


default search action
Journal of Mathematical Cryptology, Volume 12
Volume 12, Number 1, March 2018
- Juha Partala
:
Algebraic generalization of Diffie-Hellman key exchange. 1-21 - Tran van Trung:
Construction of strongly aperiodic logarithmic signatures. 23-35 - Hassan Qahur Al Mahri, Leonie Simpson
, Harry Bartlett
, Ed Dawson
, Kenneth Koon-Ho Wong
:
A fundamental flaw in the ++AE authenticated encryption mode. 37-42 - Sabyasachi Dey
, Santanu Sarkar
:
Generalization of Roos bias in RC4 and some results on key-keystream relations. 43-56 - Thalia M. Laing, Douglas R. Stinson:
A survey and refinement of repairable threshold schemes. 57-81
Volume 12, Number 2, June 2018
- Georgios Fotiadis, Elisavet Konstantinou:
Generating pairing-friendly elliptic curve parameters using sparse families. 83-99 - Prabhat Kushwaha:
Improved lower bound for Diffie-Hellman problem using multiplicative group of a finite field as auxiliary group. 101-118
Volume 12, Number 3, September 2018
- Wachirapong Jirakitpuwapat
, Parin Chaipunya
, Poom Kumam
, Sompong Dhompongsa, Phatiphat Thounthong
:
New methods of construction of cartesian authentication codes from geometries over finite commutative rings. 119-136 - Matvei Kotov
, Alexander Ushakov
:
Analysis of a key exchange protocol based on tropical matrix algebra. 137-141 - Håvard Raddum
, Pavol Zajac
:
MRHS solver based on linear algebra and exhaustive search. 143-157 - Sanjit Chatterjee, M. Prem Laxman Das
, R. Kabaleeshwaran:
Converting pairing-based cryptosystems from composite to prime order setting - A comparative analysis. 159-190
Volume 12, Number 4, December 2018
- Eduardo Carvalho Pinto, Christophe Petit
:
Better path-finding algorithms in LPS Ramanujan graphs. 191-202 - Maura B. Paterson
, Douglas R. Stinson, Jalaj Upadhyay:
Multi-prover proof of retrievability. 203-220 - Gustavo Banegas, Paulo S. L. M. Barreto, Brice Odilon Boidje, Pierre-Louis Cayrel, Gilbert Ndollane Dione, Kris Gaj, Cheikh Thiécoumba Gueye, Richard Haeussler, Jean Belo Klamti, Ousmane Ndiaye
, Duc Tri Nguyen, Edoardo Persichetti
, Jefferson E. Ricardini
:
DAGS: Key encapsulation using dyadic GS codes. 221-239 - Avik Chakraborti, Nilanjan Datta, Mridul Nandi
:
On the optimality of non-linear computations for symmetric key primitives. 241-259

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.