Joseph Tonien
Joseph Tonien
Verified email at uow.edu.au - Homepage
Title
Cited by
Cited by
Year
Birthday paradox for multi-collisions
K Suzuki, D Tonien, K Kurosawa, K Toyota
International Conference on Information Security and Cryptology, 29-40, 2006
1062006
New traitor tracing schemes using bilinear map
VD Tô, R Safavi-Naini, F Zhang
Proceedings of the 3rd ACM workshop on Digital rights management, 67-76, 2003
682003
Multi-party concurrent signatures
D Tonien, W Susilo, R Safavi-Naini
International Conference on Information Security, 131-145, 2006
482006
Generic construction of hybrid public key traitor tracing with full-public-traceability
DH Phan, R Safavi-Naini, D Tonien
International Colloquium on Automata, Languages, and Programming, 264-275, 2006
382006
A 2-secure code with efficient tracing algorithm
TV Dong, SN Reihaneh, W Yejing
International Conference on Cryptology in India, 149-163, 2002
352002
Birthday paradox for multi-collisions
K Suzuki, D Tonien, K Kurosawa, K Toyota
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2008
342008
A QR code watermarking approach based on the DWT-DCT technique
YW Chow, W Susilo, J Tonien, W Zong
Australasian Conference on Information Security and Privacy, 314-331, 2017
242017
Dynamics of an elastic ball bouncing on an oscillating plane and the oscillon
JM Hill, MJ Jennings, DV To, KA Williams
Applied Mathematical Modelling 24 (10), 715-732, 2000
232000
Unconditionally secure approximate message authentication
D Tonien, R Safavi-Naini, P Nickolas, Y Desmedt
International Conference on Coding and Cryptology, 233-247, 2009
212009
An efficient single-key pirates tracing scheme using cover-free families
D Tonien, R Safavi-Naini
International Conference on Applied Cryptography and Network Security, 82-97, 2006
172006
A generalized attack on RSA type cryptosystems
M Bunder, A Nitaj, W Susilo, J Tonien
Theoretical Computer Science 704, 74-81, 2017
162017
A new attack on three variants of the RSA cryptosystem
M Bunder, A Nitaj, W Susilo, J Tonien
The 21st Australasian Conference on Information Security and Privacy 9723 …, 2016
152016
Recursive constructions of secure codes and hash families using difference function families
D Tonien, R Safavi-Naini
Journal of Combinatorial Theory, Series A 113 (4), 664-674, 2006
152006
Cryptanalysis of RSA-type cryptosystems based on Lucas sequences, Gaussian integers and elliptic curves
M Bunder, A Nitaj, W Susilo, J Tonien
Journal of information security and applications 40, 193-198, 2018
142018
Cooperative secret sharing using QR codes and symmetric keys
YW Chow, W Susilo, J Tonien, E Vlahu-Gjorgievska, G Yang
Symmetry 10 (4), 95, 2018
142018
On the maximal codes of length 3 with the 2-identifiable parent property
VD Tô, R Safavi-Naini
SIAM Journal on Discrete Mathematics 17 (4), 548-570, 2004
142004
A new attack on the RSA cryptosystem based on continued fractions
MW Bunder, J Tonien
Malaysian Journal of Mathematical Sciences 11 (S3), 45-57, 2017
132017
Explicit construction of secure frameproof codes
VD Tô, R Safavi-Naini
International Journal of Pure and Applied Mathematics 6, 343-360, 2003
122003
Breaking and repairing an approximate message authentication scheme
D Tonien, R Safavi-Naini, P Nickolas
Discrete Mathematics, Algorithms and Applications 3 (03), 393-412, 2011
112011
Fuzzy universal hashing and approximate authentication
R Safavi-Naini, D Tonien
Discrete Mathematics, Algorithms and Applications 3 (04), 587-607, 2011
82011
The system can't perform the operation now. Try again later.
Articles 1–20