Josef Pieprzyk
Josef Pieprzyk
CSIRO Data61
Verified email at
Cited by
Cited by
Cryptanalysis of block ciphers with overdefined systems of equations
NT Courtois, J Pieprzyk
International Conference on the Theory and Application of Cryptology and …, 2002
Algorithms and theory of computation handbook, volume 2: special topics and techniques
MJ Atallah, M Blanton
CRC press, 2009
Fundamentals of computer security
J Pieprzyk, T Hardjono, J Seberry
Springer Science & Business Media, 2013
HAVAL—a one-way hashing algorithm with variable length of output
Y Zheng, J Pieprzyk, J Seberry
International workshop on the theory and application of cryptographic …, 1992
Cryptography: an introduction to computer security
J Seberry, J Pieprzyk
Prentice-Hall, Inc., 1989
Universal designated-verifier signatures
R Steinfeld, L Bull, H Wang, J Pieprzyk
International Conference on the Theory and Application of Cryptology and …, 2003
Cryptographic hash functions: A survey
S Bakhtiari, R Safavi-Naini, J Pieprzyk
Technical Report 95-09, Department of Computer Science, University of Wollongong, 1995
LOKI—a cryptographic primitive for authentication and secrecy applications
L Brown, J Pieprzyk, J Seberry
International Conference on Cryptology, 229-236, 1990
Introduction to data mining in bioinformatics
JTL Wang, MJ Zaki, HTT Toivonen, D Shasha
Data Mining in Bioinformatics, 3-8, 2005
Fast hashing and rotation-symmetric functions
J Pieprzyk, CX Qu
Journal of Universal Computer Science 5 (1), 20-31, 1999
Towards effective nonlinear cryptosystem design
J Pieprzyk, G Finkelstein
IEE Proceedings E-Computers and Digital Techniques 135 (6), 325-335, 1988
Efficient extension of standard Schnorr/RSA signatures into universal designated-verifier signatures
R Steinfeld, H Wang, J Pieprzyk
International Workshop on Public Key Cryptography, 86-100, 2004
Improving resistance to differential cryptanalysis and the redesign of LOKI
L Brown, M Kwan, J Pieprzyk, J Seberry
International Conference on the Theory and Application of Cryptology, 36-50, 1991
Election verifiability for helios under weaker trust assumptions
V Cortier, D Galindo, S Glondu, M Izabachene
European Symposium on Research in Computer Security, 327-344, 2014
Broadcast anti-jamming systems
Y Desmedt, R Safavi-Naini, H Wang, L Batten, C Charnes, J Pieprzyk
Computer Networks 35 (2-3), 223-236, 2001
Design of hashing algorithms
J Pieprzyk, B Sadeghiyan
Springer-Verlag, 1993
Secret sharing in multilevel and compartmented groups
H Ghodosi, J Pieprzyk, R Safavi-Naini
Australasian Conference on Information Security and Privacy, 367-378, 1998
How to construct pseudorandom permutations from single pseudorandom functions
J Pieprzyk
Workshop on the Theory and Application of of Cryptographic Techniques, 140-150, 1990
Reversible and blind database watermarking using difference expansion
G Gupta, J Pieprzyk
International Journal of Digital Crime and Forensics (IJDCF) 1 (2), 42-54, 2009
Keyword field-free conjunctive keyword searches on encrypted data and extension for dynamic groups
P Wang, H Wang, J Pieprzyk
International conference on cryptology and network security, 178-195, 2008
The system can't perform the operation now. Try again later.
Articles 1–20