Josef Pieprzyk

From MaRDI portal
(Redirected from Person:490340)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Computing Möbius transforms of Boolean functions and characterising coincident Boolean functions2024-09-18Paper
Möbius-\(\alpha\) commutative functions and partially coincident functions2024-09-18Paper
An algebraic analysis of Trivium ciphers based on the Boolean satisfiability problem2024-09-18Paper
Cryptography based on transcendental numbers2024-07-11Paper
Cryptosystems for hierarchical groups2024-07-11Paper
On selectable collisionful hash functions2024-07-11Paper
On password-based authenticated key exchange using collisionful hash functions2024-07-11Paper
Spatial encryption revisited: from delegatable multiple inner product encryption and more
Computer Security – ESORICS 2022
2023-07-21Paper
Resource-saving quantum key distribution based on three-photon matrix product states
Quantum Information Processing
2023-06-13Paper
Analysis of weighted quantum secret sharing based on matrix product states
Quantum Information Processing
2023-02-16Paper
High-capacity (2,3) threshold quantum secret sharing based on asymmetric quantum lossy channels
Quantum Information Processing
2023-01-13Paper
Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption
1522.68187
2022-12-22Paper
An improved quantum network communication model based on compressed tensor network states
Quantum Information Processing
2022-12-06Paper
Dynamic and compressed quantum many-body state secret sharing based on site-independent matrix product states
Quantum Information Processing
2022-11-29Paper
Dynamic searchable symmetric encryption with forward and stronger backward privacy2022-08-25Paper
Dynamic searchable symmetric encryption schemes supporting range queries with forward (and backward) security
(available as arXiv preprint)
2022-08-25Paper
Novel quantum key distribution with shift operations based on Fibonacci and Lucas valued orbital angular momentum entangled states
Physica A
2022-05-17Paper
Two types of dynamic quantum state secret sharing based on tensor networks states
Physica A
2022-03-01Paper
Lattice blind signatures with forward security
(available as arXiv preprint)
2021-06-08Paper
Trapdoor delegation and HIBE from middle-product LWE in standard model
(available as arXiv preprint)
2021-02-23Paper
Keyed hash functions
Cryptography: Policy and Algorithms
2019-10-10Paper
Signcryption schemes with insider security in an ideal permutation model
Journal of Mathematical Cryptology
2019-07-08Paper
Cryptanalysis of \textit{WG-8} and \textit{WG-16} stream ciphers
Cryptography and Communications
2019-03-22Paper
An improved coding method of quantum key distribution protocols based on Fibonacci-valued OAM entangled states
Physics Letters. A
2018-12-21Paper
A large-alphabet three-party quantum key distribution protocol based on orbital and spin angular momenta hybrid entanglement
Quantum Information Processing
2018-11-05Paper
Tunable multi-party high-capacity quantum key distribution based on \(m\)-generalized Fibonacci sequences using Golden coding
Quantum Information Processing
2018-10-29Paper
Efficient quantum key distribution using Fibonacci-number coding with a biased basis choice
Information Processing Letters
2018-04-04Paper
Controllable quantum private queries using an entangled Fibonacci-sequence spiral source
Physics Letters. A
2017-05-19Paper
High-capacity quantum key distribution using Chebyshev-map values corresponding to Lucas numbers coding
Quantum Information Processing
2017-03-06Paper
Cube attacks and cube-attack-like cryptanalysis on the round-reduced Keccak sponge function
Advances in Cryptology -- EUROCRYPT 2015
2015-09-30Paper
Rotational cryptanalysis of round-reduced \textsc{Keccak}
Fast Software Encryption
2015-09-18Paper
Rotational cryptanalysis of ARX revisited
Fast Software Encryption
2015-09-18Paper
ICEPOLE: High-Speed, Hardware-Oriented Authenticated Encryption
Advanced Information Systems Engineering
2015-07-21Paper
Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model
Nonlinear Dynamics
2015-07-09Paper
Dynamic \((2, 3)\) threshold quantum secret sharing of secure direct communication
Communications in Theoretical Physics
2015-05-20Paper
A hybrid quantum key distribution protocol based on extended unitary operations and fountain codes
Quantum Information Processing
