If you made any changes in Pure these will be visible here soon.

Research Output

  • 59 Conference Paper
  • 29 Article
  • 4 Foreword / Postscript
  • 2 Chapter (Book)

A critical look at cryptographic hash function literature

Contini, S., Steinfeld, R., Pieprzyk, J. & Matusiewicz, K., 2008, Proceedings of the First International Workshop on Coding and Cryptology. Li, Y., Ling, S., Niederreiter, H., Wang, H., Xing, C. & Zhang, S. (eds.). Singapore: World Scientific Publishing, p. 58 - 79 22 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Active security in multiparty computation over black-box groups

Desmedt, Y., Pieprzyk, J. & Steinfeld, R., 2012, Security and Cryptography for Networks: 8th International Conference, Proceedings. Visconti, I. & De Prisco, R. (eds.). Berlin Germany: Springer-Verlag London Ltd., Vol. 7485. p. 503 - 521 19 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2 Citations (Scopus)

A lattice-based approach to privacy-preserving biometric authentication without relying on trusted third parties

Dinh, T., Steinfeld, R. & Bhattacharjee, N., 2017, Information Security Practice and Experience: 13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, December 13-15, 2017 - Proceedings. Liu, J. K. & Samarati, P. (eds.). Cham Switzerland: Springer, p. 297-319 23 p. (Lecture Notes in Computer Science; vol. 10701).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

All-but-many lossy trapdoor functions and selective opening chosen-ciphertext security from LWE

Libert, B., Sakzad, A., Stehle, D. N. & Steinfeld, R., 2017, Advances in Cryptology – CRYPTO 2017 - 37th Annual International Cryptology Conference, Proceedings. Katz, J. & Shacham, H. (eds.). Cham, Switzerland: Springer, Vol. 10403 LNCS. p. 332-364 33 p. (Lecture Notes in Computer Science; vol. 10403).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

14 Citations (Scopus)

An advantage of low-exponent RSA with modules primes sharing least significant bits

Steinfeld, R. & Zheng, Y., 2001, In : Lecture Notes in Computer Science. 2020, p. 52 - 62 11 p.

Research output: Contribution to journalArticleResearchpeer-review

An advantage of low-exponent RSA with modulus primes sharing least significant bits

Steinfeld, R. & Zheng, Y., 2001, Topics in Cryptology - CT-RSA 2001 - The Cryptographers’ Track at RSA Conference 2001, Proceedings. Naccache, D. (ed.). Springer, p. 52-62 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2020).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

16 Citations (Scopus)

An efficient non-interactive multi-client searchable encryption with support for boolean queries

Sun, S-F., Liu, J. K., Sakzad, A., Steinfeld, R. & Yuen, T. H., 15 Sep 2016, Computer Security - ESORICS 2016: 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26–30, 2016, Proceedings, Part I. Askoxylakis, I., Ioannidis, S., Katsikas, S. & Meadows, C. (eds.). Switzerland: Springer, p. 154-172 19 p. (Lecture Notes in Computer Science ; vol. 9878 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

41 Citations (Scopus)

An implementation of access-control protocol for IoT home scenario

Wu, X., Steinfeld, R., Liu, J. & Rudolph, C., 2017, Proceedings - 16th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2017). Zhu, G., Yao, S., Cui, X. & Xu, S. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 31-37 7 p. 7959965

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

Open Access
File
3 Citations (Scopus)

A non-malleable group key exchange protocol robust against active insiders

Desmedt, Y., Pieprzyk, J., Steinfeld, R. & Wang, H., 2006, Information Security: 9th International Conference, ISC 2006, Proceedings. Katsikas, S. K., Lopez, J., Backes, M., Gritzalis, S. & Preneel, B. (eds.). Berlin Germany: Springer-Verlag London Ltd., p. 459 - 475 17 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

16 Citations (Scopus)

Anonymity reduction attacks to Monero

Wijaya, D. A., Liu, J., Steinfeld, R., Liu, D. & Yuen, T. H., 2019, Information Security and Cryptology: 14th International Conference, Inscrypt 2018 Fuzhou, China, December 14–17, 2018 Revised Selected Papers. Guo, F., Huang, X. & Yung, M. (eds.). Cham Switzerland: Springer, p. 86-100 15 p. (Lecture Notes in Computer Science; vol. 11449 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

3 Citations (Scopus)

Anonymizing bitcoin transaction

Wijaya, D. A., Liu, J. K., Steinfeld, R., Sun, S. F. & Huang, X., 2016, Information Security Practice and Experience : 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16–18, 2016, Proceedings. Bao, F., Chen, L., Deng, R. H. & Wang, G. (eds.). Cham, Switzerland: Springer, p. 271-283 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10060 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

6 Citations (Scopus)

A Signcryption Scheme Based on Integer Factorization

Steinfeld, R. & Zheng, Y., 2000, In : Lecture Notes in Computer Science. p. 308 - 322 15 p.

