If you made any changes in Pure these will be visible here soon.

Research Output

  • 59 Conference Paper
  • 29 Article
  • 4 Foreword / Postscript
  • 2 Chapter (Book)
2000

A Signcryption Scheme Based on Integer Factorization

Steinfeld, R. & Zheng, Y., 2000, In : Lecture Notes in Computer Science. p. 308 - 322 15 p.

Research output: Contribution to journalArticleResearchpeer-review

68 Citations (Scopus)
2001

An advantage of low-exponent RSA with modules primes sharing least significant bits

Steinfeld, R. & Zheng, Y., 2001, In : Lecture Notes in Computer Science. 2020, p. 52 - 62 11 p.

Research output: Contribution to journalArticleResearchpeer-review

An advantage of low-exponent RSA with modulus primes sharing least significant bits

Steinfeld, R. & Zheng, Y., 2001, Topics in Cryptology - CT-RSA 2001 - The Cryptographers’ Track at RSA Conference 2001, Proceedings. Naccache, D. (ed.). Springer, p. 52-62 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2020).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

16 Citations (Scopus)

Content extraction signatures

Steinfeld, R., Bull, L. & Zheng, Y., 2001, In : Lecture Notes in Computer Science. 2288, p. 285 - 304 20 p.

Research output: Contribution to journalArticleResearchpeer-review

2002

Chinese remaindering for algebraic numbers in a hidden field

Shparlinski, I. E. & Steinfeld, R., 2002, In : Lecture Notes in Computer Science. 2369, p. 349 - 356 8 p.

Research output: Contribution to journalArticleResearchpeer-review

1 Citation (Scopus)

Formal proofs for the security of signcryption

Baek, J., Steinfeld, R. & Zheng, Y., 2002, In : Lecture Notes in Computer Science. 2274, p. 80 - 98 19 p.

Research output: Contribution to journalArticleResearchpeer-review

169 Citations (Scopus)

On the necessity of strong assumptions for the security of a class of asymmetric encryption schemes

Steinfeld, R., Baek, J. & Zheng, Y., 2002, In : Lecture Notes in Computer Science. 2384, p. 241 - 256 16 p.

Research output: Contribution to journalArticleResearchpeer-review

4 Citations (Scopus)
2003

Universal designated-verifer signatures

Steinfeld, R., Bull, L., Wang, H. & Pieprzyk, J., 2003, Proceedings of the 9th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology ( ASIACRYPT 2003). Laih, C. S. (ed.). NY USA: Springer-Verlag London Ltd., Vol. 2894. p. 523 - 542 20 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Universal designated-verifier signatures

Steinfeld, R., Bull, L., Wang, H. & Pieprzyk, J., 2003, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2894, p. 523-542 20 p.

Research output: Contribution to journalArticleResearchpeer-review

170 Citations (Scopus)
2004

Efficient extension of standard Schnorr/RSA signatures into universal designated-verifier signatures

Steinfeld, R., Wang, H. & Pieprzyk, J., 2004, Public Key Cryptography - PKC 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Proceedings. Bao, F., Deng, R. & Zhou, J. (eds.). Berlin Germany: Springer-Verlag London Ltd., p. 86 - 100 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

90 Citations (Scopus)

Lattice-based threshold-changeability for standard Shamir secret-sharing schemes

Steinfeld, R., Wang, H. & Pieprzyk, J., 2004, Advances in Cryptology - ASIACRYPT 2004: 10th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Lee, P. J. (ed.). Berlin Germany: Springer-Verlag London Ltd., p. 170 - 186 17 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

13 Citations (Scopus)

Noisy Chinese remaindering in the Lee norm

Shparlinski, I. E. & Steinfeld, R., 2004, In : Journal of Complexity. 20, 2-3, p. 423 - 437 15 p.

Research output: Contribution to journalArticleResearchpeer-review

17 Citations (Scopus)

On the security of RSA with primes sharing least-significant bits

Steinfeld, R. & Zheng, Y., 2004, In : Applicable Algebra in Engineering Communication and Computing. 15, 3-4, p. 179 - 200 22 p.

