default search action
Search dblp for Publications
export results for "stream:journals/jmc:"
@article{DBLP:journals/jmc/CalderiniCI24, author = {Marco Calderini and Roberto Civino and Riccardo Invernizzi}, title = {Differential experiments using parallel alternative operations}, journal = {J. Math. Cryptol.}, volume = {18}, number = {1}, year = {2024}, url = {https://doi.org/10.1515/jmc-2023-0030}, doi = {10.1515/JMC-2023-0030}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/CalderiniCI24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/CalderiniLSV24, author = {Marco Calderini and Riccardo Longo and Massimiliano Sala and Irene Villa}, title = {Searchable encryption with randomized ciphertext and randomized keyword search}, journal = {J. Math. Cryptol.}, volume = {18}, number = {1}, year = {2024}, url = {https://doi.org/10.1515/jmc-2023-0029}, doi = {10.1515/JMC-2023-0029}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/CalderiniLSV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/CianfrigliaOP24, author = {Marco Cianfriglia and Elia Onofri and Marco Pedicini}, title = {mRLWE-CP-ABE: {A} revocable {CP-ABE} for post-quantum cryptography}, journal = {J. Math. Cryptol.}, volume = {18}, number = {1}, year = {2024}, url = {https://doi.org/10.1515/jmc-2023-0026}, doi = {10.1515/JMC-2023-0026}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/CianfrigliaOP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/ErdelyiHKN24, author = {M{\'{a}}rton Erd{\'{e}}lyi and P{\'{a}}l Heged{\"{u}}s and S{\'{a}}ndor Z. Kiss and G{\'{a}}bor P{\'{e}}ter Nagy}, title = {On linear codes with random multiplier vectors and the maximum trace dimension property}, journal = {J. Math. Cryptol.}, volume = {18}, number = {1}, year = {2024}, url = {https://doi.org/10.1515/jmc-2023-0022}, doi = {10.1515/JMC-2023-0022}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/ErdelyiHKN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/GhantousPV24, author = {Wissam Ghantous and Federico Pintore and Mattia Veroni}, title = {Efficiency of SIDH-based signatures (yes, {SIDH)}}, journal = {J. Math. Cryptol.}, volume = {18}, number = {1}, year = {2024}, url = {https://doi.org/10.1515/jmc-2023-0023}, doi = {10.1515/JMC-2023-0023}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/GhantousPV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/RouquetteMS24, author = {Lo{\"{\i}}c Rouquette and Marine Minier and Christine Solnon}, title = {Automatic boomerang attacks search on Rijndael}, journal = {J. Math. Cryptol.}, volume = {18}, number = {1}, year = {2024}, url = {https://doi.org/10.1515/jmc-2023-0027}, doi = {10.1515/JMC-2023-0027}, timestamp = {Wed, 20 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/RouquetteMS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/SalaT24, author = {Massimiliano Sala and Daniele Taufer}, title = {Group structure of elliptic curves over {\(\mathbb{Z}\)}/N{\(\mathbb{Z}\)}}, journal = {J. Math. Cryptol.}, volume = {18}, number = {1}, year = {2024}, url = {https://doi.org/10.1515/jmc-2023-0025}, doi = {10.1515/JMC-2023-0025}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/SalaT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Timpanella24, author = {Marco Timpanella}, title = {On a generalization of the Deligne-Lusztig curve of Suzuki type and application to {AG} codes}, journal = {J. Math. Cryptol.}, volume = {18}, number = {1}, year = {2024}, url = {https://doi.org/10.1515/jmc-2023-0024}, doi = {10.1515/JMC-2023-0024}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/Timpanella24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/YamashitaH24, author = {Kyosuke Yamashita and Keisuke Hara}, title = {On the Black-Box impossibility of multi-designated verifiers signature schemes from ring signature schemes}, journal = {J. Math. Cryptol.}, volume = {18}, number = {1}, year = {2024}, url = {https://doi.org/10.1515/jmc-2023-0028}, doi = {10.1515/JMC-2023-0028}, timestamp = {Wed, 20 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/YamashitaH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Brown23, author = {Daniel R. L. Brown}, title = {Plactic key agreement (insecure?)}, journal = {J. Math. Cryptol.}, volume = {17}, number = {1}, year = {2023}, url = {https://doi.org/10.1515/jmc-2022-0010}, doi = {10.1515/JMC-2022-0010}, timestamp = {Fri, 17 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/Brown23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Anokhin22, author = {Mikhail Anokhin}, title = {Pseudo-free families and cryptographic primitives}, journal = {J. Math. Cryptol.}, volume = {16}, number = {1}, pages = {114--140}, year = {2022}, url = {https://doi.org/10.1515/jmc-2020-0055}, doi = {10.1515/JMC-2020-0055}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/Anokhin22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/BabinkostovaCKN22, author = {Liljana Babinkostova and Ariana Chin and Aaron Kirtland and Vladyslav Nazarchuk and Esther Plotnick}, title = {The polynomial learning with errors problem and the smearing condition}, journal = {J. Math. Cryptol.