If you made any changes in Pure these will be visible here soon.

Research Output

  • 65 Conference Paper
  • 22 Article
  • 4 Foreword / Postscript
  • 2 Chapter (Book)
Conference Paper

On secure multi-party computation in black-box groups

Desmedt, Y., Pieprzyk, J., Steinfeld, R. & Wang, H., 2007, Advances in Cryptology - CRYPTO 2007: 27th Annual International Cryptology Conference, Proceedings. Menezes, A. (ed.). Berlin Germany: Springer-Verlag London Ltd., p. 591 - 612 22 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

9 Citations (Scopus)

On the necessity of strong assumptions for the security of a class of asymmetric encryption schemes

Steinfeld, R., Baek, J. & Zheng, Y., 2002, Information Security and Privacy: 7th Australasian Conference, ACISP 2002 Melbourne, Australia, July 3-5, 2002 Proceedings. Batten, L. & Seberry, J. (eds.). Berlin Germany: Springer, p. 241-256 16 p. (Lecture Notes in Computer Science; vol. 2384).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

4 Citations (Scopus)

On the provable security of an efficient RSA-based Pseudorandom generator

Steinfeld, R., Pieprzyk, J. & Wang, H., 2006, Advances in Cryptology - ASIACRYPT 2006: 12th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Lai, X. & Chen, K. (eds.). Berlin Germany: Springer-Verlag London Ltd., p. 194 - 209 16 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

17 Citations (Scopus)

On the unforkability of Monero

Wijaya, D. A., Liu, J. K., Steinfeld, R., Liu, D. & Yu, J., 2019, Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. Gollmann, D., Kirda, E. & Liang, Z. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 621-632 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Open Access
File
3 Citations (Scopus)

Platform-independent secure blockchain-based voting system

Yu, B., Liu, J. K., Sakzad, A., Nepal, S., Steinfeld, R., Rimba, P. & Au, M. H., 2018, Information Security: 21st International Conference, ISC 2018 Guildford, UK, September 9–12, 2018 Proceedings. Chen, L., Manulis, M. & Schneider, S. (eds.). Cham Switzerland: Springer, p. 369-386 18 p. (Lecture Notes in Computer Science ; vol. 11060 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

28 Citations (Scopus)

Post-quantum one-time linkable ring signature and application to ring confidential transactions in blockchain (Lattice RingCT v1.0)

Alberto Torres, W. A., Steinfeld, R., Sakzad, A., Liu, J. K., Kuchta, V., Bhattacharjee, N., Au, M. H. & Cheng, J., 2018, Information Security and Privacy: 23rd Australasian Conference, ACISP 2018 Wollongong, NSW, Australia, July 11–13, 2018 Proceedings. Susilo, W. & Yang, G. (eds.). Cham Switzerland: Springer, p. 558-576 19 p. (Lecture Notes in Computer Science ; vol. 10946).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

18 Citations (Scopus)

Practical backward-Secure Searchable Encryption from symmetric puncturable encryption

Sun, S-F., Yuan, X., Liu, J. K., Steinfeld, R., Sakzad, A., Vo, V. & Nepal, S., 2018, CCS’18 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security: October 15-19, 2018 Toronto, ON, Canada . Backes, M. & Wang, X. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 763-780 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

25 Citations (Scopus)

Result pattern hiding searchable encryption for conjunctive queries

Lai, S., Patranabis, S., Sakzad, A., Liu, J. K., Mukhopadhyay, D., Steinfeld, R., Sun, S-F., Liu, D. & Zuo, C., 2018, CCS’18 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security: October 15-19, 2018 Toronto, ON, Canada. Backes, M. & Wang, X. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 745-762 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

18 Citations (Scopus)

Revocable and linkable ring signature

Zhang, X., Liu, J. K., Steinfeld, R., Kuchta, V. & Yu, J., 2019, Information Security and Cryptology : 15th International Conference, Inscrypt 2019 Nanjing, China, December 6–8, 2019 Revised Selected Papers. Liu, Z. & Yung, M. (eds.). Cham Switzerland: Springer, p. 3-27 25 p. (Lecture Notes in Computer Science ; vol. 2020).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

