If you made any changes in Pure these will be visible here soon.

Research Output

  • 59 Conference Paper
  • 29 Article
  • 4 Foreword / Postscript
  • 2 Chapter (Book)
Article

An advantage of low-exponent RSA with modules primes sharing least significant bits

Steinfeld, R. & Zheng, Y., 2001, In : Lecture Notes in Computer Science. 2020, p. 52 - 62 11 p.

Research output: Contribution to journalArticleResearchpeer-review

A Signcryption Scheme Based on Integer Factorization

Steinfeld, R. & Zheng, Y., 2000, In : Lecture Notes in Computer Science. p. 308 - 322 15 p.

Research output: Contribution to journalArticleResearchpeer-review

68 Citations (Scopus)

A subexponential construction of graph coloring for multiparty computation

Asghar, H. J., Desmedt, Y., Pieprzyk, J. & Steinfeld, R., 2014, In : Journal of Mathematical Cryptology. 8, 4, p. 363 - 403 41 p.

Research output: Contribution to journalArticleResearchpeer-review

Chinese remaindering for algebraic numbers in a hidden field

Shparlinski, I. E. & Steinfeld, R., 2002, In : Lecture Notes in Computer Science. 2369, p. 349 - 356 8 p.

Research output: Contribution to journalArticleResearchpeer-review

1 Citation (Scopus)

Chinese remaindering with multiplicative noise

Shparlinski, I. E. & Steinfeld, R., 2007, In : Theory of Computing Systems. 40, 1, p. 33 - 41 9 p.

Research output: Contribution to journalArticleResearchpeer-review

Content extraction signatures

Steinfeld, R., Bull, L. & Zheng, Y., 2001, In : Lecture Notes in Computer Science. 2288, p. 285 - 304 20 p.

Research output: Contribution to journalArticleResearchpeer-review

Cryptanalysis of WG-7: A lightweight stream cipher

Orumiehchiha, M. A., Pieprzyk, J. & Steinfeld, R., 2012, In : Cryptography and Communications: discrete structures, Boolean functions and sequences. 4, 3-4, p. 277 - 285 9 p.

Research output: Contribution to journalArticleResearchpeer-review

18 Citations (Scopus)

FACCT: FAst, compact, and constant-time discrete Gaussian sampler over Integers

Zhao, R. K., Steinfeld, R. & Sakzad, A., 1 Jan 2020, In : IEEE Transactions on Computers. 69, 1, p. 126-137 12 p., 8834816.

Research output: Contribution to journalArticleResearchpeer-review

1 Citation (Scopus)

Formal proofs for the security of signcryption

Baek, J., Steinfeld, R. & Zheng, Y., 2007, In : Journal of Cryptology. 20, 2, p. 203 - 235 33 p.

Research output: Contribution to journalArticleResearchpeer-review

101 Citations (Scopus)

Formal proofs for the security of signcryption

Baek, J., Steinfeld, R. & Zheng, Y., 2002, In : Lecture Notes in Computer Science. 2274, p. 80 - 98 19 p.

Research output: Contribution to journalArticleResearchpeer-review

169 Citations (Scopus)

Geometric range search on encrypted data with Forward/Backward security

Kasra Kermanshahi, S. K., Sun, S-F., Liu, J. K., Steinfeld, R., Nepal, S., Lau, W. F. & Au, M., 23 Mar 2020, (Accepted/In press) In : IEEE Transactions on Dependable and Secure Computing. 18 p.

Research output: Contribution to journalArticleResearchpeer-review

Graph coloring applied to secure computation in non-Abelian groups

Desmedt, Y., Pieprzyk, J., Steinfeld, R., Sun, X., Tartary, C., Wang, H. & Yao, A. C-C., 2012, In : Journal of Cryptology. 25, 4, p. 557 - 600 44 p.

Research output: Contribution to journalArticleResearchpeer-review

5 Citations (Scopus)

Hardness of k-LWE and Applications in Traitor Tracing

Ling, S., Phan, D. H., Stehlé, D. & Steinfeld, R., Dec 2017, In : Algorithmica. 79, 4, p. 1318-1352 35 p.

Research output: Contribution to journalArticleResearchpeer-review

1 Citation (Scopus)

Improved security proofs in lattice-based cryptography: Using the Renyi divergence rather than the statistical distance

Bai, S., Lepoint, T., Roux-Langlois, A., Sakzad, A., Stehle, D. & Steinfeld, R., Apr 2018, In : Journal of Cryptology. 31, 2, p. 610-640 31 p.

