• 2535 Citations
  • 22 h-Index
1979 …2019

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Outputs

Filter
Article
2019

Efficient quantum private queries based on quantum key distribution with pulse-position modulation

Lai, H., Luo, M., Xu, Y., Pieprzyk, J., Pan, L., Zhang, J. & Orgun, M. A., May 2019, In : Laser Physics. 29, 5, 7 p., 055201.

Research output: Contribution to journalArticle

2018

A large-alphabet three-party quantum key distribution protocol based on orbital and spin angular momenta hybrid entanglement

Lai, H., Luo, M., Zhang, J., Pieprzyk, J., Pan, L. & Orgun, M. A., 1 Jul 2018, In : Quantum Information Processing. 17, 7, p. 1-11 11 p., 162.

Research output: Contribution to journalArticle

A quantum secret sharing scheme using orbital angular momentum onto multiple spin states based on Fibonacci compression encoding

Lai, H., Luo, M-X., Xu, Y-J., Pieprzyk, J., Zhang, J., Pan, L. & Orgun, M. A., 1 Oct 2018, In : Communications in Theoretical Physics. 70, 4, p. 384-390 7 p.

Research output: Contribution to journalArticle

Efficient quantum key distribution using Fibonacci-number coding with a biased basis choice

Lai, H., Luo, M., Pieprzyk, J., Qu, Z. & Orgun, M. A., 1 Jun 2018, In : Information Processing Letters. 134, p. 24-30 7 p.

Research output: Contribution to journalArticle

High-rate and high-capacity measurement-device-independent quantum key distribution with Fibonacci matrix coding in free space

Lai, H., Luo, M., Pieprzyk, J., Zhang, J., Pan, L. & Orgun, M. A., 1 Jun 2018, In : Science China Information Sciences. 61, 6, p. 1-11 11 p., 062501.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Preprocessing optimisation: revisiting recursive-BKZ lattice reduction algorithm

Haque, M. M. & Pieprzyk, J., 1 Nov 2018, In : IET Information Security. 12, 6, p. 551-557 7 p.

Research output: Contribution to journalArticle

Round-robin-differential-phase-shift quantum key distribution based on wavelength division multiplexing

Lai, H., Luo, M., Xu, Y., Pieprzyk, J., Zhang, J., Pan, L. & Orgun, M. A., 1 Nov 2018, In : Laser Physics Letters. 15, 11, p. 1-7 7 p., 115201.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Tunable multi-party high-capacity quantum key distribution based on m-generalized Fibonacci sequences using golden coding

Lai, H., Luo, M., Orgun, M. A., Pieprzyk, J., Xiao, F. & Zhan, C., 1 Sep 2018, In : Quantum Information Processing. 17, 9, p. 1-12 12 p., 246.

Research output: Contribution to journalArticle

2017

Analysing recursive preprocessing of BKZ lattice reduction algorithm

Haque, M. M. & Pieprzyk, J., 1 Mar 2017, In : IET Information Security. 11, 2, p. 114-120 7 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

An efficient quantum blind digital signature scheme

Lai, H., Luo, M., Pieprzyk, J., Qu, Z., Li, S. & Orgun, M. A., 1 Aug 2017, In : Science China Information Sciences. 60, 8, p. 082501:1–082501:14 14 p., 082501.

Research output: Contribution to journalArticle

6 Citations (Scopus)
6 Citations (Scopus)

Fast and simple high-capacity quantum cryptography with error detection

Lai, H., Luo, M-X., Pieprzyk, J., Zhang, J., Pan, L., Li, S. & Orgun, M. A., 13 Apr 2017, In : Scientific Reports. 7, p. 1-11 11 p., 46302.

Research output: Contribution to journalArticle

Open Access
File
4 Citations (Scopus)
12 Downloads (Pure)
2016

High-capacity quantum key distribution using Chebyshev-map values corresponding to Lucas numbers coding

Lai, H., Orgun, M. A., Pieprzyk, J., Li, J., Luo, M., Xiao, J. & Xiao, F., 1 Nov 2016, In : Quantum Information Processing. 15, 11, p. 4663-4679 17 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Hybrid threshold adaptable quantum secret sharing scheme with reverse Huffman-Fibonacci-tree coding

Lai, H., Zhang, J., Luo, M. X., Pan, L., Pieprzyk, J., Xiao, F. & Orgun, M. A., 12 Aug 2016, In : Scientific Reports. 6, p. 1-12 12 p., 31350.