}, volume = {16}, number = {1}, pages = {215--232}, year = {2022}, url = {https://doi.org/10.1515/jmc-2020-0035}, doi = {10.1515/JMC-2020-0035}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/BabinkostovaCKN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/BassoP22, author = {Andrea Basso and Fabien Pazuki}, title = {On the supersingular {GPST} attack}, journal = {J. Math. Cryptol.}, volume = {16}, number = {1}, pages = {14--19}, year = {2022}, url = {https://doi.org/10.1515/jmc-2021-0020}, doi = {10.1515/JMC-2021-0020}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/BassoP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/BattarbeeKTS22, author = {Christopher Battarbee and Delaram Kahrobaei and Dylan Tailor and Siamak F. Shahandashti}, title = {On the efficiency of a general attack against the {MOBS} cryptosystem}, journal = {J. Math. Cryptol.}, volume = {16}, number = {1}, pages = {289--297}, year = {2022}, url = {https://doi.org/10.1515/jmc-2021-0050}, doi = {10.1515/JMC-2021-0050}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/BattarbeeKTS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/BrownKL22, author = {Daniel R. L. Brown and Neal Koblitz and Jason T. LeGrow}, title = {Cryptanalysis of "MAKE"}, journal = {J. Math. Cryptol.}, volume = {16}, number = {1}, pages = {98--102}, year = {2022}, url = {https://doi.org/10.1515/jmc-2021-0016}, doi = {10.1515/JMC-2021-0016}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/BrownKL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/ChakrabortyN22, author = {Bishwajit Chakraborty and Mridul Nandi}, title = {The mF mode of authenticated encryption with associated data}, journal = {J. Math. Cryptol.}, volume = {16}, number = {1}, pages = {73--97}, year = {2022}, url = {https://doi.org/10.1515/jmc-2020-0054}, doi = {10.1515/JMC-2020-0054}, timestamp = {Mon, 26 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/ChakrabortyN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/CravenW22, author = {Matthew J. Craven and John R. Woodward}, title = {Evolution of group-theoretic cryptology attacks using hyper-heuristics}, journal = {J. Math. Cryptol.}, volume = {16}, number = {1}, pages = {49--63}, year = {2022}, url = {https://doi.org/10.1515/jmc-2021-0017}, doi = {10.1515/JMC-2021-0017}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/CravenW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/DadhwalP22, author = {Madhu Dadhwal and Pankaj}, title = {Group codes over binary tetrahedral group}, journal = {J. Math. Cryptol.}, volume = {16}, number = {1}, pages = {310--319}, year = {2022}, url = {https://doi.org/10.1515/jmc-2022-0009}, doi = {10.1515/JMC-2022-0009}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/DadhwalP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/DuzluK22, author = {Samed D{\"{u}}zl{\"{u}} and Juliane Kr{\"{a}}mer}, title = {Application of automorphic forms to lattice problems}, journal = {J. Math. Cryptol.}, volume = {16}, number = {1}, pages = {156--197}, year = {2022}, url = {https://doi.org/10.1515/jmc-2021-0045}, doi = {10.1515/JMC-2021-0045}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/DuzluK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/HanZ22, author = {Jiao Han and Jincheng Zhuang}, title = {{DLP} in semigroups: Algorithms and lower bounds}, journal = {J. Math. Cryptol.}, volume = {16}, number = {1}, pages = {278--288}, year = {2022}, url = {https://doi.org/10.1515/jmc-2021-0049}, doi = {10.1515/JMC-2021-0049}, timestamp = {Sun, 07 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/HanZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Koshelev22, author = {Dmitrii I. Koshelev}, title = {The most efficient indifferentiable hashing to elliptic curves of\emph{j}-invariant 1728}, journal = {J. Math. Cryptol.}, volume = {16}, number = {1}, pages = {298--309}, year = {2022}, url = {https://doi.org/10.1515/jmc-2021-0051}, doi = {10.1515/JMC-2021-0051}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/Koshelev22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/MejiaM22, author = {Carolina Mej{\'{\i}}a and Juan Andr{\'{e}}s Montoya}, title = {Abelian sharing, common informations, and linear rank inequalities}, journal = {J. Math. Cryptol.}, volume = {16}, number = {1}, pages = {233--250}, year = {2022}, url = {https://doi.org/10.1515/jmc-2022-0020}, doi = {10.1515/JMC-2022-0020}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/MejiaM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/MishraP22, author = {Prasanna Raghaw Mishra and Shashi Kant Pandey}, title = {On the algebraic immunity of multiplexer Boolean functions}, journal = {J. Math. Cryptol.}, volume = {16}, number = {1}, pages = {198--204}, year = {2022}, url = {https://doi.org/10.1515/jmc-2021-0027}, doi = {10.1515/JMC-2021-0027}, timestamp = {Fri, 25 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/MishraP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Qi22, author = {Mingping Qi}, title = {An efficient post-quantum {KEM} from {CSIDH}}, journal = {J. Math. Cryptol.}, volume = {16}, number = {1}, pages = {103--113}, year = {2022}, url = {https://doi.org/10.1515/jmc-2022-0007}, doi = {10.1515/JMC-2022-0007}, timestamp = {Mon, 26 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/Qi22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/RahmanS22, author = {Nael Rahman and Vladimir Shpilrain}, title = {{MAKE:} {A} matrix action key exchange}, journal = {J. Math. Cryptol.