Josef Pieprzyk

From MaRDI portal
Person:490340

Available identifiers

zbMath Open pieprzyk.josef-pWikidataQ3184049 ScholiaQ3184049MaRDI QIDQ490340

List of research outcomes

PublicationDate of PublicationType
Spatial encryption revisited: from delegatable multiple inner product encryption and more2023-07-21Paper
Resource-saving quantum key distribution based on three-photon matrix product states2023-06-13Paper
Analysis of weighted quantum secret sharing based on matrix product states2023-02-16Paper
High-capacity (2,3) threshold quantum secret sharing based on asymmetric quantum lossy channels2023-01-13Paper
Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption2022-12-22Paper
An improved quantum network communication model based on compressed tensor network states2022-12-06Paper
Dynamic and compressed quantum many-body state secret sharing based on site-independent matrix product states2022-11-29Paper
Dynamic searchable symmetric encryption schemes supporting range queries with forward (and backward) security2022-08-25Paper
Dynamic searchable symmetric encryption with forward and stronger backward privacy2022-08-25Paper
Novel quantum key distribution with shift operations based on Fibonacci and Lucas valued orbital angular momentum entangled states2022-05-17Paper
Two types of dynamic quantum state secret sharing based on tensor networks states2022-03-01Paper
Lattice blind signatures with forward security2021-06-08Paper
Trapdoor delegation and HIBE from middle-product LWE in standard model2021-02-23Paper
Keyed hash functions2019-10-10Paper
Signcryption schemes with insider security in an ideal permutation model2019-07-08Paper
Cryptanalysis of \textit{WG-8} and \textit{WG-16} stream ciphers2019-03-22Paper
An improved coding method of quantum key distribution protocols based on Fibonacci-valued OAM entangled states2018-12-21Paper
A large-alphabet three-party quantum key distribution protocol based on orbital and spin angular momenta hybrid entanglement2018-11-05Paper
Tunable multi-party high-capacity quantum key distribution based on \(m\)-generalized Fibonacci sequences using Golden coding2018-10-29Paper
Efficient quantum key distribution using Fibonacci-number coding with a biased basis choice2018-04-04Paper
Controllable quantum private queries using an entangled Fibonacci-sequence spiral source2017-05-19Paper
High-capacity quantum key distribution using Chebyshev-map values corresponding to Lucas numbers coding2017-03-06Paper
Cube Attacks and Cube-Attack-Like Cryptanalysis on the Round-Reduced Keccak Sponge Function2015-09-30Paper
Rotational Cryptanalysis of Round-Reduced Keccak2015-09-18Paper
Rotational Cryptanalysis of ARX Revisited2015-09-18Paper
ICEPOLE: High-Speed, Hardware-Oriented Authenticated Encryption2015-07-21Paper
Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model2015-07-09Paper
Dynamic (2, 3) Threshold Quantum Secret Sharing of Secure Direct Communication*2015-05-20Paper
A hybrid quantum key distribution protocol based on extended unitary operations and fountain codes2015-04-13Paper
A subexponential construction of graph coloring for multiparty computation2015-01-22Paper
Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-1282015-01-16Paper
An Ideal and Robust Threshold RSA2014-08-21Paper
Practical attack on NLM-MAC scheme2014-06-23Paper
The resistance of PRESENT-80 against related-key differential attacks2014-06-20Paper
Quantum direct secret sharing with efficient eavesdropping-check and authentication based on distributed fountain codes2014-06-13Paper
Lattice-based completely non-malleable public-key encryption in the standard model2014-04-29Paper
Security analysis of linearly filtered NLFSRs2014-01-23Paper
Cryptanalysis of WG-7: a lightweight stream cipher2013-06-24Paper
