If you made any changes in Pure these will be visible here soon.

Research Output

  • 65 Conference Paper
  • 22 Article
  • 4 Foreword / Postscript
  • 2 Chapter (Book)
2012

Cryptanalysis of RC4-based hash function

Orumiehchiha, M. A., Pieprzyk, J. & Steinfeld, R., 2012, Proceedings of the Tenth Australasian Information Security Conference. Pieprzyk, J. & Thomborson, C. (eds.). Sydney NSW Australia: Australian Computer Society Inc, Vol. 125. p. 33 - 38 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

1 Citation (Scopus)

Cryptanalysis of WG-7: A lightweight stream cipher

Orumiehchiha, M. A., Pieprzyk, J. & Steinfeld, R., 2012, In : Cryptography and Communications: discrete structures, Boolean functions and sequences. 4, 3-4, p. 277 - 285 9 p.

Research output: Contribution to journalArticleResearchpeer-review

19 Citations (Scopus)

Graph coloring applied to secure computation in non-Abelian groups

Desmedt, Y., Pieprzyk, J., Steinfeld, R., Sun, X., Tartary, C., Wang, H. & Yao, A. C-C., 2012, In : Journal of Cryptology. 25, 4, p. 557 - 600 44 p.

Research output: Contribution to journalArticleResearchpeer-review

5 Citations (Scopus)

Multi-party computation with conversion of secret sharing

Ghodosi, H., Pieprzyk, J. & Steinfeld, R., 2012, In : Designs Codes and Cryptography. 62, 3, p. 259 - 272 14 p.

Research output: Contribution to journalArticleResearchpeer-review

5 Citations (Scopus)

NTRUCCA: How to strengthen NTRUEncrypt to chosen-ciphertext security in the standard model

Steinfeld, R., Ling, S., Pieprzyk, J., Tartary, C. & Wang, H., 2012, Public Key Cryptography - PKC 2012: 15th International Conference on Practice and Theory in Public Key Cryptograpy, Proceedings. Fischlin, M., Buchmann, J. & Manulis, M. (eds.). Berlin Germany: Springer-Verlag London Ltd., p. 353 - 371 19 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

9 Citations (Scopus)

On the modular inversion hidden number problem

Ling, S., Shparlinski, I. E., Steinfeld, R. & Wang, H., 2012, In : Journal of Symbolic Computation. 47, 4, p. 358 - 367 10 p.

Research output: Contribution to journalArticleResearchpeer-review

8 Citations (Scopus)
2011

Known and chosen key differential distinguishers for block ciphers

Nikolic, I., Pieprzyk, J., Sokolowski, P. & Steinfeld, R., 2011, Information Security and Cryptology - ICISC 2010: 13th International Conference, Revised Selected Papers. Rhee, K-H. & Nyang, D. (eds.). Berlin Germany: Springer-Verlag London Ltd., p. 29 - 48 20 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

13 Citations (Scopus)

Lattice-based completely non-malleable PKE in the standard model (poster)

Sepahi, R., Steinfeld, R. & Pieprzyk, J., 2011, Information Security and Privacy: 16th Australasian Conference, ACISP 2011, Proceedings. Parampalli, U. & Hawkes, P. (eds.). Berlin Germany: Springer-Verlag London Ltd., p. 407 - 411 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperOtherpeer-review

2 Citations (Scopus)

Making NTRU as secure as worst-case problems over ideal lattices

Stehle, D. N. & Steinfeld, R., 2011, Advances in Cryptology - EUROCRYPT 2011: 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Paterson, K. G. (ed.). Berlin Germany: Springer-Verlag London Ltd., p. 27 - 47 21 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

180 Citations (Scopus)
2010

Efficient fuzzy matching and intersection on private datasets

Ye, Q., Steinfeld, R., Pieprzyk, J. & Wang, H., 2010, Information Security and Cryptology - ICISC 2009: 12th International Conference, Revised Selected Papers. Lee, D. & Hong, S. (eds.). Berlin Germany: Springer-Verlag London Ltd., p. 211 - 228 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

6 Citations (Scopus)

Faster fully homomorphic encryption

Stehle, D. N. & Steinfeld, R., 2010, Advances in Cryptology - ASIACRYPT 2010: 16th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Abe, M. (ed.). Berlin Germany: Springer-Verlag London Ltd., p. 377 - 394 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

161 Citations (Scopus)

Preface

Steinfeld, R. & Hawkes, P., 2010, 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings. Springer, 1 p. (Lecture Notes in Computer Science ; vol. 6168).