Research output: Contribution to journalArticleResearchpeer-review

68 Citations (Scopus)

A subexponential construction of graph coloring for multiparty computation

Asghar, H. J., Desmedt, Y., Pieprzyk, J. & Steinfeld, R., 2014, In : Journal of Mathematical Cryptology. 8, 4, p. 363 - 403 41 p.

Research output: Contribution to journalArticleResearchpeer-review

Chinese remaindering for algebraic numbers in a hidden field

Shparlinski, I. E. & Steinfeld, R., 2002, In : Lecture Notes in Computer Science. 2369, p. 349 - 356 8 p.

Research output: Contribution to journalArticleResearchpeer-review

1 Citation (Scopus)

Chinese remaindering with multiplicative noise

Shparlinski, I. E. & Steinfeld, R., 2007, In : Theory of Computing Systems. 40, 1, p. 33 - 41 9 p.

Research output: Contribution to journalArticleResearchpeer-review

Collision in the DSA function

Shparlinski, I. E. & Steinfeld, R., 2008, Proceedings of the First International Workshop on Coding and Cryptology. Li, Y., Ling, S., Niederreiter, H., Wang, H., Xing, C. & Zhang, S. (eds.). Singapore: World Scientific Publishing, p. 226 - 232 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Content extraction signatures

Steinfeld, R., Bull, L. & Zheng, Y., 2001, In : Lecture Notes in Computer Science. 2288, p. 285 - 304 20 p.

Research output: Contribution to journalArticleResearchpeer-review

Converse results to the Wiener attack on RSA

Steinfeld, R., Contini, S., Wang, H. & Pieprzyk, J., 2005, Public Key Cryptography - PKC 2005: 8th International Workshop on Theory and Practice in Public Key Cryptography, Proceedings. Vaudenay, S. (ed.). Berlin Germany: Springer-Verlag London Ltd., p. 184 - 198 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

11 Citations (Scopus)

COSAC: compact and scalable arbitrary-centered discrete Gaussian sampling over integers

Zhao, R. K., Steinfeld, R. & Sakzad, A., 2020, Post-Quantum Cryptography : 11th International Conference, PQCrypto 2020 Paris, France, April 15–17, 2020 Proceedings. Ding, J. & Tillich, J-P. (eds.). Cham Switzerland: Springer, p. 284-303 20 p. (Lecture Notes in Computer Science ; vol. 12100 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Cryptanalysis of LASH

Steinfeld, R., Contini, S., Matusiewicz, K., Pieprzyk, J., Guo, J., Ling, S. & Wang, H., 2008, Fast Software Encryption: 15th International Workshop, FSE 2008, Revised Selected Papers. Nyberg, K. (ed.). Berlin Germany: Springer-Verlag London Ltd., p. 207 - 223 17 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

1 Citation (Scopus)

Cryptanalysis of RC4(n,m) stream cipher

Orumiehchiha, M. A., Pieprzyk, J., Shakour, E. & Steinfeld, R., 2013, Proceedings of the 6th International Conference on Security of Information and Networks (SIN 2013). Elci, A., Chefranov, A., Gaur, M. S., Orgun, M. A., Makarevich, O. B. & Celik, Y. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 165 - 172 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

7 Citations (Scopus)

Cryptanalysis of RC4-based hash function

Orumiehchiha, M. A., Pieprzyk, J. & Steinfeld, R., 2012, Proceedings of the Tenth Australasian Information Security Conference. Pieprzyk, J. & Thomborson, C. (eds.). Sydney NSW Australia: Australian Computer Society Inc, Vol. 125. p. 33 - 38 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

1 Citation (Scopus)

Cryptanalysis of short exponent RSA with primes sharing least significant bits

Sun, H-M., Wu, M-E., Steinfeld, R., Guo, J. & Wang, H., 2008, Cryptology and Network Security: 7th International Conference, CANS 2008, Proceedings. Franklin, M. K., Kwong Hui, L. C. & Wong, D. S. (eds.). Berlin Germany: Springer-Verlag London Ltd., p. 49 - 63 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

10 Citations (Scopus)

Cryptanalysis of WG-7: A lightweight stream cipher

Orumiehchiha, M. A., Pieprzyk, J. & Steinfeld, R., 2012, In : Cryptography and Communications: discrete structures, Boolean functions and sequences. 4, 3-4, p. 277 - 285 9 p.

