Birthday paradox for multi-collisions K Suzuki, D Tonien, K Kurosawa, K Toyota International Conference on Information Security and Cryptology, 29-40, 2006 | 146 | 2006 |
Privacy-Preserving Multi-Keyword Searchable Encryption for Distributed Systems X Liu, G Yang, W Susilo, J Tonien, X Liu, J Shen IEEE Transactions on Parallel and Distributed Systems 32 (3), 561-574, 2021 | 80 | 2021 |
New traitor tracing schemes using bilinear map VD Tô, R Safavi-Naini, F Zhang Proceedings of the 3rd ACM workshop on Digital rights management, 67-76, 2003 | 72 | 2003 |
Multi-party concurrent signatures D Tonien, W Susilo, R Safavi-Naini International Conference on Information Security, 131-145, 2006 | 50 | 2006 |
Birthday paradox for multi-collisions K Suzuki, D Tonien, K Kurosawa, K Toyota IEICE Transactions on Fundamentals of Electronics, Communications and …, 2008 | 42 | 2008 |
A QR code watermarking approach based on the DWT-DCT technique YW Chow, W Susilo, J Tonien, W Zong Australasian Conference on Information Security and Privacy, 314-331, 2017 | 41 | 2017 |
Generic construction of hybrid public key traitor tracing with full-public-traceability DH Phan, R Safavi-Naini, D Tonien International Colloquium on Automata, Languages, and Programming, 264-275, 2006 | 40 | 2006 |
Cooperative secret sharing using QR codes and symmetric keys YW Chow, W Susilo, J Tonien, E Vlahu-Gjorgievska, G Yang Symmetry 10 (4), 95, 2018 | 38 | 2018 |
A generalized attack on RSA type cryptosystems M Bunder, A Nitaj, W Susilo, J Tonien Theoretical Computer Science 704, 74-81, 2017 | 38 | 2017 |
A 2-secure code with efficient tracing algorithm TV Dong, SN Reihaneh, W Yejing International Conference on Cryptology in India, 149-163, 2002 | 36 | 2002 |
A new attack on three variants of the RSA cryptosystem M Bunder, A Nitaj, W Susilo, J Tonien The 21st Australasian Conference on Information Security and Privacy 9723 …, 2016 | 28 | 2016 |
A New Improved AES S-box with Enhanced Properties A Nitaj, W Susilo, J Tonien Australasian Conference on Information Security and Privacy, 125-141, 2020 | 25 | 2020 |
Towards enhanced security for certificateless public-key authenticated encryption with keyword search X Liu, H Li, G Yang, W Susilo, J Tonien, Q Huang International Conference on Provable Security, 113-129, 2019 | 25 | 2019 |
A new attack on the RSA cryptosystem based on continued fractions MW Bunder, J Tonien Malaysian Journal of Mathematical Sciences 11 (S3), 45-57, 2017 | 25 | 2017 |
Unconditionally secure approximate message authentication D Tonien, R Safavi-Naini, P Nickolas, Y Desmedt International Conference on Coding and Cryptology, 233-247, 2009 | 23 | 2009 |
Cryptanalysis of RSA-type cryptosystems based on Lucas sequences, Gaussian integers and elliptic curves M Bunder, A Nitaj, W Susilo, J Tonien Journal of information security and applications 40, 193-198, 2018 | 21 | 2018 |
An efficient single-key pirates tracing scheme using cover-free families D Tonien, R Safavi-Naini International Conference on Applied Cryptography and Network Security, 82-97, 2006 | 21 | 2006 |
Broadcast Authenticated Encryption with Keyword Search X Liu, K He, G Yang, W Susilo, J Tonien, Q Huang Australasian Conference on Information Security and Privacy, 193-213, 2021 | 19 | 2021 |
Divide and Capture: An Improved Cryptanalysis of the Encryption Standard Algorithm RSA W Susilo, J Tonien, G Yang Computer Standards & Interfaces, 103470, 2021 | 19 | 2021 |
Construction of deletion correcting codes using generalized Reed–Solomon codes and their subcodes D Tonien, R Safavi-Naini Designs, Codes and Cryptography 42 (2), 227-237, 2007 | 17 | 2007 |