Research output: Chapter in Book/Report/Conference proceedingForeword / PostscriptOtherpeer-review

Security for signcryption: The multi-user model

Baek, J. & Steinfeld, R., 2010, Practical Signcryption. Dent, A. W. & Zheng, Y. (eds.). Berlin Germany: Springer, p. 43 - 53 11 p.

Research output: Chapter in Book/Report/Conference proceedingChapter (Book)Researchpeer-review

2009

Efficient public key encryption based on ideal lattices

Stehle, D. N., Steinfeld, R., Tanaka, K. & Xagawa, K., 2009, Advances in Cryptology - ASIACRYPT 2009: 15th International Conference on the Theory and Application of Cryptology and Information Security. Matsui, M. (ed.). Berline Germany: Springer-Verlag London Ltd., p. 617 - 635 19 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

111 Citations (Scopus)
2008

A critical look at cryptographic hash function literature

Contini, S., Steinfeld, R., Pieprzyk, J. & Matusiewicz, K., 2008, Proceedings of the First International Workshop on Coding and Cryptology. Li, Y., Ling, S., Niederreiter, H., Wang, H., Xing, C. & Zhang, S. (eds.). Singapore: World Scientific Publishing, p. 58 - 79 22 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Collision in the DSA function

Shparlinski, I. E. & Steinfeld, R., 2008, Proceedings of the First International Workshop on Coding and Cryptology. Li, Y., Ling, S., Niederreiter, H., Wang, H., Xing, C. & Zhang, S. (eds.). Singapore: World Scientific Publishing, p. 226 - 232 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Cryptanalysis of LASH

Steinfeld, R., Contini, S., Matusiewicz, K., Pieprzyk, J., Guo, J., Ling, S. & Wang, H., 2008, Fast Software Encryption: 15th International Workshop, FSE 2008, Revised Selected Papers. Nyberg, K. (ed.). Berlin Germany: Springer-Verlag London Ltd., p. 207 - 223 17 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2 Citations (Scopus)

Cryptanalysis of short exponent RSA with primes sharing least significant bits

Sun, H-M., Wu, M-E., Steinfeld, R., Guo, J. & Wang, H., 2008, Cryptology and Network Security: 7th International Conference, CANS 2008, Proceedings. Franklin, M. K., Kwong Hui, L. C. & Wong, D. S. (eds.). Berlin Germany: Springer-Verlag London Ltd., p. 49 - 63 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

10 Citations (Scopus)

The current status in design of efficient provably secure Cryptographic Pseudorandom Generators

Steinfeld, R., 2008, Proceedings of the First International Workshop on Coding and Cryptology. Li, Y., Ling, S., Niederreiter, H., Wang, H., Xing, C. & Zhang, S. (eds.). Singapore: World Scientific Publishing, p. 233 - 255 23 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2007

Chinese remaindering with multiplicative noise

Shparlinski, I. E. & Steinfeld, R., 2007, In : Theory of Computing Systems. 40, 1, p. 33 - 41 9 p.

Research output: Contribution to journalArticleResearchpeer-review

Formal proofs for the security of signcryption

Baek, J., Steinfeld, R. & Zheng, Y., 2007, In : Journal of Cryptology. 20, 2, p. 203 - 235 33 p.

Research output: Contribution to journalArticleResearchpeer-review

101 Citations (Scopus)

Lattice-based threshold changeability for standard Shamir secret-sharing schemes

Steinfeld, R., Pieprzyk, J. & Wang, H., 2007, In : IEEE Transactions on Information Theory. 53, 7, p. 2542 - 2559 18 p.