Research output: Contribution to journalArticleResearchpeer-review

18 Citations (Scopus)
2 Citations (Scopus)
2005

Converse results to the Wiener attack on RSA

Steinfeld, R., Contini, S., Wang, H. & Pieprzyk, J., 2005, Public Key Cryptography - PKC 2005: 8th International Workshop on Theory and Practice in Public Key Cryptography, Proceedings. Vaudenay, S. (ed.). Berlin Germany: Springer-Verlag London Ltd., p. 184 - 198 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

11 Citations (Scopus)
2006

A non-malleable group key exchange protocol robust against active insiders

Desmedt, Y., Pieprzyk, J., Steinfeld, R. & Wang, H., 2006, Information Security: 9th International Conference, ISC 2006, Proceedings. Katsikas, S. K., Lopez, J., Backes, M., Gritzalis, S. & Preneel, B. (eds.). Berlin Germany: Springer-Verlag London Ltd., p. 459 - 475 17 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

16 Citations (Scopus)

Higher order Universal One-Way Hash Functions from the subset sum assumption

Steinfeld, R., Pieprzyk, J. & Wang, H., 2006, Public Key Cryptography - PKC 2006: 9th International Conference on Theory and Practice of Public-Key Cryptography, Proceedings. Yung, M., Dodis, Y., Kiayias, A. & Malkin, T. (eds.). Berlin Germany: Springer-Verlag London Ltd., p. 157 - 173 17 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

How to strengthen any weakly unforgeable signature into a strongly unforgeable signature

Steinfeld, R., Pieprzyk, J. & Wang, H., 2006, Topics in Cryptology - CT-RSA 2007: The Cryptographers' Track at the RSA Conference 2007, Proceedings. Abe, M. (ed.). Berlin Germany: Springer-Verlag London Ltd., p. 357 - 371 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Lattice-based threshold-changeability for standard CRT secret-sharing schemes

Steinfeld, R., Pieprzyk, J. & Wang, H., 2006, In : Finite Fields and their Applications. 12, 4, p. 653 - 680 28 p.

Research output: Contribution to journalArticleResearchpeer-review

22 Citations (Scopus)

On the provable security of an efficient RSA-based Pseudorandom generator

Steinfeld, R., Pieprzyk, J. & Wang, H., 2006, Advances in Cryptology - ASIACRYPT 2006: 12th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Lai, X. & Chen, K. (eds.). Berlin Germany: Springer-Verlag London Ltd., p. 194 - 209 16 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

17 Citations (Scopus)

VSH, an efficient and provable collision-resistant hash function

Contini, S., Lenstra, A. K. & Steinfeld, R., 2006, Advances in Cryptology - EUROCRYPT 2006: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Vaudenay, S. (ed.). Berlin Germany: Springer-Verlag London Ltd., p. 165 - 182 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

66 Citations (Scopus)
2007

Chinese remaindering with multiplicative noise

Shparlinski, I. E. & Steinfeld, R., 2007, In : Theory of Computing Systems. 40, 1, p. 33 - 41 9 p.

Research output: Contribution to journalArticleResearchpeer-review

Formal proofs for the security of signcryption

Baek, J., Steinfeld, R. & Zheng, Y., 2007, In : Journal of Cryptology. 20, 2, p. 203 - 235 33 p.

Research output: Contribution to journalArticleResearchpeer-review

101 Citations (Scopus)

Lattice-based threshold changeability for standard Shamir secret-sharing schemes

Steinfeld, R., Pieprzyk, J. & Wang, H., 2007, In : IEEE Transactions on Information Theory. 53, 7, p. 2542 - 2559 18 p.

Research output: Contribution to journalArticleResearchpeer-review

21 Citations (Scopus)

On secure multi-party computation in black-box groups

Desmedt, Y., Pieprzyk, J., Steinfeld, R. & Wang, H., 2007, Advances in Cryptology - CRYPTO 2007: 27th Annual International Cryptology Conference, Proceedings. Menezes, A. (ed.). Berlin Germany: Springer-Verlag London Ltd., p. 591 - 612 22 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

9 Citations (Scopus)
2008

A critical look at cryptographic hash function literature

Contini, S., Steinfeld, R., Pieprzyk, J. & Matusiewicz, K., 2008, Proceedings of the First International Workshop on Coding and Cryptology. Li, Y., Ling, S., Niederreiter, H., Wang, H., Xing, C. & Zhang, S. (eds.). Singapore: World Scientific Publishing, p. 58 - 79 22 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Collision in the DSA function

Shparlinski, I. E. & Steinfeld, R., 2008, Proceedings of the First International Workshop on Coding and Cryptology. Li, Y., Ling, S., Niederreiter, H., Wang, H., Xing, C. & Zhang, S. (eds.). Singapore: World Scientific Publishing, p. 226 - 232 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Cryptanalysis of LASH