}, volume = {16}, number = {1}, pages = {64--72}, year = {2022}, url = {https://doi.org/10.1515/jmc-2020-0053}, doi = {10.1515/JMC-2020-0053}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/RahmanS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/SantiniPB22, author = {Paolo Santini and Edoardo Persichetti and Marco Baldi}, title = {Reproducible families of codes and cryptographic applications}, journal = {J. Math. Cryptol.}, volume = {16}, number = {1}, pages = {20--48}, year = {2022}, url = {https://doi.org/10.1515/jmc-2020-0003}, doi = {10.1515/JMC-2020-0003}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/SantiniPB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/SharafiD22, author = {Javad Sharafi and Hassan Daghigh}, title = {A Ring-LWE-based digital signature inspired by Lindner-Peikert scheme}, journal = {J. Math. Cryptol.}, volume = {16}, number = {1}, pages = {205--214}, year = {2022}, url = {https://doi.org/10.1515/jmc-2021-0013}, doi = {10.1515/JMC-2021-0013}, timestamp = {Mon, 26 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/SharafiD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/TinaniR22, author = {Simran Tinani and Joachim Rosenthal}, title = {A deterministic algorithm for the discrete logarithm problem in a semigroup}, journal = {J. Math. Cryptol.}, volume = {16}, number = {1}, pages = {141--155}, year = {2022}, url = {https://doi.org/10.1515/jmc-2021-0022}, doi = {10.1515/JMC-2021-0022}, timestamp = {Mon, 26 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/TinaniR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/VivekMK22, author = {Srinivas Vivek and Shyam Murthy and Deepak Kumaraswamy}, title = {Integer polynomial recovery from outputs and its application to cryptanalysis of a protocol for secure sorting}, journal = {J. Math. Cryptol.}, volume = {16}, number = {1}, pages = {251--277}, year = {2022}, url = {https://doi.org/10.1515/jmc-2021-0054}, doi = {10.1515/JMC-2021-0054}, timestamp = {Mon, 26 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/VivekMK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/ZhouHMHZ21, author = {Yu Zhou and Jianyong Hu and Xudong Miao and Yu Han and Fuzhong Zhang}, title = {On the confusion coefficient of Boolean functions}, journal = {J. Math. Cryptol.}, volume = {16}, number = {1}, pages = {1--13}, year = {2022}, url = {https://doi.org/10.1515/jmc-2021-0012}, doi = {10.1515/JMC-2021-0012}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/ZhouHMHZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Anokhin20, author = {Mikhail Anokhin}, title = {Pseudo-free families of computational universal algebras}, journal = {J. Math. Cryptol.}, volume = {15}, number = {1}, pages = {197--222}, year = {2021}, url = {https://doi.org/10.1515/jmc-2020-0014}, doi = {10.1515/JMC-2020-0014}, timestamp = {Tue, 24 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/Anokhin20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/AraujoN20, author = {Filipe Ara{\'{u}}jo and Samuel Neves}, title = {The circulant hash revisited}, journal = {J. Math. Cryptol.}, volume = {15}, number = {1}, pages = {250--257}, year = {2021}, url = {https://doi.org/10.1515/jmc-2018-0054}, doi = {10.1515/JMC-2018-0054}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/AraujoN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/BhattacharjeeLL21, author = {Arghya Bhattacharjee and Cuauhtemoc Mancillas L{\'{o}}pez and Eik List and Mridul Nandi}, title = {The Oribatida v1.3 Family of Lightweight Authenticated Encryption Schemes}, journal = {J. Math. Cryptol.}, volume = {15}, number = {1}, pages = {305--344}, year = {2021}, url = {https://doi.org/10.1515/jmc-2020-0018}, doi = {10.1515/JMC-2020-0018}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/BhattacharjeeLL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/BiasseBPSY20, author = {Jean{-}Fran{\c{c}}ois Biasse and Xavier Bonnetain and Benjamin Pring and Andr{\'{e}} Schrottenloher and William Youmans}, title = {A trade-off between classical and quantum circuit size for an attack against {CSIDH}}, journal = {J. Math. Cryptol.}, volume = {15}, number = {1}, pages = {4--17}, year = {2021}, url = {https://doi.org/10.1515/jmc-2020-0070}, doi = {10.1515/JMC-2020-0070}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/BiasseBPSY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/BiasseP20, author = {Jean{-}Fran{\c{c}}ois Biasse and Benjamin Pring}, title = {A framework for reducing the overhead of the quantum oracle for use with Grover's algorithm with applications to cryptanalysis of {SIKE}}, journal = {J. Math. Cryptol.}, volume = {15}, number = {1}, pages = {143--156}, year = {2021}, url = {https://doi.org/10.1515/jmc-2020-0080}, doi = {10.1515/JMC-2020-0080}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/BiasseP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/BroonDFM21, author = {Fouazou Lontouo Perez Broon and Thinh Dang and Emmanuel Fouotsa and Dustin Moody}, title = {Isogenies on twisted Hessian curves}, journal = {J. Math. Cryptol.