Research output: Contribution to journalArticle

Open Access
File
12 Citations (Scopus)
19 Downloads (Pure)

Large-capacity three-party quantum digital secret sharing using three particular matrices coding

Lai, H., Luo, M. X., Pieprzyk, J., Tao, L., Liu, Z. M. & Orgun, M. A., 1 Nov 2016, In : Communications in Theoretical Physics. 66, 5, p. 501-508 8 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)
2015

A hybrid quantum key distribution protocol based on extended unitary operations and fountain codes

Lai, H., Xue, L., Orgun, M. A., Xiao, J. & Pieprzyk, J., Feb 2015, In : Quantum Information Processing. 14, 2, p. 697-713 17 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)
32 Citations (Scopus)

Controllable quantum private queries using an entangled Fibonacci-sequence spiral source

Lai, H., Orgun, M. A., Pieprzyk, J., Xiao, J., Xue, L. & Jia, Z., 23 Oct 2015, In : Physics Letters, Section A: General, Atomic and Solid State Physics. 379, 40-41, p. 2561-2568 8 p.

Research output: Contribution to journalArticle

13 Citations (Scopus)

Dynamic (2,3) Threshold Quantum Secret Sharing of Secure Direct Communication

Lai, H., Mehmet, O. A., Xiao, J. H., Josef, P. & Xue, L. Y., 1 Apr 2015, In : Communications in Theoretical Physics. 63, 4, p. 459-465 7 p., 459.

Research output: Contribution to journalArticle

5 Citations (Scopus)

On the linearization of human identification protocols: Attacks based on linear algebra, coding theory, and lattices

Asghar, H. J., Steinfeld, R., Li, S., Kaafar, M. A. & Pieprzyk, J., 1 Aug 2015, In : IEEE Transactions on Information Forensics and Security. 10, 8, p. 1643-1655 13 p., 7083737.

Research output: Contribution to journalArticle

6 Citations (Scopus)
2014

A strong lightweight authentication protocol for low-cost RFID systems

Shi, Z., Pieprzyk, J., Doche, C., Xia, Y., Zhang, Y. & Dai, J., 2014, In : International Journal of Security and its Applications. 8, 6, p. 225-234 10 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)

A subexponential construction of graph coloring for multiparty computation

Asghar, H. J., Desmedt, Y., Pieprzyk, J. & Steinfeld, R., 1 Dec 2014, In : Journal of Mathematical Cryptology. 8, 4, p. 363-403 41 p.

Research output: Contribution to journalArticle

Lattice-based certificateless public-key encryption in the standard model

Sepahi, R., Steinfeld, R. & Pieprzyk, J., 2014, In : International Journal of Information Security. 13, 4, p. 315-333 19 p.

Research output: Contribution to journalArticle

7 Citations (Scopus)

Lattice-based completely non-malleable public-key encryption in the standard model

Sepahi, R., Steinfeld, R. & Pieprzyk, J., 2014, In : Designs, Codes and Cryptography. 71, 2, p. 293-313 21 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

Practical attack on NLM-MAC scheme

Orumiehchiha, M. A., Pieprzyk, J. & Steinfeld, R., 2014, In : Information Processing Letters. 114, 10, p. 547-550 4 p.

Research output: Contribution to journalArticle

Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model

Lai, H., Orgun, M. A., Xiao, J., Pieprzyk, J., Xue, L. & Yang, Y., Sep 2014, In : Nonlinear Dynamics. 77, 4, p. 1427-1439 13 p.

Research output: Contribution to journalArticle

18 Citations (Scopus)

Quantum direct secret sharing with efficient eavesdropping-check and authentication based on distributed fountain codes

Lai, H., Xiao, J., Orgun, M. A., Xue, L. & Pieprzyk, J., 2014, In : Quantum Information Processing. 13, 4, p. 895-907 13 p.

Research output: Contribution to journalArticle

11 Citations (Scopus)

The resistance of PRESENT-80 against related-key differential attacks

Emami, S., Ling, S., Nikolić, I., Pieprzyk, J. & Wang, H., 2014, In : Cryptography and Communications. 6, 3, p. 171-187 17 p.

Research output: Contribution to journalArticle

7 Citations (Scopus)
2013

Cryptanalysis of the convex hull click human identification protocol

Asghar, H. J., Pieprzyk, J., Li, S. & Wang, H., 2013, In : International Journal of Information Security. 12, 2, p. 83-96 14 p.

Research output: Contribution to journalArticle

8 Citations (Scopus)

Security analysis of linearly filtered NLFSRs

Orumiehchiha, M. A., Pieprzyk, J., Steinfeld, R. & Bartlett, H., 1 Dec 2013, In : Journal of Mathematical Cryptology. 7, 4, p. 313-332 20 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)
2012

Characterising and predicting cyber attacks using the Cyber Attacker Model Profile (CAMP)

Watters, P. A., McCombie, S., Layton, R. & Pieprzyk, J., 2012, In : Journal of Money Laundering Control. 15, 4, p. 430-441 12 p.

