If you made any changes in Pure these will be visible here soon.

Research Output

  • 56 Conference Paper
  • 29 Article
  • 4 Foreword / Postscript
  • 2 Chapter (Book)
Filter
Conference Paper
2019

Anonymity reduction attacks to Monero

Wijaya, D. A., Liu, J., Steinfeld, R., Liu, D. & Yuen, T. H., 2019, Information Security and Cryptology: 14th International Conference, Inscrypt 2018 Fuzhou, China, December 14–17, 2018 Revised Selected Papers. Guo, F., Huang, X. & Yung, M. (eds.). Cham Switzerland: Springer, p. 86-100 15 p. (Lecture Notes in Computer Science; vol. 11449 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

3 Citations (Scopus)

DGM: a dynamic and revocable Group Merkle signature

Buser, M., Liu, J., Steinfeld, R., Sakzad, A. & Sun, S-F., 2019, Computer Security - ESORICS 2019: 24th European Symposium on Research in Computer Security Luxembourg, September 23–27, 2019 Proceedings, Part I. Sako, K., Schneider, S. & Y. A. Ryan, P. (eds.). Cham Switzerland: Springer, p. 194-214 21 p. (Lecture Notes in Computer Science; vol. 11735).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Generic multi-keyword ranked search on encrypted cloud data

Kasra Kermanshahi, S., Liu, J. K., Steinfeld, R. & Nepal, S., 2019, Computer Security - ESORICS 2019: 24th European Symposium on Research in Computer Security Luxembourg, September 23–27, 2019 Proceedings, Part I. Sako, K., Schneider, S. & Y. A. Ryan, P. (eds.). Cham Switzerland: Springer, p. 322-343 22 p. (Lecture Notes in Computer Science ; vol. 11735).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Lattice-based zero-knowledge proofs: new techniques for shorter and faster constructions and applications

Esgin, M. F., Steinfeld, R., Liu, J. K. & Liu, D., 2019, Advances in Cryptology – CRYPTO 2019 : 39th Annual International Cryptology Conference Santa Barbara, CA, USA, August 18–22, 2019 Proceedings, Part I. Boldyreva, A. & Micciancio, D. (eds.). Cham Switzerland: Springer, p. 115-146 32 p. (Lecture Notes in Computer Science ; vol. 11692 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2 Citations (Scopus)

Lattice RingCT V2.0 with Multiple Input and Multiple Output Wallets

Alberto Torres, W., Kuchta, V., Steinfeld, R., Sakzad, A., Liu, J. K. & Cheng, J., 2019, Information Security and Privacy: 24th Australasian Conference, ACISP 2019 Christchurch, New Zealand, July 3–5, 2019 Proceedings. Jang-Jaccard, J. & Guo, F. (eds.). Cham Switzerland: Springer, p. 156-175 20 p. (Lecture Notes in Computer Science ; vol. 11547 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

1 Citation (Scopus)

Multi-Writer Searchable Encryption: an LWE-based realization and implementation

Xu, L., Yuan, X., Steinfeld, R., Wang, C. & Xu, C., 2019, Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. Gollmann, D., Kirda, E. & Liang, Z. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 122-133 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

On the unforkability of Monero

Wijaya, D. A., Liu, J. K., Steinfeld, R., Liu, D. & Yu, J., 2019, Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. Gollmann, D., Kirda, E. & Liang, Z. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 621-632 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Open Access
File

Risk of asynchronous protocol update: attacks to Monero protocols

Wijaya, D. A., Liu, J. K., Steinfeld, R. & Liu, D., 2019, Information Security and Privacy: 24th Australasian Conference, ACISP 2019 Christchurch, New Zealand, July 3–5, 2019 Proceedings. Jang-Jaccard, J. & Guo, F. (eds.). Cham Switzerland: Springer, p. 307-321 15 p. (Lecture Notes in Computer Science ; vol. 11547 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Short lattice-based one-out-of-many proofs and applications to ring signatures

Esgin, M. F., Steinfeld, R., Sakzad, A., Liu, J. K. & Liu, D., 2019, Applied Cryptography and Network Security: 17th International Conference, ACNS 2019 Bogota, Colombia, June 5–7, 2019 Proceedings. Deng, R. H., Gauthier-Umaña, V., Ochoa, M. & Yung, M. (eds.). Cham Switzerland: Springer, p. 67-88 22 p. (Lecture Notes in Computer Science ; vol. 11464 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2 Citations (Scopus)
2018

