Följ
Josef Pieprzyk
Josef Pieprzyk
CSIRO Data61
Verifierad e-postadress på csiro.au
Titel
Citeras av
Citeras av
År
Cryptanalysis of block ciphers with overdefined systems of equations
NT Courtois, J Pieprzyk
Advances in Cryptology—ASIACRYPT 2002: 8th International Conference on the …, 2002
12662002
Fundamentals of computer security
J Pieprzyk, T Hardjono, J Seberry
Springer Science & Business Media, 2013
4292013
Cryptography: an introduction to computer security
J Seberry, J Pieprzyk
Prentice-Hall, Inc., 1989
3511989
HAVAL—a one-way hashing algorithm with variable length of output
Y Zheng, J Pieprzyk, J Seberry
Advances in Cryptology—AUSCRYPT'92: Workshop on the Theory and Application …, 1993
3481993
Universal designated-verifier signatures
R Steinfeld, L Bull, H Wang, J Pieprzyk
Advances in Cryptology-ASIACRYPT 2003: 9th International Conference on the …, 2003
3102003
Cryptographic hash functions: A survey
S Bakhtiari, R Safavi-Naini, J Pieprzyk
Technical Report 95-09, Department of Computer Science, University of Wollongong, 1995
2181995
LOKI—a cryptographic primitive for authentication and secrecy applications
L Brown, J Pieprzyk, J Seberry
Advances in Cryptology—AUSCRYPT'90: International Conference on Cryptology …, 1990
1901990
Fast hashing and rotation-symmetric functions
J Pieprzyk, CX Qu
Journal of Universal Computer Science 5 (1), 20-31, 1999
1861999
Towards effective nonlinear cryptosystem design
J Pieprzyk, G Finkelstein
IEE Proceedings E-Computers and Digital Techniques 135 (6), 325-335, 1988
1521988
Efficient extension of standard Schnorr/RSA signatures into universal designated-verifier signatures
R Steinfeld, H Wang, J Pieprzyk
Public Key Cryptography–PKC 2004: 7th International Workshop on Theory and …, 2004
1492004
Improving resistance to differential cryptanalysis and the redesign of LOKI
L Brown, M Kwan, J Pieprzyk, J Seberry
Advances in Cryptology—ASIACRYPT'91: International Conference on the Theory …, 1993
1311993
Broadcast anti-jamming systems
Y Desmedt, R Safavi-Naini, H Wang, L Batten, C Charnes, J Pieprzyk
Computer Networks 35 (2-3), 223-236, 2001
1092001
Keyword field-free conjunctive keyword searches on encrypted data and extension for dynamic groups
P Wang, H Wang, J Pieprzyk
International conference on cryptology and network security, 178-195, 2008
1032008
Reversible and blind database watermarking using difference expansion
G Gupta, J Pieprzyk
International Journal of Digital Crime and Forensics (IJDCF) 1 (2), 42-54, 2009
1022009
Secret sharing in multilevel and compartmented groups
H Ghodosi, J Pieprzyk, R Safavi-Naini
Information Security and Privacy: Third Australasian Conference, ACISP’98 …, 1998
1021998
Design of hashing algorithms
J Pieprzyk, B Sadeghiyan
Springer Berlin Heidelberg, 1993
1021993
Cube attacks and cube-attack-like cryptanalysis on the round-reduced Keccak sponge function
I Dinur, P Morawiecki, J Pieprzyk, M Srebrny, M Straus
Advances in Cryptology--EUROCRYPT 2015: 34th Annual International Conference …, 2015
952015
Rotational Cryptanalysis of Round-Reduced Keccak
P Morawiecki, J Pieprzyk, M Srebrny
International Workshop on Fast Software Encryption, 241-262, 2013
952013
How to construct pseudorandom permutations from single pseudorandom functions
J Pieprzyk
Workshop on the Theory and Application of of Cryptographic Techniques, 140-150, 1990
861990
A new biocryptosystem-oriented security analysis framework and implementation of multibiometric cryptosystems based on decision level fusion
C Li, J Hu, J Pieprzyk, W Susilo
IEEE transactions on Information Forensics and Security 10 (6), 1193-1206, 2015
802015
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20