Risk of asynchronous protocol update: attacks to Monero protocols

Wijaya, D. A., Liu, J. K., Steinfeld, R. & Liu, D., 2019, Information Security and Privacy: 24th Australasian Conference, ACISP 2019 Christchurch, New Zealand, July 3–5, 2019 Proceedings. Jang-Jaccard, J. & Guo, F. (eds.). Cham Switzerland: Springer, p. 307-321 15 p. (Lecture Notes in Computer Science ; vol. 11547 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Rotational cryptanalysis of ARX revisited

Khovratovich, D., Nikolic, I., Pieprzyk, J., Sokolowski, P. & Steinfeld, R., 2015, Fast Software Encryption: 22nd International Workshop, FSE 2015, Revised Selected Papers. Leander, G. (ed.). Heidelberg Germany: Springer, Vol. 9054. p. 519 - 536 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2 Citations (Scopus)

Security evaluation of Rakaposhi stream cipher

Orumiehchiha, M. A., Pieprzyk, J., Shakour, E. & Steinfeld, R., 2013, Information Security Practice and Experience: 9th International Conference (ISPEC 2013), Proceedings. Deng, R. H. & Feng, T. (eds.). Berlin Germany: Springer-Verlag London Ltd., p. 361 - 371 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

7 Citations (Scopus)

Short lattice-based one-out-of-many proofs and applications to ring signatures

Esgin, M. F., Steinfeld, R., Sakzad, A., Liu, J. K. & Liu, D., 2019, Applied Cryptography and Network Security: 17th International Conference, ACNS 2019 Bogota, Colombia, June 5–7, 2019 Proceedings. Deng, R. H., Gauthier-Umaña, V., Ochoa, M. & Yung, M. (eds.). Cham Switzerland: Springer, p. 67-88 22 p. (Lecture Notes in Computer Science ; vol. 11464 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

3 Citations (Scopus)

The current status in design of efficient provably secure Cryptographic Pseudorandom Generators

Steinfeld, R., 2008, Proceedings of the First International Workshop on Coding and Cryptology. Li, Y., Ling, S., Niederreiter, H., Wang, H., Xing, C. & Zhang, S. (eds.). Singapore: World Scientific Publishing, p. 233 - 255 23 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Truncated differential analysis of reduced-round LBlock

Emami, S., McDonald, C., Pieprzyk, J. & Steinfeld, R., 2013, Cryptology and Network Security, 12th International Conference (CANS 2013), Proceedings. Abdalla, M., Nita-Rotaru, C. & Dahab, R. (eds.). Cham Switzerland: Springer, p. 291 - 308 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2 Citations (Scopus)

Trusted Boolean Search on Cloud Using Searchable Symmetric Encryption

Zuo, C., Macindoe, J., Yang, S., Steinfeld, R. & Liu, J. K., 2016, 2016 IEEE Trustcom/BigDataSE/ISPA: Tianjin, China, 23-26 August, 2016, [Proceedings]. Xiang, Y., Ren, K. & Feng, D. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 113-120 8 p. 7846936

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

16 Citations (Scopus)

Universal designated-verifer signatures

Steinfeld, R., Bull, L., Wang, H. & Pieprzyk, J., 2003, Proceedings of the 9th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology ( ASIACRYPT 2003). Laih, C. S. (ed.). NY USA: Springer-Verlag London Ltd., Vol. 2894. p. 523 - 542 20 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Universal designated-verifier signatures

Steinfeld, R., Bull, L., Wang, H. & Pieprzyk, J., 2003, Advances in Cryptology - ASIACRYPT 2003: 9th International Conference on the Theory and Application of Cryptology and Information Security Taipei, Taiwan, November 30 – December 4, 2003 Proceedings. Laih, C. S. (ed.). Berlin Germany: Springer, p. 523-542 20 p. (Lecture Notes in Computer Science; vol. 2894).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