}, volume = {15}, number = {1}, pages = {345--358}, year = {2021}, url = {https://doi.org/10.1515/jmc-2020-0037}, doi = {10.1515/JMC-2020-0037}, timestamp = {Wed, 25 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/BroonDFM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/CascudoS21, author = {Ignacio Cascudo and Reto Schnyder}, title = {A note on secure multiparty computation via higher residue symbols}, journal = {J. Math. Cryptol.}, volume = {15}, number = {1}, pages = {284--297}, year = {2021}, url = {https://doi.org/10.1515/jmc-2020-0013}, doi = {10.1515/JMC-2020-0013}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/CascudoS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/CheonLS20, author = {Jung Hee Cheon and Kristin E. Lauter and Yongsoo Song}, title = {Editor's Preface for the Second Annual MathCrypt Proceedings Volume}, journal = {J. Math. Cryptol.}, volume = {15}, number = {1}, pages = {1--3}, year = {2021}, url = {https://doi.org/10.1515/jmc-2020-0170}, doi = {10.1515/JMC-2020-0170}, timestamp = {Tue, 24 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/CheonLS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Csirmaz20, author = {L{\'{a}}szl{\'{o}} Csirmaz}, title = {Secret sharing and duality}, journal = {J. Math. Cryptol.}, volume = {15}, number = {1}, pages = {157--173}, year = {2021}, url = {https://doi.org/10.1515/jmc-2019-0045}, doi = {10.1515/JMC-2019-0045}, timestamp = {Tue, 24 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/Csirmaz20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Dachman-SoledGK20, author = {Dana Dachman{-}Soled and Huijing Gong and Mukul Kulkarni and Aria Shahverdi}, title = {(In)Security of Ring-LWE Under Partial Key Exposure}, journal = {J. Math. Cryptol.}, volume = {15}, number = {1}, pages = {72--86}, year = {2021}, url = {https://doi.org/10.1515/jmc-2020-0075}, doi = {10.1515/JMC-2020-0075}, timestamp = {Tue, 24 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/Dachman-SoledGK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Dachman-SoledGK20a, author = {Dana Dachman{-}Soled and Huijing Gong and Mukul Kulkarni and Aria Shahverdi}, title = {Towards a Ring Analogue of the Leftover Hash Lemma}, journal = {J. Math. Cryptol.}, volume = {15}, number = {1}, pages = {87--110}, year = {2021}, url = {https://doi.org/10.1515/jmc-2020-0076}, doi = {10.1515/JMC-2020-0076}, timestamp = {Tue, 24 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/Dachman-SoledGK20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/DugardinSG21, author = {Margaux Dugardin and Werner Schindler and Sylvain Guilley}, title = {Stochastic methods defeat regular {RSA} exponentiation algorithms with combined blinding methods}, journal = {J. Math. Cryptol.}, volume = {15}, number = {1}, pages = {408--433}, year = {2021}, url = {https://doi.org/10.1515/jmc-2020-0010}, doi = {10.1515/JMC-2020-0010}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/DugardinSG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Ekera21, author = {Martin Eker{\aa}}, title = {Quantum algorithms for computing general discrete logarithms and orders with tradeoffs}, journal = {J. Math. Cryptol.}, volume = {15}, number = {1}, pages = {359--407}, year = {2021}, url = {https://doi.org/10.1515/jmc-2020-0006}, doi = {10.1515/JMC-2020-0006}, timestamp = {Wed, 25 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/Ekera21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/JoyeLNN20, author = {Marc Joye and Oleksandra Lapiha and Ky Nguyen and David Naccache}, title = {The Eleventh Power Residue Symbol}, journal = {J. Math. Cryptol.}, volume = {15}, number = {1}, pages = {111--122}, year = {2021}, url = {https://doi.org/10.1515/jmc-2020-0077}, doi = {10.1515/JMC-2020-0077}, timestamp = {Tue, 24 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/JoyeLNN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/KotovMU20, author = {Matvei Kotov and Anton Menshov and Alexander Ushakov}, title = {Attack on Kayawood protocol: uncloaking private keys}, journal = {J. Math. Cryptol.}, volume = {15}, number = {1}, pages = {237--249}, year = {2021}, url = {https://doi.org/10.1515/jmc-2019-0015}, doi = {10.1515/JMC-2019-0015}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/KotovMU20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Laarhoven20, author = {Thijs Laarhoven}, title = {Approximate Voronoi cells for lattices, revisited}, journal = {J. Math. Cryptol.}, volume = {15}, number = {1}, pages = {60--71}, year = {2021}, url = {https://doi.org/10.1515/jmc-2020-0074}, doi = {10.1515/JMC-2020-0074}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/Laarhoven20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/LuoA21, author = {Fucai Luo and Saif M. Al{-}Kuwari}, title = {Revocable attribute-based proxy re-encryption}, journal = {J. Math. Cryptol.}, volume = {15}, number = {1}, pages = {465--482}, year = {2021}, url = {https://doi.org/10.1515/jmc-2020-0039}, doi = {10.1515/JMC-2020-0039}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/LuoA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/McGuireR20, author = {Gary McGuire and Ois{\'{\i}}n Robinson}, title = {Lattice Sieving in Three Dimensions for Discrete Log in Medium Characteristic}, journal = {J. Math. Cryptol.