Research output: Contribution to journalArticleResearchpeer-review

8 Citations (Scopus)

Lattice-based certificateless public-key encryption in the standard model

Sepahi, R., Steinfeld, R. & Pieprzyk, J., 2014, In : International Journal of Information Security. 13, 4, p. 315-333 19 p.

Research output: Contribution to journalArticleResearchpeer-review

8 Citations (Scopus)

Lattice-based completely non-malleable public-key encryption in the standard model

Sepahi, R., Steinfeld, R. & Pieprzyk, J., May 2014, In : Designs Codes and Cryptography. 71, 2, p. 293-313 21 p.

Research output: Contribution to journalArticleResearchpeer-review

3 Citations (Scopus)

Lattice-based threshold-changeability for standard CRT secret-sharing schemes

Steinfeld, R., Pieprzyk, J. & Wang, H., 2006, In : Finite Fields and their Applications. 12, 4, p. 653 - 680 28 p.

Research output: Contribution to journalArticleResearchpeer-review

22 Citations (Scopus)

Lattice-based threshold changeability for standard Shamir secret-sharing schemes

Steinfeld, R., Pieprzyk, J. & Wang, H., 2007, In : IEEE Transactions on Information Theory. 53, 7, p. 2542 - 2559 18 p.

Research output: Contribution to journalArticleResearchpeer-review

21 Citations (Scopus)

Multi-party computation with conversion of secret sharing

Ghodosi, H., Pieprzyk, J. & Steinfeld, R., 2012, In : Designs Codes and Cryptography. 62, 3, p. 259 - 272 14 p.

Research output: Contribution to journalArticleResearchpeer-review

3 Citations (Scopus)

Noisy Chinese remaindering in the Lee norm

Shparlinski, I. E. & Steinfeld, R., 2004, In : Journal of Complexity. 20, 2-3, p. 423 - 437 15 p.

Research output: Contribution to journalArticleResearchpeer-review

17 Citations (Scopus)

On the linearization of human identification protocols: Attacks based on linear algebra, coding theory, and lattices

Asghar, H. J., Steinfeld, R., Li, S., Kaafar, M. A. & Pieprzyk, J., 2015, In : IEEE Transactions on Information Forensics and Security. 10, 8, p. 1643 - 1655 13 p.

Research output: Contribution to journalArticleResearchpeer-review

6 Citations (Scopus)

On the modular inversion hidden number problem

Ling, S., Shparlinski, I. E., Steinfeld, R. & Wang, H., 2012, In : Journal of Symbolic Computation. 47, 4, p. 358 - 367 10 p.

Research output: Contribution to journalArticleResearchpeer-review

8 Citations (Scopus)

On the necessity of strong assumptions for the security of a class of asymmetric encryption schemes

Steinfeld, R., Baek, J. & Zheng, Y., 2002, In : Lecture Notes in Computer Science. 2384, p. 241 - 256 16 p.

Research output: Contribution to journalArticleResearchpeer-review

4 Citations (Scopus)

On the security of RSA with primes sharing least-significant bits

Steinfeld, R. & Zheng, Y., 2004, In : Applicable Algebra in Engineering Communication and Computing. 15, 3-4, p. 179 - 200 22 p.

Research output: Contribution to journalArticleResearchpeer-review

18 Citations (Scopus)

Practical attack on NLM-MAC scheme

Orumiehchiha, M. A., Pieprzyk, J. & Steinfeld, R., 2014, In : Information Processing Letters. 114, 10, p. 547 - 550 4 p.

Research output: Contribution to journalArticleOtherpeer-review

Practical MP-LWE -based encryption balancing security-risk versus efficiency

Steinfeld, R., Sakzad, A. & Zhao, R. K., 12 Dec 2019, In : Designs Codes and Cryptography. 87, 12, p. 2847-2884 38 p.

Research output: Contribution to journalArticleResearchpeer-review

Security analysis of linearly filtered NLFSRs

Orumiehchiha, M. A., Pieprzyk, J., Steinfeld, R. & Bartlett, H., 2013, In : Journal of Mathematical Cryptology. 7, 4, p. 313 - 332 20 p.

Research output: Contribution to journalArticleResearchpeer-review

1 Citation (Scopus)

Universal designated-verifier signatures

Steinfeld, R., Bull, L., Wang, H. & Pieprzyk, J., 2003, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2894, p. 523-542 20 p.