171 Citations (Scopus)

VSH, an efficient and provable collision-resistant hash function

Contini, S., Lenstra, A. K. & Steinfeld, R., 2006, Advances in Cryptology - EUROCRYPT 2006: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Vaudenay, S. (ed.). Berlin Germany: Springer-Verlag London Ltd., p. 165 - 182 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

68 Citations (Scopus)
Chapter (Book)

NTRU Cryptosystem: Recent developments and emerging mathematical problems in finite polynomial rings

Steinfeld, R., 2014, Algebraic Curves and Finite Fields: Cryptography and Other Applications. Niederreiter, H., Ostafe, A., Panario, D. & Winterhof, A. (eds.). Berlin Germany: Walter de Gruyter, p. 179 - 211 33 p.

Research output: Chapter in Book/Report/Conference proceedingChapter (Book)Researchpeer-review

Security for signcryption: The multi-user model

Baek, J. & Steinfeld, R., 2010, Practical Signcryption. Dent, A. W. & Zheng, Y. (eds.). Berlin Germany: Springer, p. 43 - 53 11 p.

Research output: Chapter in Book/Report/Conference proceedingChapter (Book)Researchpeer-review

Article

A subexponential construction of graph coloring for multiparty computation

Asghar, H. J., Desmedt, Y., Pieprzyk, J. & Steinfeld, R., 2014, In : Journal of Mathematical Cryptology. 8, 4, p. 363 - 403 41 p.

Research output: Contribution to journalArticleResearchpeer-review

Chinese remaindering with multiplicative noise

Shparlinski, I. E. & Steinfeld, R., 2007, In : Theory of Computing Systems. 40, 1, p. 33 - 41 9 p.

Research output: Contribution to journalArticleResearchpeer-review

Cryptanalysis of WG-7: A lightweight stream cipher

Orumiehchiha, M. A., Pieprzyk, J. & Steinfeld, R., 2012, In : Cryptography and Communications: discrete structures, Boolean functions and sequences. 4, 3-4, p. 277 - 285 9 p.

Research output: Contribution to journalArticleResearchpeer-review

19 Citations (Scopus)

FACCT: FAst, compact, and constant-time discrete Gaussian sampler over Integers

Zhao, R. K., Steinfeld, R. & Sakzad, A., 1 Jan 2020, In : IEEE Transactions on Computers. 69, 1, p. 126-137 12 p., 8834816.

Research output: Contribution to journalArticleResearchpeer-review

2 Citations (Scopus)

Formal proofs for the security of signcryption

Baek, J., Steinfeld, R. & Zheng, Y., 2007, In : Journal of Cryptology. 20, 2, p. 203 - 235 33 p.

Research output: Contribution to journalArticleResearchpeer-review

101 Citations (Scopus)

Geometric range search on encrypted data with Forward/Backward security

Kasra Kermanshahi, S. K., Sun, S-F., Liu, J. K., Steinfeld, R., Nepal, S., Lau, W. F. & Au, M., 23 Mar 2020, (Accepted/In press) In : IEEE Transactions on Dependable and Secure Computing. 18 p.

Research output: Contribution to journalArticleResearchpeer-review

1 Citation (Scopus)

Graph coloring applied to secure computation in non-Abelian groups

Desmedt, Y., Pieprzyk, J., Steinfeld, R., Sun, X., Tartary, C., Wang, H. & Yao, A. C-C., 2012, In : Journal of Cryptology. 25, 4, p. 557 - 600 44 p.

Research output: Contribution to journalArticleResearchpeer-review

5 Citations (Scopus)

Hardness of k-LWE and Applications in Traitor Tracing

Ling, S., Phan, D. H., Stehlé, D. & Steinfeld, R., Dec 2017, In : Algorithmica. 79, 4, p. 1318-1352 35 p.

Research output: Contribution to journalArticleResearchpeer-review

1 Citation (Scopus)

Improved security proofs in lattice-based cryptography: Using the Renyi divergence rather than the statistical distance

Bai, S., Lepoint, T., Roux-Langlois, A., Sakzad, A., Stehle, D. & Steinfeld, R., Apr 2018, In : Journal of Cryptology. 31, 2, p. 610-640 31 p.

