y. & Susilo, W. (eds.). Berlin: Springer, Springer Nature, p. 347-360 14 p. (Lecture Notes in Computer Science; vol. 4991).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

34 Citations (Scopus)