}, volume = {15}, number = {1}, pages = {223--236}, year = {2021}, url = {https://doi.org/10.1515/jmc-2020-0008}, doi = {10.1515/JMC-2020-0008}, timestamp = {Tue, 24 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/McGuireR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/MurphyP20, author = {Sean Murphy and Rachel Player}, title = {Discretisation and Product Distributions in Ring-LWE}, journal = {J. Math. Cryptol.}, volume = {15}, number = {1}, pages = {45--59}, year = {2021}, url = {https://doi.org/10.1515/jmc-2020-0073}, doi = {10.1515/JMC-2020-0073}, timestamp = {Tue, 24 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/MurphyP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/PandeyGS20, author = {Atul Pandey and Indivar Gupta and Dhiraj Kumar Singh}, title = {Improved cryptanalysis of a ElGamal Cryptosystem Based on Matrices Over Group Rings}, journal = {J. Math. Cryptol.}, volume = {15}, number = {1}, pages = {266--279}, year = {2021}, url = {https://doi.org/10.1515/jmc-2019-0054}, doi = {10.1515/JMC-2019-0054}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/PandeyGS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/PatersonS20, author = {Maura B. Paterson and Douglas R. Stinson}, title = {On the equivalence of authentication codes and robust (2, 2)-threshold schemes}, journal = {J. Math. Cryptol.}, volume = {15}, number = {1}, pages = {179--196}, year = {2021}, url = {https://doi.org/10.1515/jmc-2019-0048}, doi = {10.1515/JMC-2019-0048}, timestamp = {Tue, 24 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/PatersonS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Reid21, author = {Elizabeth M. Reid}, title = {Using Inclusion / Exclusion to find Bent and Balanced Monomial Rotation Symmetric Functions}, journal = {J. Math. Cryptol.}, volume = {15}, number = {1}, pages = {298--304}, year = {2021}, url = {https://doi.org/10.1515/jmc-2020-0021}, doi = {10.1515/JMC-2020-0021}, timestamp = {Wed, 25 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/Reid21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/RudyM20, author = {Dylan Rudy and Chris Monico}, title = {Remarks on a Tropical Key Exchange System}, journal = {J. Math. Cryptol.}, volume = {15}, number = {1}, pages = {280--283}, year = {2021}, url = {https://doi.org/10.1515/jmc-2019-0061}, doi = {10.1515/JMC-2019-0061}, timestamp = {Tue, 24 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/RudyM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/ScalaSS20, author = {Antonio J. Di Scala and Carlo Sanna and Edoardo Signorini}, title = {On the condition number of the Vandermonde matrix of the nth cyclotomic polynomial}, journal = {J. Math. Cryptol.}, volume = {15}, number = {1}, pages = {174--178}, year = {2021}, url = {https://doi.org/10.1515/jmc-2020-0009}, doi = {10.1515/JMC-2020-0009}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/ScalaSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Sica20, author = {Francesco Sica}, title = {Factoring with Hints}, journal = {J. Math. Cryptol.}, volume = {15}, number = {1}, pages = {123--130}, year = {2021}, url = {https://doi.org/10.1515/jmc-2020-0078}, doi = {10.1515/JMC-2020-0078}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/Sica20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/TakahashiKFIYY20, author = {Yasushi Takahashi and Momonari Kudo and Ryoya Fukasaku and Yasuhiko Ikematsu and Masaya Yasuda and Kazuhiro Yokoyama}, title = {Algebraic approaches for solving isogeny problems of prime power degrees}, journal = {J. Math. Cryptol.}, volume = {15}, number = {1}, pages = {31--44}, year = {2021}, url = {https://doi.org/10.1515/jmc-2020-0072}, doi = {10.1515/JMC-2020-0072}, timestamp = {Tue, 24 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/TakahashiKFIYY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/TaraskinSJL20, author = {Oleg Taraskin and Vladimir Soukharev and David Jao and Jason T. LeGrow}, title = {Towards Isogeny-Based Password-Authenticated Key Establishment}, journal = {J. Math. Cryptol.}, volume = {15}, number = {1}, pages = {18--30}, year = {2021}, url = {https://doi.org/10.1515/jmc-2020-0071}, doi = {10.1515/JMC-2020-0071}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/TaraskinSJL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/TibouchiW20, author = {Mehdi Tibouchi and Alexandre Wallet}, title = {One Bit is All It Takes: {A} Devastating Timing Attack on BLISS's Non-Constant Time Sign Flips}, journal = {J. Math. Cryptol.}, volume = {15}, number = {1}, pages = {131--142}, year = {2021}, url = {https://doi.org/10.1515/jmc-2020-0079}, doi = {10.1515/JMC-2020-0079}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/TibouchiW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/XiaoLD21, author = {Guanju Xiao and Lixia Luo and Yingpu Deng}, title = {Constructing Cycles in Isogeny Graphs of Supersingular Elliptic Curves}, journal = {J. Math. Cryptol.}, volume = {15}, number = {1}, pages = {454--464}, year = {2021}, url = {https://doi.org/10.1515/jmc-2020-0029}, doi = {10.1515/JMC-2020-0029}, timestamp = {Wed, 25 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/XiaoLD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/ZhangLA21, author = {Jing Zhang and Yuan Li and John O. Adeyeye}, title = {Sensitivities and block sensitivities of elementary symmetric Boolean functions}, journal = {J. Math. Cryptol.