What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Josef Pieprzyk
Google Scholar
ORCID:
0000-0002-1917-6466
116
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/provsec
Many-Time Linkable Ring Signatures.
Nam Tran
Khoa Nguyen
Dongxi Liu
Josef Pieprzyk
Willy Susilo
2024
journals/istr
Shared file protection against unauthorised encryption using a Buffer-Based Signature Verification Method.
Arash Mahboubi
Seyit Camtepe
Keyvan Ansari
Marcin Pawlowski
Pawel Morawiecki
Hamed Aboutorab
Josef Pieprzyk
Jaroslaw Duda
2024
conf/acisp
Improved Multimodal Private Signatures from Lattices.
Nam Tran
Khoa Nguyen
Dongxi Liu
Josef Pieprzyk
Willy Susilo
2024
conf/iwsec
File System Shield (FSS): A Pass-Through Strategy Against Unwanted Encryption in Network File Systems.
Arash Mahboubi
Seyit Camtepe
Keyvan Ansari
Marcin Piotr Pawlowski
Pawel Morawiecki
Jaroslaw Duda
Josef Pieprzyk
2022
conf/esorics
Spatial Encryption Revisited: From Delegatable Multiple Inner Product Encryption and More.
Huy Quoc Le
Dung Hoang Duong
Willy Susilo
Josef Pieprzyk
2022
conf/acsac
Transformer-Based Language Models for Software Vulnerability Detection.
Chandra Thapa
Seung Ick Jang
Muhammad Ejaz Ahmed
Seyit Camtepe
Josef Pieprzyk
Surya Nepal
2021
journals/tifs
Compcrypt-Lightweight ANS-Based Compression and Encryption.
Seyit Camtepe
Jarek Duda
Arash Mahboubi
Pawel Morawiecki
Surya Nepal
Marcin Pawlowski
Josef Pieprzyk
2021
journals/tifs
On the Efficiency of Pairing-Based Authentication for Connected Vehicles: Time is Not on Our Side!
Mir Ali Rezazadeh Baee
Leonie Simpson
Xavier Boyen
Ernest Foo
Josef Pieprzyk
2021
conf/asiaccs
P2DPI: Practical and Privacy-Preserving Deep Packet Inspection.
Jongkil Kim
Seyit Camtepe
Joonsang Baek
Willy Susilo
Josef Pieprzyk
Surya Nepal
2020
journals/tifs
An Efficient Authentication Scheme for Intra-Vehicular Controller Area Network.
Basker Palaniswamy
Seyit Camtepe
Ernest Foo
Josef Pieprzyk
2020
conf/acisp
Lattice Blind Signatures with Forward Security.
Huy Quoc Le
Dung Hoang Duong
Willy Susilo
Ha Thanh Nguyen Tran
Viet Cuong Trinh
Josef Pieprzyk
Thomas Plantard
2020
conf/acns
Trapdoor Delegation and HIBE from Middle-Product LWE in Standard Model.
Huy Quoc Le
Dung Hoang Duong
Willy Susilo
Josef Pieprzyk
2020
conf/esorics
Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption.
Willy Susilo
Dung Hoang Duong
Huy Quoc Le
Josef Pieprzyk
2019
conf/esorics
Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy.
Cong Zuo
Shifeng Sun
Joseph K. Liu
Jun Shao
Josef Pieprzyk
2018
conf/esorics
Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward (and Backward) Security.
Cong Zuo
Shifeng Sun
Joseph K. Liu
Jun Shao
Josef Pieprzyk
2015
journals/tifs
A New Biocryptosystem-Oriented Security Analysis Framework and Implementation of Multibiometric Cryptosystems Based on Decision Level Fusion.
Cai Li
Jiankun Hu
Josef Pieprzyk
Willy Susilo
2015
journals/tifs
On the Linearization of Human Identification Protocols: Attacks Based on Linear Algebra, Coding Theory, and Lattices.
Hassan Jameel Asghar
Ron Steinfeld
Shujun Li
Mohamed Ali Kâafar
Josef Pieprzyk
2015
conf/fse
Rotational Cryptanalysis of ARX Revisited.
