Find Research Outputs

Search in all content

Filters for Research Outputs

Search concepts
Selected filters

Publication Year

  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011

Author

  • Josef Pieprzyk

A case study of user-level spam filtering

Bajaj, K. S. & Pieprzyk, J., 2014, Information Security 2014 - Proceedings of the Twelfth Australasian Information Security Conference, AISC 2014. Parampalli, U. & Welch, I. (eds.). Sydney, Australia: Australian Computer Society, Vol. 149. p. 67-75 9 p. (Conferences in Research and Practice in Information Technology - CRPIT).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

1 Citation (Scopus)

Active security in multiparty computation over black-box groups

Desmedt, Y., Pieprzyk, J. & Steinfeld, R., 2012, Security and Cryptography for Networks - 8th International Conference, SCN 2012, Proceedings. Visconti, I. & De Prisco, R. (eds.). Berlin: Springer, Springer Nature, p. 503-521 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7485 LNCS).

Research output: Chapter in Book/Report/Conference proceedingChapter

2 Citations (Scopus)

A hybrid quantum key distribution protocol based on extended unitary operations and fountain codes

Lai, H., Xue, L., Orgun, M. A., Xiao, J. & Pieprzyk, J., Feb 2015, In : Quantum Information Processing. 14, 2, p. 697-713 17 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

A large-alphabet three-party quantum key distribution protocol based on orbital and spin angular momenta hybrid entanglement

Lai, H., Luo, M., Zhang, J., Pieprzyk, J., Pan, L. & Orgun, M. A., 1 Jul 2018, In : Quantum Information Processing. 17, 7, p. 1-11 11 p., 162.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Analysing recursive preprocessing of BKZ lattice reduction algorithm

Haque, M. M. & Pieprzyk, J., 1 Mar 2017, In : IET Information Security. 11, 2, p. 114-120 7 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

An efficient quantum blind digital signature scheme

Lai, H., Luo, M., Pieprzyk, J., Qu, Z., Li, S. & Orgun, M. A., 1 Aug 2017, In : Science China Information Sciences. 60, 8, p. 082501:1–082501:14 14 p., 082501.

Research output: Contribution to journalArticle

7 Citations (Scopus)
39 Citations (Scopus)
7 Citations (Scopus)

A quantum secret sharing scheme using orbital angular momentum onto multiple spin states based on Fibonacci compression encoding

Lai, H., Luo, M-X., Xu, Y-J., Pieprzyk, J., Zhang, J., Pan, L. & Orgun, M. A., 1 Oct 2018, In : Communications in Theoretical Physics. 70, 4, p. 384-390 7 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

A strong lightweight authentication protocol for low-cost RFID systems

Shi, Z., Pieprzyk, J., Doche, C., Xia, Y., Zhang, Y. & Dai, J., 2014, In : International Journal of Security and its Applications. 8, 6, p. 225-234 10 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)

A subexponential construction of graph coloring for multiparty computation

Asghar, H. J., Desmedt, Y., Pieprzyk, J. & Steinfeld, R., 1 Dec 2014, In : Journal of Mathematical Cryptology. 8, 4, p. 363-403 41 p.

Research output: Contribution to journalArticle

A survey: error control methods used in bio-cryptography

Pussewalage, H. S. G., Hu, J. & Pieprzyk, J., 9 Dec 2014, FSKD 2014: Proceedings of the 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 956-962 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

4 Citations (Scopus)

Bucket attack on numeric set watermarking model and safeguards

Gupta, G., Pieprzyk, J. & Hamey, L., May 2011, In : Information Security Technical Report. 16, 2, p. 59-66 8 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Can we CAN the email spam

Bajaj, S. K. & Pieprzyk, J., 6 Mar 2014, 2013 Fourth Cybercrime and Trustworthy Computing Workshop (CTC 2013). Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 36-43 8 p. 6754639

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

4 Citations (Scopus)

Characterising and predicting cyber attacks using the Cyber Attacker Model Profile (CAMP)

Watters, P. A., McCombie, S., Layton, R. & Pieprzyk, J., 2012, In : Journal of Money Laundering Control. 15, 4, p. 430-441 12 p.