}, volume = {15}, number = {1}, pages = {434--453}, year = {2021}, url = {https://doi.org/10.1515/jmc-2020-0042}, doi = {10.1515/JMC-2020-0042}, timestamp = {Wed, 25 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/ZhangLA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/ZhouMD20, author = {Yu Zhou and Daoguang Mu and Xinfeng Dong}, title = {On cryptographic properties of (n + 1)-bit S-boxes constructed by known n-bit S-boxes}, journal = {J. Math. Cryptol.}, volume = {15}, number = {1}, pages = {258--265}, year = {2021}, url = {https://doi.org/10.1515/jmc-2020-0004}, doi = {10.1515/JMC-2020-0004}, timestamp = {Wed, 27 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/ZhouMD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/BanegasBPS20, author = {Gustavo Banegas and Paulo S. L. M. Barreto and Edoardo Persichetti and Paolo Santini}, title = {Designing Efficient Dyadic Operations for Cryptographic Applications}, journal = {J. Math. Cryptol.}, volume = {14}, number = {1}, pages = {95--109}, year = {2020}, url = {https://doi.org/10.1515/jmc-2015-0054}, doi = {10.1515/JMC-2015-0054}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/BanegasBPS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/BonehGKLSSTZ20, author = {Dan Boneh and Darren B. Glass and Daniel Krashen and Kristin E. Lauter and Shahed Sharif and Alice Silverberg and Mehdi Tibouchi and Mark Zhandry}, title = {Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves}, journal = {J. Math. Cryptol.}, volume = {14}, number = {1}, pages = {5--14}, year = {2020}, url = {https://doi.org/10.1515/jmc-2015-0047}, doi = {10.1515/JMC-2015-0047}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/BonehGKLSSTZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/BootlandCIV20, author = {Carl Bootland and Wouter Castryck and Ilia Iliashenko and Frederik Vercauteren}, title = {Efficiently Processing Complex-Valued Data in Homomorphic Encryption}, journal = {J. Math. Cryptol.}, volume = {14}, number = {1}, pages = {55--65}, year = {2020}, url = {https://doi.org/10.1515/jmc-2015-0051}, doi = {10.1515/JMC-2015-0051}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/BootlandCIV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/BootlandCSV20, author = {Carl Bootland and Wouter Castryck and Alan Szepieniec and Frederik Vercauteren}, title = {A framework for cryptographic problems from linear algebra}, journal = {J. Math. Cryptol.}, volume = {14}, number = {1}, pages = {202--217}, year = {2020}, url = {https://doi.org/10.1515/jmc-2019-0032}, doi = {10.1515/JMC-2019-0032}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/BootlandCSV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/BouraGGJ20, author = {Christina Boura and Nicolas Gama and Mariya Georgieva and Dimitar Jetchev}, title = {{CHIMERA:} Combining Ring-LWE-based Fully Homomorphic Encryption Schemes}, journal = {J. Math. Cryptol.}, volume = {14}, number = {1}, pages = {316--338}, year = {2020}, url = {https://doi.org/10.1515/jmc-2019-0026}, doi = {10.1515/JMC-2019-0026}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/BouraGGJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/BrierFJN20, author = {{\'{E}}ric Brier and Houda Ferradi and Marc Joye and David Naccache}, title = {New number-theoretic cryptographic primitives}, journal = {J. Math. Cryptol.}, volume = {14}, number = {1}, pages = {224--235}, year = {2020}, url = {https://doi.org/10.1515/jmc-2019-0035}, doi = {10.1515/JMC-2019-0035}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/BrierFJN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/CastryckDS20, author = {Wouter Castryck and Thomas Decru and Benjamin Smith}, title = {Hash functions from superspecial genus-2 curves using Richelot isogenies}, journal = {J. Math. Cryptol.}, volume = {14}, number = {1}, pages = {268--292}, year = {2020}, url = {https://doi.org/10.1515/jmc-2019-0021}, doi = {10.1515/JMC-2019-0021}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/CastryckDS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/ChakrabortyAR20, author = {Suvradip Chakraborty and Janaka Alawatugoda and Chandrasekaran Pandu Rangan}, title = {New approach to practical leakage-resilient public-key cryptography}, journal = {J. Math. Cryptol.}, volume = {14}, number = {1}, pages = {172--201}, year = {2020}, url = {https://doi.org/10.1515/jmc-2019-0014}, doi = {10.1515/JMC-2019-0014}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/ChakrabortyAR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/CheonCHKL20, author = {Jung Hee Cheon and Wonhee Cho and Minki Hhan and Jiseung Kim and Changmin Lee}, title = {Algorithms for CRT-variant of Approximate Greatest Common Divisor Problem}, journal = {J. Math. Cryptol.}, volume = {14}, number = {1}, pages = {397--413}, year = {2020}, url = {https://doi.org/10.1515/jmc-2019-0031}, doi = {10.1515/JMC-2019-0031}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/CheonCHKL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/CheonLY20, author = {Jung Hee Cheon and Kristin E. Lauter and Donggeon Yhee}, title = {Preface to the First Annual MathCrypt Proceedings Volume}, journal = {J. Math. Cryptol.