Find Research Outputs

Search concepts
Selected filters

Publication Year

  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011

Author

  • Josef Pieprzyk
2018

Efficient quantum key distribution using Fibonacci-number coding with a biased basis choice

Lai, H., Luo, M., Pieprzyk, J., Qu, Z. & Orgun, M. A., 1 Jun 2018, In : Information Processing Letters. 134, p. 24-30 7 p.

Research output: Contribution to journalArticle

2011

Privacy enhancements for hardware-based security modules

Pasupathinathan, V., Pieprzyk, J. & Wang, H., 2011, e-Business and Telecommunications: 6th International Joint Conference, ICETE 2009, Milan, Italy, July 7-10, 2009. Revised Selected Papers. Obaidat, M. S. & Filipe, J. (eds.). Heidelberg: Springer, Springer Nature, p. 224-236 13 p. (Communications in Computer and Information Science; vol. 130).

Research output: Chapter in Book/Report/Conference proceedingChapter

2017

An efficient quantum blind digital signature scheme

Lai, H., Luo, M., Pieprzyk, J., Qu, Z., Li, S. & Orgun, M. A., 1 Aug 2017, In : Science China Information Sciences. 60, 8, p. 082501:1–082501:14 14 p., 082501.

Research output: Contribution to journalArticle

6 Citations (Scopus)

Preface

Pieprzyk, J. & Suriadi, S., 2017, Information Security and Privacy: 22nd Australasian conference : proceedings. Pieprzyk, J. & Suriadi, S. (eds.). Cham, Switzerland: Springer, Springer Nature, Vol. Part 1. p. V 1 p. (Lecture Notes in Computer Science; vol. 10342).

Research output: Chapter in Book/Report/Conference proceedingForeword/postscript/introduction

2013

Welcome message from the CTC Steering Committee

Brown, S., Layton, R., McCombie, S., Pieprzyk, J. & Watters, P. A., 2013, CTC 2013: Fourth Cybercrime and Trustworthy Computing Workshop. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. vi-vi 1 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

Truncated differential analysis of reduced-round LBlock

Emami, S., McDonald, C., Pieprzyk, J. & Steinfeld, R., 2013, Cryptology and Network Security - 12th International Conference, CANS 2013, Proceedings. Abdalla, M., Nita-Rotaru, C. & Dahab, R. (eds.). Cham: Springer, Springer Nature, Vol. 8257. p. 291-308 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8257 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

2 Citations (Scopus)
2014

Rotational cryptanalysis of round-reduced Keccak

Morawiecki, P., Pieprzyk, J. & Srebrny, M., 2014, Fast Software Encryption - 20th International Workshop, FSE 2013, Revised Selected Papers. Moriai, S. (ed.). Heidelberg: Springer, Springer Nature, Vol. 8424 LNCS. p. 241-262 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8424 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

15 Citations (Scopus)
2011

Preface

Boyd, C. & Pieprzyk, J., 2011, In : Conferences in Research and Practice in Information Technology Series. 116, p. vii 1 p.

Research output: Contribution to journalEditorial

2013

Does counting still count? Revisiting the security of counting based user authentication protocols against statistical attacks

Asghar, H. J., Li, S., Steinfeld, R. & Pieprzyk, J., 2013, NDSS 2013: 20th Annual Network & Distributed System Security Symposium : proceedings. Geneva, Switzerland: Internet Society, p. 1-18 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

2012

On the (in)security of IDEA in various hashing modes

Wei, L., Peyrin, T., Sokołowski, P., Ling, S., Pieprzyk, J. & Wang, H., 2012, Fast Software Encryption: 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers. Canteaut, A. (ed.). Berlin: Springer, Springer Nature, p. 163-179 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7549 LNCS).

Research output: Chapter in Book/Report/Conference proceedingChapter

8 Citations (Scopus)
2011

Lattice-based completely non-malleable PKE in the standard model (poster)

Sepahi, R., Steinfeld, R. & Pieprzyk, J., 2011, Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Proceedings. Parampalli, U. & Hawkes, P. (eds.). Heidelberg: Springer, Springer Nature, Vol. 6812 LNCS. p. 407-411 5 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6812 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

2 Citations (Scopus)

Reversible and blind database watermarking using difference expansion

Gupta, G. & Pieprzyk, J., 2011, New technologies for digital crime and forensics: devices, applications, and software. Li, C-T. & Ho, A. T. S. (eds.). Hershey, PA: Information Science Reference, p. 190-201 12 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

2018

A quantum secret sharing scheme using orbital angular momentum onto multiple spin states based on Fibonacci compression encoding

Lai, H., Luo, M-X., Xu, Y-J., Pieprzyk, J., Zhang, J., Pan, L. & Orgun, M. A., 1 Oct 2018, In : Communications in Theoretical Physics. 70, 4, p. 384-390 7 p.