2015-04-13Paper
A subexponential construction of graph coloring for multiparty computation
Journal of Mathematical Cryptology
2015-01-22Paper
Low probability differentials and the cryptanalysis of full-round CLEFIA-128
Lecture Notes in Computer Science
2015-01-16Paper
An ideal and robust threshold RSA
Progress in Cryptology - VIETCRYPT 2006
2014-08-21Paper
Practical attack on NLM-MAC scheme
Information Processing Letters
2014-06-23Paper
The resistance of PRESENT-80 against related-key differential attacks
Cryptography and Communications
2014-06-20Paper
Quantum direct secret sharing with efficient eavesdropping-check and authentication based on distributed fountain codes
Quantum Information Processing
2014-06-13Paper
Lattice-based completely non-malleable public-key encryption in the standard model
Designs, Codes and Cryptography
2014-04-29Paper
Security analysis of linearly filtered NLFSRs
Journal of Mathematical Cryptology
2014-01-23Paper
Cryptanalysis of WG-7: a lightweight stream cipher
Cryptography and Communications
2013-06-24Paper
New security notions and relations for public-key encryption
Journal of Mathematical Cryptology
2013-01-17Paper
On the (in)security of IDEA in various hashing modes
Fast Software Encryption
2013-01-08Paper
Graph coloring applied to secure computation in non-abelian groups
Journal of Cryptology
2013-01-04Paper
Active security in multiparty computation over black-box groups
Lecture Notes in Computer Science
2012-09-25Paper
NTRUCCA: how to strengthen NTRUEncrypt to chosen-ciphertext security in the standard model
Public Key Cryptography – PKC 2012
2012-07-20Paper
Multi-party computation with conversion of secret sharing
Designs, Codes and Cryptography
2012-03-01Paper
Known and Chosen Key Differential Distinguishers for Block Ciphers
Information Security and Cryptology - ICISC 2010
2011-10-27Paper
Lattice-Based Completely Non-malleable PKE in the Standard Model (Poster)
Information Security and Privacy
2011-07-07Paper
Möbius transforms, coincident Boolean functions and non-coincidence property of Boolean functions
International Journal of Computer Mathematics
2011-06-15Paper
Parallel signcryption
Practical Signcryption
2011-05-18Paper
Decomposition construction for secret sharing schemes with graph access structures in polynomial time
SIAM Journal on Discrete Mathematics
2011-04-15Paper
Cryptanalysis of the Convex Hull Click Human Identification Protocol
Lecture Notes in Computer Science
2011-02-11Paper
A New Human Identification Protocol and Coppersmith’s Baby-Step Giant-Step Algorithm
Applied Cryptography and Network Security
2010-07-06Paper
Efficient one-time proxy signatures
Lecture Notes in Computer Science
2010-01-05Paper
Universal designated-verifier signatures
Lecture Notes in Computer Science
2010-01-05Paper
Extensions of the Cube Attack Based on Low Degree Annihilators
Cryptology and Network Security
2009-11-26Paper
Cryptanalysis of the LAKE Hash Family
Fast Software Encryption
2009-08-11Paper
Public Key Cryptography – PKC 2004
Lecture Notes in Computer Science
2009-05-14Paper
Unconditionally secure disjointness tests for private datasets
International Journal of Applied Cryptography
2009-05-12Paper
Multi-Party Computation with Omnipresent Adversary
Public Key Cryptography – PKC 2009
2009-03-24Paper
On Secure Multi-party Computation in Black-Box Groups
Advances in Cryptology - CRYPTO 2007
2009-03-10Paper
A Critical Look at Cryptographic Hash Function Literature
Coding and Cryptology
2009-03-09Paper
An Improved Distinguisher for Dragon
Coding and Cryptology
2009-03-09Paper
Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures
Information Security and Cryptology
2009-02-10Paper
Lattice-based treshold-changeability for standard CRT secret-sharing schemes
Finite Fields and their Applications
2009-02-09Paper
Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups
Cryptology and Network Security
2009-01-09Paper
Lattice-Based Threshold Changeability for Standard Shamir Secret-Sharing Schemes
IEEE Transactions on Information Theory
2008-12-21Paper
The eight variable homogeneous degree three bent functions
Journal of Discrete Algorithms
2008-11-18Paper
Cryptanalysis of LASH
Fast Software Encryption
2008-09-18Paper
Cryptanalysis of FORK-256
Fast Software Encryption
2008-09-16Paper
Efficient Disjointness Tests for Private Datasets
