Publications
-
The space of two-sided generalized Fibonacci sequences
(with M. Bunder),
Rocky Mountain Journal of Mathematics 55(1)(2025), 35-44.
[pdf]
https://doi.org/10.1216/rmj.2025.55.35
-
Nested fifth root radical identities from elliptic curves,
Journal of Computational Algebra
13(2025), #100032.
https://doi.org/10.1016/j.jaca.2025.100032
-
Enumerating irreducible polynomials over the binary field,
Discrete Mathematics, Algorithms and Applications,
2025, #2550085.
https://doi.org/10.1142/S1793830925500855
-
Fibonacci and Pi squared,
The Fibonacci Quarterly
62(1)(2024), 65-74.
https://doi.org/10.1080/00150517.2024.12427379
-
Fibonacci-related formulas for pi,
The Mathematical Intelligencer 46(3)(2024),
214-221.
[pdf]
https://doi.org/10.1007/s00283-023-10284-4
-
Enhanced S-boxes for the Advanced Encryption Standard with maximal periodicity and better avalanche property
(with A. Nitaj, W. Susilo),
Computer Standards & Interfaces
87 (2024), #103769.
https://doi.org/10.1016/j.csi.2023.103769
-
A new attack on some RSA variants
(with A. Nitaj, W. Susilo),
Theoretical Computer Science
960 (2023), #113898.
https://doi.org/10.1016/j.tcs.2023.113898
-
Message-locked searchable encryption: a new versatile tool for secure cloud storage
(with X. Liu, G. Yang, W. Susilo, R. Chen, L. Xixiang),
IEEE Transactions on Services Computing
15(3)(2022), 1664-1677.
https://doi.org/10.1109/TSC.2020.3006532
-
A generalized attack on the multi-prime power RSA
(with A. Nitaj, W. Susilo),
Proceedings of the 13th International Conference on Cryptology in Africa,
Lecture Notes in Computer Science 13503, 2022, 537-549.
https://doi.org/10.1007/978-3-031-17433-9_23
-
An exact formula for the harmonic continued fraction
(with M. Bunder, P. Nickolas),
Bulletin of the Australian Mathematical Society
103(2021), 11-21.
https://doi.org/10.1017/S0004972720000544
-
A Wiener-type attack on an RSA-like cryptosystem constructed from cubic Pell equations
(with W. Susilo),
Theoretical Computer Science
885 (2021), 125-130.
https://doi.org/10.1016/j.tcs.2021.06.033
-
Divide and Capture: An improved cryptanalysis of the encryption standard algorithm RSA
(with W. Susilo, G. Yang),
Computer Standards & Interfaces
74 (2021), #103470.
https://doi.org/10.1016/j.csi.2020.103470
-
Privacy-preserving multi-keyword searchable encryption for distributed systems
(with X. Liu, G. Yang, W. Susilo, X. Liu, J. Shen),
IEEE Transactions on Parallel and Distributed Systems
32(3)(2021), 561-574.
https://doi.org/10.1109/TPDS.2020.3027003
-
Broadcast authenticated encryption with keyword search
(with X. Liu, K. He, G. Yang, W. Susilo, Q. Huang),
Proceedings of the 26th Australasian Conference on Information Security and Privacy,
Lecture Notes in Computer Science 13083, 2021, 193-213.
https://doi.org/10.1007/978-3-030-90567-5_10
-
Cryptanalysis of RSA variants with primes sharing most significant bits
(with M. Cherkaoui-Semmouni, A. Nitaj, W. Susilo),
Proceedings of the 24th International Conference on Information Security,
Lecture Notes in Computer Science 13118, 2021, 42-53.
https://doi.org/10.1007/978-3-030-91356-4_3
-
Generalized Fibonacci numbers and their 2-adic order
(with M. Bunder),
Integers: Electronic Journal of Combinatorial Number Theory,
2020, #A105.
https://doi.org/10.5281/zenodo.10802328
-
A generalised bound for the Wiener attack on RSA
(with W. Susilo, G. Yang),
Journal of Information Security and Applications
53(2020), #102531.
https://doi.org/10.1016/j.jisa.2020.102531
-
A new improved AES S-box with enhanced properties
(with A. Nitaj, W. Susilo),
Proceedings of the 25th Australasian Conference on Information Security and Privacy,
Lecture Notes in Computer Science 12248, 2020, 125-141.
https://doi.org/10.1007/978-3-030-55304-3_7
-
On the harmonic continued fractions
(with M. Bunder, P. Nickolas),
The Ramanujan Journal
49(3)(2019), 669-697.
[pdf]
https://doi.org/10.1007/s11139-018-0098-4
-
Towards enhanced security for certificateless public-key authenticated encryption with keyword search
(with X. Liu, H. Li, G. Yang, W. Susilo, Q. Huang),
Proceedings of the 13th International Conference on Provable Security,
Lecture Notes in Computer Science 11821, 2019, 113-129.
https://doi.org/10.1007/978-3-030-31919-9_7
-
Improved cryptanalysis of the KMOV elliptic curve cryptosystem
(with A. Nitaj, W. Susilo),
Proceedings of the 13th International Conference on Provable Security,
Lecture Notes in Computer Science 11821, 2019, 206-221.
https://doi.org/10.1007/978-3-030-31919-9_12
-
The Wiener attack on RSA revisited: a quest for the exact bound
(with W. Susilo, G. Yang),
Proceedings of the 24th Australasian Conference on Information Security and Privacy,
Lecture Notes in Computer Science 11547, 2019, 381-398.
https://doi.org/10.1007/978-3-030-21548-4_21
-
A generalized attack on some variants of the RSA cryptosystem
(with A. Nitaj, Y. Pan),
Proceedings of the 25th International Conference on Selected Areas in Cryptography,
Lecture Notes in Computer Science 11349, 2019, 421-433.
https://doi.org/10.1007/978-3-030-10970-7_19
-
A new elementary proof of Euler's continued fractions,
The Mathematical Gazette
102(2018), 105-111.
https://doi.org/10.1017/mag.2018.15
-
Cryptanalysis of RSA-type cryptosystems based on Lucas sequences, Gaussian integers and elliptic curves
(with M. Bunder, A. Nitaj, W. Susilo),
Journal of Information Security and Applications, 40(2018), 193-198.
https://doi.org/10.1016/j.jisa.2018.04.006
-
Closed form expressions for two harmonic continued fractions
(with M. Bunder),
The Mathematical Gazette
101(552)(2017), 439-448.
https://doi.org/10.1017/mag.2017.125
-
A continued fraction inspired by an identity of Euler,
The Mathematical Gazette
101(550)(2017), 115-121.
https://doi.org/10.1017/mag.2017.16
-
A new attack on the RSA cryptosystem based on continued fractions
(with M. Bunder),
Malaysian Journal of Mathematical Sciences
11(S3)(August 2017), 45-57.
-
A QR code watermarking approach based on the DWT-DCT technique
(with Y.-W. Chow, W. Susilo, W. Zong),
Proceedings of the 22nd Australasian Conference on Information Security and Privacy,
Lecture Notes in Computer Science 10343, 2017,
314-331.
https://doi.org/10.1007/978-3-319-59870-3_18
-
A generalized attack on RSA type cryptosystems
(with M. Bunder, A. Nitaj, W. Susilo),
Theoretical Computer Science
704(2017), 74-81.
https://doi.org/10.1016/j.tcs.2017.09.009
-
Dirichlet product for Boolean functions
(with A. Nitaj, W. Susilo),
Journal of Applied Mathematics and Computing
55(2017), 293-312.
https://doi.org/10.1007/s12190-016-1037-4
-
Trisecting an angle correctly up to arcminute,
Forum Geometricorum
16 (2016), 37-41.
[pdf]
-
A simple proof of Euler's continued fraction of e1/M,
The Mathematical Gazette
100(548)(2016), 279-287.
https://doi.org/10.1017/mag.2016.65
-
A new improved attack on RSA
(with M. Bunder),
Proceedings of the 5th International Cryptology and Information Security Conference,
2016,
101-110.
-
A new attack on three variants of the RSA cryptosystem
(with M. Bunder, A. Nitaj, W. Susilo),
Proceedings of the 21st Australasian Conference on Information Security and Privacy,
Lecture Notes in Computer Science 9723, 2016,
258-268.
https://doi.org/10.1007/978-3-319-40367-0_16
-
Some constructions of mutually orthogonal Latin squares and superimposed codes
(with J. Seberry),
Discrete Mathematics, Algorithms and Applications
4(3)(2012), 1250022-(1-8).
https://doi.org/10.1142/S179383091250022X
-
A new generic digital signature algorithm
(with J. Seberry, V. To),
Groups - Complexity - Cryptology
3(2)(2011), 221-237.
https://doi.org/10.1515/gcc.2011.008
-
Fuzzy universal hashing and approximate authentication
(with R. Safavi-Naini),
Discrete Mathematics, Algorithms and Applications
3(4)(2011), 587-607.
https://doi.org/10.1142/S1793830911001425
-
On "the power of verification queries" in unconditionally secure message authentication
(with R. Safavi-Naini, P. Wild),
Discrete Mathematics, Algorithms and Applications
3(3)(2011), 287-303.
https://doi.org/10.1142/S1793830911001218
-
Breaking and repairing an approximate message authentication scheme
(with R. Safavi-Naini, P. Nickolas),
Discrete Mathematics, Algorithms and Applications
3(3)(2011), 393-412.
https://doi.org/10.1142/S1793830911001292
-
Unconditionally secure approximate message authentication
(with R. Safavi-Naini, P. Nickolas, Y. Desmedt),
Proceedings of the 2009 International Workshop on Coding and Cryptology,
Lecture Notes in Computer Science 5557, 2009, 233-247.
https://doi.org/10.1007/978-3-642-01877-0_19
-
Birthday paradox for multi-collisions
(with K. Suzuki, K. Kurosawa, K. Toyota),
The Institute of Electronics, Information and Communication Engineers Transactions, Special Section on Cryptography and Information Security
91A(1)(2008), 39-45.
https://doi.org/10.1093/ietfec/e91-a.1.39
-
Authentication codes in the query model
(with R. Safavi-Naini, P. Wild),
Proceedings of the First International Workshop on Coding and Cryptology, Series on Coding and Cryptology
4, 2008, 214-225.
https://doi.org/10.1142/9789812832245_0016
-
A simple visual proof of the Schroder-Bernstein theorem,
Elemente der Mathematik
62(3)(2007), 118-120.
https://doi.org/10.4171/EM/65
-
Construction of deletion correcting codes using generalized Reed-Solomon codes and their subcodes
(with R. Safavi-Naini),
Designs, Codes and Cryptography
42(2007), 227-237.
https://doi.org/10.1007/s10623-006-9032-7
-
Combinatorial characterizations of authentication codes in verification oracle model
(with R. Safavi-Naini, P. Wild),
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security
, 183-193, 2007.
https://doi.org/10.1145/1229285.1229311
-
Cancellation law and unique factorization theorem for string operations,
Journal of Algebra and Its Applications
5(2)(2006), 231-243.
https://doi.org/10.1142/S0219498806001739
-
On the Diophantine equation x! = pya,
New Zealand Journal of Mathematics
35 (2006), 207-209.
-
Recursive constructions of secure codes and hash families using difference function families
(with R. Safavi-Naini),
Journal of Combinatorial Theory Series A
113(4)(2006), 664-674.
https://doi.org/10.1016/j.jcta.2005.07.001
-
On a traitor tracing scheme from ACISP 2003,
Information Processing Letters
100(1)(2006), 21-22.
https://doi.org/10.1016/j.ipl.2006.04.016
-
Multi-party concurrent signatures
(with W. Susilo, R. Safavi-Naini),
Proceedings of the 9th Information Security Conference,
Lecture Notes in Computer Science 4176, 2006, 131-145.
https://doi.org/10.1007/11836810_10
-
Generic construction of hybrid public key traitor tracing with full-public-traceability
(with D.H. Phan, R. Safavi-Naini),
Proceedings of the 33rd International Colloquium on Automata, Languages and Programming,
Lecture Notes in Computer Science 4052, 2006, 264-275.
https://doi.org/10.1007/11787006_23
-
Birthday paradox for multi-collisions
(with K. Suzuki, K. Kurosawa, K. Toyota),
Proceedings of the 9th Annual International Conference on Information Security and Cryptology
, Lecture Notes in Computer Science 4296, 2006, 29-40.
https://doi.org/10.1007/11927587_5
-
An efficient single-key pirates tracing scheme using cover-free families
(with R. Safavi-Naini),
Proceedings of the 4th International Conference on Applied Cryptography and Network Security,
Lecture Notes in Computer Science 3989, 2006, 82-97.
https://doi.org/10.1007/11767480_6
-
2-Secure codes from 2-SFP codes
(with R. Safavi-Naini, Y. Wang),
Journal of Discrete Mathematical Sciences & Cryptography
8(2) (2005), 287-304.
https://doi.org/10.1080/09720529.2005.10698039
-
Self-dual modular-graceful cyclic digraphs
(with R. Safavi-Naini),
Journal of Combinatorial Mathematics and Combinatorial Computing
52 (2005), 97-108.
-
A note on Devaney's definition of chaos,
Journal of Dynamical Systems and Geometric Theories
2 (2004), 23-26.
https://doi.org/10.1080/1726037X.2004.10698476
-
On the maximal codes of length 3 with the 2-identifiable parent property
(with R. Safavi-Naini),
SIAM Journal on Discrete Mathematics
17(4) (2004), 548-570.
https://doi.org/10.1137/S0895480102400424
-
Linear code implies public-key traitor tracing with revocation
(with R. Safavi-Naini),
Proceedings of the 9th Australasian Conference on Information Security and Privacy,
Lecture Notes in Computer Science 3108, 2004, 24-35.
https://doi.org/10.1007/978-3-540-27800-9_3
-
New traitor tracing schemes using bilinear map
(with R. Safavi-Naini, F. Zhang),
Proceedings of the 2003 ACM Workshop on Digital Rights Management,
67-76, 2003.
https://doi.org/10.1145/947380.947389
-
Explicit construction of secure frameproof codes
(with R. Safavi-Naini),
International Journal of Pure and Applied Mathematics
6 (2003), 343-360.
-
A 2-secure code with efficient tracing algorithm
(with R. Safavi-Naini, Y. Wang),
Proceedings of the 3rd International Conference on Cryptology in India
, Lecture Notes in Computer Science 2551, 2002, 149-162.
https://doi.org/10.1007/3-540-36231-2_13
-
Dynamics of an elastic ball bouncing on an oscillating plane and the oscillon
(with J.M. Hill, M.J. Jennings, K.A. Williams),
Applied Mathematical Modelling
24(2000), 715-732.
https://doi.org/10.1016/S0307-904X(00)00002-0
Ph.D. Thesis
Recreational math & miscellaneous
-
New Year identities for 2019,
The Mathematical Gazette, 103(2019), 130-130.
-
Problem 103.J
,
The Mathematical Gazette,
November 2019.
-
Problem 101.B
,
The Mathematical Gazette,
March 2017.
-
Problem Q1056
,
Mathematics Magazine,
Dec 2015.
-
New Year Identity,
Mathematics Magazine,
Dec 2015.
-
New Year Identity,
Mathematics Magazine,
Dec 2014.
-
New Year Identity,
Mathematics Magazine,
Dec 2013.