Avatar Image

Professor Josef Pieprzyk

Science and Engineering Faculty,
Electrical Engineering, Computer Science,
Information Security

Personal

Name
Professor Josef Pieprzyk
Position(s)
Professor
Science and Engineering Faculty,
Electrical Engineering, Computer Science,
Information Security
Discipline *
Data Format, Computation Theory and Mathematics, Distributed Computing
Phone
+61 7 3138 9549
Email
Location
View location details (QUT staff and student access only)
Social Media
LinkedIn
Qualifications

PhD - Computer Science (Polish Academy of Science)

Professional memberships
and associations

EDITORIAL BOARDS

  • International Journal of Information Security, Springer-Verlag
  • Journal of Mathematical Cryptology, W de Gruyter
  • International Journal of Applied Cryptography, Inderscience Publishers
  • Fundamenta Informaticae, Annales Societatis Mathematicae Polonae
  • Journal of Research and Practice in Information Technology, Australian Computer Society
  • International Journal of Security and Networks, Inderscience Publishers
  • International Journal of Information and Computer Security, Inderscience Publishers

PROFESSIONAL SOCIETIES

  • Member of International Association for Cryptologic Research (IACR)
  • Member of International Steering Committee for ASIACRYPT conferences,
  • Member of Steering Committee for ACISP conferences
  • Member of International Steering Committee for ProvSec conferences
Keywords

Algorithms and Complexity, Cryptography, Information Security, Security of Computer Networks

* Field of Research code, Australian and New Zealand Standard Research Classification (ANZSRC), 2008

Biography

EDUCATION BACKGROUND

  • PhD in Computer Science, 1980 (with High Distinction), Institute of Computer Science, Polish Academy of Sciences, Warsaw, Poland
  • MSc in Mathematics, 1975, Nicolaus Copernicus University, Torun, Poland
  • BSc in Electrical Engineering, 1972, Technical Academy of Bydgoszcz, Poland

ACADEMIC POSITIONS

  • Professor (2014 — till now), School of Electrical Engineering and Computer Science, Queensland Universilty of Technology, Brisbane
  • Professor (2001 – 2014), Department of Computing, Macquarie University, Sydney, Australia
  • Associate Professor (1992 – 2001), School of IT and Computer Science, Wollongong University, Wollongong
  • Senior Lecturer (1988 – 1992), Department of Computer Science, University College, University of NSW, ADFA, Canberra

RESEARCH INTEREST

CRYPTOLOGY

  •  Analysis and Design of Block Ciphers, Stream Ciphers and Hash Functions — linear and differential analysis, algebraic analysis, SP networks, key scheduling
  • Public-Key Cryptography — lattice-based cryptography, signcryption, parallel authenticated encryption, security of RSA
  • Multiparty Computations – secure computations in non-Abelian groups
  • Digital Signatures — proxy signatures, batch signature verification, multiple-time signatures, one-time proxy signatures, universal designated-verifier signatures
  • Key Distribution — key agreements, key management in multicast groups, malleability attacks on key agreements
  • Threshold Cryptography — cryptography in hierarchical groups, threshold fail-stop signatures, shared generation of pseudorandom functions
  • Secret Sharing — perfect and ideal secret sharing, threshold changeable secret sharing, verifiable secret sharing, cheating prevention and detection, cheating immune secret sharing, cumulative arrays, secret sharing in hierarchical groups, divisibility of shares, lattice-based threshold changeable Shamir and CRT secret sharing, multi-secret secret sharing
  • S-box Theory — non-linearity of power permutations, linear non-equivalence, homogeneous bent Boolean functions, constructions of cubic homogeneous Boolean bent functions, algebraic resiliency and immunity
  • Pseudorandomness — pseudorandom bit generators, pseudorandom function and permutation generators, one-way functions,

INFORMATION SECURITY

  • Human Identification Protocols — challenge-response protocols
  • Database Security — access authorization in Object-Oriented databases, cryptographic mechanisms for authorization, multilevel security, discretionary access control
  • Intrusion Detection Systems — anomaly detection, misuse intrusion detections, Dempster-Shafer theory, host and network intrusion detection, honey pots
  • Copyright Protection — software fingerprints, watermarking schemes
  • E-Commerce — e-voting schemes, e-cheques, payment systems, micro-payments
  • E-Government — user identification, biometrics
This information has been contributed by Professor Josef Pieprzyk.