Research output: Contribution to journalArticleResearchpeer-review

170 Citations (Scopus)
2 Citations (Scopus)
Chapter (Book)

NTRU Cryptosystem: Recent developments and emerging mathematical problems in finite polynomial rings

Steinfeld, R., 2014, Algebraic Curves and Finite Fields: Cryptography and Other Applications. Niederreiter, H., Ostafe, A., Panario, D. & Winterhof, A. (eds.). Berlin Germany: Walter de Gruyter, p. 179 - 211 33 p.

Research output: Chapter in Book/Report/Conference proceedingChapter (Book)Researchpeer-review

Security for signcryption: The multi-user model

Baek, J. & Steinfeld, R., 2010, Practical Signcryption. Dent, A. W. & Zheng, Y. (eds.). Berlin Germany: Springer, p. 43 - 53 11 p.

Research output: Chapter in Book/Report/Conference proceedingChapter (Book)Researchpeer-review

Conference Paper

A critical look at cryptographic hash function literature

Contini, S., Steinfeld, R., Pieprzyk, J. & Matusiewicz, K., 2008, Proceedings of the First International Workshop on Coding and Cryptology. Li, Y., Ling, S., Niederreiter, H., Wang, H., Xing, C. & Zhang, S. (eds.). Singapore: World Scientific Publishing, p. 58 - 79 22 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Active security in multiparty computation over black-box groups

Desmedt, Y., Pieprzyk, J. & Steinfeld, R., 2012, Security and Cryptography for Networks: 8th International Conference, Proceedings. Visconti, I. & De Prisco, R. (eds.). Berlin Germany: Springer-Verlag London Ltd., Vol. 7485. p. 503 - 521 19 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2 Citations (Scopus)

A lattice-based approach to privacy-preserving biometric authentication without relying on trusted third parties

Dinh, T., Steinfeld, R. & Bhattacharjee, N., 2017, Information Security Practice and Experience: 13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, December 13-15, 2017 - Proceedings. Liu, J. K. & Samarati, P. (eds.). Cham Switzerland: Springer, p. 297-319 23 p. (Lecture Notes in Computer Science; vol. 10701).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

All-but-many lossy trapdoor functions and selective opening chosen-ciphertext security from LWE

Libert, B., Sakzad, A., Stehle, D. N. & Steinfeld, R., 2017, Advances in Cryptology – CRYPTO 2017 - 37th Annual International Cryptology Conference, Proceedings. Katz, J. & Shacham, H. (eds.). Cham, Switzerland: Springer, Vol. 10403 LNCS. p. 332-364 33 p. (Lecture Notes in Computer Science; vol. 10403).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

14 Citations (Scopus)

An advantage of low-exponent RSA with modulus primes sharing least significant bits

Steinfeld, R. & Zheng, Y., 2001, Topics in Cryptology - CT-RSA 2001 - The Cryptographers’ Track at RSA Conference 2001, Proceedings. Naccache, D. (ed.). Springer, p. 52-62 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2020).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

16 Citations (Scopus)

An efficient non-interactive multi-client searchable encryption with support for boolean queries

Sun, S-F., Liu, J. K., Sakzad, A., Steinfeld, R. & Yuen, T. H., 15 Sep 2016, Computer Security - ESORICS 2016: 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26–30, 2016, Proceedings, Part I. Askoxylakis, I., Ioannidis, S., Katsikas, S. & Meadows, C. (eds.). Switzerland: Springer, p. 154-172 19 p. (Lecture Notes in Computer Science ; vol. 9878 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

40 Citations (Scopus)

An implementation of access-control protocol for IoT home scenario

Wu, X., Steinfeld, R., Liu, J. & Rudolph, C., 2017, Proceedings - 16th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2017). Zhu, G., Yao, S., Cui, X. & Xu, S. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 31-37 7 p. 7959965

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

Open Access
File
3 Citations (Scopus)

A non-malleable group key exchange protocol robust against active insiders

Desmedt, Y., Pieprzyk, J., Steinfeld, R. & Wang, H., 2006, Information Security: 9th International Conference, ISC 2006, Proceedings. Katsikas, S. K., Lopez, J., Backes, M., Gritzalis, S. & Preneel, B. (eds.). Berlin Germany: Springer-Verlag London Ltd., p. 459 - 475 17 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

