


default search action
Journal of Mathematical Cryptology, Volume 14
Volume 14, Number 1, June 2020
- Jung Hee Cheon, Kristin E. Lauter, Donggeon Yhee:
Preface to the First Annual MathCrypt Proceedings Volume. 1-4 - Dan Boneh, Darren B. Glass, Daniel Krashen
, Kristin E. Lauter, Shahed Sharif, Alice Silverberg, Mehdi Tibouchi, Mark Zhandry:
Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves. 5-14 - Houda Ferradi, Rémi Géraud
, Sylvain Guilley, David Naccache, Mehdi Tibouchi:
Recovering Secrets From Prefix-Dependent Leakage. 15-24 - Ming-Deh A. Huang, Michiel Kosters, Christophe Petit
, Sze Ling Yeo, Yang Yun:
Quasi-subfield Polynomials and the Elliptic Curve Discrete Logarithm Problem. 25-38 - Jeffrey Hoffstein
, Joseph H. Silverman, William Whyte, Zhenfei Zhang:
A signature scheme from the finite field isomorphism problem. 39-54 - Carl Bootland, Wouter Castryck
, Ilia Iliashenko, Frederik Vercauteren:
Efficiently Processing Complex-Valued Data in Homomorphic Encryption. 55-65 - Yarkin Doröz, Berk Sunar:
Flattening NTRU for Evaluation Key Free Homomorphic Encryption. 66-83 - Masaya Yasuda:
Self-dual DeepBKZ for finding short lattice vectors. 84-94 - Gustavo Banegas, Paulo S. L. M. Barreto, Edoardo Persichetti
, Paolo Santini
:
Designing Efficient Dyadic Operations for Cryptographic Applications. 95-109 - Gabrielle De Micheli
, Nadia Heninger, Barak Shani:
Characterizing overstretched NTRU attacks. 110-119 - David Urbanik, David Jao
:
New Techniques for SIDH-based NIKE. 120-128 - David Jao
, Jason T. LeGrow
, Christopher Leonardi, Luis Ruiz-Lopez
:
A subexponential-time, polynomial quantum space algorithm for inverting the CM group action. 129-138 - (Withdrawn) An elementary proof of Fermat's last theorem for all even exponents. 139-142
- Retraction of: An elementary proof of Fermat's Last Theorem for all even exponents. 143
- Neha Goel, Indivar Gupta, Bal Kishan Dass:
Survey on SAP and its application in public-key cryptography. 144-152 - Liang Feng Zhang, Reihaneh Safavi-Naini:
Privacy-preserving verifiable delegation of polynomial and matrix functions. 153-171 - Suvradip Chakraborty, Janaka Alawatugoda
, Chandrasekaran Pandu Rangan:
New approach to practical leakage-resilient public-key cryptography. 172-201 - Carl Bootland
, Wouter Castryck
, Alan Szepieniec, Frederik Vercauteren
:
A framework for cryptographic problems from linear algebra. 202-217 - Jean-Sébastien Coron, Agnese Gini
:
Improved cryptanalysis of the AJPS Mersenne based cryptosystem. 218-223 - Éric Brier, Houda Ferradi, Marc Joye, David Naccache:
New number-theoretic cryptographic primitives. 224-235 - Hayley Tomkins, Monica Nevins
, Hadi Salmasian:
New Zémor-Tillich Type Hash Functions Over GL2 (𝔽pn). 236-253 - Marc Joye:
Protecting ECC Against Fault Attacks: The Ring Extension Method Revisited. 254-267 - Wouter Castryck
, Thomas Decru
, Benjamin Smith
:
Hash functions from superspecial genus-2 curves using Richelot isogenies. 268-292 - Claire Delaplace, Alexander May
:
Can we Beat the Square Root Bound for ECDLP over 𝔽p2 via Representation? 293-306 - Maciej Grzeskowiak
:
A variant of the large sieve inequality with explicit constants. 307-315 - Christina Boura, Nicolas Gama, Mariya Georgieva, Dimitar Jetchev:
CHIMERA: Combining Ring-LWE-based Fully Homomorphic Encryption Schemes. 316-338 - Taechan Kim
, Mehdi Tibouchi:
Equidistribution Among Cosets of Elliptic Curve Points in Intervals. 339-345 - Jacek Pomykala, Maciej Radziejewski
:
Integer factoring and compositeness witnesses. 346-358 - Andrea Lesavourey
, Thomas Plantard
, Willy Susilo
:
Short Principal Ideal Problem in multicubic fields. 359-392 - Antoine Joux, Jacek Pomykala:
Preface for the Number-Theoretic Methods in Cryptology conferences. 393-396 - Jung Hee Cheon, Wonhee Cho
, Minki Hhan, Jiseung Kim
, Changmin Lee:
Algorithms for CRT-variant of Approximate Greatest Common Divisor Problem. 397-413 - Leonardo Colò
, David Kohel:
Orienting supersingular isogeny graphs. 414-437 - Giovanni Di Crescenzo, Matluba Khodjaeva, Delaram Kahrobaei
, Vladimir Shpilrain:
Delegating a Product of Group Exponentiations with Application to Signature Schemes (Submission to Special NutMiC 2019 Issue of JMC). 438-459 - Kazuhiro Yokoyama, Masaya Yasuda, Yasushi Takahashi, Jun Kogure:
Complexity bounds on Semaev's naive index calculus method for ECDLP. 460-485

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.