Teaching

QUT

  • Cryptography (CAB340) – semester 2, 2015
  • Discrete Structures (CAB203) – semester 1, 2014-2016
  • Information Security (CAB240) – semester 2, 2014

MACQUARE UNIVERSITY

  • Cryptography and Information Security (COMP343) – year 3 (2002-2013)
  • Fundamentals of Computer Science (COMP125) – year 1 (2013)
  • Information Technology Project (ITEC810) – postgraduate (2010-2011)
  • E-Commerce Technology (COMP344) – year 3 (2009-2010)
  • Algorithm Theory and Design (COMP333) – year 3 (2003, 2007)
  • Advanced Information Security (COMP445) – postgraduate (2004,2005)
  • Fundamentals of Computer Science (COMP165) – year 1 (2004)
  • Introduction to Information Technology (COMP123) – year 1 (2001)
  • Object-Oriented Technology} (COMP433/833) – postgraduate (2001)
This information has been contributed by Professor Josef Pieprzyk.

Experience

COMPETITIVE RESEARCH GRANTS (since 2001)

  • National Science Centre, Poland, Efficient and Secure Encryption with Authentication – New Designs and Advanced Cryptanalysis, Josef Pieprzyk, Pawel Morawiecki, Marian Srebrny, 2015-2018, $216,000
  • ARC Discovery, DP0987734, Secure and Efficient Cryptographic Hashing, Josef Pieprzyk, Ron Steinfeld, Arjen Lenstra, 2009-2014, $548,466
  • ARC Linkage, LP0776267, Defence against Phishing Attacks,  J. Pieprzyk, B. Watson, A. Ng, M. Dras, S. Cassidy, S. McCombie, B. Reardon, P. Watters, 2009–2012, $400,000
  • ARC Discovery, DP0663452, Algebraic Properties of Cryptographic Components and their Cryptanalysis, J. Pieprzyk, C. Charnes, S. McCallum, 2006-2008, $351,000
  • ARC Discovery, DP0451484, Algebraic models of stream ciphers, J. Pieprzyk, 2004-2006, $210,000
  • ARC Linkage, LP0453790, Algebraic methods in design and analysis of stream ciphers, J. Pieprzyk, G. Rose, P. Hawkes, 2004-2006, $70,500
  • ARC Linkage, LP0349183, Audit Security Models for Multiparty Internet Transactions, J. Seruga, J. Pieprzyk, J. Fick, 2003-2006, $69,099
  • ARC Special Research Initiative, Intelligent applications through the semantic web, Josef Pieprzyk Initiative Co-ordinator (together with other 29 academics), 2003 — 2006, $20,000
  • ARC Discovery} DP0345366, Algebraic Analysis of Cryptosystems, J. Pieprzyk, H. Wang, 2003-2005, $225,000
  •  Macquarie University Innovation Fund, Quantum Information Processing, $249,000, 2003-2005, B. Mans, J. Pieprzyk,.I. Shparlinski, J. Twamley
  • ARC Large Grant, A00103078, Secure Multi-Party Collaboration, J. Pieprzyk, 2001-2003,  $159,000
  • ARC SPIRT Grant, Internet Voting Protocols, J. Pieprzyk, 2001-2003, $388,000

