Joseph Tonien
Joseph Tonien
Verified email at uow.edu.au - Homepage
Title
Cited by
Cited by
Year
Birthday paradox for multi-collisions
K Suzuki, D Tonien, K Kurosawa, K Toyota
International Conference on Information Security and Cryptology, 29-40, 2006
992006
New traitor tracing schemes using bilinear map
VD Tô, R Safavi-Naini, F Zhang
Proceedings of the 3rd ACM workshop on Digital rights management, 67-76, 2003
672003
Multi-party concurrent signatures
D Tonien, W Susilo, R Safavi-Naini
International Conference on Information Security, 131-145, 2006
472006
Generic construction of hybrid public key traitor tracing with full-public-traceability
DH Phan, R Safavi-Naini, D Tonien
International Colloquium on Automata, Languages, and Programming, 264-275, 2006
362006
A 2-secure code with efficient tracing algorithm
TV Dong, SN Reihaneh, W Yejing
International Conference on Cryptology in India, 149-163, 2002
352002
Birthday paradox for multi-collisions
K Suzuki, D Tonien, K Kurosawa, K Toyota
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2008
342008
Dynamics of an elastic ball bouncing on an oscillating plane and the oscillon
JM Hill, MJ Jennings, DV To, KA Williams
Applied Mathematical Modelling 24 (10), 715-732, 2000
232000
A QR code watermarking approach based on the DWT-DCT technique
YW Chow, W Susilo, J Tonien, W Zong
Australasian Conference on Information Security and Privacy, 314-331, 2017
212017
Unconditionally secure approximate message authentication
D Tonien, R Safavi-Naini, P Nickolas, Y Desmedt
International Conference on Coding and Cryptology, 233-247, 2009
212009
An efficient single-key pirates tracing scheme using cover-free families
D Tonien, R Safavi-Naini
International Conference on Applied Cryptography and Network Security, 82-97, 2006
172006
A generalized attack on RSA type cryptosystems
M Bunder, A Nitaj, W Susilo, J Tonien
Theoretical Computer Science 704, 74-81, 2017
152017
A new attack on three variants of the RSA cryptosystem
M Bunder, A Nitaj, W Susilo, J Tonien
The 21st Australasian Conference on Information Security and Privacy 9723 …, 2016
152016
Recursive constructions of secure codes and hash families using difference function families
D Tonien, R Safavi-Naini
Journal of Combinatorial Theory, Series A 113 (4), 664-674, 2006
152006
Cooperative secret sharing using QR codes and symmetric keys
YW Chow, W Susilo, J Tonien, E Vlahu-Gjorgievska, G Yang
Symmetry 10 (4), 95, 2018
142018
Cryptanalysis of RSA-type cryptosystems based on Lucas sequences, Gaussian integers and elliptic curves
M Bunder, A Nitaj, W Susilo, J Tonien
Journal of information security and applications 40, 193-198, 2018
132018
A new attack on the RSA cryptosystem based on continued fractions
MW Bunder, J Tonien
Malaysian Journal of Mathematical Sciences 11 (S3), 45-57, 2017
132017
On the maximal codes of length 3 with the 2-identifiable parent property
VD Tô, R Safavi-Naini
SIAM Journal on Discrete Mathematics 17 (4), 548-570, 2004
132004
Explicit construction of secure frameproof codes
VD Tô, R Safavi-Naini
International Journal of Pure and Applied Mathematics 6, 343-360, 2003
122003
Breaking and repairing an approximate message authentication scheme
D Tonien, R Safavi-Naini, P Nickolas
Discrete Mathematics, Algorithms and Applications 3 (03), 393-412, 2011
112011
Fuzzy universal hashing and approximate authentication
R Safavi-Naini, D Tonien
Discrete Mathematics, Algorithms and Applications 3 (04), 587-607, 2011
82011
The system can't perform the operation now. Try again later.
Articles 1–20