Birthday paradox for multi-collisions K Suzuki, D Tonien, K Kurosawa, K Toyota International Conference on Information Security and Cryptology, 29-40, 2006 | 99 | 2006 |
New traitor tracing schemes using bilinear map VD Tô, R Safavi-Naini, F Zhang Proceedings of the 3rd ACM workshop on Digital rights management, 67-76, 2003 | 67 | 2003 |
Multi-party concurrent signatures D Tonien, W Susilo, R Safavi-Naini International Conference on Information Security, 131-145, 2006 | 47 | 2006 |
Generic construction of hybrid public key traitor tracing with full-public-traceability DH Phan, R Safavi-Naini, D Tonien International Colloquium on Automata, Languages, and Programming, 264-275, 2006 | 36 | 2006 |
A 2-secure code with efficient tracing algorithm TV Dong, SN Reihaneh, W Yejing International Conference on Cryptology in India, 149-163, 2002 | 35 | 2002 |
Birthday paradox for multi-collisions K Suzuki, D Tonien, K Kurosawa, K Toyota IEICE Transactions on Fundamentals of Electronics, Communications and …, 2008 | 34 | 2008 |
Dynamics of an elastic ball bouncing on an oscillating plane and the oscillon JM Hill, MJ Jennings, DV To, KA Williams Applied Mathematical Modelling 24 (10), 715-732, 2000 | 23 | 2000 |
A QR code watermarking approach based on the DWT-DCT technique YW Chow, W Susilo, J Tonien, W Zong Australasian Conference on Information Security and Privacy, 314-331, 2017 | 21 | 2017 |
Unconditionally secure approximate message authentication D Tonien, R Safavi-Naini, P Nickolas, Y Desmedt International Conference on Coding and Cryptology, 233-247, 2009 | 21 | 2009 |
An efficient single-key pirates tracing scheme using cover-free families D Tonien, R Safavi-Naini International Conference on Applied Cryptography and Network Security, 82-97, 2006 | 17 | 2006 |
A generalized attack on RSA type cryptosystems M Bunder, A Nitaj, W Susilo, J Tonien Theoretical Computer Science 704, 74-81, 2017 | 15 | 2017 |
A new attack on three variants of the RSA cryptosystem M Bunder, A Nitaj, W Susilo, J Tonien The 21st Australasian Conference on Information Security and Privacy 9723 …, 2016 | 15 | 2016 |
Recursive constructions of secure codes and hash families using difference function families D Tonien, R Safavi-Naini Journal of Combinatorial Theory, Series A 113 (4), 664-674, 2006 | 15 | 2006 |
Cooperative secret sharing using QR codes and symmetric keys YW Chow, W Susilo, J Tonien, E Vlahu-Gjorgievska, G Yang Symmetry 10 (4), 95, 2018 | 14 | 2018 |
Cryptanalysis of RSA-type cryptosystems based on Lucas sequences, Gaussian integers and elliptic curves M Bunder, A Nitaj, W Susilo, J Tonien Journal of information security and applications 40, 193-198, 2018 | 13 | 2018 |
A new attack on the RSA cryptosystem based on continued fractions MW Bunder, J Tonien Malaysian Journal of Mathematical Sciences 11 (S3), 45-57, 2017 | 13 | 2017 |
On the maximal codes of length 3 with the 2-identifiable parent property VD Tô, R Safavi-Naini SIAM Journal on Discrete Mathematics 17 (4), 548-570, 2004 | 13 | 2004 |
Explicit construction of secure frameproof codes VD Tô, R Safavi-Naini International Journal of Pure and Applied Mathematics 6, 343-360, 2003 | 12 | 2003 |
Breaking and repairing an approximate message authentication scheme D Tonien, R Safavi-Naini, P Nickolas Discrete Mathematics, Algorithms and Applications 3 (03), 393-412, 2011 | 11 | 2011 |
Fuzzy universal hashing and approximate authentication R Safavi-Naini, D Tonien Discrete Mathematics, Algorithms and Applications 3 (04), 587-607, 2011 | 8 | 2011 |