default search action
Journal of Mathematical Cryptology, Volume 6
Volume 6, Number 1, June 2012
- Robert P. Gallant:
Finding discrete logarithms with a set orbit distinguisher. 1-20 - Barbara Baumeister, Jan de Wiljes:
Aperiodic logarithmic signatures. 21-37 - Tzer-jen Wei, Lih-Chung Wang:
A fast mental poker protocol. 39-68 - Gérard Maze:
Analysis of a key distribution scheme in secure multicasting. 69-80
Volume 6, Number 2, October 2012
- John Boxall:
Heuristics on pairing-friendly elliptic curves. 81-104 - Alyssa Brown, Thomas W. Cusick:
Recursive weights for some Boolean functions. 105-135 - Sean Murphy:
The effectiveness of the linear hull effect. 137-147 - Edoardo Persichetti:
Compact McEliece keys based on quasi-dyadic Srivastava codes. 149-169 - Matan Banin, Boaz Tsaban:
The discrete logarithm problem in Bergman's non-representable ring. 171-182
Volume 6, Number 3-4, December 2012
- Reza Sepahi, Josef Pieprzyk, Siamak Fayyaz Shahandashti, Berry Schoenmakers:
New security notions and relations for public-key encryption. 183-227 - Nicky Mouha, Gautham Sekar, Bart Preneel:
Challenging the increased resistance of regular hash functions against birthday attacks. 229-248 - Keiji Okano:
On the ρ-values of complete families of pairing-friendly elliptic curves. 249-268
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.