PhD STUDENTS

  • Cai Li, Privacy-Preserving Fingerprint Authentication System Design and Analysis, School of Engineering and IT, University of New South Wales, Canberra, August 2015 (submitted)
  • Hong LAI, Design and Analysis of Classical and Quantum Key Agreement Protocols, Computing Department, Macquarie University, July 2015
  • Sareh Sadat Emami, Security Analysis of Cryptographic Algorithms, Computing Department, Macquarie University, July 2014 http://trove.nla.gov.au/version/209996522
  • Mohammad Ali Orumiehchiha, Cryptanalysis of Lightweight Symmetric Ciphers, Computing Department, Macquarie University, May 2014
  • Md. Mokammel Haque, Lattice-based Cryptanalysis for Secure Cryptosystems, Computing Department, Macquarie University, March 2014 http://trove.nla.gov.au/version/209908688
  • Przemyslaw Sokolowski, Contributions to Cryptanalysis: Design and Analysis of Cryptographic Hash Functions, Computing Department, Macquarie University, November 2013  http://trove.nla.gov.au/version/206721944
  • Sze-Meng Jojo Wong, Native Language Identification Incorporating Syntactic Knowledge, Computing Department, Macquarie University, 2013  http://hdl.handle.net/1959.14/285614
  • Reza Sepahi, Contributions to Public-Key Cryptography, Computing Department, Macquarie University, December 2012  http://trove.nla.gov.au/version/201151562
  • Hanh Nguyen Vo, Protecting Web Services From Botnet Exploitations, Computing Department, Macquarie University, August 2012  http://hdl.handle.net/1959.14/228419
  • Hassan Jameel Asghar Design and Analysis of Human Identification Protocols, Computing Department, Macquarie University, June 2012  http://hdl.handle.net/1959.14/214483
  • Stephen McCombie, Phishing the Long Line: Transnational Cybercrime from Eastern Europe to Australia, Computing Department, Macquarie University, November 2011  http://trove.nla.gov.au/version/200299467
  • Kang Leng Chiew, Steganalysis of Binary Images, Computing Department, Macquarie University, July 2011  http://trove.nla.gov.au/version/192344353
  • Cameron McDonald, Analysis of Modern Cryptographic Primitives, Computing Department, Macquarie University, February 2010
  • Vijayakrishnan Pasupathinathan, Hardware-based Identification and Authentication Systems, Computing Department, Macquarie University, December 2009  http://trove.nla.gov.au/version/206379271
  • Qingsong Ye, Privacy Preserving Dataset Operations, Computing Department, Macquarie University, March 2009  http://trove.nla.gov.au/version/51595429
  • Peishun Wang, Privacy Preserving Keyword-based Retrieval over Encrypted Data, Computing Department, Macquarie University, October, 2008
  • Gaurav Gupta, Robust Digital Watermarking of Multimedia Objects, Computing Department, Macquarie University, August, 2008  http://hdl.handle.net/1959.14/28597
  • Krystian Matusiewicz, Analysis of Modern Dedicated Cryptographic Hash Functions, Computing Department, Macquarie University, August, 2007  http://trove.nla.gov.au/version/31858946
  • Christophe Tartary, Authentication for Multicast Communication, Computing Department, Macquarie University, August 2007  http://trove.nla.gov.au/version/41884242
  • Joo Yeon Cho, New Results on Cryptanalysis of Stream Ciphers, Computing Department, Macquarie University, July 2007  http://trove.nla.gov.au/version/31858930
  • Mohamed H Al-Ibrahim, Source Authentication in Group Communication, Computing Department, Macquarie University, 2005  http://hdl.handle.net/1959.14/549
  • Tianbing Xia, Boolean Functions, Hadamard Matrices, Orthogonal Designs Applicable to Security and Communication, School of IT and CS, University of Wollongong, 2002  http://ro.uow.edu.au/theses/2005/
  • Willy Susilo, Contributions to Fail-Stop Signature Schemes, School of IT and CS, University of Wollongong, 2001  http://ro.uow.edu.au/theses/1846/
  • Huaxiong Wang, Unconditionally Secure Schemes for Distributed Authentication Systems, School of IT and CS, University of Wollongong, 2001  http://ro.uow.edu.au/theses/1853/
  • Cheng-Xin Qu, Boolean Functions in Cryptography, School of IT and CS, University of Wollongong, 2000  http://ro.uow.edu.au/theses/1292/
  • Chih-Hung Li, Secure Multi-party Key Establishment, School of IT and CS, University of Wollongong, 2000  http://ro.uow.edu.au/theses/2018/
  • Hossein Ghodosi, Society-Oriented Cryptographic Techniques forInformation Protection, School of IT and CS, University of Wollongong, 1999  http://ro.uow.edu.au/theses/2020/
  • Shahram Bahtiari, Analysis and Design of Message Authentication Codes, School of IT and CS, University of Wollongong,1998  http://ro.uow.edu.au/theses/2003/
  • Bernard Colbert, On the Security of Cryptographic Algorithms, Department of Computer Science, University College,University of NSW, 1997  http://trove.nla.gov.au/version/42116252
  • Esmaili Mansour, New Directions in Computer Intrusion Detection, Department of Computer Science, University of Wollongong,1997  http://ro.uow.edu.au/theses/2440/
  • Ahmad Baraani-Dastjerdi, Access Control in Object-Oriented Databases, Department of Computer Science, University of Wollongong, 1996  http://ro.uow.edu.au/theses/1290/
  • Babak Sadeghiyan, Principles for the designing of hashing algorithms, Department of Computer Science, University College, University of NSW, 1993  http://trove.nla.gov.au/version/13245428
  • Lawrie Brown, Analysis of the DES and the Design of the LOKI Encryption Scheme, Department of Computer Science, University College, University of NSW, 1991  http://seit.unsw.adfa.edu.au/staff/sites/lpb/phd/phd.html