Research output: Contribution to journalArticleResearchpeer-review

19 Citations (Scopus)

DGM: a dynamic and revocable Group Merkle signature

Buser, M., Liu, J., Steinfeld, R., Sakzad, A. & Sun, S-F., 2019, Computer Security - ESORICS 2019: 24th European Symposium on Research in Computer Security Luxembourg, September 23–27, 2019 Proceedings, Part I. Sako, K., Schneider, S. & Y. A. Ryan, P. (eds.). Cham Switzerland: Springer, p. 194-214 21 p. (Lecture Notes in Computer Science; vol. 11735).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Does counting still count? Revisiting the security of counting based user authentication protocols against statistical attacks

Asghar, H. J., Li, S., Steinfeld, R. & Pieprzyk, J., 2013, NDSS Symposium 2013, 20th Annual Network & Distributed System Security Symposium. Ning, P. (ed.). Reston VA USA: Internet Society (ISoc), p. 1 - 18 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Efficient extension of standard Schnorr/RSA signatures into universal designated-verifier signatures

Steinfeld, R., Wang, H. & Pieprzyk, J., 2004, Public Key Cryptography - PKC 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Proceedings. Bao, F., Deng, R. & Zhou, J. (eds.). Berlin Germany: Springer-Verlag London Ltd., p. 86 - 100 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

90 Citations (Scopus)

Efficient fuzzy matching and intersection on private datasets

Ye, Q., Steinfeld, R., Pieprzyk, J. & Wang, H., 2010, Information Security and Cryptology - ICISC 2009: 12th International Conference, Revised Selected Papers. Lee, D. & Hong, S. (eds.). Berlin Germany: Springer-Verlag London Ltd., p. 211 - 228 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

6 Citations (Scopus)

Efficient public key encryption based on ideal lattices

Stehle, D. N., Steinfeld, R., Tanaka, K. & Xagawa, K., 2009, Advances in Cryptology - ASIACRYPT 2009: 15th International Conference on the Theory and Application of Cryptology and Information Security. Matsui, M. (ed.). Berline Germany: Springer-Verlag London Ltd., p. 617 - 635 19 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

105 Citations (Scopus)

FACCT: FAst, compact, and constant-time discrete Gaussian sampler over Integers

Zhao, R. K., Steinfeld, R. & Sakzad, A., 1 Jan 2020, In : IEEE Transactions on Computers. 69, 1, p. 126-137 12 p., 8834816.

Research output: Contribution to journalArticleResearchpeer-review

1 Citation (Scopus)

Faster fully homomorphic encryption

Stehle, D. N. & Steinfeld, R., 2010, Advances in Cryptology - ASIACRYPT 2010: 16th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Abe, M. (ed.). Berlin Germany: Springer-Verlag London Ltd., p. 377 - 394 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

156 Citations (Scopus)

Formal proofs for the security of signcryption

Baek, J., Steinfeld, R. & Zheng, Y., 2002, In : Lecture Notes in Computer Science. 2274, p. 80 - 98 19 p.

Research output: Contribution to journalArticleResearchpeer-review

169 Citations (Scopus)

Formal proofs for the security of signcryption

Baek, J., Steinfeld, R. & Zheng, Y., 2007, In : Journal of Cryptology. 20, 2, p. 203 - 235 33 p.

Research output: Contribution to journalArticleResearchpeer-review

101 Citations (Scopus)

Generic multi-keyword ranked search on encrypted cloud data

Kasra Kermanshahi, S., Liu, J. K., Steinfeld, R. & Nepal, S., 2019, Computer Security - ESORICS 2019: 24th European Symposium on Research in Computer Security Luxembourg, September 23–27, 2019 Proceedings, Part I. Sako, K., Schneider, S. & Y. A. Ryan, P. (eds.). Cham Switzerland: Springer, p. 322-343 22 p. (Lecture Notes in Computer Science ; vol. 11735).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Geometric range search on encrypted data with Forward/Backward security

Kasra Kermanshahi, S. K., Sun, S-F., Liu, J. K., Steinfeld, R., Nepal, S., Lau, W. F. & Au, M., 23 Mar 2020, (Accepted/In press) In : IEEE Transactions on Dependable and Secure Computing. 18 p.

Research output: Contribution to journalArticleResearchpeer-review

GGHLite: More efficient multilinear maps from ideal lattices

Langlois, A., Stehle, D. N. & Steinfeld, R., 2014, Advances in Cryptology - EUROCRYPT 2014: 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques. Nguyen, P. Q. & Oswald, E. (eds.). Heidelberg Germany: Springer, p. 239 - 256 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

65 Citations (Scopus)

Graph coloring applied to secure computation in non-Abelian groups

Desmedt, Y., Pieprzyk, J., Steinfeld, R., Sun, X., Tartary, C., Wang, H. & Yao, A. C-C., 2012, In : Journal of Cryptology. 25, 4, p. 557 - 600 44 p.

