Cryptographers' World
 

Josef Pieprzyk


Author's Web Page Link

44 papers and 1 book in database with 1588 citations StarStarStar

Editor of 3 conference proceedings books

H-number: 17

Books

 
1. Josef PieprzykThomas HardjonoJennifer SeberryFundamentals of Computer Security. Springer, 2003. ISBN 978-3-540-43101-5.

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

[Cited 101 times Red StarRed Star]


Conference Proceedings

 
1. Josef Pieprzyk, editor, Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings. Springer, 2008. ISBN 978-3-540-89254-0.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

2. Josef PieprzykReihaneh Safavi-Naini, editors, Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28 - December 1, 1994, Proceedings. Springer, 1995. ISBN 3-540-59339-X.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

3. Jennifer SeberryJosef Pieprzyk, editors, Advances in Cryptology - AUSCRYPT '90, International Conference on Cryptology, Sydney, Australia, January 8-11, 1990, Proceedings. Springer, 1990. ISBN 3-540-53000-2.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Shoulun Long,  Josef Pieprzyk,  Huaxiong Wang,  Duncan S. Wong,  Generalised Cumulative Arrays in Secret Sharing, Designs, Codes and Cryptography, Volume 40(2), pp. 191 - 209, Springer, 2006.

[Electronic Edition][Cited 2 times ]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Hossein Ghodosi,  Josef Pieprzyk,  Multi-Party Computation with Omnipresent Adversary, pp. 180 - 195, PKC 2009.

[Electronic Edition][Cited 1 times ]

2. Alex Biryukov,  Praveen Gauravaram,  Jian Guo,  Dmitry Khovratovich,  San Ling,  Krystian Matusiewicz,  Ivica Nikolic,  Josef Pieprzyk,  Huaxiong Wang,  Cryptanalysis of the LAKE Hash Family, pp. 156 - 179, FSE 2009.

[Electronic Edition][Cited 1 times ]

3. Ron Steinfeld,  Scott Contini,  Krystian Matusiewicz,  Josef Pieprzyk,  Jian Guo,  San Ling,  Huaxiong Wang,  Cryptanalysis of LASH, pp. 207 - 223, FSE 2008.

[Electronic Edition][Cited 5 times ]

4. Krystian Matusiewicz,  Thomas Peyrin,  Olivier Billet,  Scott Contini,  Josef Pieprzyk,  Cryptanalysis of FORK-256, pp. 19 - 38, FSE 2007.

[Electronic Edition][Cited 22 times ]

5. Ron Steinfeld,  Josef Pieprzyk,  Huaxiong Wang,  How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature, pp. 357 - 371, CT-RSA 2007.

[Electronic Edition][Cited 18 times ]

6. Yvo Desmedt,  Josef Pieprzyk,  Ron Steinfeld,  Huaxiong Wang,  On Secure Multi-party Computation in Black-Box Groups, pp. 591 - 612, CRYPTO 2007.

[Electronic Edition][Cited 4 times ]

7. Hossein Ghodosi,  Josef Pieprzyk,  An Ideal and Robust Threshold RSA, pp. 312 - 321, VIETCRYPT 2006.

[Electronic Edition][No citation]

8. Ron Steinfeld,  Josef Pieprzyk,  Huaxiong Wang,  Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption, pp. 157 - 173, PKC 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 1 times ]

9. Joo Yeon Cho,  Josef Pieprzyk,  Crossword Puzzle Attack on NLS, pp. 249 - 265, SAC 2006.

[Electronic Edition][Cited 13 times ]

10. Ron Steinfeld,  Josef Pieprzyk,  Huaxiong Wang,  On the Provable Security of an Efficient RSA-Based Pseudorandom Generator, pp. 194 - 209, ASIACRYPT 2006.

[Electronic Edition][Cited 16 times ]

11. Ron Steinfeld,  Scott Contini,  Huaxiong Wang,  Josef Pieprzyk,  Converse Results to the Wiener Attack on RSA, pp. 184 - 198, PKC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 10 times ]

12. Ron Steinfeld,  Huaxiong Wang,  Josef Pieprzyk,  Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes, pp. 170 - 186, ASIACRYPT 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 14 times ]

13. Ron Steinfeld,  Huaxiong Wang,  Josef Pieprzyk,  Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures, pp. 86 - 100, PKC 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 70 times Red Star]

14. Joo Yeon Cho,  Josef Pieprzyk,  Algebraic Attacks on SOBER-t32 and SOBER-t16 without Stuttering, pp. 49 - 64, FSE 2004.

[Electronic Edition][Cited 22 times ]

15. Huaxiong Wang,  Josef Pieprzyk,  Efficient One-Time Proxy Signatures, pp. 507 - 522, ASIACRYPT 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 38 times ]

16. Ron Steinfeld,  Laurence Bull,  Huaxiong Wang,  Josef Pieprzyk,  Universal Designated-Verifier Signatures, pp. 523 - 542, ASIACRYPT 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 140 times Red StarRed Star]

17. Josef Pieprzyk,  Huaxiong Wang,  Chaoping Xing,  Multiple-Time Signature Schemes against Adaptive Chosen Message Attacks, pp. 88 - 100, SAC 2003.

[Electronic Edition][Cited 17 times ]

18. Huaxiong Wang,  Josef Pieprzyk,  Shared Generation of Pseudo-Random Functions with Cumulative Maps, pp. 281 - 294, CT-RSA 2003.

[Electronic Edition][Cited 2 times ]

19. Nicolas Courtois,  Josef Pieprzyk,  Cryptanalysis of Block Ciphers with Overdefined Systems of Equations, pp. 267 - 287, ASIACRYPT 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 476 times Red StarRed StarRed Star]

20. Mohamed Al-Ibrahim,  Hossein Ghodosi,  Josef Pieprzyk,  Authentication of Concast Communication, pp. 185 - 198, INDOCRYPT 2002.