Steinfeld, R., Contini, S., Matusiewicz, K., Pieprzyk, J., Guo, J., Ling, S. & Wang, H., 2008, Fast Software Encryption: 15th International Workshop, FSE 2008, Revised Selected Papers. Nyberg, K. (ed.). Berlin Germany: Springer-Verlag London Ltd., p. 207 - 223 17 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

1 Citation (Scopus)

Cryptanalysis of short exponent RSA with primes sharing least significant bits

Sun, H-M., Wu, M-E., Steinfeld, R., Guo, J. & Wang, H., 2008, Cryptology and Network Security: 7th International Conference, CANS 2008, Proceedings. Franklin, M. K., Kwong Hui, L. C. & Wong, D. S. (eds.). Berlin Germany: Springer-Verlag London Ltd., p. 49 - 63 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

10 Citations (Scopus)

The current status in design of efficient provably secure Cryptographic Pseudorandom Generators

Steinfeld, R., 2008, Proceedings of the First International Workshop on Coding and Cryptology. Li, Y., Ling, S., Niederreiter, H., Wang, H., Xing, C. & Zhang, S. (eds.). Singapore: World Scientific Publishing, p. 233 - 255 23 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2009

Efficient public key encryption based on ideal lattices

Stehle, D. N., Steinfeld, R., Tanaka, K. & Xagawa, K., 2009, Advances in Cryptology - ASIACRYPT 2009: 15th International Conference on the Theory and Application of Cryptology and Information Security. Matsui, M. (ed.). Berline Germany: Springer-Verlag London Ltd., p. 617 - 635 19 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

105 Citations (Scopus)
2010

Efficient fuzzy matching and intersection on private datasets

Ye, Q., Steinfeld, R., Pieprzyk, J. & Wang, H., 2010, Information Security and Cryptology - ICISC 2009: 12th International Conference, Revised Selected Papers. Lee, D. & Hong, S. (eds.). Berlin Germany: Springer-Verlag London Ltd., p. 211 - 228 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

6 Citations (Scopus)

Faster fully homomorphic encryption

Stehle, D. N. & Steinfeld, R., 2010, Advances in Cryptology - ASIACRYPT 2010: 16th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Abe, M. (ed.). Berlin Germany: Springer-Verlag London Ltd., p. 377 - 394 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

156 Citations (Scopus)

Preface

Steinfeld, R. & Hawkes, P., 2010, 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings. Springer, 1 p. (Lecture Notes in Computer Science ; vol. 6168).

Research output: Chapter in Book/Report/Conference proceedingForeword / PostscriptOtherpeer-review

Security for signcryption: The multi-user model

Baek, J. & Steinfeld, R., 2010, Practical Signcryption. Dent, A. W. & Zheng, Y. (eds.). Berlin Germany: Springer, p. 43 - 53 11 p.

Research output: Chapter in Book/Report/Conference proceedingChapter (Book)Researchpeer-review

2011

Known and chosen key differential distinguishers for block ciphers

Nikolic, I., Pieprzyk, J., Sokolowski, P. & Steinfeld, R., 2011, Information Security and Cryptology - ICISC 2010: 13th International Conference, Revised Selected Papers. Rhee, K-H. & Nyang, D. (eds.). Berlin Germany: Springer-Verlag London Ltd., p. 29 - 48 20 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

13 Citations (Scopus)

Lattice-based completely non-malleable PKE in the standard model (poster)

Sepahi, R., Steinfeld, R. & Pieprzyk, J., 2011, Information Security and Privacy: 16th Australasian Conference, ACISP 2011, Proceedings. Parampalli, U. & Hawkes, P. (eds.). Berlin Germany: Springer-Verlag London Ltd., p. 407 - 411 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperOtherpeer-review

2 Citations (Scopus)

Making NTRU as secure as worst-case problems over ideal lattices

Stehle, D. N. & Steinfeld, R., 2011, Advances in Cryptology - EUROCRYPT 2011: 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Paterson, K. G. (ed.). Berlin Germany: Springer-Verlag London Ltd., p. 27 - 47 21 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

171 Citations (Scopus)
2012

Active security in multiparty computation over black-box groups

Desmedt, Y., Pieprzyk, J. & Steinfeld, R., 2012, Security and Cryptography for Networks: 8th International Conference, Proceedings. Visconti, I. & De Prisco, R. (eds.). Berlin Germany: Springer-Verlag London Ltd., Vol. 7485. p. 503 - 521 19 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2 Citations (Scopus)