Dmitry Khovratovich
Ivica Nikolic
Josef Pieprzyk
Przemyslaw Sokolowski
Ron Steinfeld
2015
conf/eurocrypt
Cube Attacks and Cube-Attack-Like Cryptanalysis on the Round-Reduced Keccak Sponge Function.
Itai Dinur
Pawel Morawiecki
Josef Pieprzyk
Marian Srebrny
Michal Straus
2014
conf/ches
ICEPOLE: High-Speed, Hardware-Oriented Authenticated Encryption.
Pawel Morawiecki
Kris Gaj
Ekawat Homsirikamol
Krystian Matusiewicz
Josef Pieprzyk
Marcin Rogawski
Marian Srebrny
Marcin Wójcik
2014
conf/asiacrypt
Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128.
Sareh Emami
San Ling
Ivica Nikolic
Josef Pieprzyk
Huaxiong Wang
2013
conf/fse
Rotational Cryptanalysis of Round-Reduced Keccak.
Pawel Morawiecki
Josef Pieprzyk
Marian Srebrny
2013
conf/ndss
Does Counting Still Count? Revisiting the Security of Counting based User Authentication Protocols against Statistical Attacks.
Hassan Jameel Asghar
Shujun Li
Ron Steinfeld
Josef Pieprzyk
2013
conf/cans
Truncated Differential Analysis of Reduced-Round LBlock.
Sareh Emami
Cameron McDonald
Josef Pieprzyk
Ron Steinfeld
2012
journals/joc
Graph Coloring Applied to Secure Computation in Non-Abelian Groups.
Yvo Desmedt
Josef Pieprzyk
Ron Steinfeld
Xiaoming Sun
Christophe Tartary
Huaxiong Wang
Andrew Chi-Chih Yao
2012
conf/fse
On the (In)Security of IDEA in Various Hashing Modes.
Lei Wei
Thomas Peyrin
Przemyslaw Sokolowski
San Ling
Josef Pieprzyk
Huaxiong Wang
2012
conf/pkc
NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model.
Ron Steinfeld
San Ling
Josef Pieprzyk
Christophe Tartary
Huaxiong Wang
2011
journals/istr
Bucket attack on numeric set watermarking model and safeguards.
Gaurav Gupta
Josef Pieprzyk
Len Hamey
2011
journals/istr
Socio-technological phishing prevention.
Gaurav Gupta
Josef Pieprzyk
2011
conf/acisp
Lattice-Based Completely Non-malleable PKE in the Standard Model (Poster).
Reza Sepahi
Ron Steinfeld
Josef Pieprzyk
2010
conf/acns
A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm.
Hassan Jameel Asghar
Josef Pieprzyk
Huaxiong Wang
2010
conf/icisc
Known and Chosen Key Differential Distinguishers for Block Ciphers.
Ivica Nikolic
Josef Pieprzyk
Przemyslaw Sokolowski
Ron Steinfeld
2009
conf/fse
Cryptanalysis of the LAKE Hash Family.
Alex Biryukov
Praveen Gauravaram
Jian Guo
Dmitry Khovratovich
San Ling
Krystian Matusiewicz
Ivica Nikolic
Josef Pieprzyk
Huaxiong Wang
2009
conf/icisc
Efficient Fuzzy Matching and Intersection on Private Datasets.
Qingsong Ye
Ron Steinfeld
Josef Pieprzyk
Huaxiong Wang
2009
conf/iciss
Database Relation Watermarking Resilient against Secondary Watermarking Attacks.
Gaurav Gupta
Josef Pieprzyk
2009
conf/pkc
Multi-Party Computation with Omnipresent Adversary.
Hossein Ghodosi
Josef Pieprzyk
2009
conf/acsac
On the Security of PAS (Predicate-Based Authentication Service).
Shujun Li
Hassan Jameel Asghar
Josef Pieprzyk
Ahmad-Reza Sadeghi
Roland Schmitz
Huaxiong Wang
2009
conf/cans
Extensions of the Cube Attack Based on Low Degree Annihilators.