}, volume = {14}, number = {1}, pages = {1--4}, year = {2020}, url = {https://doi.org/10.1515/jmc-2020-0060}, doi = {10.1515/JMC-2020-0060}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/CheonLY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/ColoK20, author = {Leonardo Col{\`{o}} and David Kohel}, title = {Orienting supersingular isogeny graphs}, journal = {J. Math. Cryptol.}, volume = {14}, number = {1}, pages = {414--437}, year = {2020}, url = {https://doi.org/10.1515/jmc-2019-0034}, doi = {10.1515/JMC-2019-0034}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/ColoK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/CoronG20, author = {Jean{-}S{\'{e}}bastien Coron and Agnese Gini}, title = {Improved cryptanalysis of the {AJPS} Mersenne based cryptosystem}, journal = {J. Math. Cryptol.}, volume = {14}, number = {1}, pages = {218--223}, year = {2020}, url = {https://doi.org/10.1515/jmc-2019-0027}, doi = {10.1515/JMC-2019-0027}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/CoronG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/CrescenzoKKS20, author = {Giovanni Di Crescenzo and Matluba Khodjaeva and Delaram Kahrobaei and Vladimir Shpilrain}, title = {Delegating a Product of Group Exponentiations with Application to Signature Schemes (Submission to Special NutMiC 2019 Issue of {JMC)}}, journal = {J. Math. Cryptol.}, volume = {14}, number = {1}, pages = {438--459}, year = {2020}, url = {https://doi.org/10.1515/jmc-2019-0036}, doi = {10.1515/JMC-2019-0036}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/CrescenzoKKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/DelaplaceM20, author = {Claire Delaplace and Alexander May}, title = {Can we Beat the Square Root Bound for {ECDLP} over {\(\mathbb{F}\)}\({}_{\mbox{p\({}^{\mbox{2}}\)}}\) via Representation?}, journal = {J. Math. Cryptol.}, volume = {14}, number = {1}, pages = {293--306}, year = {2020}, url = {https://doi.org/10.1515/jmc-2019-0025}, doi = {10.1515/JMC-2019-0025}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/DelaplaceM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/DorozS20, author = {Yarkin Dor{\"{o}}z and Berk Sunar}, title = {Flattening {NTRU} for Evaluation Key Free Homomorphic Encryption}, journal = {J. Math. Cryptol.}, volume = {14}, number = {1}, pages = {66--83}, year = {2020}, url = {https://doi.org/10.1515/jmc-2015-0052}, doi = {10.1515/JMC-2015-0052}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/DorozS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/FerradiGGNT20, author = {Houda Ferradi and R{\'{e}}mi G{\'{e}}raud and Sylvain Guilley and David Naccache and Mehdi Tibouchi}, title = {Recovering Secrets From Prefix-Dependent Leakage}, journal = {J. Math. Cryptol.}, volume = {14}, number = {1}, pages = {15--24}, year = {2020}, url = {https://doi.org/10.1515/jmc-2015-0048}, doi = {10.1515/JMC-2015-0048}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/FerradiGGNT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/GoelGD20, author = {Neha Goel and Indivar Gupta and Bal Kishan Dass}, title = {Survey on {SAP} and its application in public-key cryptography}, journal = {J. Math. Cryptol.}, volume = {14}, number = {1}, pages = {144--152}, year = {2020}, url = {https://doi.org/10.1515/jmc-2016-0004}, doi = {10.1515/JMC-2016-0004}, timestamp = {Tue, 05 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/GoelGD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Grzeskowiak20, author = {Maciej Grzeskowiak}, title = {A variant of the large sieve inequality with explicit constants}, journal = {J. Math. Cryptol.}, volume = {14}, number = {1}, pages = {307--315}, year = {2020}, url = {https://doi.org/10.1515/jmc-2019-0022}, doi = {10.1515/JMC-2019-0022}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/Grzeskowiak20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/HoffsteinSWZ20, author = {Jeffrey Hoffstein and Joseph H. Silverman and William Whyte and Zhenfei Zhang}, title = {A signature scheme from the finite field isomorphism problem}, journal = {J. Math. Cryptol.}, volume = {14}, number = {1}, pages = {39--54}, year = {2020}, url = {https://doi.org/10.1515/jmc-2015-0050}, doi = {10.1515/JMC-2015-0050}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/HoffsteinSWZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/HuangKPYY20, author = {Ming{-}Deh A. Huang and Michiel Kosters and Christophe Petit and Sze Ling Yeo and Yang Yun}, title = {Quasi-subfield Polynomials and the Elliptic Curve Discrete Logarithm Problem}, journal = {J. Math. Cryptol.}, volume = {14}, number = {1}, pages = {25--38}, year = {2020}, url = {https://doi.org/10.1515/jmc-2015-0049}, doi = {10.1515/JMC-2015-0049}, timestamp = {Fri, 17 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/HuangKPYY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/JaoLLR20, author = {David Jao and Jason T. LeGrow and Christopher Leonardi and Luis Ruiz{-}Lopez}, title = {A subexponential-time, polynomial quantum space algorithm for inverting the {CM} group action}, journal = {J. Math. Cryptol.