Research output: Contribution to journalArticleResearchpeer-review

11 Citations (Scopus)

Lattice-based certificateless public-key encryption in the standard model

Sepahi, R., Steinfeld, R. & Pieprzyk, J., 2014, In : International Journal of Information Security. 13, 4, p. 315-333 19 p.

Research output: Contribution to journalArticleResearchpeer-review

8 Citations (Scopus)

Lattice-based completely non-malleable public-key encryption in the standard model

Sepahi, R., Steinfeld, R. & Pieprzyk, J., May 2014, In : Designs Codes and Cryptography. 71, 2, p. 293-313 21 p.

Research output: Contribution to journalArticleResearchpeer-review

3 Citations (Scopus)

Lattice-based threshold-changeability for standard CRT secret-sharing schemes

Steinfeld, R., Pieprzyk, J. & Wang, H., 2006, In : Finite Fields and their Applications. 12, 4, p. 653 - 680 28 p.

Research output: Contribution to journalArticleResearchpeer-review

23 Citations (Scopus)

Lattice-based threshold changeability for standard Shamir secret-sharing schemes

Steinfeld, R., Pieprzyk, J. & Wang, H., 2007, In : IEEE Transactions on Information Theory. 53, 7, p. 2542 - 2559 18 p.

Research output: Contribution to journalArticleResearchpeer-review

21 Citations (Scopus)

Multi-party computation with conversion of secret sharing

Ghodosi, H., Pieprzyk, J. & Steinfeld, R., 2012, In : Designs Codes and Cryptography. 62, 3, p. 259 - 272 14 p.

Research output: Contribution to journalArticleResearchpeer-review

5 Citations (Scopus)

Noisy Chinese remaindering in the Lee norm

Shparlinski, I. E. & Steinfeld, R., 2004, In : Journal of Complexity. 20, 2-3, p. 423 - 437 15 p.

Research output: Contribution to journalArticleResearchpeer-review

17 Citations (Scopus)

On the linearization of human identification protocols: Attacks based on linear algebra, coding theory, and lattices

Asghar, H. J., Steinfeld, R., Li, S., Kaafar, M. A. & Pieprzyk, J., 2015, In : IEEE Transactions on Information Forensics and Security. 10, 8, p. 1643 - 1655 13 p.

Research output: Contribution to journalArticleResearchpeer-review

6 Citations (Scopus)

On the modular inversion hidden number problem

Ling, S., Shparlinski, I. E., Steinfeld, R. & Wang, H., 2012, In : Journal of Symbolic Computation. 47, 4, p. 358 - 367 10 p.

Research output: Contribution to journalArticleResearchpeer-review

8 Citations (Scopus)

On the security of RSA with primes sharing least-significant bits

Steinfeld, R. & Zheng, Y., 2004, In : Applicable Algebra in Engineering Communication and Computing. 15, 3-4, p. 179 - 200 22 p.

Research output: Contribution to journalArticleResearchpeer-review

18 Citations (Scopus)

Practical attack on NLM-MAC scheme

Orumiehchiha, M. A., Pieprzyk, J. & Steinfeld, R., 2014, In : Information Processing Letters. 114, 10, p. 547 - 550 4 p.

Research output: Contribution to journalArticleOtherpeer-review

Practical MP-LWE -based encryption balancing security-risk versus efficiency

Steinfeld, R., Sakzad, A. & Zhao, R. K., 12 Dec 2019, In : Designs Codes and Cryptography. 87, 12, p. 2847-2884 38 p.

Research output: Contribution to journalArticleResearchpeer-review

1 Citation (Scopus)

Security analysis of linearly filtered NLFSRs

Orumiehchiha, M. A., Pieprzyk, J., Steinfeld, R. & Bartlett, H., 2013, In : Journal of Mathematical Cryptology. 7, 4, p. 313 - 332 20 p.

Research output: Contribution to journalArticleResearchpeer-review

1 Citation (Scopus)
2 Citations (Scopus)