Monero ring attack: recreating zero mixin transaction effect

Wijaya, D. A., Liu, J., Steinfeld, R. & Liu, D., 5 Sep 2018, Proceedings - The 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2018) - The 12th IEEE International Conference on Big Data Science and Engineering (IEEE BigDataSE 2018): 2018 IEEE Trustcom/BigDataSE. Choo, K-K. R., Zhu, Y., Fei, Z., Thuraisingham, B. & Xiang, Y. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 1196-1201 6 p. 8456034

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

6 Citations (Scopus)

Platform-independent secure blockchain-based voting system

Yu, B., Liu, J. K., Sakzad, A., Nepal, S., Steinfeld, R., Rimba, P. & Au, M. H., 2018, Information Security: 21st International Conference, ISC 2018 Guildford, UK, September 9–12, 2018 Proceedings. Chen, L., Manulis, M. & Schneider, S. (eds.). Cham Switzerland: Springer, p. 369-386 18 p. (Lecture Notes in Computer Science ; vol. 11060 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

20 Citations (Scopus)

Post-quantum one-time linkable ring signature and application to ring confidential transactions in blockchain (Lattice RingCT v1.0)

Alberto Torres, W. A., Steinfeld, R., Sakzad, A., Liu, J. K., Kuchta, V., Bhattacharjee, N., Au, M. H. & Cheng, J., 2018, Information Security and Privacy: 23rd Australasian Conference, ACISP 2018 Wollongong, NSW, Australia, July 11–13, 2018 Proceedings. Susilo, W. & Yang, G. (eds.). Cham Switzerland: Springer, p. 558-576 19 p. (Lecture Notes in Computer Science ; vol. 10946).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

16 Citations (Scopus)

Practical backward-Secure Searchable Encryption from symmetric puncturable encryption

Sun, S-F., Yuan, X., Liu, J. K., Steinfeld, R., Sakzad, A., Vo, V. & Nepal, S., 2018, CCS’18 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security: October 15-19, 2018 Toronto, ON, Canada . Backes, M. & Wang, X. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 763-780 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

22 Citations (Scopus)

Result pattern hiding searchable encryption for conjunctive queries

Lai, S., Patranabis, S., Sakzad, A., Liu, J. K., Mukhopadhyay, D., Steinfeld, R., Sun, S-F., Liu, D. & Zuo, C., 2018, CCS’18 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security: October 15-19, 2018 Toronto, ON, Canada. Backes, M. & Wang, X. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 745-762 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

15 Citations (Scopus)
2017

A lattice-based approach to privacy-preserving biometric authentication without relying on trusted third parties

Dinh, T., Steinfeld, R. & Bhattacharjee, N., 2017, Information Security Practice and Experience: 13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, December 13-15, 2017 - Proceedings. Liu, J. K. & Samarati, P. (eds.). Cham Switzerland: Springer, p. 297-319 23 p. (Lecture Notes in Computer Science; vol. 10701).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

All-but-many lossy trapdoor functions and selective opening chosen-ciphertext security from LWE

Libert, B., Sakzad, A., Stehle, D. N. & Steinfeld, R., 2017, Advances in Cryptology – CRYPTO 2017 - 37th Annual International Cryptology Conference, Proceedings. Katz, J. & Shacham, H. (eds.). Cham, Switzerland: Springer, Vol. 10403 LNCS. p. 332-364 33 p. (Lecture Notes in Computer Science; vol. 10403).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

14 Citations (Scopus)

An implementation of access-control protocol for IoT home scenario

Wu, X., Steinfeld, R., Liu, J. & Rudolph, C., 2017, Proceedings - 16th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2017). Zhu, G., Yao, S., Cui, X. & Xu, S. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 31-37 7 p. 7959965

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

Open Access
File
3 Citations (Scopus)

Middle-product learning with errors

Roşca, M., Sakzad, A., Stehle, D. N. & Steinfeld, R., 2017, Advances in Cryptology – CRYPTO 2017 - 37th Annual International Cryptology Conference, Proceedings. Katz, J. & Shacham, H. (eds.). Cham Switzerland: Springer, Vol. 10403. p. 283-297 15 p. (Lecture Notes in Computer Science ; vol. 10403 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