Research output: Contribution to journalArticle

2011

Bucket attack on numeric set watermarking model and safeguards

Gupta, G., Pieprzyk, J. & Hamey, L., May 2011, In : Information Security Technical Report. 16, 2, p. 59-66 8 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)
2014

Lattice-based completely non-malleable public-key encryption in the standard model

Sepahi, R., Steinfeld, R. & Pieprzyk, J., 2014, In : Designs, Codes and Cryptography. 71, 2, p. 293-313 21 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)
2013

Welcome message: CTC 2012

Layton, R., McCombie, S., Pieprzyk, J. & Watters, P. A., 2013, In : Proceedings - 2012 3rd Cybercrime and Trustworthy Computing Workshop, CTC 2012. 3, p. vii-vii 1 p., 6498418.

Research output: Contribution to journalEditorial

2011

Program chairs' welcome

Pieprzyk, J., Babenko, L., Chefranov, A. & Shankaran, R., 2011, Proceedings of the 6th International Conference on Security of Information and Networks. Elci, A., Chefranov, A., Singh Gaur, M., Orgun, M. A., Mararevich, O. B. & Celik, Y. (eds.). New York: ACM, p. iv 1 p.

Research output: Chapter in Book/Report/Conference proceedingForeword/postscript/introduction

2019

Efficient quantum private queries based on quantum key distribution with pulse-position modulation

Lai, H., Luo, M., Xu, Y., Pieprzyk, J., Pan, L., Zhang, J. & Orgun, M. A., May 2019, In : Laser Physics. 29, 5, p. 1-7 7 p., 055201.

Research output: Contribution to journalArticle

2012

Preface

Pieprzyk, J. & Thomborson, C., 2012, Information Security 2012: Proceedings of the Tenth Australasian Information Security Conference (AISC 2012), Melbourne, Australia, 31 January - 3 February 2012. Pieprzyk, J. & Thomborson, C. (eds.). Sydney: Australian Computer Society, p. vii-vii 1 p. (Conferences in Research and Practice in Information Technology; vol. 125).

Research output: Chapter in Book/Report/Conference proceedingForeword/postscript/introduction

2015

Controllable quantum private queries using an entangled Fibonacci-sequence spiral source

Lai, H., Orgun, M. A., Pieprzyk, J., Xiao, J., Xue, L. & Jia, Z., 23 Oct 2015, In : Physics Letters, Section A: General, Atomic and Solid State Physics. 379, 40-41, p. 2561-2568 8 p.

Research output: Contribution to journalArticle

13 Citations (Scopus)
2017

Preface

Pieprzyk, J. & Suriadi, S., 2017, Information Security and Privacy: 22nd Australasian conference : proceedings. Pieprzyk, J. & Suriadi, S. (eds.). Cham, Switzerland: Springer, Springer Nature, Vol. Part 2. p. V 1 p. (Lecture Notes in Computer Science; vol. 10343).

Research output: Chapter in Book/Report/Conference proceedingForeword/postscript/introduction

2015

Rotational cryptanalysis of ARX revisited

Khovratovich, D., Nikolić, I., Pieprzyk, J., Sokołowski, P. & Steinfeld, R., 2015, Fast software encryption: 22nd international workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015: Revised Selected Papers. Leander, G. (ed.). Berlin: Springer, Springer Nature, p. 519-536 18 p. (Lecture Notes in Computer Science; vol. 9054).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

1 Citation (Scopus)
2011

Known and chosen key differential distinguishers for block ciphers

Nikolić, I., Pieprzyk, J., Sokołowski, P. & Steinfeld, R., 2011, Information Security and Cryptology, ICISC 2010 - 13th International Conference, Revised Selected Papers. Rhee, K-H. & Nyang, D. (eds.). Heidelberg: Springer, Springer Nature, Vol. 6829. p. 29-48 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6829 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

13 Citations (Scopus)
2015

Cube attacks and cube-attack-like cryptanalysis on the round-reduced Keccak sponge function

Dinur, I., Morawiecki, P., Pieprzyk, J., Srebrny, M. & Straus, M., 2015, Advances in Cryptology – EUROCRYPT 2015: 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings. Oswald, E. & Fischlin, M. (eds.). Heidelberg: Springer, Springer Nature, Vol. 9056. p. 733-761 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9056).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

36 Citations (Scopus)
2014

Low probability differentials and the cryptanalysis of full-round CLEFIA-128

Emami, S., Ling, S., Nikolić, I., Pieprzyk, J. & Wang, H., 2014, Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings, Part I. Sarkar, P. & Iwata, T. (eds.). Heidelberg: Springer, Springer Nature, Vol. 8873. p. 141-157 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8873).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