Research output: Contribution to journalArticle

29 Citations (Scopus)

Controllable quantum private queries using an entangled Fibonacci-sequence spiral source

Lai, H., Orgun, M. A., Pieprzyk, J., Xiao, J., Xue, L. & Jia, Z., 23 Oct 2015, In : Physics Letters, Section A: General, Atomic and Solid State Physics. 379, 40-41, p. 2561-2568 8 p.

Research output: Contribution to journalArticle

13 Citations (Scopus)

Critical analysis of spam prevention techniques

Bajaj, K. S., Egbufor, F. & Pieprzyk, J., 2011, Proceedings of the 3rd International Workshop on Security and Communication Networks, IWSCN 2011. Piscataway, N.J.: Institute of Electrical and Electronics Engineers (IEEE), p. 83-87 5 p. 6827721

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

2 Citations (Scopus)

Cryptanalysis of RC4(n, m) stream cipher

Orumiehchiha, M. A., Pieprzyk, J., Shakour, E. & Steinfeld, R., 2013, SIN 2013 - Proceedings of the 6th International Conference on Security of Information and Networks. Elçi, A., Chefranov, A., Gaur, M. S., Orgun, M. A., Makarevich, O. B. & Çelik, Y. (eds.). New York: ACM, p. 165-172 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

7 Citations (Scopus)

Cryptanalysis of RC4-based hash function

Orumiehchiha, M. A., Pieprzyk, J. & Steinfeld, R., 2012, Information Security 2012 - Proceedings of the Tenth Australasian Information Security Conference, AISC 2012. Pieprzyk, J. & Thomborson, C. (eds.). Sydney: Australian Computer Society, Vol. 125. p. 33-38 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

1 Citation (Scopus)

Cryptanalysis of the convex hull click human identification protocol

Asghar, H. J., Pieprzyk, J., Li, S. & Wang, H., 2013, In : International Journal of Information Security. 12, 2, p. 83-96 14 p.

Research output: Contribution to journalArticle

8 Citations (Scopus)

Cryptanalysis of WG-7: a lightweight stream cipher

Orumiehchiha, M. A., Pieprzyk, J. & Steinfeld, R., 2012, In : Cryptography and Communications. 4, 3-4, p. 277-285 9 p.

Research output: Contribution to journalArticle

19 Citations (Scopus)

Cryptology and network security: 11th international conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012 : proceedings

Pieprzyk, J. (ed.), Sadeghi, A-R. (ed.) & Manulis, M. (ed.), 2012, Heidelberg: Springer, Springer Nature. 309 p. (Lecture notes in computer science; vol. 7712)

Research output: Book/ReportEdited Book/Anthology

Cube attacks and cube-attack-like cryptanalysis on the round-reduced Keccak sponge function

Dinur, I., Morawiecki, P., Pieprzyk, J., Srebrny, M. & Straus, M., 2015, Advances in Cryptology – EUROCRYPT 2015: 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings. Oswald, E. & Fischlin, M. (eds.). Heidelberg: Springer, Springer Nature, Vol. 9056. p. 733-761 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9056).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

38 Citations (Scopus)

Does counting still count? Revisiting the security of counting based user authentication protocols against statistical attacks

Asghar, H. J., Li, S., Steinfeld, R. & Pieprzyk, J., 2013, NDSS 2013: 20th Annual Network & Distributed System Security Symposium : proceedings. Geneva, Switzerland: Internet Society, p. 1-18 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

Dual compressible hybrid quantum secret sharing schemes based on extended unitary operations

Lai, H., Orgun, M., Xue, L., Xiao, J. & Pieprzyk, J., 2014, Quantum Information and Computation XII. Donkor, E., Pirich, A. R., Brandt, H. E., Frey, M. R., Lomonaco Jr., S. J. & Myers, J. M. (eds.). Washington, DC: SPIE, Vol. 9123. p. 1-13 13 p. 912309

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

Open Access
File
3 Citations (Scopus)
18 Downloads (Pure)

Dynamic (2,3) Threshold Quantum Secret Sharing of Secure Direct Communication

Lai, H., Mehmet, O. A., Xiao, J. H., Josef, P. & Xue, L. Y., 1 Apr 2015, In : Communications in Theoretical Physics. 63, 4, p. 459-465 7 p., 459.