9 Citations (Scopus)

Multi-user cloud-based secure keyword search

Kasra Kermanshahi, S., Liu, J. K. & Steinfeld, R., 2017, Information Security and Privacy: 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part I. Pieprzyk, J. & Suriadi, S. (eds.). Cham, Switzerland: Springer, p. 227-247 21 p. (Lecture Notes in Computer Science ; vol. 10342).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

8 Citations (Scopus)
2016

An efficient non-interactive multi-client searchable encryption with support for boolean queries

Sun, S-F., Liu, J. K., Sakzad, A., Steinfeld, R. & Yuen, T. H., 15 Sep 2016, Computer Security - ESORICS 2016: 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26–30, 2016, Proceedings, Part I. Askoxylakis, I., Ioannidis, S., Katsikas, S. & Meadows, C. (eds.). Switzerland: Springer, p. 154-172 19 p. (Lecture Notes in Computer Science ; vol. 9878 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

38 Citations (Scopus)

Anonymizing bitcoin transaction

Wijaya, D. A., Liu, J. K., Steinfeld, R., Sun, S. F. & Huang, X., 2016, Information Security Practice and Experience : 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16–18, 2016, Proceedings. Bao, F., Chen, L., Deng, R. H. & Wang, G. (eds.). Cham, Switzerland: Springer, p. 271-283 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10060 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

6 Citations (Scopus)

Trusted Boolean Search on Cloud Using Searchable Symmetric Encryption

Zuo, C., Macindoe, J., Yang, S., Steinfeld, R. & Liu, J. K., 2016, 2016 IEEE Trustcom/BigDataSE/ISPA: Tianjin, China, 23-26 August, 2016, [Proceedings]. Xiang, Y., Ren, K. & Feng, D. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 113-120 8 p. 7846936

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

16 Citations (Scopus)
2015

Improved security proofs in lattice-based cryptography: Using the Renyi divergence rather than the statistical distance

Bai, S., Langlois, A., Lepoint, T., Stehle, D. & Steinfeld, R., 2015, Advances in Cryptology - ASIACRYPT 2015: 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings Part I. Iwata, T. & Cheon, J. H. (eds.). Heidelberg [Germany]: Springer, p. 3-24 22 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

35 Citations (Scopus)

On massive MIMO physical layer cryptosystem

Steinfeld, R. & Sakzad, A., 2015, ITW2015- 2015 IEEE Information Theory Workshop (Fall). Chung, S., Urbanke, R. & Viswanath, P. (eds.). Danvers MA USA: IEEE, Institute of Electrical and Electronics Engineers, p. 292 - 296 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

4 Citations (Scopus)

Rotational cryptanalysis of ARX revisited

Khovratovich, D., Nikolic, I., Pieprzyk, J., Sokolowski, P. & Steinfeld, R., 2015, Fast Software Encryption: 22nd International Workshop, FSE 2015, Revised Selected Papers. Leander, G. (ed.). Heidelberg Germany: Springer, Vol. 9054. p. 519 - 536 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

1 Citation (Scopus)
2014

GGHLite: More efficient multilinear maps from ideal lattices

Langlois, A., Stehle, D. N. & Steinfeld, R., 2014, Advances in Cryptology - EUROCRYPT 2014: 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques. Nguyen, P. Q. & Oswald, E. (eds.). Heidelberg Germany: Springer, p. 239 - 256 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

64 Citations (Scopus)

Hardness of k-LWE and applications in traitor tracing

Ling, S., Phan, D. H., Stehle, D. N. & Steinfeld, R., 2014, Advances in Cryptology - CRYPTO 2014: 34th Annual Cryptology Conference, Proceedings. Garay, J. A. & Gennaro, R. (eds.). Heidelberg Germany: Springer, p. 315 - 334 20 p. (Lecture Notes in Computer Science; vol. 8616).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

20 Citations (Scopus)
2013

Cryptanalysis of RC4(n,m) stream cipher

Orumiehchiha, M. A., Pieprzyk, J., Shakour, E. & Steinfeld, R., 2013, Proceedings of the 6th International Conference on Security of Information and Networks (SIN 2013). Elci, A., Chefranov, A., Gaur, M. S., Orgun, M. A., Makarevich, O. B. & Celik, Y. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 165 - 172 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

7 Citations (Scopus)

Does counting still count? Revisiting the security of counting based user authentication protocols against statistical attacks

