default search action
Joseph Tonien
Person information
- affiliation: University of Wollongong, NSW, Australia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Abderrahmane Nitaj, Willy Susilo, Joseph Tonien:
Enhanced S-boxes for the Advanced Encryption Standard with maximal periodicity and better avalanche property. Comput. Stand. Interfaces 87: 103769 (2024) - 2023
- [j18]Abderrahmane Nitaj, Willy Susilo, Joseph Tonien:
A new attack on some RSA variants. Theor. Comput. Sci. 960: 113898 (2023) - 2022
- [j17]Xueqiao Liu, Guomin Yang, Willy Susilo, Joseph Tonien, Rongmao Chen, Xixiang Lv:
Message-Locked Searchable Encryption: A New Versatile Tool for Secure Cloud Storage. IEEE Trans. Serv. Comput. 15(3): 1664-1677 (2022) - [c17]Abderrahmane Nitaj, Willy Susilo, Joseph Tonien:
A Generalized Attack on the Multi-prime Power RSA. AFRICACRYPT 2022: 537-549 - 2021
- [j16]Willy Susilo, Joseph Tonien, Guomin Yang:
Divide and capture: An improved cryptanalysis of the encryption standard algorithm RSA. Comput. Stand. Interfaces 74: 103470 (2021) - [j15]Willy Susilo, Joseph Tonien:
A Wiener-type attack on an RSA-like cryptosystem constructed from cubic Pell equations. Theor. Comput. Sci. 885: 125-130 (2021) - [j14]Xueqiao Liu, Guomin Yang, Willy Susilo, Joseph Tonien, Ximeng Liu, Jian Shen:
Privacy-Preserving Multi-Keyword Searchable Encryption for Distributed Systems. IEEE Trans. Parallel Distributed Syst. 32(3): 561-574 (2021) - [c16]Xueqiao Liu, Kai He, Guomin Yang, Willy Susilo, Joseph Tonien, Qiong Huang:
Broadcast Authenticated Encryption with Keyword Search. ACISP 2021: 193-213 - [c15]Meryem Cherkaoui Semmouni, Abderrahmane Nitaj, Willy Susilo, Joseph Tonien:
Cryptanalysis of RSA Variants with Primes Sharing Most Significant Bits. ISC 2021: 42-53 - [i10]Meryem Cherkaoui Semmouni, Abderrahmane Nitaj, Willy Susilo, Joseph Tonien:
Cryptanalysis of RSA Variants with Primes Sharing Most Significant Bits. IACR Cryptol. ePrint Arch. 2021: 1632 (2021) - 2020
- [j13]Willy Susilo, Joseph Tonien, Guomin Yang:
A generalised bound for the Wiener attack on RSA. J. Inf. Secur. Appl. 53: 102531 (2020) - [c14]Abderrahmane Nitaj, Willy Susilo, Joseph Tonien:
A New Improved AES S-box with Enhanced Properties. ACISP 2020: 125-141 - [i9]Abderrahmane Nitaj, Willy Susilo, Joseph Tonien:
A New Improved AES S-box With Enhanced Properties. IACR Cryptol. ePrint Arch. 2020: 1597 (2020)
2010 – 2019
- 2019
- [c13]Willy Susilo, Joseph Tonien, Guomin Yang:
The Wiener Attack on RSA Revisited: A Quest for the Exact Bound. ACISP 2019: 381-398 - [c12]Xueqiao Liu, Hongbo Li, Guomin Yang, Willy Susilo, Joseph Tonien, Qiong Huang:
Towards Enhanced Security for Certificateless Public-Key Authenticated Encryption with Keyword Search. ProvSec 2019: 113-129 - [c11]Abderrahmane Nitaj, Willy Susilo, Joseph Tonien:
Improved Cryptanalysis of the KMOV Elliptic Curve Cryptosystem. ProvSec 2019: 206-221 - [i8]Abderrahmane Nitaj, Willy Susilo, Joseph Tonien:
Improved Cryptanalysis of the KMOV Elliptic Curve Cryptosystem. IACR Cryptol. ePrint Arch. 2019: 1052 (2019) - 2018
- [j12]Martin W. Bunder, Abderrahmane Nitaj, Willy Susilo, Joseph Tonien:
Cryptanalysis of RSA-type cryptosystems based on Lucas sequences, Gaussian integers and elliptic curves. J. Inf. Secur. Appl. 40: 193-198 (2018) - [j11]Yang-Wai Chow, Willy Susilo, Joseph Tonien, Elena Vlahu-Gjorgievska, Guomin Yang:
Cooperative Secret Sharing Using QR Codes and Symmetric Keys. Symmetry 10(4): 95 (2018) - [c10]Abderrahmane Nitaj, Yanbin Pan, Joseph Tonien:
A Generalized Attack on Some Variants of the RSA Cryptosystem. SAC 2018: 421-433 - 2017
- [j10]Martin W. Bunder, Abderrahmane Nitaj, Willy Susilo, Joseph Tonien:
A generalized attack on RSA type cryptosystems. Theor. Comput. Sci. 704: 74-81 (2017) - [c9]Yang-Wai Chow, Willy Susilo, Joseph Tonien, Wei Zong:
A QR Code Watermarking Approach Based on the DWT-DCT Technique. ACISP (2) 2017: 314-331 - [i7]Martin W. Bunder, Abderrahmane Nitaj, Willy Susilo, Joseph Tonien:
A generalized attack on RSA type cryptosystems. IACR Cryptol. ePrint Arch. 2017: 1076 (2017) - 2016
- [c8]Martin W. Bunder, Abderrahmane Nitaj, Willy Susilo, Joseph Tonien:
A New Attack on Three Variants of the RSA Cryptosystem. ACISP (2) 2016: 258-268 - [c7]Mandy Li, Willy Susilo, Joseph Tonien:
Securing Shared Systems. CDVE 2016: 194-201 - [i6]Abderrahmane Nitaj, Willy Susilo, Joseph Tonien:
Dirichlet Product for Boolean Functions. IACR Cryptol. ePrint Arch. 2016: 673 (2016) - 2012
- [j9]Jennifer Seberry, Dongvu Tonien:
Some Constructions of Mutually Orthogonal Latin Squares and Superimposed Codes. Discret. Math. Algorithms Appl. 4(3) (2012) - 2011
- [j8]Dongvu Tonien, Reihaneh Safavi-Naini, Peter R. Wild:
On "the Power of Verification Queries" in Unconditionally Secure Message Authentication. Discret. Math. Algorithms Appl. 3(3): 287-304 (2011) - [j7]Dongvu Tonien, Reihaneh Safavi-Naini, Peter Nickolas:
Breaking and Repairing an Approximate Message Authentication Scheme. Discret. Math. Algorithms Appl. 3(3): 393-412 (2011) - [j6]Reihaneh Safavi-Naini, Dongvu Tonien:
Fuzzy Universal Hashing and Approximate Authentication. Discret. Math. Algorithms Appl. 3(4): 587-608 (2011) - [j5]Jennifer Seberry, Vinhbuu To, Dongvu Tonien:
A new generic digital signature algorithm. Groups Complex. Cryptol. 3(2): 221-237 (2011)
2000 – 2009
- 2009
- [c6]Dongvu Tonien, Reihaneh Safavi-Naini, Peter Nickolas, Yvo Desmedt:
Unconditionally Secure Approximate Message Authentication. IWCC 2009: 233-247 - 2008
- [j4]Kazuhiro Suzuki, Dongvu Tonien, Kaoru Kurosawa, Koji Toyota:
Birthday Paradox for Multi-Collisions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(1): 39-45 (2008) - 2007
- [j3]Dongvu Tonien, Reihaneh Safavi-Naini:
Construction of deletion correcting codes using generalized Reed-Solomon codes and their subcodes. Des. Codes Cryptogr. 42(2): 227-237 (2007) - [c5]Dongvu Tonien, Reihaneh Safavi-Naini, Peter R. Wild:
Combinatorial characterizations of authentication codes in verification oracle model. AsiaCCS 2007: 183-193 - 2006
- [j2]Dongvu Tonien:
On a traitor tracing scheme from ACISP 2003. Inf. Process. Lett. 100(1): 21-22 (2006) - [j1]Dongvu Tonien, Reihaneh Safavi-Naini:
Recursive constructions of secure codes and hash families using difference function families. J. Comb. Theory A 113(4): 664-674 (2006) - [c4]Dongvu Tonien, Reihaneh Safavi-Naini:
An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families. ACNS 2006: 82-97 - [c3]Duong Hieu Phan, Reihaneh Safavi-Naini, Dongvu Tonien:
Generic Construction of Hybrid Public Key Traitor Tracing with Full-Public-Traceability. ICALP (2) 2006: 264-275 - [c2]Kazuhiro Suzuki, Dongvu Tonien, Kaoru Kurosawa, Koji Toyota:
Birthday Paradox for Multi-collisions. ICISC 2006: 29-40 - [c1]Dongvu Tonien, Willy Susilo, Reihaneh Safavi-Naini:
Multi-party Concurrent Signatures. ISC 2006: 131-145 - [i5]Dongvu Tonien, Reihaneh Safavi-Naini:
An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families. IACR Cryptol. ePrint Arch. 2006: 99 (2006) - 2005
- [i4]Dongvu Tonien, Reihaneh Safavi-Naini:
Recursive Constructions of Secure Codes and Hash Families Using Difference Function Families. IACR Cryptol. ePrint Arch. 2005: 184 (2005) - [i3]Reihaneh Safavi-Naini, Dongvu Tonien:
Fuzzy Universal Hashing and Approximate Authentication. IACR Cryptol. ePrint Arch. 2005: 256 (2005) - [i2]Dongvu Tonien, Reihaneh Safavi-Naini:
Explicit Construction of Secure Frameproof Codes. IACR Cryptol. ePrint Arch. 2005: 275 (2005) - [i1]Dongvu Tonien:
On a Traitor Tracing Scheme from ACISP 2003. IACR Cryptol. ePrint Arch. 2005: 371 (2005)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-10 20:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint