


default search action
Journal of Mathematical Cryptology, Volume 7
Volume 7, Number 1, July 2013
- Tamir Tassa, Ayman Jarrous, Yonatan Ben-Ya'akov:
Oblivious evaluation of multivariate polynomials. 1-29 - Steven D. Galbraith
, Chang-An Zhao
:
Self-pairings on hyperelliptic curves. 31-42 - Jean-Pierre Flori, Sihem Mesnager:
An efficient characterization of a family of hyper-bent functions with multiple trace terms. 43-68 - Tianze Wang, Dongdai Lin:
A method for counting the number of polynomial equivalence classes. 69-95
Volume 7, Number 2, September 2013
- Rebecca E. Field, Brant C. Jones:
Using carry-truncated addition to analyze add-rotate-xor hash algorithms. 97-110 - Yanling Chen, Danilo Gligoroski, Svein J. Knapskog:
On a special class of multivariate quadratic quasigroups (MQQs). 111-141 - Motahhareh Gharahi, Massoud Hadian Dehkordi:
Perfect secret sharing schemes for graph access structures on six participants. 143-146 - Reiner Staszewski, Tran van Trung:
Strongly aperiodic logarithmic signatures. 147-179
Volume 7, Number 3, October 2013
- Spyros S. Magliveras:
Foreword. 181-182 - Maura B. Paterson
, Douglas R. Stinson, Jalaj Upadhyay:
A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage. 183-216 - Otokar Grosek
, Stefan Porubský
:
Coprime solutions to ax≡b (mod n). 217-224 - Neal Koblitz, Alfred Menezes:
Another look at HMAC. 225-251 - Mufeed Al Mashrafi, Harry Bartlett
, Ed Dawson
, Leonie Simpson
, Kenneth Koon-Ho Wong
:
Indirect message injection for MAC generation. 253-277
Volume 7, Number 4, December 2013
- Mahabir Prasad Jhanwar
, Reihaneh Safavi-Naini:
Unconditionally-secure ideal robust secret sharing schemes for threshold and multilevel access structure. 279-296 - Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong:
New leakage-resilient CCA-secure public key encryption. 297-312 - Mohammad Ali Orumiehchiha, Josef Pieprzyk
, Ron Steinfeld, Harry Bartlett
:
Security analysis of linearly filtered NLFSRs. 313-332 - Joachim von zur Gathen, Igor E. Shparlinski
:
Generating safe primes. 333-365 - Pavol Zajac
:
A new method to solve MRHS equation systems and its connection to group factorization. 367-381

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.