default search action
Journal of Mathematical Cryptology, Volume 16
Volume 16, Number 1, 2022
- Yu Zhou, Jianyong Hu, Xudong Miao, Yu Han, Fuzhong Zhang:
On the confusion coefficient of Boolean functions. 1-13 - Andrea Basso, Fabien Pazuki:
On the supersingular GPST attack. 14-19 - Paolo Santini, Edoardo Persichetti, Marco Baldi:
Reproducible families of codes and cryptographic applications. 20-48 - Matthew J. Craven, John R. Woodward:
Evolution of group-theoretic cryptology attacks using hyper-heuristics. 49-63 - Nael Rahman, Vladimir Shpilrain:
MAKE: A matrix action key exchange. 64-72 - Bishwajit Chakraborty, Mridul Nandi:
The mF mode of authenticated encryption with associated data. 73-97 - Daniel R. L. Brown, Neal Koblitz, Jason T. LeGrow:
Cryptanalysis of "MAKE". 98-102 - Mingping Qi:
An efficient post-quantum KEM from CSIDH. 103-113 - Mikhail Anokhin:
Pseudo-free families and cryptographic primitives. 114-140 - Simran Tinani, Joachim Rosenthal:
A deterministic algorithm for the discrete logarithm problem in a semigroup. 141-155 - Samed Düzlü, Juliane Krämer:
Application of automorphic forms to lattice problems. 156-197 - Prasanna Raghaw Mishra, Shashi Kant Pandey:
On the algebraic immunity of multiplexer Boolean functions. 198-204 - Javad Sharafi, Hassan Daghigh:
A Ring-LWE-based digital signature inspired by Lindner-Peikert scheme. 205-214 - Liljana Babinkostova, Ariana Chin, Aaron Kirtland, Vladyslav Nazarchuk, Esther Plotnick:
The polynomial learning with errors problem and the smearing condition. 215-232 - Carolina Mejía, Juan Andrés Montoya:
Abelian sharing, common informations, and linear rank inequalities. 233-250 - Srinivas Vivek, Shyam Murthy, Deepak Kumaraswamy:
Integer polynomial recovery from outputs and its application to cryptanalysis of a protocol for secure sorting. 251-277 - Jiao Han, Jincheng Zhuang:
DLP in semigroups: Algorithms and lower bounds. 278-288 - Christopher Battarbee, Delaram Kahrobaei, Dylan Tailor, Siamak F. Shahandashti:
On the efficiency of a general attack against the MOBS cryptosystem. 289-297 - Dmitrii I. Koshelev:
The most efficient indifferentiable hashing to elliptic curves ofj-invariant 1728. 298-309 - Madhu Dadhwal, Pankaj:
Group codes over binary tetrahedral group. 310-319
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.