Research output: Contribution to journalArticleResearchpeer-review

21 Citations (Scopus)

On secure multi-party computation in black-box groups

Desmedt, Y., Pieprzyk, J., Steinfeld, R. & Wang, H., 2007, Advances in Cryptology - CRYPTO 2007: 27th Annual International Cryptology Conference, Proceedings. Menezes, A. (ed.). Berlin Germany: Springer-Verlag London Ltd., p. 591 - 612 22 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

9 Citations (Scopus)
2006

A non-malleable group key exchange protocol robust against active insiders

Desmedt, Y., Pieprzyk, J., Steinfeld, R. & Wang, H., 2006, Information Security: 9th International Conference, ISC 2006, Proceedings. Katsikas, S. K., Lopez, J., Backes, M., Gritzalis, S. & Preneel, B. (eds.). Berlin Germany: Springer-Verlag London Ltd., p. 459 - 475 17 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

16 Citations (Scopus)

Higher order Universal One-Way Hash Functions from the subset sum assumption

Steinfeld, R., Pieprzyk, J. & Wang, H., 2006, Public Key Cryptography - PKC 2006: 9th International Conference on Theory and Practice of Public-Key Cryptography, Proceedings. Yung, M., Dodis, Y., Kiayias, A. & Malkin, T. (eds.). Berlin Germany: Springer-Verlag London Ltd., p. 157 - 173 17 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

How to strengthen any weakly unforgeable signature into a strongly unforgeable signature

Steinfeld, R., Pieprzyk, J. & Wang, H., 2006, Topics in Cryptology - CT-RSA 2007: The Cryptographers' Track at the RSA Conference 2007, Proceedings. Abe, M. (ed.). Berlin Germany: Springer-Verlag London Ltd., p. 357 - 371 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Lattice-based threshold-changeability for standard CRT secret-sharing schemes

Steinfeld, R., Pieprzyk, J. & Wang, H., 2006, In : Finite Fields and their Applications. 12, 4, p. 653 - 680 28 p.

Research output: Contribution to journalArticleResearchpeer-review

23 Citations (Scopus)

On the provable security of an efficient RSA-based Pseudorandom generator

Steinfeld, R., Pieprzyk, J. & Wang, H., 2006, Advances in Cryptology - ASIACRYPT 2006: 12th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Lai, X. & Chen, K. (eds.). Berlin Germany: Springer-Verlag London Ltd., p. 194 - 209 16 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

17 Citations (Scopus)

VSH, an efficient and provable collision-resistant hash function

Contini, S., Lenstra, A. K. & Steinfeld, R., 2006, Advances in Cryptology - EUROCRYPT 2006: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Vaudenay, S. (ed.). Berlin Germany: Springer-Verlag London Ltd., p. 165 - 182 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

68 Citations (Scopus)
2005

Converse results to the Wiener attack on RSA

Steinfeld, R., Contini, S., Wang, H. & Pieprzyk, J., 2005, Public Key Cryptography - PKC 2005: 8th International Workshop on Theory and Practice in Public Key Cryptography, Proceedings. Vaudenay, S. (ed.). Berlin Germany: Springer-Verlag London Ltd., p. 184 - 198 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

11 Citations (Scopus)
2004

Efficient extension of standard Schnorr/RSA signatures into universal designated-verifier signatures

Steinfeld, R., Wang, H. & Pieprzyk, J., 2004, Public Key Cryptography - PKC 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Proceedings. Bao, F., Deng, R. & Zhou, J. (eds.). Berlin Germany: Springer-Verlag London Ltd., p. 86 - 100 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

91 Citations (Scopus)

Lattice-based threshold-changeability for standard Shamir secret-sharing schemes

Steinfeld, R., Wang, H. & Pieprzyk, J., 2004, Advances in Cryptology - ASIACRYPT 2004: 10th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Lee, P. J. (ed.). Berlin Germany: Springer-Verlag London Ltd., p. 170 - 186 17 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

14 Citations (Scopus)

Noisy Chinese remaindering in the Lee norm

Shparlinski, I. E. & Steinfeld, R., 2004, In : Journal of Complexity. 20, 2-3, p. 423 - 437 15 p.