Asghar, H. J., Li, S., Steinfeld, R. & Pieprzyk, J., 2013, NDSS Symposium 2013, 20th Annual Network & Distributed System Security Symposium. Ning, P. (ed.). Reston VA USA: Internet Society (ISoc), p. 1 - 18 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Security evaluation of Rakaposhi stream cipher

Orumiehchiha, M. A., Pieprzyk, J., Shakour, E. & Steinfeld, R., 2013, Information Security Practice and Experience: 9th International Conference (ISPEC 2013), Proceedings. Deng, R. H. & Feng, T. (eds.). Berlin Germany: Springer-Verlag London Ltd., p. 361 - 371 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

7 Citations (Scopus)

Truncated differential analysis of reduced-round LBlock

Emami, S., McDonald, C., Pieprzyk, J. & Steinfeld, R., 2013, Cryptology and Network Security, 12th International Conference (CANS 2013), Proceedings. Abdalla, M., Nita-Rotaru, C. & Dahab, R. (eds.). Cham Switzerland: Springer, p. 291 - 308 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2 Citations (Scopus)
2012

Active security in multiparty computation over black-box groups

Desmedt, Y., Pieprzyk, J. & Steinfeld, R., 2012, Security and Cryptography for Networks: 8th International Conference, Proceedings. Visconti, I. & De Prisco, R. (eds.). Berlin Germany: Springer-Verlag London Ltd., Vol. 7485. p. 503 - 521 19 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2 Citations (Scopus)

Cryptanalysis of RC4-based hash function

Orumiehchiha, M. A., Pieprzyk, J. & Steinfeld, R., 2012, Proceedings of the Tenth Australasian Information Security Conference. Pieprzyk, J. & Thomborson, C. (eds.). Sydney NSW Australia: Australian Computer Society Inc, Vol. 125. p. 33 - 38 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

1 Citation (Scopus)

NTRUCCA: How to strengthen NTRUEncrypt to chosen-ciphertext security in the standard model

Steinfeld, R., Ling, S., Pieprzyk, J., Tartary, C. & Wang, H., 2012, Public Key Cryptography - PKC 2012: 15th International Conference on Practice and Theory in Public Key Cryptograpy, Proceedings. Fischlin, M., Buchmann, J. & Manulis, M. (eds.). Berlin Germany: Springer-Verlag London Ltd., p. 353 - 371 19 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

8 Citations (Scopus)
2011

Known and chosen key differential distinguishers for block ciphers

Nikolic, I., Pieprzyk, J., Sokolowski, P. & Steinfeld, R., 2011, Information Security and Cryptology - ICISC 2010: 13th International Conference, Revised Selected Papers. Rhee, K-H. & Nyang, D. (eds.). Berlin Germany: Springer-Verlag London Ltd., p. 29 - 48 20 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

13 Citations (Scopus)

Lattice-based completely non-malleable PKE in the standard model (poster)

Sepahi, R., Steinfeld, R. & Pieprzyk, J., 2011, Information Security and Privacy: 16th Australasian Conference, ACISP 2011, Proceedings. Parampalli, U. & Hawkes, P. (eds.). Berlin Germany: Springer-Verlag London Ltd., p. 407 - 411 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperOtherpeer-review

2 Citations (Scopus)

Making NTRU as secure as worst-case problems over ideal lattices

Stehle, D. N. & Steinfeld, R., 2011, Advances in Cryptology - EUROCRYPT 2011: 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Paterson, K. G. (ed.). Berlin Germany: Springer-Verlag London Ltd., p. 27 - 47 21 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

168 Citations (Scopus)
2010

Efficient fuzzy matching and intersection on private datasets

Ye, Q., Steinfeld, R., Pieprzyk, J. & Wang, H., 2010, Information Security and Cryptology - ICISC 2009: 12th International Conference, Revised Selected Papers. Lee, D. & Hong, S. (eds.). Berlin Germany: Springer-Verlag London Ltd., p. 211 - 228 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

6 Citations (Scopus)

Faster fully homomorphic encryption

Stehle, D. N. & Steinfeld, R., 2010, Advances in Cryptology - ASIACRYPT 2010: 16th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Abe, M. (ed.). Berlin Germany: Springer-Verlag London Ltd., p. 377 - 394 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