MSc(Hons)

  • Nieke Aerts Cryptanalysis of Hash Functions, Macquarie University (Australia) and Eidhoven University of Technology (The Netherlands), August 2011
  • Pasupathinathan Vijayakrishnan, Cryptographic protocols in electronic payment systems, Computing Department, Macquarie University, November 2006
  • Soroush Sedaghat, Web Authenticity, University of Western Sydney, September 2002
  • Gunnar Storeboe, Security in the IP Layer — the IP Security Protocol, University of Trondheim, Norway, March 1999
  • Shaukat Hussein, Some Aspects of Computer Network Security, Department of Computer Science, University of Wollongong, 1998
  • Olav Loen, Electronic Commerce: an Electronic Cash System, Department of Computer Science,University of Wollongong and Norwegian University of Science and Technology, Department of Computer Science, 1997
  • Justin Lister, Intrusion Detection Systems: An Introduction to the Detection and Prevention of Computer Abuse, Department of Computer Science, University of Wollongong, 1995
  • Per Magne Hoff, Secure Telnet; An Extension of Berkeley Telnet with Authentication and Encryption Options, University of Trondheim, Norway, 1990

HONOURS STUDENTS

  • Joseph Alley, Cryptanalysis of pi-cipher, QUT, EE&CS, November 2015
  • Hanh Nguyen Vo, Algebraic Analysis of the Serpent Encryption Algorithm, Macquarie University, December 2004
  • Tim Garnett, Level-Based Intrusion Detection, Macquarie University, December 2004
  • Rish Raghu, Improvements on the PayWord Micropayment Scheme, Macquarie University, December 2003
  • Dennis Luu, Incoercible Electronic Elections, Macquarie University, November 2003
  • Adi Winarto, Investigation of Factoring Algorithms, Macquarie University, June 2003
  • Stephen Gilmore, Computer Virus Detection: An Aplication of Firewall Technologies, Macquarie University, November 2002
  • Amanda Scott, IDS – Catching the Bad Guys, Macquarie University, February 2002
  • T.W. Chu, Knapsack public-key cryptosystems, University of Sydney, 1987
  • G.S. Finkelstein, The nonlinear property of symmetric cryptosystems, University of Sydney, 1987
  • J. Lo, Factoring algorithms, University of Sydney, 1987
This information has been contributed by Professor Josef Pieprzyk.

Publications

  • Li C, Hu J, Pieprzyk J, Susilo W, (2015) A new biocryptosystem-oriented security analysis framework and implementation of multibiometric cryptosystems based on decision level fusion, IEEE Transactions on Information Forensics and Security p1193-1206
  • Asghar H, Steinfeld R, Li S, Kaafar M, Pieprzyk J, (2015) On the linearization of human identification protocols: Attacks based on linear algebra, coding theory, and lattices, IEEE Transactions on Information Forensics and Security p1643-1655
  • Asghar H, Desmedt Y, Pieprzyk J, Steinfeld R, (2014) A subexponential construction of graph coloring for multiparty computation, Journal of Mathematical Cryptology p363-403
  • Emami S, Ling S, Nikolic I, Pieprzyk J, Wang H, (2014) Low probability differentials and the cryptanalysis of full-round CLEFIA-128, Advances in Cryptology -- ASIACRYPT 2014: 20th International Conference on the Theory and Application of Cryptology and Information Security Proceedings, Part I [Lecture Notes in Computer Science, Volume 8873] p141-157
  • Morawiecki P, Pieprzyk JP, Srebrny M, (2014) Rotational cryptanalysis of round-reduced Keccak, Fast Software Encryption: 20th International Workshop, FSE 2013, Revised Selected Papers [Lecture Notes in Computer Science, Volume 8424] p241-262

For more publications by this staff member, visit QUT ePrints, the University's research repository.

Research projects

Grants and projects (Category 1: Australian Competitive Grants only)

Title
Secure and Efficient Cryptographic Hashing
Primary fund type
CAT 1 - Australian Competitive Grant
Project ID
DP0987734
Start year
2009
Keywords
Title
Building trust in Australia's infrastructure: dealing with scientific, technological, business, policy and legal issues in information security
Primary fund type
CAT 1 - Australian Competitive Grant
Project ID
SR0354880
Start year
2003
Keywords
Research policy direction information security