Aileen Zhang
Chu-Wee Lim
Khoongming Khoo
Lei Wei
Josef Pieprzyk
2008
conf/fse
Cryptanalysis of LASH.
Ron Steinfeld
Scott Contini
Krystian Matusiewicz
Josef Pieprzyk
Jian Guo
San Ling
Huaxiong Wang
2008
conf/acisp
Efficient Disjointness Tests for Private Datasets.
Qingsong Ye
Huaxiong Wang
Josef Pieprzyk
Xian-Mo Zhang
2008
conf/wisa
An Efficient Scheme of Common Secure Indices for Conjunctive Keyword-Based Retrieval on Encrypted Data.
Peishun Wang
Huaxiong Wang
Josef Pieprzyk
2008
conf/cans
Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups.
Peishun Wang
Huaxiong Wang
Josef Pieprzyk
2007
conf/fse
Cryptanalysis of FORK-256.
Krystian Matusiewicz
Thomas Peyrin
Olivier Billet
Scott Contini
Josef Pieprzyk
2007
conf/crypto
On Secure Multi-party Computation in Black-Box Groups.
Yvo Desmedt
Josef Pieprzyk
Ron Steinfeld
Huaxiong Wang
2007
conf/provsec
An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels.
Christophe Tartary
Huaxiong Wang
Josef Pieprzyk
2007
conf/icics
Extending FORK-256 Attack to the Full Hash Function.
Scott Contini
Krystian Matusiewicz
Josef Pieprzyk
2007
conf/icics
A New Dynamic Accumulator for Batch Updates.
Peishun Wang
Huaxiong Wang
Josef Pieprzyk
2007
conf/ctrsa
How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature.
Ron Steinfeld
Josef Pieprzyk
Huaxiong Wang
2006
conf/ccs
An attack-localizing watermarking scheme for natural language documents.
Gaurav Gupta
Josef Pieprzyk
Huaxiong Wang
2006
conf/acisp
Distinguishing Attack on SOBER-128 with Linear Masking.
Joo Yeon Cho
Josef Pieprzyk
2006
conf/icisc
On Algebraic Immunity and Annihilators.
Xian-Mo Zhang
Josef Pieprzyk
Yuliang Zheng
2006
conf/pkc
Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption.
Ron Steinfeld
Josef Pieprzyk
Huaxiong Wang
2006
conf/asiacrypt
On the Provable Security of an Efficient RSA-Based Pseudorandom Generator.
Ron Steinfeld
Josef Pieprzyk
Huaxiong Wang
2006
conf/sacrypt
Crossword Puzzle Attack on NLS.
Joo Yeon Cho
Josef Pieprzyk
2005
conf/icisc
Characterisations of Extended Resiliency and Extended Immunity of S-Boxes.
Josef Pieprzyk
Xian-Mo Zhang
Jovan Dj. Golic
2005
conf/pkc
Converse Results to the Wiener Attack on RSA.
Ron Steinfeld
Scott Contini
Huaxiong Wang
Josef Pieprzyk
2004
conf/fse
Algebraic Attacks on SOBER-t32 and SOBER-t16 without Stuttering.
Joo Yeon Cho
Josef Pieprzyk
2004
conf/pkc
Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures.
Ron Steinfeld
Huaxiong Wang
Josef Pieprzyk
2004
conf/asiacrypt
Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes.
Ron Steinfeld
Huaxiong Wang
Josef Pieprzyk
2003
conf/acisp
Josef Pieprzyk, David Pointcheval.
Josef Pieprzyk
David Pointcheval
2003
conf/ctrsa
Shared Generation of Pseudo-Random Functions with Cumulative Maps.
Huaxiong Wang
Josef Pieprzyk
2003
conf/asiacrypt
Universal Designated-Verifier Signatures.
Ron Steinfeld
Laurence Bull
Huaxiong Wang
Josef Pieprzyk
2003
conf/asiacrypt
Efficient One-Time Proxy Signatures.
Huaxiong Wang
Josef Pieprzyk
2003
conf/sacrypt
Multiple-Time Signature Schemes against Adaptive Chosen Message Attacks.
