Josef Pieprzyk

From MaRDI portal
Person:490340

Available identifiers

zbMath Open pieprzyk.josef-pDBLPp/JosefPieprzykWikidataQ3184049 ScholiaQ3184049MaRDI QIDQ490340

List of research outcomes





PublicationDate of PublicationType
Computing Möbius transforms of Boolean functions and characterising coincident Boolean functions2024-09-18Paper
Möbius-\(\alpha\) commutative functions and partially coincident functions2024-09-18Paper
An algebraic analysis of Trivium ciphers based on the Boolean satisfiability problem2024-09-18Paper
Cryptography based on transcendental numbers2024-07-11Paper
Cryptosystems for hierarchical groups2024-07-11Paper
On selectable collisionful hash functions2024-07-11Paper
On password-based authenticated key exchange using collisionful hash functions2024-07-11Paper
Spatial encryption revisited: from delegatable multiple inner product encryption and more2023-07-21Paper
Resource-saving quantum key distribution based on three-photon matrix product states2023-06-13Paper
Analysis of weighted quantum secret sharing based on matrix product states2023-02-16Paper
High-capacity (2,3) threshold quantum secret sharing based on asymmetric quantum lossy channels2023-01-13Paper
Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption2022-12-22Paper
An improved quantum network communication model based on compressed tensor network states2022-12-06Paper
Dynamic and compressed quantum many-body state secret sharing based on site-independent matrix product states2022-11-29Paper
Dynamic searchable symmetric encryption with forward and stronger backward privacy2022-08-25Paper
Dynamic searchable symmetric encryption schemes supporting range queries with forward (and backward) security2022-08-25Paper
Novel quantum key distribution with shift operations based on Fibonacci and Lucas valued orbital angular momentum entangled states2022-05-17Paper
Two types of dynamic quantum state secret sharing based on tensor networks states2022-03-01Paper
Lattice blind signatures with forward security2021-06-08Paper
Trapdoor delegation and HIBE from middle-product LWE in standard model2021-02-23Paper
Keyed hash functions2019-10-10Paper
Signcryption schemes with insider security in an ideal permutation model2019-07-08Paper
Cryptanalysis of \textit{WG-8} and \textit{WG-16} stream ciphers2019-03-22Paper
An improved coding method of quantum key distribution protocols based on Fibonacci-valued OAM entangled states2018-12-21Paper
A large-alphabet three-party quantum key distribution protocol based on orbital and spin angular momenta hybrid entanglement2018-11-05Paper
Tunable multi-party high-capacity quantum key distribution based on \(m\)-generalized Fibonacci sequences using Golden coding2018-10-29Paper
Efficient quantum key distribution using Fibonacci-number coding with a biased basis choice2018-04-04Paper
Controllable quantum private queries using an entangled Fibonacci-sequence spiral source2017-05-19Paper
High-capacity quantum key distribution using Chebyshev-map values corresponding to Lucas numbers coding2017-03-06Paper
Cube Attacks and Cube-Attack-Like Cryptanalysis on the Round-Reduced Keccak Sponge Function2015-09-30Paper
Rotational Cryptanalysis of Round-Reduced Keccak2015-09-18Paper
Rotational Cryptanalysis of ARX Revisited2015-09-18Paper
ICEPOLE: High-Speed, Hardware-Oriented Authenticated Encryption2015-07-21Paper
Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model2015-07-09Paper
Dynamic (2, 3) Threshold Quantum Secret Sharing of Secure Direct Communication*2015-05-20Paper
A hybrid quantum key distribution protocol based on extended unitary operations and fountain codes2015-04-13Paper
A subexponential construction of graph coloring for multiparty computation2015-01-22Paper
Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-1282015-01-16Paper
An Ideal and Robust Threshold RSA2014-08-21Paper
Practical attack on NLM-MAC scheme2014-06-23Paper
The resistance of PRESENT-80 against related-key differential attacks2014-06-20Paper