Research output: Contribution to journalArticle

6 Citations (Scopus)

Efficient quantum key distribution using Fibonacci-number coding with a biased basis choice

Lai, H., Luo, M., Pieprzyk, J., Qu, Z. & Orgun, M. A., 1 Jun 2018, In : Information Processing Letters. 134, p. 24-30 7 p.

Research output: Contribution to journalArticle

Efficient quantum private queries based on quantum key distribution with pulse-position modulation

Lai, H., Luo, M., Xu, Y., Pieprzyk, J., Pan, L., Zhang, J. & Orgun, M. A., May 2019, In : Laser Physics. 29, 5, p. 1-7 7 p., 055201.

Research output: Contribution to journalArticle

Open Access
File

Evaluating the performance of the practical lattice reduction algorithms

Haque, M. M. & Pieprzyk, J., 28 Jan 2015, 8th International Conference on Electrical and Computer Engineering: Advancing Technology for a Better Tomorrow, ICECE 2014. Picataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 341-344 4 p. 7026884

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

Fast and simple high-capacity quantum cryptography with error detection

Lai, H., Luo, M-X., Pieprzyk, J., Zhang, J., Pan, L., Li, S. & Orgun, M. A., 13 Apr 2017, In : Scientific Reports. 7, p. 1-11 11 p., 46302.

Research output: Contribution to journalArticle

Open Access
File
5 Citations (Scopus)
12 Downloads (Pure)

Finding state collisions in the authenticated encryption stream cipher ACORN

Salam, M. I., Simpson, L., Wong, K. K. H., Dawson, E., Bartlett, H. & Pieprzyk, J., 1 Feb 2016, Proceedings of the Australasian Computer Science Week Multiconference, ACSW 2016. New York: Association for Computing Machinery, p. 1-10 10 p. 36

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

2 Citations (Scopus)

Graph coloring applied to secure computation in non-Abelian groups

Desmedt, Y., Pieprzyk, J., Steinfeld, R., Sun, X., Tartary, C., Wang, H. & Yao, A. C. C., Oct 2012, In : Journal of Cryptology. 25, 4, p. 557-600 44 p.

Research output: Contribution to journalArticle

5 Citations (Scopus)

High-capacity (2,3) threshold quantum secret sharing based on asymmetric quantum lossy channels

Lai, H., Pieprzyk, J., Luo, M. X., Zhan, C., Pan, L. & Orgun, M. A., May 2020, In : Quantum Information Processing. 19, 5, 13 p., 157.

Research output: Contribution to journalArticle

1 Citation (Scopus)

High-capacity quantum key distribution using Chebyshev-map values corresponding to Lucas numbers coding

Lai, H., Orgun, M. A., Pieprzyk, J., Li, J., Luo, M., Xiao, J. & Xiao, F., 1 Nov 2016, In : Quantum Information Processing. 15, 11, p. 4663-4679 17 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

High-rate and high-capacity measurement-device-independent quantum key distribution with Fibonacci matrix coding in free space

Lai, H., Luo, M., Pieprzyk, J., Zhang, J., Pan, L. & Orgun, M. A., 1 Jun 2018, In : Science China Information Sciences. 61, 6, p. 1-11 11 p., 062501.

Research output: Contribution to journalArticle

3 Citations (Scopus)

Hybrid threshold adaptable quantum secret sharing scheme with reverse Huffman-Fibonacci-tree coding

Lai, H., Zhang, J., Luo, M. X., Pan, L., Pieprzyk, J., Xiao, F. & Orgun, M. A., 12 Aug 2016, In : Scientific Reports. 6, p. 1-12 12 p., 31350.

Research output: Contribution to journalArticle

Open Access
File
12 Citations (Scopus)
20 Downloads (Pure)

ICEPOLE: high-speed, hardware-oriented authenticated encryption

Morawiecki, P., Gaj, K., Homsirikamol, E., Matusiewicz, K., Pieprzyk, J., Rogawski, M., Srebrny, M. & Wójcik, M., 2014, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8731, p. 392-413 22 p.