2 Citations (Scopus)
2013

Preface

Elçi, A., Orgun, M. A., Pieprzyk, J., Chefranov, A. G., Wang, H. & Shankaran, R., 31 May 2013, Theory and Practice of Cryptography Solutions for Secure Information Systems. Elçi, A., Orgun, M. A., Pieprzyk, J. P., Alexander G., C., Wang, H. & Shankaran, R. (eds.). Hershey, PA: IGI Global, p. xix-xxv 7 p. (Advances in Information Security, Privacy, and Ethics (AISPE) book series).

Research output: Chapter in Book/Report/Conference proceedingForeword/postscript/introduction

2011

Möbius transforms, coincident Boolean functions and non-coincidence property of Boolean functions

Pieprzyk, J., Wang, H. & Zhang, X. M., May 2011, In : International Journal of Computer Mathematics. 88, 7, p. 1398-1416 19 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

Critical analysis of spam prevention techniques

Bajaj, K. S., Egbufor, F. & Pieprzyk, J., 2011, Proceedings of the 3rd International Workshop on Security and Communication Networks, IWSCN 2011. Piscataway, N.J.: Institute of Electrical and Electronics Engineers (IEEE), p. 83-87 5 p. 6827721

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

2 Citations (Scopus)
2015

Dynamic (2,3) Threshold Quantum Secret Sharing of Secure Direct Communication

Lai, H., Mehmet, O. A., Xiao, J. H., Josef, P. & Xue, L. Y., 1 Apr 2015, In : Communications in Theoretical Physics. 63, 4, p. 459-465 7 p., 459.

Research output: Contribution to journalArticle

6 Citations (Scopus)
2013

Cryptanalysis of RC4(n, m) stream cipher

Orumiehchiha, M. A., Pieprzyk, J., Shakour, E. & Steinfeld, R., 2013, SIN 2013 - Proceedings of the 6th International Conference on Security of Information and Networks. Elçi, A., Chefranov, A., Gaur, M. S., Orgun, M. A., Makarevich, O. B. & Çelik, Y. (eds.). New York: ACM, p. 165-172 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

7 Citations (Scopus)
2014

A subexponential construction of graph coloring for multiparty computation

Asghar, H. J., Desmedt, Y., Pieprzyk, J. & Steinfeld, R., 1 Dec 2014, In : Journal of Mathematical Cryptology. 8, 4, p. 363-403 41 p.

Research output: Contribution to journalArticle

2018

A large-alphabet three-party quantum key distribution protocol based on orbital and spin angular momenta hybrid entanglement

Lai, H., Luo, M., Zhang, J., Pieprzyk, J., Pan, L. & Orgun, M. A., 1 Jul 2018, In : Quantum Information Processing. 17, 7, p. 1-11 11 p., 162.

Research output: Contribution to journalArticle

2013

Theory and practice of cryptography solutions for secure information systems

Elçi, A. (ed.), Pieprzyk, J. (ed.), Chefranov, A. G. (ed.), Orgun, M. A. (ed.), Wang, H. (ed.) & Shankaran, R. (ed.), 31 May 2013, Hershey, PA: IGI Global. 582 p. (Advances in information security, privacy, and ethics (AISPE))

Research output: Book/ReportEdited Book/Anthology

2016

Large-capacity three-party quantum digital secret sharing using three particular matrices coding

Lai, H., Luo, M. X., Pieprzyk, J., Tao, L., Liu, Z. M. & Orgun, M. A., 1 Nov 2016, In : Communications in Theoretical Physics. 66, 5, p. 501-508 8 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)
2012

Graph coloring applied to secure computation in non-Abelian groups

Desmedt, Y., Pieprzyk, J., Steinfeld, R., Sun, X., Tartary, C., Wang, H. & Yao, A. C. C., Oct 2012, In : Journal of Cryptology. 25, 4, p. 557-600 44 p.

Research output: Contribution to journalArticle

5 Citations (Scopus)
2013

Security analysis of linearly filtered NLFSRs

Orumiehchiha, M. A., Pieprzyk, J., Steinfeld, R. & Bartlett, H., 1 Dec 2013, In : Journal of Mathematical Cryptology. 7, 4, p. 313-332 20 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)
2014

The resistance of PRESENT-80 against related-key differential attacks

Emami, S., Ling, S., Nikolić, I., Pieprzyk, J. & Wang, H., 2014, In : Cryptography and Communications. 6, 3, p. 171-187 17 p.