Josef Pieprzyk
Huaxiong Wang
Chaoping Xing
2002
conf/acisp
Cheating Prevention in Linear Secret Sharing.
Josef Pieprzyk
Xian-Mo Zhang
2002
conf/icisc
Threshold MACs.
Keith M. Martin
Josef Pieprzyk
Reihaneh Safavi-Naini
Huaxiong Wang
Peter R. Wild
2002
conf/icisc
Ideal Threshold Schemes from MDS Codes.
Josef Pieprzyk
Xian-Mo Zhang
2002
conf/icics
Ideal Threshold Schemes from Orthogonal Arrays.
Josef Pieprzyk
Xian-Mo Zhang
2002
conf/asiacrypt
Cryptanalysis of Block Ciphers with Overdefined Systems of Equations.
Nicolas T. Courtois
Josef Pieprzyk
2001
conf/acisp
Democratic Systems.
Hossein Ghodosi
Josef Pieprzyk
2001
conf/icisc
Copyright Protection of Object-Oriented Software.
Jaroslaw Pastuszak
Darek Michalek
Josef Pieprzyk
2001
conf/icisc
Constructions of Cheating Immune Secret Sharing.
Josef Pieprzyk
Xian-Mo Zhang
2001
conf/icics
Cheating Immune Secret Sharing.
Xian-Mo Zhang
Josef Pieprzyk
2000
conf/acisp
Cheating Prevention in Secret Sharing.
Hossein Ghodosi
Josef Pieprzyk
2000
conf/pkc
Identification of Bad Signatures in Batches.
Jaroslaw Pastuszak
Dariusz Michatek
Josef Pieprzyk
Jennifer Seberry
1999
conf/acisp
Fail-Stop Threshold Signature Schemes Based on Elliptic Curves.
Willy Susilo
Reihaneh Safavi-Naini
Josef Pieprzyk
1999
conf/acisp
Repudiation of Cheating and Non-repudiation of Zhang's Proxy Signature Schemes.
Hossein Ghodosi
Josef Pieprzyk
1999
conf/acisp
On the Symmetric Property of Homogeneous Boolean Functions.
Chengxin Qu
Jennifer Seberry
Josef Pieprzyk
1999
conf/acisp
Conference Key Agreement from Secret Sharing.
Chih-Hung Li
Josef Pieprzyk
1999
conf/acisp
Changing Thresholds in the Absence of Secure Channels.
Keith M. Martin
Josef Pieprzyk
Reihaneh Safavi-Naini
Huaxiong Wang
1999
conf/icisc
Verfiable Secret Sharing and Time Capsules.
Josef Pieprzyk
Eiji Okamoto
1999
conf/icics
Linear Secret Sharing with Divisible Shares.
Josef Pieprzyk
1998
conf/acisp
On Construction of Cumulative Secret Sharing Schemes.
Hossein Ghodosi
Josef Pieprzyk
Reihaneh Safavi-Naini
Huaxiong Wang
1998
conf/acisp
Secret Sharing in Multilevel and Compartmented Groups.
Hossein Ghodosi
Josef Pieprzyk
Reihaneh Safavi-Naini
1998
conf/acisp
Rotation-Symmetric Functions and Fast Hashing.
Josef Pieprzyk
Cheng Xin Qu
1997
conf/acisp
A Message Authentication Code Based on Latin Squares.
Shahram Bakhtiari
Reihaneh Safavi-Naini
Josef Pieprzyk
1997
conf/icics
Remarks on the multiple assignment secret sharing scheme.
Hossein Ghodosi
Josef Pieprzyk
Reihaneh Safavi-Naini
1997
conf/icics
Secret sharing in hierarchical groups.
Chris Charnes
Keith M. Martin
Josef Pieprzyk
Reihaneh Safavi-Naini
1996
conf/acisp
Modeling a multi-level secure object-oriented database using views.
Ahmad Baraani-Dastjerdi
Josef Pieprzyk
Reihaneh Safavi-Naini
1996
conf/acisp
Evidential reasoning in network intrusion detection systems.