Information Security and Privacy
2008-07-08Paper
Multiple Modular Additions and Crossword Puzzle Attack on NLSv2
Lecture Notes in Computer Science
2008-06-24Paper
A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders
Lecture Notes in Computer Science
2008-06-17Paper
An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels
Provable Security
2008-06-10Paper
On Algebraic Immunity and Annihilators
Information Security and Cryptology – ICISC 2006
2008-05-06Paper
On the Provable Security of an Efficient RSA-Based Pseudorandom Generator
Advances in Cryptology – ASIACRYPT 2006
2008-04-24Paper
Permutation polynomials of the \((x^p - x+\delta)^s+L(x)\)
Finite Fields and their Applications
2008-04-22Paper
How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature
Lecture Notes in Computer Science
2008-04-17Paper
A New Dynamic Accumulator for Batch Updates
Information and Communications Security
2008-03-25Paper
Threshold Privacy Preserving Keyword Searches
SOFSEM 2008: Theory and Practice of Computer Science
2008-03-07Paper
Crossword Puzzle Attack on NLS
Selected Areas in Cryptography
2007-11-29Paper
Distinguishing Attack on SOBER-128 with Linear Masking
Information Security and Privacy
2007-09-07Paper
Coding and Cryptography
Lecture Notes in Computer Science
2007-05-02Paper
Information Security and Cryptology - ICISC 2005
Lecture Notes in Computer Science
2007-05-02Paper
Public Key Cryptography - PKC 2006
Lecture Notes in Computer Science
2007-05-02Paper
New constructions of anonymous membership broadcasting schemes
Advances in Mathematics of Communications
2007-04-05Paper
Generalised cumulative arrays in secret sharing
Designs, Codes and Cryptography
2006-11-22Paper
Selected Areas in Cryptography
Lecture Notes in Computer Science
2005-12-27Paper
Fast Software Encryption
Lecture Notes in Computer Science
2005-12-27Paper
Public Key Cryptography - PKC 2005
Lecture Notes in Computer Science
2005-12-07Paper
Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes2005-08-12Paper
scientific article; zbMATH DE number 2159653 (Why is no real title available?)2005-04-20Paper
scientific article; zbMATH DE number 2159653 (Why is no real title available?)2005-04-20Paper
scientific article; zbMATH DE number 2159640 (Why is no real title available?)2005-04-20Paper
scientific article; zbMATH DE number 2159640 (Why is no real title available?)2005-04-20Paper
scientific article; zbMATH DE number 2127879 (Why is no real title available?)2005-01-14Paper
Homogeneous bent functions of degree \(n\) in 2\(n\) variables do not exist for \(n>3\)
Discrete Applied Mathematics
2004-08-19Paper
scientific article; zbMATH DE number 2089971 (Why is no real title available?)2004-08-12Paper
Shared generation of pseudo-random functions
Journal of Complexity
2004-08-06Paper
scientific article; zbMATH DE number 2080685 (Why is no real title available?)2004-08-04Paper
scientific article; zbMATH DE number 2048538 (Why is no real title available?)2004-03-01Paper
scientific article; zbMATH DE number 2043337 (Why is no real title available?)2004-02-16Paper
scientific article; zbMATH DE number 1942820 (Why is no real title available?)2003-10-26Paper
scientific article; zbMATH DE number 1980983 (Why is no real title available?)2003-09-15Paper
scientific article; zbMATH DE number 1962157 (Why is no real title available?)2003-08-10Paper
Homogeneous bent functions
Discrete Applied Mathematics
2003-08-06Paper
scientific article; zbMATH DE number 1955792 (Why is no real title available?)2003-07-29Paper
scientific article; zbMATH DE number 1950616 (Why is no real title available?)2003-07-17Paper
scientific article; zbMATH DE number 1950336 (Why is no real title available?)2003-07-17Paper
scientific article; zbMATH DE number 1950617 (Why is no real title available?)2003-07-17Paper
Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
Lecture Notes in Computer Science
2003-07-16Paper
scientific article; zbMATH DE number 1857516 (Why is no real title available?)2003-05-19Paper
scientific article; zbMATH DE number 1759656 (Why is no real title available?)2002-11-23Paper
scientific article; zbMATH DE number 1808275 (Why is no real title available?)2002-09-26Paper
scientific article; zbMATH DE number 1500490 (Why is no real title available?)2002-07-28Paper
scientific article; zbMATH DE number 1759653 (Why is no real title available?)2002-06-25Paper