Quantum direct secret sharing with efficient eavesdropping-check and authentication based on distributed fountain codes2014-06-13Paper
Lattice-based completely non-malleable public-key encryption in the standard model2014-04-29Paper
Security analysis of linearly filtered NLFSRs2014-01-23Paper
Cryptanalysis of WG-7: a lightweight stream cipher2013-06-24Paper
New security notions and relations for public-key encryption2013-01-17Paper
On the (In)Security of IDEA in Various Hashing Modes2013-01-08Paper
Graph coloring applied to secure computation in non-abelian groups2013-01-04Paper
Active Security in Multiparty Computation over Black-Box Groups2012-09-25Paper
NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model2012-07-20Paper
Multi-party computation with conversion of secret sharing2012-03-01Paper
Known and Chosen Key Differential Distinguishers for Block Ciphers2011-10-27Paper
Lattice-Based Completely Non-malleable PKE in the Standard Model (Poster)2011-07-07Paper
Möbius transforms, coincident Boolean functions and non-coincidence property of Boolean functions2011-06-15Paper
Parallel Signcryption2011-05-18Paper
Decomposition Construction for Secret Sharing Schemes with Graph Access Structures in Polynomial Time2011-04-15Paper
Cryptanalysis of the Convex Hull Click Human Identification Protocol2011-02-11Paper
A New Human Identification Protocol and Coppersmith’s Baby-Step Giant-Step Algorithm2010-07-06Paper
Advances in Cryptology - ASIACRYPT 20032010-01-05Paper
Advances in Cryptology - ASIACRYPT 20032010-01-05Paper
Extensions of the Cube Attack Based on Low Degree Annihilators2009-11-26Paper
Cryptanalysis of the LAKE Hash Family2009-08-11Paper
Public Key Cryptography – PKC 20042009-05-14Paper
Unconditionally secure disjointness tests for private datasets2009-05-12Paper
Multi-Party Computation with Omnipresent Adversary2009-03-24Paper
On Secure Multi-party Computation in Black-Box Groups2009-03-10Paper
A Critical Look at Cryptographic Hash Function Literature2009-03-09Paper
An Improved Distinguisher for Dragon2009-03-09Paper
Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures2009-02-10Paper
Lattice-based treshold-changeability for standard CRT secret-sharing schemes2009-02-09Paper
Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups2009-01-09Paper
Lattice-Based Threshold Changeability for Standard Shamir Secret-Sharing Schemes2008-12-21Paper
The eight variable homogeneous degree three bent functions2008-11-18Paper
Cryptanalysis of LASH2008-09-18Paper
Cryptanalysis of FORK-2562008-09-16Paper
Efficient Disjointness Tests for Private Datasets2008-07-08Paper
Multiple Modular Additions and Crossword Puzzle Attack on NLSv22008-06-24Paper
A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders2008-06-17Paper
An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels2008-06-10Paper
On Algebraic Immunity and Annihilators2008-05-06Paper
On the Provable Security of an Efficient RSA-Based Pseudorandom Generator2008-04-24Paper
Permutation polynomials of the \((x^p - x+\delta)^s+L(x)\)2008-04-22Paper
How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature2008-04-17Paper
A New Dynamic Accumulator for Batch Updates2008-03-25Paper
Threshold Privacy Preserving Keyword Searches2008-03-07Paper
Crossword Puzzle Attack on NLS2007-11-29Paper
Distinguishing Attack on SOBER-128 with Linear Masking2007-09-07Paper
Coding and Cryptography2007-05-02Paper
Information Security and Cryptology - ICISC 20052007-05-02Paper
Public Key Cryptography - PKC 20062007-05-02Paper
New constructions of anonymous membership broadcasting schemes2007-04-05Paper
Generalised cumulative arrays in secret sharing2006-11-22Paper
Selected Areas in Cryptography2005-12-27Paper
Fast Software Encryption2005-12-27Paper
Public Key Cryptography - PKC 20052005-12-07Paper
Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes2005-08-12Paper
https://portal.mardi4nfdi.de/entity/Q46676192005-04-20Paper
https://portal.mardi4nfdi.de/entity/Q46676062005-04-20Paper