[Electronic Edition][Cited 2 times ]

21. Josef Pieprzyk,  Xian-Mo Zhang,  Cheating Prevention in Secret Sharing over GF(pt), pp. 79 - 90, INDOCRYPT 2001.

[Electronic Edition][Cited 15 times ]

22. Jaroslaw Pastuszak,  Josef Pieprzyk,  Jennifer Seberry,  Codes Identifying Bad Signatures in Batches, pp. 143 - 154, INDOCRYPT 2000.

[Electronic Edition][Cited 2 times ]

23. Jaroslaw Pastuszak,  Dariusz Michatek,  Josef Pieprzyk,  Jennifer Seberry,  Identification of Bad Signatures in Batches, pp. 28 - 45, PKC 2000.

[Electronic Edition][Cited 27 times ]

24. Chris Charnes,  Josef Pieprzyk,  Attacking the SL, pp. 322 - 330, ASIACRYPT 1994.

[Electronic Edition][Cited 33 times ]

25. Chris Charnes,  Luke O'Connor,  Josef Pieprzyk,  Reihaneh Safavi-Naini,  Yuliang Zheng,  Comments on Soviet Encryption Algorithm, pp. 433 - 438, EUROCRYPT 1994.

[Electronic Edition][Cited 10 times ]

26. Chris Charnes,  Josef Pieprzyk,  Linear Nonequivalence versus Nonlinearity, pp. 156 - 164, ASIACRYPT 1992.

[Electronic Edition][Cited 9 times ]

27. Yuliang Zheng,  Josef Pieprzyk,  Jennifer Seberry,  HAVAL - A One-Way Hashing Algorithm with Variable Length of Output, pp. 83 - 104, ASIACRYPT 1992.

[Electronic Edition][Cited 161 times Red StarRed Star]

28. Babak Sadeghiyan,  Josef Pieprzyk,  A Construction for Super Pseudorandom Permutations from A Single Pseudorandom Function, pp. 267 - 284, EUROCRYPT 1992.

[Electronic Edition][Cited 17 times ]

29. Josef Pieprzyk,  Babak Sadeghiyan,  Optimal Perfect Randomizers, pp. 225 - 236, ASIACRYPT 1991.

[Electronic Edition][Cited 6 times ]

30. Babak Sadeghiyan,  Yuliang Zheng,  Josef Pieprzyk,  How to Construct A Family of Strong One Way Permutations, pp. 97 - 110, ASIACRYPT 1991.

[Electronic Edition][Cited 4 times ]

31. Lawrence Brown,  Matthew Kwan,  Josef Pieprzyk,  Jennifer Seberry,  Improving Resistance to Differential Cryptanalysis and the Redesign of LOKI, pp. 36 - 50, ASIACRYPT 1991.

[Electronic Edition][Cited 73 times Red Star]

32. Babak Sadeghiyan,  Josef Pieprzyk,  On Necessary and Sufficient Conditions for the Construction of Super Pseudorandom Permutations, pp. 194 - 209, ASIACRYPT 1991.

[Electronic Edition][Cited 19 times ]

33. Yuliang Zheng,  Thomas Hardjono,  Josef Pieprzyk,  Sibling Intractable Function Families and Their Applications (Extended Abstract), pp. 124 - 138, ASIACRYPT 1991.

[Electronic Edition][Cited 15 times ]

34. Matthew Kwan,  Josef Pieprzyk,  A General Purpose Technique for Locating Key Scheduling Weakness in DES-like Cryptosystems (Extended Abstract), pp. 237 - 246, ASIACRYPT 1991.

[Electronic Edition][No citation]

35. Babak Sadeghiyan,  Josef Pieprzyk,  A Construction for One Way Hash Functions and Pseudorandom Bit Generators, pp. 431 - 445, EUROCRYPT 1991.

[Electronic Edition][Cited 3 times ]

36. Josef Pieprzyk,  Probabilistic Analysis of Elementary Randomizers, pp. 542 - 546, EUROCRYPT 1991.

[Electronic Edition][Cited 5 times ]

37. Josef Pieprzyk,  Reihaneh Safavi-Naini,  Randomized Authentication Systems, pp. 472 - 481, EUROCRYPT 1991.

[Electronic Edition][Cited 2 times ]

38. Josef Pieprzyk,  How to Construct Pseudorandom Permutations from Single Pseudorandom Functions, pp. 140 - 150, EUROCRYPT 1990.

[Electronic Edition][Cited 49 times ]

39. Josef Pieprzyk,  Xian-Mo Zhang,  Permutation Generators of Alternating Groups, pp. 237 - 244, ASIACRYPT 1990.

[Electronic Edition][Cited 14 times ]

40. Lawrence Brown,  Josef Pieprzyk,  Jennifer Seberry,  LOKI - A Cryptographic Primitive for Authentication and Secrecy Applications, pp. 229 - 236, ASIACRYPT 1990.

[Electronic Edition][Cited 115 times Red StarRed Star]

41. Josef Pieprzyk,  Non-linearity of Exponent Permutations, pp. 80 - 92, EUROCRYPT 1989.

[Electronic Edition][Cited 28 times ]

42. Josef Pieprzyk,  On Public-Key Cryptosystems Built using Polynomial Rings, pp. 73 - 78, EUROCRYPT 1985.

[Electronic Edition][Cited 6 times ]

43. Josef Pieprzyk,  Algebraical Structures of Cryptographic Transformations, pp. 16 - 24, EUROCRYPT 1984.

[Electronic Edition][No citation]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...