Research output: Contribution to journalArticleResearchpeer-review

5 Citations (Scopus)

Hardness of k-LWE and applications in traitor tracing

Ling, S., Phan, D. H., Stehle, D. N. & Steinfeld, R., 2014, Advances in Cryptology - CRYPTO 2014: 34th Annual Cryptology Conference, Proceedings. Garay, J. A. & Gennaro, R. (eds.). Heidelberg Germany: Springer, p. 315 - 334 20 p. (Lecture Notes in Computer Science; vol. 8616).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

20 Citations (Scopus)

Hardness of k-LWE and Applications in Traitor Tracing

Ling, S., Phan, D. H., Stehlé, D. & Steinfeld, R., Dec 2017, In : Algorithmica. 79, 4, p. 1318-1352 35 p.

Research output: Contribution to journalArticleResearchpeer-review

1 Citation (Scopus)

Higher order Universal One-Way Hash Functions from the subset sum assumption

Steinfeld, R., Pieprzyk, J. & Wang, H., 2006, Public Key Cryptography - PKC 2006: 9th International Conference on Theory and Practice of Public-Key Cryptography, Proceedings. Yung, M., Dodis, Y., Kiayias, A. & Malkin, T. (eds.). Berlin Germany: Springer-Verlag London Ltd., p. 157 - 173 17 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

How to strengthen any weakly unforgeable signature into a strongly unforgeable signature

Steinfeld, R., Pieprzyk, J. & Wang, H., 2006, Topics in Cryptology - CT-RSA 2007: The Cryptographers' Track at the RSA Conference 2007, Proceedings. Abe, M. (ed.). Berlin Germany: Springer-Verlag London Ltd., p. 357 - 371 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Improved security proofs in lattice-based cryptography: Using the Renyi divergence rather than the statistical distance

Bai, S., Lepoint, T., Roux-Langlois, A., Sakzad, A., Stehle, D. & Steinfeld, R., Apr 2018, In : Journal of Cryptology. 31, 2, p. 610-640 31 p.

Research output: Contribution to journalArticleResearchpeer-review

8 Citations (Scopus)

Improved security proofs in lattice-based cryptography: Using the Renyi divergence rather than the statistical distance

Bai, S., Langlois, A., Lepoint, T., Stehle, D. & Steinfeld, R., 2015, Advances in Cryptology - ASIACRYPT 2015: 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings Part I. Iwata, T. & Cheon, J. H. (eds.). Heidelberg [Germany]: Springer, p. 3-24 22 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

36 Citations (Scopus)

Known and chosen key differential distinguishers for block ciphers

Nikolic, I., Pieprzyk, J., Sokolowski, P. & Steinfeld, R., 2011, Information Security and Cryptology - ICISC 2010: 13th International Conference, Revised Selected Papers. Rhee, K-H. & Nyang, D. (eds.). Berlin Germany: Springer-Verlag London Ltd., p. 29 - 48 20 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

13 Citations (Scopus)

Lattice-based certificateless public-key encryption in the standard model

Sepahi, R., Steinfeld, R. & Pieprzyk, J., 2014, In : International Journal of Information Security. 13, 4, p. 315-333 19 p.

Research output: Contribution to journalArticleResearchpeer-review

8 Citations (Scopus)

Lattice-based completely non-malleable PKE in the standard model (poster)

Sepahi, R., Steinfeld, R. & Pieprzyk, J., 2011, Information Security and Privacy: 16th Australasian Conference, ACISP 2011, Proceedings. Parampalli, U. & Hawkes, P. (eds.). Berlin Germany: Springer-Verlag London Ltd., p. 407 - 411 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperOtherpeer-review

2 Citations (Scopus)

Lattice-based completely non-malleable public-key encryption in the standard model

Sepahi, R., Steinfeld, R. & Pieprzyk, J., May 2014, In : Designs Codes and Cryptography. 71, 2, p. 293-313 21 p.

Research output: Contribution to journalArticleResearchpeer-review

3 Citations (Scopus)

Lattice-based threshold-changeability for standard CRT secret-sharing schemes

Steinfeld, R., Pieprzyk, J. & Wang, H., 2006, In : Finite Fields and their Applications. 12, 4, p. 653 - 680 28 p.

Research output: Contribution to journalArticleResearchpeer-review

22 Citations (Scopus)

Lattice-based threshold changeability for standard Shamir secret-sharing schemes

Steinfeld, R., Pieprzyk, J. & Wang, H., 2007, In : IEEE Transactions on Information Theory. 53, 7, p. 2542 - 2559 18 p.

Research output: Contribution to journalArticleResearchpeer-review

21 Citations (Scopus)

Lattice-based threshold-changeability for standard Shamir secret-sharing schemes

Steinfeld, R., Wang, H. & Pieprzyk, J., 2004, Advances in Cryptology - ASIACRYPT 2004: 10th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Lee, P. J. (ed.). Berlin Germany: Springer-Verlag London Ltd., p. 170 - 186 17 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

13 Citations (Scopus)