16 Citations (Scopus)

Anonymity reduction attacks to Monero

Wijaya, D. A., Liu, J., Steinfeld, R., Liu, D. & Yuen, T. H., 2019, Information Security and Cryptology: 14th International Conference, Inscrypt 2018 Fuzhou, China, December 14–17, 2018 Revised Selected Papers. Guo, F., Huang, X. & Yung, M. (eds.). Cham Switzerland: Springer, p. 86-100 15 p. (Lecture Notes in Computer Science; vol. 11449 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

3 Citations (Scopus)

Anonymizing bitcoin transaction

Wijaya, D. A., Liu, J. K., Steinfeld, R., Sun, S. F. & Huang, X., 2016, Information Security Practice and Experience : 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16–18, 2016, Proceedings. Bao, F., Chen, L., Deng, R. H. & Wang, G. (eds.). Cham, Switzerland: Springer, p. 271-283 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10060 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

6 Citations (Scopus)

Collision in the DSA function

Shparlinski, I. E. & Steinfeld, R., 2008, Proceedings of the First International Workshop on Coding and Cryptology. Li, Y., Ling, S., Niederreiter, H., Wang, H., Xing, C. & Zhang, S. (eds.). Singapore: World Scientific Publishing, p. 226 - 232 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Converse results to the Wiener attack on RSA

Steinfeld, R., Contini, S., Wang, H. & Pieprzyk, J., 2005, Public Key Cryptography - PKC 2005: 8th International Workshop on Theory and Practice in Public Key Cryptography, Proceedings. Vaudenay, S. (ed.). Berlin Germany: Springer-Verlag London Ltd., p. 184 - 198 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

11 Citations (Scopus)

COSAC: compact and scalable arbitrary-centered discrete Gaussian sampling over integers

Zhao, R. K., Steinfeld, R. & Sakzad, A., 2020, Post-Quantum Cryptography : 11th International Conference, PQCrypto 2020 Paris, France, April 15–17, 2020 Proceedings. Ding, J. & Tillich, J-P. (eds.). Cham Switzerland: Springer, p. 284-303 20 p. (Lecture Notes in Computer Science ; vol. 12100 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Cryptanalysis of LASH

Steinfeld, R., Contini, S., Matusiewicz, K., Pieprzyk, J., Guo, J., Ling, S. & Wang, H., 2008, Fast Software Encryption: 15th International Workshop, FSE 2008, Revised Selected Papers. Nyberg, K. (ed.). Berlin Germany: Springer-Verlag London Ltd., p. 207 - 223 17 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

1 Citation (Scopus)

Cryptanalysis of RC4(n,m) stream cipher

Orumiehchiha, M. A., Pieprzyk, J., Shakour, E. & Steinfeld, R., 2013, Proceedings of the 6th International Conference on Security of Information and Networks (SIN 2013). Elci, A., Chefranov, A., Gaur, M. S., Orgun, M. A., Makarevich, O. B. & Celik, Y. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 165 - 172 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

7 Citations (Scopus)

Cryptanalysis of RC4-based hash function

Orumiehchiha, M. A., Pieprzyk, J. & Steinfeld, R., 2012, Proceedings of the Tenth Australasian Information Security Conference. Pieprzyk, J. & Thomborson, C. (eds.). Sydney NSW Australia: Australian Computer Society Inc, Vol. 125. p. 33 - 38 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

1 Citation (Scopus)

Cryptanalysis of short exponent RSA with primes sharing least significant bits

Sun, H-M., Wu, M-E., Steinfeld, R., Guo, J. & Wang, H., 2008, Cryptology and Network Security: 7th International Conference, CANS 2008, Proceedings. Franklin, M. K., Kwong Hui, L. C. & Wong, D. S. (eds.). Berlin Germany: Springer-Verlag London Ltd., p. 49 - 63 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

10 Citations (Scopus)

DGM: a dynamic and revocable Group Merkle signature

Buser, M., Liu, J., Steinfeld, R., Sakzad, A. & Sun, S-F., 2019, Computer Security - ESORICS 2019: 24th European Symposium on Research in Computer Security Luxembourg, September 23–27, 2019 Proceedings, Part I. Sako, K., Schneider, S. & Y. A. Ryan, P. (eds.). Cham Switzerland: Springer, p. 194-214 21 p. (Lecture Notes in Computer Science; vol. 11735).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Does counting still count? Revisiting the security of counting based user authentication protocols against statistical attacks

Asghar, H. J., Li, S., Steinfeld, R. & Pieprzyk, J., 2013, NDSS Symposium 2013, 20th Annual Network & Distributed System Security Symposium. Ning, P. (ed.). Reston VA USA: Internet Society (ISoc), p. 1 - 18 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review