https://portal.mardi4nfdi.de/entity/Q31548702005-01-14Paper
Homogeneous bent functions of degree \(n\) in 2\(n\) variables do not exist for \(n>3\)2004-08-19Paper
https://portal.mardi4nfdi.de/entity/Q48086342004-08-12Paper
Shared generation of pseudo-random functions2004-08-06Paper
https://portal.mardi4nfdi.de/entity/Q44735842004-08-04Paper
https://portal.mardi4nfdi.de/entity/Q44525742004-03-01Paper
https://portal.mardi4nfdi.de/entity/Q44507702004-02-16Paper
https://portal.mardi4nfdi.de/entity/Q44093582003-10-26Paper
https://portal.mardi4nfdi.de/entity/Q44283822003-09-15Paper
https://portal.mardi4nfdi.de/entity/Q44185432003-08-10Paper
Homogeneous bent functions2003-08-06Paper
https://portal.mardi4nfdi.de/entity/Q44174062003-07-29Paper
https://portal.mardi4nfdi.de/entity/Q44133282003-07-17Paper
https://portal.mardi4nfdi.de/entity/Q44129682003-07-17Paper
https://portal.mardi4nfdi.de/entity/Q44133292003-07-17Paper
Cryptanalysis of Block Ciphers with Overdefined Systems of Equations2003-07-16Paper
https://portal.mardi4nfdi.de/entity/Q47885652003-05-19Paper
https://portal.mardi4nfdi.de/entity/Q45366542002-11-23Paper
https://portal.mardi4nfdi.de/entity/Q31497582002-09-26Paper
https://portal.mardi4nfdi.de/entity/Q45015002002-07-28Paper
https://portal.mardi4nfdi.de/entity/Q45366512002-06-25Paper
https://portal.mardi4nfdi.de/entity/Q27842642002-04-22Paper
https://portal.mardi4nfdi.de/entity/Q27772452002-03-07Paper
https://portal.mardi4nfdi.de/entity/Q49500332001-08-20Paper
https://portal.mardi4nfdi.de/entity/Q27211612001-07-01Paper
https://portal.mardi4nfdi.de/entity/Q27076012001-04-03Paper
https://portal.mardi4nfdi.de/entity/Q45266422001-04-02Paper
Remarks on the multiple assignment secret sharing scheme2001-04-01Paper
https://portal.mardi4nfdi.de/entity/Q45205062001-02-26Paper
https://portal.mardi4nfdi.de/entity/Q45204862001-02-26Paper
https://portal.mardi4nfdi.de/entity/Q44950802000-08-10Paper
https://portal.mardi4nfdi.de/entity/Q49453832000-03-23Paper
https://portal.mardi4nfdi.de/entity/Q42697541999-11-10Paper
https://portal.mardi4nfdi.de/entity/Q42506291999-09-09Paper
https://portal.mardi4nfdi.de/entity/Q42506341999-07-11Paper
https://portal.mardi4nfdi.de/entity/Q42506321999-06-17Paper
https://portal.mardi4nfdi.de/entity/Q42506381999-06-17Paper
https://portal.mardi4nfdi.de/entity/Q42506261999-06-17Paper
https://portal.mardi4nfdi.de/entity/Q38391991998-10-08Paper
https://portal.mardi4nfdi.de/entity/Q38391981998-08-13Paper
A multi-level view model for secure object-oriented databases1998-07-22Paper
Secret sharing in hierarchical groups1998-02-16Paper
Rotation-symmetric functions and fast hashing1998-01-01Paper
https://portal.mardi4nfdi.de/entity/Q43416801997-08-26Paper
https://portal.mardi4nfdi.de/entity/Q43416751997-07-20Paper
Attacking the SL 2 hashing scheme1997-06-18Paper
https://portal.mardi4nfdi.de/entity/Q43140201995-02-19Paper
https://portal.mardi4nfdi.de/entity/Q31369511995-01-23Paper
https://portal.mardi4nfdi.de/entity/Q43140151995-01-08Paper
https://portal.mardi4nfdi.de/entity/Q43140311995-01-08Paper
https://portal.mardi4nfdi.de/entity/Q42796831994-12-04Paper
https://portal.mardi4nfdi.de/entity/Q43140211994-11-30Paper
https://portal.mardi4nfdi.de/entity/Q43140281994-11-30Paper
https://portal.mardi4nfdi.de/entity/Q43140301994-11-30Paper
Design of hashing algorithms1993-12-08Paper
https://portal.mardi4nfdi.de/entity/Q40374861993-05-18Paper
https://portal.mardi4nfdi.de/entity/Q40374891993-05-18Paper
https://portal.mardi4nfdi.de/entity/Q40375011993-05-18Paper
https://portal.mardi4nfdi.de/entity/Q40368651993-05-18Paper
https://portal.mardi4nfdi.de/entity/Q39974991992-09-17Paper
Permutation generators of alternating groups1992-06-26Paper
https://portal.mardi4nfdi.de/entity/Q52026231990-01-01Paper
https://portal.mardi4nfdi.de/entity/Q37104711985-01-01Paper
Algebraical Structures of Cryptographic Transformations1985-01-01Paper
https://portal.mardi4nfdi.de/entity/Q39070651979-01-01Paper

Research outcomes over time

This page was built for person: Josef Pieprzyk