New security notions and relations for public-key encryption2013-01-17Paper
On the (In)Security of IDEA in Various Hashing Modes2013-01-08Paper
Graph coloring applied to secure computation in non-abelian groups2013-01-04Paper
Active Security in Multiparty Computation over Black-Box Groups2012-09-25Paper
NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model2012-07-20Paper
Multi-party computation with conversion of secret sharing2012-03-01Paper
Known and Chosen Key Differential Distinguishers for Block Ciphers2011-10-27Paper
Lattice-Based Completely Non-malleable PKE in the Standard Model (Poster)2011-07-07Paper
Möbius transforms, coincident Boolean functions and non-coincidence property of Boolean functions2011-06-15Paper
Parallel Signcryption2011-05-18Paper
Decomposition Construction for Secret Sharing Schemes with Graph Access Structures in Polynomial Time2011-04-15Paper
Cryptanalysis of the Convex Hull Click Human Identification Protocol2011-02-11Paper
A New Human Identification Protocol and Coppersmith’s Baby-Step Giant-Step Algorithm2010-07-06Paper
Advances in Cryptology - ASIACRYPT 20032010-01-05Paper
Advances in Cryptology - ASIACRYPT 20032010-01-05Paper
Extensions of the Cube Attack Based on Low Degree Annihilators2009-11-26Paper
Cryptanalysis of the LAKE Hash Family2009-08-11Paper
Public Key Cryptography – PKC 20042009-05-14Paper
Unconditionally secure disjointness tests for private datasets2009-05-12Paper
Multi-Party Computation with Omnipresent Adversary2009-03-24Paper
On Secure Multi-party Computation in Black-Box Groups2009-03-10Paper
A Critical Look at Cryptographic Hash Function Literature2009-03-09Paper
An Improved Distinguisher for Dragon2009-03-09Paper
Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures2009-02-10Paper
Lattice-based treshold-changeability for standard CRT secret-sharing schemes2009-02-09Paper
Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups2009-01-09Paper
Lattice-Based Threshold Changeability for Standard Shamir Secret-Sharing Schemes2008-12-21Paper
The eight variable homogeneous degree three bent functions2008-11-18Paper
Cryptanalysis of LASH2008-09-18Paper
Cryptanalysis of FORK-2562008-09-16Paper
Efficient Disjointness Tests for Private Datasets2008-07-08Paper
Multiple Modular Additions and Crossword Puzzle Attack on NLSv22008-06-24Paper
A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders2008-06-17Paper
An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels2008-06-10Paper
On Algebraic Immunity and Annihilators2008-05-06Paper
On the Provable Security of an Efficient RSA-Based Pseudorandom Generator2008-04-24Paper
Permutation polynomials of the \((x^p - x+\delta)^s+L(x)\)2008-04-22Paper
How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature2008-04-17Paper
A New Dynamic Accumulator for Batch Updates2008-03-25Paper
Threshold Privacy Preserving Keyword Searches2008-03-07Paper
Crossword Puzzle Attack on NLS2007-11-29Paper
Distinguishing Attack on SOBER-128 with Linear Masking2007-09-07Paper
Public Key Cryptography - PKC 20062007-05-02Paper
Coding and Cryptography2007-05-02Paper
Information Security and Cryptology - ICISC 20052007-05-02Paper
New constructions of anonymous membership broadcasting schemes2007-04-05Paper
Generalised cumulative arrays in secret sharing2006-11-22Paper
Fast Software Encryption2005-12-27Paper
Selected Areas in Cryptography2005-12-27Paper
Public Key Cryptography - PKC 20052005-12-07Paper
Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes2005-08-12Paper
https://portal.mardi4nfdi.de/entity/Q46676062005-04-20Paper
https://portal.mardi4nfdi.de/entity/Q46676192005-04-20Paper
https://portal.mardi4nfdi.de/entity/Q31548702005-01-14Paper
Homogeneous bent functions of degree \(n\) in 2\(n\) variables do not exist for \(n>3\)2004-08-19Paper
https://portal.mardi4nfdi.de/entity/Q48086342004-08-12Paper