156 Citations (Scopus)
2009

Efficient public key encryption based on ideal lattices

Stehle, D. N., Steinfeld, R., Tanaka, K. & Xagawa, K., 2009, Advances in Cryptology - ASIACRYPT 2009: 15th International Conference on the Theory and Application of Cryptology and Information Security. Matsui, M. (ed.). Berline Germany: Springer-Verlag London Ltd., p. 617 - 635 19 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

105 Citations (Scopus)
2008

A critical look at cryptographic hash function literature

Contini, S., Steinfeld, R., Pieprzyk, J. & Matusiewicz, K., 2008, Proceedings of the First International Workshop on Coding and Cryptology. Li, Y., Ling, S., Niederreiter, H., Wang, H., Xing, C. & Zhang, S. (eds.). Singapore: World Scientific Publishing, p. 58 - 79 22 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Collision in the DSA function

Shparlinski, I. E. & Steinfeld, R., 2008, Proceedings of the First International Workshop on Coding and Cryptology. Li, Y., Ling, S., Niederreiter, H., Wang, H., Xing, C. & Zhang, S. (eds.). Singapore: World Scientific Publishing, p. 226 - 232 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Cryptanalysis of LASH

Steinfeld, R., Contini, S., Matusiewicz, K., Pieprzyk, J., Guo, J., Ling, S. & Wang, H., 2008, Fast Software Encryption: 15th International Workshop, FSE 2008, Revised Selected Papers. Nyberg, K. (ed.). Berlin Germany: Springer-Verlag London Ltd., p. 207 - 223 17 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

1 Citation (Scopus)

Cryptanalysis of short exponent RSA with primes sharing least significant bits

Sun, H-M., Wu, M-E., Steinfeld, R., Guo, J. & Wang, H., 2008, Cryptology and Network Security: 7th International Conference, CANS 2008, Proceedings. Franklin, M. K., Kwong Hui, L. C. & Wong, D. S. (eds.). Berlin Germany: Springer-Verlag London Ltd., p. 49 - 63 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

10 Citations (Scopus)

The current status in design of efficient provably secure Cryptographic Pseudorandom Generators

Steinfeld, R., 2008, Proceedings of the First International Workshop on Coding and Cryptology. Li, Y., Ling, S., Niederreiter, H., Wang, H., Xing, C. & Zhang, S. (eds.). Singapore: World Scientific Publishing, p. 233 - 255 23 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2007

On secure multi-party computation in black-box groups

Desmedt, Y., Pieprzyk, J., Steinfeld, R. & Wang, H., 2007, Advances in Cryptology - CRYPTO 2007: 27th Annual International Cryptology Conference, Proceedings. Menezes, A. (ed.). Berlin Germany: Springer-Verlag London Ltd., p. 591 - 612 22 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

9 Citations (Scopus)
2006

A non-malleable group key exchange protocol robust against active insiders

Desmedt, Y., Pieprzyk, J., Steinfeld, R. & Wang, H., 2006, Information Security: 9th International Conference, ISC 2006, Proceedings. Katsikas, S. K., Lopez, J., Backes, M., Gritzalis, S. & Preneel, B. (eds.). Berlin Germany: Springer-Verlag London Ltd., p. 459 - 475 17 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

16 Citations (Scopus)

Higher order Universal One-Way Hash Functions from the subset sum assumption

Steinfeld, R., Pieprzyk, J. & Wang, H., 2006, Public Key Cryptography - PKC 2006: 9th International Conference on Theory and Practice of Public-Key Cryptography, Proceedings. Yung, M., Dodis, Y., Kiayias, A. & Malkin, T. (eds.). Berlin Germany: Springer-Verlag London Ltd., p. 157 - 173 17 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

How to strengthen any weakly unforgeable signature into a strongly unforgeable signature

Steinfeld, R., Pieprzyk, J. & Wang, H., 2006, Topics in Cryptology - CT-RSA 2007: The Cryptographers' Track at the RSA Conference 2007, Proceedings. Abe, M. (ed.). Berlin Germany: Springer-Verlag London Ltd., p. 357 - 371 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

On the provable security of an efficient RSA-based Pseudorandom generator

Steinfeld, R., Pieprzyk, J. & Wang, H., 2006, Advances in Cryptology - ASIACRYPT 2006: 12th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Lai, X. & Chen, K. (eds.). Berlin Germany: Springer-Verlag London Ltd., p. 194 - 209 16 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

17 Citations (Scopus)