Research output: Contribution to journalArticle

25 Citations (Scopus)

Cryptanalysis of WG-7: a lightweight stream cipher

Orumiehchiha, M. A., Pieprzyk, J. & Steinfeld, R., 2012, In : Cryptography and Communications. 4, 3-4, p. 277-285 9 p.

Research output: Contribution to journalArticle

17 Citations (Scopus)

Graph coloring applied to secure computation in non-Abelian groups

Desmedt, Y., Pieprzyk, J., Steinfeld, R., Sun, X., Tartary, C., Wang, H. & Yao, A. C. C., Oct 2012, In : Journal of Cryptology. 25, 4, p. 557-600 44 p.

Research output: Contribution to journalArticle

5 Citations (Scopus)

Multi-party computation with conversion of secret sharing

Ghodosi, H., Pieprzyk, J. & Steinfeld, R., 2012, In : Designs, Codes and Cryptography. 62, 3, p. 259-272 14 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

New security notions and relations for public-key encryption

Sepahi, R., Pieprzyk, J., Shahandashti, S. F. & Schoenmakers, B., Dec 2012, In : Journal of Mathematical Cryptology. 6, 3-4, p. 183-227 45 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)
2011

Bucket attack on numeric set watermarking model and safeguards

Gupta, G., Pieprzyk, J. & Hamey, L., May 2011, In : Information Security Technical Report. 16, 2, p. 59-66 8 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Möbius transforms, coincident Boolean functions and non-coincidence property of Boolean functions

Pieprzyk, J., Wang, H. & Zhang, X. M., May 2011, In : International Journal of Computer Mathematics. 88, 7, p. 1398-1416 19 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

On the hardness of the sum of k mins problem

Asghar, H. J., Pieprzyk, J. & Wang, H., Oct 2011, In : Computer Journal. 54, 10, p. 1652-1660 9 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Socio-technological phishing prevention

Gupta, G. & Pieprzyk, J., May 2011, In : Information Security Technical Report. 16, 2, p. 67-73 7 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)
2010

Decomposition construction fo r secret sharing schemes with graph access structures in polynomial time

Sun, H. M., Wang, H., Ku, B. H. & Pieprzyk, J., 2010, In : SIAM Journal on Discrete Mathematics. 24, 2, p. 617-638 22 p.

Research output: Contribution to journalArticle

Open Access
File
6 Citations (Scopus)
2009
1 Citation (Scopus)

Reversible and blind database watermarking using difference expansion

Gupta, G. & Pieprzyk, J., Apr 2009, In : International Journal of Digital Crime and Forensics. 1, 2, p. 42-54 13 p.

Research output: Contribution to journalArticle

14 Citations (Scopus)

Unconditionally secure disjointness tests for private datasets

Ye, Q., Wang, H., Pieprzyk, J. & Zhang, X. M., Feb 2009, In : International Journal of Applied Cryptography. 1, 3, p. 225-235 11 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)
2008

A coding approach to the multicast stream authentication problem

Tartary, C., Wang, H. & Pieprzyk, J., Aug 2008, In : International Journal of Information Security. 7, 4, p. 265-283 19 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Analysis of bilinear pairing-based accumulator for identity escrowing

Tartary, C., Zhou, S., Lin, D., Wang, H. & Pieprzyk, J., 2008, In : IET Information Security. 2, 4, p. 99-107 9 p.

Research output: Contribution to journalArticle

6 Citations (Scopus)

Permutation polynomials of the form (xp - x + δ)s + L (x)

Yuan, J., Ding, C., Wang, H. & Pieprzyk, J., Apr 2008, In : Finite Fields and their Applications. 14, 2, p. 482-493 12 p.

Research output: Contribution to journalArticle

38 Citations (Scopus)

Security analysis of Australian and E.U. E-passport implementation

Pasupathinathan, V., Pieprzyk, J. & Wang, H., 2008, In : Journal of Research and Practice in Information Technology. 40, 3, p. 187-205 19 p.

Research output: Contribution to journalArticle

7 Citations (Scopus)

The eight variable homogeneous degree three bent functions

Charnes, C., Dempwolff, U. & Pieprzyk, J., Mar 2008, In : Journal of Discrete Algorithms. 6, 1, p. 66-72 7 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)
2007

Lattice-based threshold changeability for standard Shamir secret-sharing schemes

Steinfeld, R., Pieprzyk, J. & Wang, H., Jul 2007, In : IEEE Transactions on Information Theory. 53, 7, p. 2542-2559 18 p.

Research output: Contribution to journalArticle

Open Access
File
21 Citations (Scopus)
6 Downloads (Pure)

New constructions of anonymous membership broadcasting schemes

van Tilborg, H., Pieprzyk, J., Steinfeld, R. & Wang, H., Feb 2007, In : Advances in Mathematics of Communications. 1, 1, p. 29-44 16 p.

Research output: Contribution to journalArticle