Loading…
Loading…
Loading…
Cube attacks on round-reduced TinyJAMBU
Teng, Wil Liam, Salam, Iftekhar, Yau, Wei-Chuen, Pieprzyk, Josef, Phan, Raphaël C.-W.
Published in Scientific reports (29.03.2022)
Published in Scientific reports (29.03.2022)
Get full text
Journal Article
Loading…
Loading…
Inspiring Technologies for Digital Inclusivity
Chiew, Kang Leng, Pieprzyk, Josef
Published in Journal of Telecommunications and Information Technology (01.03.2022)
Published in Journal of Telecommunications and Information Technology (01.03.2022)
Get full text
Journal Article
Loading…
The Compression Optimality of Asymmetric Numeral Systems
Pieprzyk, Josef, Duda, Jarek, Pawłowski, Marcin, Camtepe, Seyit, Mahboubi, Arash, Morawiecki, Paweł
Published in Entropy (Basel, Switzerland) (17.04.2023)
Published in Entropy (Basel, Switzerland) (17.04.2023)
Get full text
Journal Article
Loading…
High-capacity (2,3) threshold quantum secret sharing based on asymmetric quantum lossy channels
Lai, Hong, Pieprzyk, Josef, Luo, Ming-Xing, Zhan, Cheng, Pan, Lei, Orgun, Mehmet A.
Published in Quantum information processing (01.05.2020)
Published in Quantum information processing (01.05.2020)
Get full text
Journal Article
Loading…
The Security of "2FLIP" Authentication Scheme for VANETs: Attacks and Rectifications
Rezazadeh Baee, Mir Ali, Simpson, Leonie, Foo, Ernest, Pieprzyk, Josef
Published in IEEE open journal of vehicular technology (01.01.2023)
Published in IEEE open journal of vehicular technology (01.01.2023)
Get full text
Journal Article
Loading…
A differential fault attack on the WG family of stream ciphers
Orumiehchiha, Mohammad Ali, Rostami, Saeed, Shakour, Elham, Pieprzyk, Josef
Published in Journal of cryptographic engineering (01.06.2020)
Published in Journal of cryptographic engineering (01.06.2020)
Get full text
Journal Article
Loading…
Loading…
Loading…
Differential fault attacks on the lightweight authenticated encryption algorithm CLX-128
Salam, Iftekhar, Yau, Wei-Chuen, Phan, Raphaël C.-W., Pieprzyk, Josef
Published in Journal of cryptographic engineering (01.09.2023)
Published in Journal of cryptographic engineering (01.09.2023)
Get full text
Journal Article
Loading…
Loading…
Pervasive User Data Collection from Cyberspace: Privacy Concerns and Countermeasures
Jiang, Yinhao, Rezazadeh Baee, Mir Ali, Simpson, Leonie Ruth, Gauravaram, Praveen, Pieprzyk, Josef, Zia, Tanveer, Zhao, Zhen, Le, Zung
Published in Cryptography (01.01.2024)
Published in Cryptography (01.01.2024)
Get full text
Journal Article
Loading…
Loading…
Signcryption schemes with insider security in an ideal permutation model
Bansal, Tarun Kumar, Boyen, Xavier, Pieprzyk, Josef
Published in Journal of mathematical cryptology (01.06.2019)
Published in Journal of mathematical cryptology (01.06.2019)
Get full text
Journal Article
Loading…
An efficient quantum blind digital signature scheme
Lai, Hong, Luo, Mingxing, Pieprzyk, Josef, Qu, Zhiguo, Li, Shudong, Orgun, Mehmet A.
Published in Science China. Information sciences (01.08.2017)
Published in Science China. Information sciences (01.08.2017)
Get full text
Journal Article