Shared generation of pseudo-random functions2004-08-06Paper
https://portal.mardi4nfdi.de/entity/Q44735842004-08-04Paper
https://portal.mardi4nfdi.de/entity/Q44525742004-03-01Paper
https://portal.mardi4nfdi.de/entity/Q44507702004-02-16Paper
https://portal.mardi4nfdi.de/entity/Q44093582003-10-26Paper
https://portal.mardi4nfdi.de/entity/Q44283822003-09-15Paper
https://portal.mardi4nfdi.de/entity/Q44185432003-08-10Paper
Homogeneous bent functions2003-08-06Paper
https://portal.mardi4nfdi.de/entity/Q44174062003-07-29Paper
https://portal.mardi4nfdi.de/entity/Q44129682003-07-17Paper
https://portal.mardi4nfdi.de/entity/Q44133282003-07-17Paper
https://portal.mardi4nfdi.de/entity/Q44133292003-07-17Paper
Cryptanalysis of Block Ciphers with Overdefined Systems of Equations2003-07-16Paper
https://portal.mardi4nfdi.de/entity/Q47885652003-05-19Paper
https://portal.mardi4nfdi.de/entity/Q45366542002-11-23Paper
https://portal.mardi4nfdi.de/entity/Q31497582002-09-26Paper
https://portal.mardi4nfdi.de/entity/Q45015002002-07-28Paper
https://portal.mardi4nfdi.de/entity/Q45366512002-06-25Paper
https://portal.mardi4nfdi.de/entity/Q27842642002-04-22Paper
https://portal.mardi4nfdi.de/entity/Q27772452002-03-07Paper
https://portal.mardi4nfdi.de/entity/Q49500332001-08-20Paper
https://portal.mardi4nfdi.de/entity/Q27211612001-07-01Paper
https://portal.mardi4nfdi.de/entity/Q27076012001-04-03Paper
https://portal.mardi4nfdi.de/entity/Q45266422001-04-02Paper
Remarks on the multiple assignment secret sharing scheme2001-04-01Paper
https://portal.mardi4nfdi.de/entity/Q45204862001-02-26Paper
https://portal.mardi4nfdi.de/entity/Q45205062001-02-26Paper
https://portal.mardi4nfdi.de/entity/Q44950802000-08-10Paper
https://portal.mardi4nfdi.de/entity/Q49453832000-03-23Paper
https://portal.mardi4nfdi.de/entity/Q42697541999-11-10Paper
https://portal.mardi4nfdi.de/entity/Q42506291999-09-09Paper
https://portal.mardi4nfdi.de/entity/Q42506341999-07-11Paper
https://portal.mardi4nfdi.de/entity/Q42506261999-06-17Paper
https://portal.mardi4nfdi.de/entity/Q42506321999-06-17Paper
https://portal.mardi4nfdi.de/entity/Q42506381999-06-17Paper
https://portal.mardi4nfdi.de/entity/Q38391991998-10-08Paper
https://portal.mardi4nfdi.de/entity/Q38391981998-08-13Paper
A multi-level view model for secure object-oriented databases1998-07-22Paper
Secret sharing in hierarchical groups1998-02-16Paper
Rotation-symmetric functions and fast hashing1998-01-01Paper
https://portal.mardi4nfdi.de/entity/Q43416801997-08-26Paper
https://portal.mardi4nfdi.de/entity/Q43416751997-07-20Paper
Attacking the SL 2 hashing scheme1997-06-18Paper
https://portal.mardi4nfdi.de/entity/Q43140201995-02-19Paper
https://portal.mardi4nfdi.de/entity/Q31369511995-01-23Paper
https://portal.mardi4nfdi.de/entity/Q43140151995-01-08Paper
https://portal.mardi4nfdi.de/entity/Q43140311995-01-08Paper
https://portal.mardi4nfdi.de/entity/Q42796831994-12-04Paper
https://portal.mardi4nfdi.de/entity/Q43140211994-11-30Paper
https://portal.mardi4nfdi.de/entity/Q43140281994-11-30Paper
https://portal.mardi4nfdi.de/entity/Q43140301994-11-30Paper
Design of hashing algorithms1993-12-08Paper
https://portal.mardi4nfdi.de/entity/Q40368651993-05-18Paper
https://portal.mardi4nfdi.de/entity/Q40374861993-05-18Paper
https://portal.mardi4nfdi.de/entity/Q40374891993-05-18Paper
https://portal.mardi4nfdi.de/entity/Q40375011993-05-18Paper
https://portal.mardi4nfdi.de/entity/Q39974991992-09-17Paper
Permutation generators of alternating groups1992-06-26Paper
https://portal.mardi4nfdi.de/entity/Q52026231990-01-01Paper
https://portal.mardi4nfdi.de/entity/Q37104711985-01-01Paper
Algebraical Structures of Cryptographic Transformations1985-01-01Paper
https://portal.mardi4nfdi.de/entity/Q39070651979-01-01Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Josef Pieprzyk