Research output: Contribution to journalArticle

7 Citations (Scopus)
2012

Cryptology and network security: 11th international conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012 : proceedings

Pieprzyk, J. (ed.), Sadeghi, A-R. (ed.) & Manulis, M. (ed.), 2012, Heidelberg: Springer, Springer Nature. 309 p. (Lecture notes in computer science; vol. 7712)

Research output: Book/ReportEdited Book/Anthology

2013

Program chairs' welcome

Chefranov, A., Laxmi, V., Pieprzyk, J., Babenko, L. & Yalçin, S. B. Ö., 2013, Proceedings of the 4th international conference on security of information and networks. Amsterdam, Netherlands: ACM, p. vi-vii 2 p.

Research output: Chapter in Book/Report/Conference proceedingForeword/postscript/introduction

2014

Dual compressible hybrid quantum secret sharing schemes based on extended unitary operations

Lai, H., Orgun, M., Xue, L., Xiao, J. & Pieprzyk, J., 2014, Quantum Information and Computation XII. Donkor, E., Pirich, A. R., Brandt, H. E., Frey, M. R., Lomonaco Jr., S. J. & Myers, J. M. (eds.). Washington, DC: SPIE, Vol. 9123. p. 1-13 13 p. 912309

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

Open Access
File
3 Citations (Scopus)
17 Downloads (Pure)

ICEPOLE: high-speed, hardware-oriented authenticated encryption

Morawiecki, P., Gaj, K., Homsirikamol, E., Matusiewicz, K., Pieprzyk, J., Rogawski, M., Srebrny, M. & Wójcik, M., 2014, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8731, p. 392-413 22 p.

Research output: Contribution to journalConference paper

12 Citations (Scopus)
2015

Welcome message

Brown, S., Layton, R., McCombie, S., Pieprzyk, J. & Watters, P. A., 2015, Proceedings: Fifth Cybercrime and Trustworthy Computing Conference: CTC 2014. Piscataway, USA: Institute of Electrical and Electronics Engineers (IEEE), p. vi 1 p.

Research output: Chapter in Book/Report/Conference proceedingForeword/postscript/introduction

2011

Proceedings of the 4th International Conference on Security of Information and Networks (SIN 2011)

Orgun, M. A. (ed.), Elçi, A. (ed.), Makarevich, O. B. (ed.), Huss, S. A. (ed.), Pieprzyk, J. (ed.), Babenko, L. (ed.), Chefranov, A. (ed.) & Shankaran, R. (ed.), 2011, New York, NY: Association for Computing Machinery. 263 p.

Research output: Book/ReportEdited Book/Anthology

2012

New security notions and relations for public-key encryption

Sepahi, R., Pieprzyk, J., Shahandashti, S. F. & Schoenmakers, B., Dec 2012, In : Journal of Mathematical Cryptology. 6, 3-4, p. 183-227 45 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)
2015

A hybrid quantum key distribution protocol based on extended unitary operations and fountain codes

Lai, H., Xue, L., Orgun, M. A., Xiao, J. & Pieprzyk, J., Feb 2015, In : Quantum Information Processing. 14, 2, p. 697-713 17 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)
2012

Taxonomy and control measures of SPAM and SPIM

Bajaj, K. & Pieprzyk, J., 2012, Advances in Computer Science and Information Technology. Computer Science and Information Technology: Second International Conference, CCSIT 2012, Bangalore, India, January 2-4, 2012.. Meghanathan, N. & Chaki, N. (eds.). Berlin; New York: Springer, Springer Nature, Vol. 86. p. 529-542 14 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; vol. 86).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

2015

On the linearization of human identification protocols: Attacks based on linear algebra, coding theory, and lattices

Asghar, H. J., Steinfeld, R., Li, S., Kaafar, M. A. & Pieprzyk, J., 1 Aug 2015, In : IEEE Transactions on Information Forensics and Security. 10, 8, p. 1643-1655 13 p., 7083737.

Research output: Contribution to journalArticle

6 Citations (Scopus)
2014

Practical attack on NLM-MAC scheme

Orumiehchiha, M. A., Pieprzyk, J. & Steinfeld, R., 2014, In : Information Processing Letters. 114, 10, p. 547-550 4 p.

Research output: Contribution to journalArticle

2016

Investigating cube attacks on the authenticated encryption stream cipher ACORN

Salam, M. I., Bartlett, H., Dawson, E., Pieprzyk, J., Simpson, L. & Wong, K. K. H., 2016, Applications and Techniques in Information Security: 6th International Conference, ATIS 2016, Proceedings. Batten, L. & Li, G. (eds.). Singapore: Springer, Springer Nature, p. 15-26 12 p. (Communications in Computer and Information Science; vol. 651).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

17 Citations (Scopus)