Cryptanalysis of RC4-based hash function

Orumiehchiha, M. A., Pieprzyk, J. & Steinfeld, R., 2012, Proceedings of the Tenth Australasian Information Security Conference. Pieprzyk, J. & Thomborson, C. (eds.). Sydney NSW Australia: Australian Computer Society Inc, Vol. 125. p. 33 - 38 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

1 Citation (Scopus)

Cryptanalysis of WG-7: A lightweight stream cipher

Orumiehchiha, M. A., Pieprzyk, J. & Steinfeld, R., 2012, In : Cryptography and Communications: discrete structures, Boolean functions and sequences. 4, 3-4, p. 277 - 285 9 p.

Research output: Contribution to journalArticleResearchpeer-review

19 Citations (Scopus)

Graph coloring applied to secure computation in non-Abelian groups

Desmedt, Y., Pieprzyk, J., Steinfeld, R., Sun, X., Tartary, C., Wang, H. & Yao, A. C-C., 2012, In : Journal of Cryptology. 25, 4, p. 557 - 600 44 p.

Research output: Contribution to journalArticleResearchpeer-review

5 Citations (Scopus)

Multi-party computation with conversion of secret sharing

Ghodosi, H., Pieprzyk, J. & Steinfeld, R., 2012, In : Designs Codes and Cryptography. 62, 3, p. 259 - 272 14 p.

Research output: Contribution to journalArticleResearchpeer-review

3 Citations (Scopus)

NTRUCCA: How to strengthen NTRUEncrypt to chosen-ciphertext security in the standard model

Steinfeld, R., Ling, S., Pieprzyk, J., Tartary, C. & Wang, H., 2012, Public Key Cryptography - PKC 2012: 15th International Conference on Practice and Theory in Public Key Cryptograpy, Proceedings. Fischlin, M., Buchmann, J. & Manulis, M. (eds.). Berlin Germany: Springer-Verlag London Ltd., p. 353 - 371 19 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

8 Citations (Scopus)

On the modular inversion hidden number problem

Ling, S., Shparlinski, I. E., Steinfeld, R. & Wang, H., 2012, In : Journal of Symbolic Computation. 47, 4, p. 358 - 367 10 p.

Research output: Contribution to journalArticleResearchpeer-review

8 Citations (Scopus)
2013

Cryptanalysis of RC4(n,m) stream cipher

Orumiehchiha, M. A., Pieprzyk, J., Shakour, E. & Steinfeld, R., 2013, Proceedings of the 6th International Conference on Security of Information and Networks (SIN 2013). Elci, A., Chefranov, A., Gaur, M. S., Orgun, M. A., Makarevich, O. B. & Celik, Y. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 165 - 172 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

7 Citations (Scopus)

Does counting still count? Revisiting the security of counting based user authentication protocols against statistical attacks

Asghar, H. J., Li, S., Steinfeld, R. & Pieprzyk, J., 2013, NDSS Symposium 2013, 20th Annual Network & Distributed System Security Symposium. Ning, P. (ed.). Reston VA USA: Internet Society (ISoc), p. 1 - 18 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Security analysis of linearly filtered NLFSRs

Orumiehchiha, M. A., Pieprzyk, J., Steinfeld, R. & Bartlett, H., 2013, In : Journal of Mathematical Cryptology. 7, 4, p. 313 - 332 20 p.

Research output: Contribution to journalArticleResearchpeer-review

1 Citation (Scopus)

Security evaluation of Rakaposhi stream cipher

Orumiehchiha, M. A., Pieprzyk, J., Shakour, E. & Steinfeld, R., 2013, Information Security Practice and Experience: 9th International Conference (ISPEC 2013), Proceedings. Deng, R. H. & Feng, T. (eds.). Berlin Germany: Springer-Verlag London Ltd., p. 361 - 371 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

7 Citations (Scopus)

Truncated differential analysis of reduced-round LBlock

Emami, S., McDonald, C., Pieprzyk, J. & Steinfeld, R., 2013, Cryptology and Network Security, 12th International Conference (CANS 2013), Proceedings. Abdalla, M., Nita-Rotaru, C. & Dahab, R. (eds.). Cham Switzerland: Springer, p. 291 - 308 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2 Citations (Scopus)