Mansour Esmaili
Reihaneh Safavi-Naini
Josef Pieprzyk
1996
conf/acisp
On selectable collisionful hash functions.
Shahram Bakhtiari
Reihaneh Safavi-Naini
Josef Pieprzyk
1996
conf/acisp
Cryptosystems for hierarchical groups.
Hossein Ghodosi
Josef Pieprzyk
Chris Charnes
Reihaneh Safavi-Naini
1996
conf/acisp
Cryptography based on transcendental numbers.
Josef Pieprzyk
Hossein Ghodosi
Chris Charnes
Reihaneh Safavi-Naini
1996
conf/acisp
On password-based authenticated key exchange using collisionful hash functions.
Shahram Bakhtiari
Reihaneh Safavi-Naini
Josef Pieprzyk
1996
conf/acsac
Case-Based Reasoning for Intrusion Detection.
Mansour Esmaili
Bala Balachandran
Reihaneh Safavi-Naini
Josef Pieprzyk
1994
conf/ccs
Conditionally Secure Secret Sharing Schemes with Disenrollment Capability.
Chris Charnes
Josef Pieprzyk
Reihaneh Safavi-Naini
1994
conf/eurocrypt
Comments on Soviet Encryption Algorithm.
Chris Charnes
Luke O'Connor
Josef Pieprzyk
Reihaneh Safavi-Naini
Yuliang Zheng
1994
conf/asiacrypt
Attacking the SL<sub>2</sub> Hashing Scheme.
Chris Charnes
Josef Pieprzyk
1992
conf/eurocrypt
A Construction for Super Pseudorandom Permutations from A Single Pseudorandom Function.
Babak Sadeghiyan
Josef Pieprzyk
1992
conf/asiacrypt
HAVAL - A One-Way Hashing Algorithm with Variable Length of Output.
Yuliang Zheng
Josef Pieprzyk
Jennifer Seberry
1992
conf/asiacrypt
Linear Nonequivalence versus Nonlinearity.
Chris Charnes
Josef Pieprzyk
1991
conf/eurocrypt
Randomized Authentication Systems.
Josef Pieprzyk
Reihaneh Safavi-Naini
1991
conf/eurocrypt
Probabilistic Analysis of Elementary Randimizers.
Josef Pieprzyk
1991
conf/eurocrypt
A Construction for One Way Hash Functions and Pseudorandom Bit Generators.
Babak Sadeghiyan
Josef Pieprzyk
1991
conf/asiacrypt
Sibling Intractable Function Families and Their Applications (Extended Abstract).
Yuliang Zheng
Thomas Hardjono
Josef Pieprzyk
1991
conf/asiacrypt
Optima Perfect Randomizers.
Josef Pieprzyk
Babak Sadeghiyan
1991
conf/asiacrypt
Improving Resistance to Differential Cryptanalysis and the Redesign of LOKI.
Lawrence Brown
Matthew Kwan
Josef Pieprzyk
Jennifer Seberry
1991
conf/asiacrypt
How to Construct A Family of Strong One Way Permutations.
Babak Sadeghiyan
Yuliang Zheng
Josef Pieprzyk
1991
conf/asiacrypt
A General Purpose Technique for Locating Key Scheduling Weakness in DES-like Cryptosystems (Extended Abstract).
Matthew Kwan
Josef Pieprzyk
1991
conf/asiacrypt
On Necessary and Sufficient Conditions for the Construction of Super Pseudorandom Permutations.
Babak Sadeghiyan
Josef Pieprzyk
1990
conf/eurocrypt
How to Construct Pseudorandom Permutations from Single Pseudorandom Functions.
Josef Pieprzyk
1990
conf/asiacrypt
LOKI - A Cryptographic Primitive for Authentication and Secrecy Applications.
Lawrence Brown
Josef Pieprzyk
Jennifer Seberry
1990
conf/asiacrypt
Permutation Generators of Alternating Groups.
Josef Pieprzyk
Xian-Mo Zhang
1989
conf/eurocrypt
Non-linearity of Exponent Permutations.