Research output: Contribution to journalConference paper

Open Access
12 Citations (Scopus)

Introduction to the special issue on Next Generation Network Architectures, Protocols, Theory, Systems and Applications

Orgun, M. A., Pieprzyk, J., Elçi, A., Shankaran, R., Xu, M. & Wang, H., 2013, In : Networking science. 2, 3-4, p. 67-68 2 p.

Research output: Contribution to journalLetter

Investigating cube attacks on the authenticated encryption stream cipher ACORN

Salam, M. I., Bartlett, H., Dawson, E., Pieprzyk, J., Simpson, L. & Wong, K. K. H., 2016, Applications and Techniques in Information Security: 6th International Conference, ATIS 2016, Proceedings. Batten, L. & Li, G. (eds.). Singapore: Springer, Springer Nature, p. 15-26 12 p. (Communications in Computer and Information Science; vol. 651).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

19 Citations (Scopus)

Known and chosen key differential distinguishers for block ciphers

Nikolić, I., Pieprzyk, J., Sokołowski, P. & Steinfeld, R., 2011, Information Security and Cryptology, ICISC 2010 - 13th International Conference, Revised Selected Papers. Rhee, K-H. & Nyang, D. (eds.). Heidelberg: Springer, Springer Nature, Vol. 6829. p. 29-48 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6829 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

13 Citations (Scopus)

Large-capacity three-party quantum digital secret sharing using three particular matrices coding

Lai, H., Luo, M. X., Pieprzyk, J., Tao, L., Liu, Z. M. & Orgun, M. A., 1 Nov 2016, In : Communications in Theoretical Physics. 66, 5, p. 501-508 8 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

Lattice-based certificateless public-key encryption in the standard model

Sepahi, R., Steinfeld, R. & Pieprzyk, J., Aug 2014, In : International Journal of Information Security. 13, 4, p. 315-333 19 p.

Research output: Contribution to journalArticle

8 Citations (Scopus)

Lattice-based completely non-malleable PKE in the standard model (poster)

Sepahi, R., Steinfeld, R. & Pieprzyk, J., 2011, Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Proceedings. Parampalli, U. & Hawkes, P. (eds.). Heidelberg: Springer, Springer Nature, Vol. 6812 LNCS. p. 407-411 5 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6812 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

2 Citations (Scopus)

Lattice-based completely non-malleable public-key encryption in the standard model

Sepahi, R., Steinfeld, R. & Pieprzyk, J., May 2014, In : Designs, Codes and Cryptography. 71, 2, p. 293-313 21 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

Low probability differentials and the cryptanalysis of full-round CLEFIA-128

Emami, S., Ling, S., Nikolić, I., Pieprzyk, J. & Wang, H., 2014, Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings, Part I. Sarkar, P. & Iwata, T. (eds.). Heidelberg: Springer, Springer Nature, Vol. 8873. p. 141-157 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8873).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

2 Citations (Scopus)

Message from chair

Gaur, M. S., Elçi, A., Makarevich, O., Orgun, M. A., Singh, V., Laxmi, V., Babenko, L., Pieprzyk, J., Kamakoty, V. & Chefranov, A., 2012, In : Proceedings of the 5th International Conference on Security of Information and Networks, SIN'12. p. i-ii 2 p.

Research output: Contribution to journalEditorial

Möbius transforms, coincident Boolean functions and non-coincidence property of Boolean functions

Pieprzyk, J., Wang, H. & Zhang, X. M., May 2011, In : International Journal of Computer Mathematics. 88, 7, p. 1398-1416 19 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

Multi-party computation with conversion of secret sharing

Ghodosi, H., Pieprzyk, J. & Steinfeld, R., 2012, In : Designs, Codes and Cryptography. 62, 3, p. 259-272 14 p.

Research output: Contribution to journalArticle

5 Citations (Scopus)

New security notions and relations for public-key encryption

Sepahi, R., Pieprzyk, J., Shahandashti, S. F. & Schoenmakers, B., Dec 2012, In : Journal of Mathematical Cryptology. 6, 3-4, p. 183-227 45 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)