Follow
Joseph Tonien
Joseph Tonien
Verified email at uow.edu.au
Title
Cited by
Cited by
Year
Birthday paradox for multi-collisions
K Suzuki, D Tonien, K Kurosawa, K Toyota
International Conference on Information Security and Cryptology, 29-40, 2006
1342006
New traitor tracing schemes using bilinear map
VD Tô, R Safavi-Naini, F Zhang
Proceedings of the 3rd ACM workshop on Digital rights management, 67-76, 2003
722003
Privacy-Preserving Multi-Keyword Searchable Encryption for Distributed Systems
X Liu, G Yang, W Susilo, J Tonien, X Liu, J Shen
IEEE Transactions on Parallel and Distributed Systems 32 (3), 561-574, 2021
582021
Multi-party concurrent signatures
D Tonien, W Susilo, R Safavi-Naini
International Conference on Information Security, 131-145, 2006
502006
A QR code watermarking approach based on the DWT-DCT technique
YW Chow, W Susilo, J Tonien, W Zong
Australasian Conference on Information Security and Privacy, 314-331, 2017
402017
Birthday paradox for multi-collisions
K Suzuki, D Tonien, K Kurosawa, K Toyota
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2008
392008
Generic construction of hybrid public key traitor tracing with full-public-traceability
DH Phan, R Safavi-Naini, D Tonien
International Colloquium on Automata, Languages, and Programming, 264-275, 2006
392006
Cooperative secret sharing using QR codes and symmetric keys
YW Chow, W Susilo, J Tonien, E Vlahu-Gjorgievska, G Yang
Symmetry 10 (4), 95, 2018
362018
A 2-secure code with efficient tracing algorithm
TV Dong, SN Reihaneh, W Yejing
International Conference on Cryptology in India, 149-163, 2002
362002
A generalized attack on RSA type cryptosystems
M Bunder, A Nitaj, W Susilo, J Tonien
Theoretical Computer Science 704, 74-81, 2017
292017
A new attack on the RSA cryptosystem based on continued fractions
MW Bunder, J Tonien
Malaysian Journal of Mathematical Sciences 11 (S3), 45-57, 2017
232017
Unconditionally secure approximate message authentication
D Tonien, R Safavi-Naini, P Nickolas, Y Desmedt
International Conference on Coding and Cryptology, 233-247, 2009
232009
Towards enhanced security for certificateless public-key authenticated encryption with keyword search
X Liu, H Li, G Yang, W Susilo, J Tonien, Q Huang
International Conference on Provable Security, 113-129, 2019
222019
A new attack on three variants of the RSA cryptosystem
M Bunder, A Nitaj, W Susilo, J Tonien
The 21st Australasian Conference on Information Security and Privacy 9723 …, 2016
222016
An efficient single-key pirates tracing scheme using cover-free families
D Tonien, R Safavi-Naini
International Conference on Applied Cryptography and Network Security, 82-97, 2006
202006
A New Improved AES S-box with Enhanced Properties
A Nitaj, W Susilo, J Tonien
Australasian Conference on Information Security and Privacy, 125-141, 2020
192020
Divide and Capture: An Improved Cryptanalysis of the Encryption Standard Algorithm RSA
W Susilo, J Tonien, G Yang
Computer Standards & Interfaces, 103470, 2021
182021
Cryptanalysis of RSA-type cryptosystems based on Lucas sequences, Gaussian integers and elliptic curves
M Bunder, A Nitaj, W Susilo, J Tonien
Journal of information security and applications 40, 193-198, 2018
182018
Broadcast Authenticated Encryption with Keyword Search
X Liu, K He, G Yang, W Susilo, J Tonien, Q Huang
Australasian Conference on Information Security and Privacy, 193-213, 2021
172021
Recursive constructions of secure codes and hash families using difference function families
D Tonien, R Safavi-Naini
Journal of Combinatorial Theory, Series A 113 (4), 664-674, 2006
142006
The system can't perform the operation now. Try again later.
Articles 1–20