Josef Pieprzyk
1985
conf/eurocrypt
On Public-Key Cryptosystems Built using Polynomial Rings.
Josef Pieprzyk
1984
conf/eurocrypt
Algebraical Structures of Cryptographic Transformations.
Josef Pieprzyk
Coauthors
Ahmad Baraani-Dastjerdi
(1)
Ahmad-Reza Sadeghi
(1)
Aileen Zhang
(1)
Alex Biryukov
(1)
Andrew Chi-Chih Yao
(1)
Arash Mahboubi
(3)
Babak Sadeghiyan
(5)
Bala Balachandran
(1)
Basker Palaniswamy
(1)
Cai Li
(1)
Cameron McDonald
(1)
Chandra Thapa
(1)
Chaoping Xing
(1)
Cheng Xin Qu
(1)
Chengxin Qu
(1)
Chih-Hung Li
(1)
Chris Charnes
(7)
Christophe Tartary
(3)
Chu-Wee Lim
(1)
Cong Zuo
(2)
Darek Michalek
(1)
Dariusz Michatek
(1)
David Pointcheval
(1)
Dmitry Khovratovich
(2)
Dongxi Liu
(2)
Dung Hoang Duong
(4)
Eiji Okamoto
(1)
Ekawat Homsirikamol
(1)
Ernest Foo
(2)
Gaurav Gupta
(4)
Ha Thanh Nguyen Tran
(1)
Hamed Aboutorab
(1)
Hassan Jameel Asghar
(4)
Hossein Ghodosi
(9)
Huaxiong Wang
(29)
Huy Quoc Le
(4)
Itai Dinur
(1)
Ivica Nikolic
(4)
Jarek Duda
(1)
Jaroslaw Duda
(2)
Jaroslaw Pastuszak
(2)
Jennifer Seberry
(5)
Jian Guo
(2)
Jiankun Hu
(1)
Jongkil Kim
(1)
Joo Yeon Cho
(3)
Joonsang Baek
(1)
Josef Pieprzyk
(116)
Joseph K. Liu
(2)
Jovan Dj. Golic
(1)
Jun Shao
(2)
Keith M. Martin
(3)
Keyvan Ansari
(2)
Khoa Nguyen
(2)
Khoongming Khoo
(1)
Kris Gaj
(1)
Krystian Matusiewicz
(5)
Laurence Bull
(1)
Lawrence Brown
(2)
Lei Wei
(2)
Len Hamey
(1)
Leonie Simpson
(1)
Luke O'Connor
(1)
Mansour Esmaili
(2)
Marcin Pawlowski
(2)
Marcin Piotr Pawlowski
(1)
Marcin Rogawski
(1)
Marcin Wójcik
(1)
Marian Srebrny
(3)
Matthew Kwan
(2)
Michal Straus
(1)
Mir Ali Rezazadeh Baee
(1)
Mohamed Ali Kâafar
(1)
Muhammad Ejaz Ahmed
(1)
Nam Tran
(2)
Nicolas T. Courtois
(1)
Olivier Billet
(1)
Pawel Morawiecki
(6)
Peishun Wang
(3)
Peter R. Wild
(1)
Praveen Gauravaram
(1)
Przemyslaw Sokolowski
(3)
Qingsong Ye
(2)
Reihaneh Safavi-Naini
(18)
Reza Sepahi
(1)
Roland Schmitz
(1)
Ron Steinfeld
(18)
San Ling
(5)
Sareh Emami
(2)
Scott Contini
(4)
Seung Ick Jang
(1)
Seyit Camtepe
(6)
Shahram Bakhtiari
(3)
Shifeng Sun
(2)
Shujun Li
(3)
Surya Nepal
(3)
Thomas Hardjono
(1)
Thomas Peyrin
(2)
Thomas Plantard
(1)
Viet Cuong Trinh
(1)
Willy Susilo
(9)
Xavier Boyen
(1)
Xian-Mo Zhang
(9)
Xiaoming Sun
(1)
Yuliang Zheng
(5)
Yvo Desmedt
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to