scientific article; zbMATH DE number 1731748 (Why is no real title available?)2002-04-22Paper
scientific article; zbMATH DE number 1717241 (Why is no real title available?)2002-03-07Paper
scientific article; zbMATH DE number 1440047 (Why is no real title available?)2001-08-20Paper
scientific article; zbMATH DE number 1612522 (Why is no real title available?)2001-07-01Paper
scientific article; zbMATH DE number 1583941 (Why is no real title available?)2001-04-03Paper
scientific article; zbMATH DE number 1556752 (Why is no real title available?)2001-04-02Paper
Remarks on the multiple assignment secret sharing scheme
Information and Communications Security
2001-04-01Paper
scientific article; zbMATH DE number 1543053 (Why is no real title available?)2001-02-26Paper
scientific article; zbMATH DE number 1543036 (Why is no real title available?)2001-02-26Paper
scientific article; zbMATH DE number 1487952 (Why is no real title available?)2000-08-10Paper
scientific article; zbMATH DE number 1424185 (Why is no real title available?)2000-03-23Paper
scientific article; zbMATH DE number 1360745 (Why is no real title available?)1999-11-10Paper
scientific article; zbMATH DE number 1303961 (Why is no real title available?)1999-09-09Paper
scientific article; zbMATH DE number 1303966 (Why is no real title available?)1999-07-11Paper
scientific article; zbMATH DE number 1303964 (Why is no real title available?)1999-06-17Paper
scientific article; zbMATH DE number 1303970 (Why is no real title available?)1999-06-17Paper
scientific article; zbMATH DE number 1303958 (Why is no real title available?)1999-06-17Paper
scientific article; zbMATH DE number 1189397 (Why is no real title available?)1998-10-08Paper
scientific article; zbMATH DE number 1189396 (Why is no real title available?)1998-08-13Paper
A multi-level view model for secure object-oriented databases
Data & Knowledge Engineering
1998-07-22Paper
Secret sharing in hierarchical groups
Information and Communications Security
1998-02-16Paper
Rotation-symmetric functions and fast hashing1998-01-01Paper
scientific article; zbMATH DE number 1024006 (Why is no real title available?)1997-08-26Paper
scientific article; zbMATH DE number 1024001 (Why is no real title available?)1997-07-20Paper
Attacking the SL 2 hashing scheme
Advances in Cryptology — ASIACRYPT'94
1997-06-18Paper
scientific article; zbMATH DE number 697804 (Why is no real title available?)1995-02-19Paper
scientific article; zbMATH DE number 426131 (Why is no real title available?)1995-01-23Paper
scientific article; zbMATH DE number 697799 (Why is no real title available?)1995-01-08Paper
scientific article; zbMATH DE number 697815 (Why is no real title available?)1995-01-08Paper
scientific article; zbMATH DE number 503344 (Why is no real title available?)1994-12-04Paper
scientific article; zbMATH DE number 697806 (Why is no real title available?)1994-11-30Paper
scientific article; zbMATH DE number 697812 (Why is no real title available?)1994-11-30Paper
scientific article; zbMATH DE number 697814 (Why is no real title available?)1994-11-30Paper
Design of hashing algorithms
Lecture Notes in Computer Science
1993-12-08Paper
scientific article; zbMATH DE number 177608 (Why is no real title available?)1993-05-18Paper
scientific article; zbMATH DE number 177611 (Why is no real title available?)1993-05-18Paper
scientific article; zbMATH DE number 177622 (Why is no real title available?)1993-05-18Paper
scientific article; zbMATH DE number 177029 (Why is no real title available?)1993-05-18Paper
scientific article; zbMATH DE number 48626 (Why is no real title available?)1992-09-17Paper
Permutation generators of alternating groups
Advances in Cryptology — AUSCRYPT '90
1992-06-26Paper
scientific article; zbMATH DE number 4195885 (Why is no real title available?)1990-01-01Paper
scientific article; zbMATH DE number 3937111 (Why is no real title available?)1985-01-01Paper
Algebraical Structures of Cryptographic Transformations
Advances in cryptology. Proceedings of CRYPTO '84 (a workshop on the theory and application of cryptographic techniques held at the University of California, Santa Barbara, August 19--22, 1984)
1985-01-01Paper
scientific article; zbMATH DE number 3716776 (Why is no real title available?)1979-01-01Paper


Research outcomes over time


This page was built for person: Josef Pieprzyk