Research output: Contribution to journalArticleResearchpeer-review

17 Citations (Scopus)

On the security of RSA with primes sharing least-significant bits

Steinfeld, R. & Zheng, Y., 2004, In : Applicable Algebra in Engineering Communication and Computing. 15, 3-4, p. 179 - 200 22 p.

Research output: Contribution to journalArticleResearchpeer-review

18 Citations (Scopus)
2 Citations (Scopus)
2003

Universal designated-verifer signatures

Steinfeld, R., Bull, L., Wang, H. & Pieprzyk, J., 2003, Proceedings of the 9th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology ( ASIACRYPT 2003). Laih, C. S. (ed.). NY USA: Springer-Verlag London Ltd., Vol. 2894. p. 523 - 542 20 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Universal designated-verifier signatures

Steinfeld, R., Bull, L., Wang, H. & Pieprzyk, J., 2003, Advances in Cryptology - ASIACRYPT 2003: 9th International Conference on the Theory and Application of Cryptology and Information Security Taipei, Taiwan, November 30 – December 4, 2003 Proceedings. Laih, C. S. (ed.). Berlin Germany: Springer, p. 523-542 20 p. (Lecture Notes in Computer Science; vol. 2894).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

172 Citations (Scopus)
2002

Chinese remaindering for algebraic numbers in a hidden field

Shparlinski, I. E. & Steinfeld, R., 2002, Algorithmic Number Theory: 5th International Symposium, ANTS-V Sydney, Australia, July 7-12, 2002 Proceedings. Fieker, C. & Kohel, D. R. (eds.). Berlin Germany: Springer, p. 349-356 8 p. (Lecture Notes in Computer Science; vol. 2369).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

1 Citation (Scopus)

Formal proofs for the security of signcryption

Baek, J., Steinfeld, R. & Zheng, Y., 2002, Public Key Cryptography: 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002 Paris, France, February 12-14, 2002 Proceedings. Naccache, D. & Paillier, P. (eds.). Berlin Germany: Springer, p. 80-98 19 p. (Lecture Notes in Computer Science; vol. 2274).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

169 Citations (Scopus)

On the necessity of strong assumptions for the security of a class of asymmetric encryption schemes

Steinfeld, R., Baek, J. & Zheng, Y., 2002, Information Security and Privacy: 7th Australasian Conference, ACISP 2002 Melbourne, Australia, July 3-5, 2002 Proceedings. Batten, L. & Seberry, J. (eds.). Berlin Germany: Springer, p. 241-256 16 p. (Lecture Notes in Computer Science; vol. 2384).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

4 Citations (Scopus)
2001

An advantage of low-exponent RSA with modulus primes sharing least significant bits

Steinfeld, R. & Zheng, Y., 2001, Topics in Cryptology - CT-RSA 2001 - The Cryptographers’ Track at RSA Conference 2001, Proceedings. Naccache, D. (ed.). Berlin Germany: Springer, p. 52-62 11 p. (Lecture Notes in Computer Science; vol. 2020).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

16 Citations (Scopus)

Content extraction signatures

Steinfeld, R., Bull, L. & Zheng, Y., 2001, Information Security and Cryptology – ICISC 2001: 4th International Conference Seoul, Korea, December 6-7, 2001 Proceedings. Kim, K. (ed.). Berlin Germany: Springer, p. 285-304 20 p. (Lecture Notes in Computer Science; vol. 2288).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2000

A signcryption scheme based on integer factorization

Steinfeld, R. & Zheng, Y., 2000, Information Security: Third International Workshop, ISW 2000 Wollongong, Australia, December 20-21, 2000 Proceedings. Pieprzyk, J., Okamoto, E. & Seberry, J. (eds.). Berlin Germany: Springer, p. 308-322 15 p. (Lecture Notes in Computer Science; vol. 1975).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

69 Citations (Scopus)