}, volume = {14}, number = {1}, pages = {129--138}, year = {2020}, url = {https://doi.org/10.1515/jmc-2015-0057}, doi = {10.1515/JMC-2015-0057}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/JaoLLR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/JouxP20, author = {Antoine Joux and Jacek Pomykala}, title = {Preface for the Number-Theoretic Methods in Cryptology conferences}, journal = {J. Math. Cryptol.}, volume = {14}, number = {1}, pages = {393--396}, year = {2020}, url = {https://doi.org/10.1515/jmc-2019-0111}, doi = {10.1515/JMC-2019-0111}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/JouxP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Joye20, author = {Marc Joye}, title = {Protecting {ECC} Against Fault Attacks: The Ring Extension Method Revisited}, journal = {J. Math. Cryptol.}, volume = {14}, number = {1}, pages = {254--267}, year = {2020}, url = {https://doi.org/10.1515/jmc-2019-0030}, doi = {10.1515/JMC-2019-0030}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/Joye20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Karmakar20a, title = {Retraction of: An elementary proof of Fermat's Last Theorem for all even exponents}, journal = {J. Math. Cryptol.}, volume = {14}, number = {1}, pages = {143}, year = {2020}, url = {https://doi.org/10.1515/jmc-2017-2000}, doi = {10.1515/JMC-2017-2000}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/Karmakar20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/KimT20, author = {Taechan Kim and Mehdi Tibouchi}, title = {Equidistribution Among Cosets of Elliptic Curve Points in Intervals}, journal = {J. Math. Cryptol.}, volume = {14}, number = {1}, pages = {339--345}, year = {2020}, url = {https://doi.org/10.1515/jmc-2019-0020}, doi = {10.1515/JMC-2019-0020}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/KimT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/LesavoureyPS20, author = {Andrea Lesavourey and Thomas Plantard and Willy Susilo}, title = {Short Principal Ideal Problem in multicubic fields}, journal = {J. Math. Cryptol.}, volume = {14}, number = {1}, pages = {359--392}, year = {2020}, url = {https://doi.org/10.1515/jmc-2019-0028}, doi = {10.1515/JMC-2019-0028}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/LesavoureyPS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/MicheliHS20, author = {Gabrielle De Micheli and Nadia Heninger and Barak Shani}, title = {Characterizing overstretched {NTRU} attacks}, journal = {J. Math. Cryptol.}, volume = {14}, number = {1}, pages = {110--119}, year = {2020}, url = {https://doi.org/10.1515/jmc-2015-0055}, doi = {10.1515/JMC-2015-0055}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/MicheliHS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/PomykalaR20, author = {Jacek Pomykala and Maciej Radziejewski}, title = {Integer factoring and compositeness witnesses}, journal = {J. Math. Cryptol.}, volume = {14}, number = {1}, pages = {346--358}, year = {2020}, url = {https://doi.org/10.1515/jmc-2019-0023}, doi = {10.1515/JMC-2019-0023}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/PomykalaR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/TomkinsNS20, author = {Hayley Tomkins and Monica Nevins and Hadi Salmasian}, title = {New Z{\'{e}}mor-Tillich Type Hash Functions Over {GL2} ({\(\mathbb{F}\)}\({}_{\mbox{p\({}^{\mbox{n}}\)}}\))}, journal = {J. Math. Cryptol.}, volume = {14}, number = {1}, pages = {236--253}, year = {2020}, url = {https://doi.org/10.1515/jmc-2019-0033}, doi = {10.1515/JMC-2019-0033}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/TomkinsNS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/UrbanikJ20, author = {David Urbanik and David Jao}, title = {New Techniques for SIDH-based {NIKE}}, journal = {J. Math. Cryptol.}, volume = {14}, number = {1}, pages = {120--128}, year = {2020}, url = {https://doi.org/10.1515/jmc-2015-0056}, doi = {10.1515/JMC-2015-0056}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/UrbanikJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Yasuda20, author = {Masaya Yasuda}, title = {Self-dual DeepBKZ for finding short lattice vectors}, journal = {J. Math. Cryptol.}, volume = {14}, number = {1}, pages = {84--94}, year = {2020}, url = {https://doi.org/10.1515/jmc-2015-0053}, doi = {10.1515/JMC-2015-0053}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/Yasuda20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/YokoyamaYTK20, author = {Kazuhiro Yokoyama and Masaya Yasuda and Yasushi Takahashi and Jun Kogure}, title = {Complexity bounds on Semaev's naive index calculus method for {ECDLP}}, journal = {J. Math. Cryptol.}, volume = {14}, number = {1}, pages = {460--485}, year = {2020}, url = {https://doi.org/10.1515/jmc-2019-0029}, doi = {10.1515/JMC-2019-0029}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/YokoyamaYTK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/ZhangS20, author = {Liang Feng Zhang and Reihaneh Safavi{-}Naini}, title = {Privacy-preserving verifiable delegation of polynomial and matrix functions}, journal = {J. Math. Cryptol.}, volume = {14}, number = {1}, pages = {153--171}, year = {2020}, url = {https://doi.org/10.1515/jmc-2018-0039}, doi = {10.1515/JMC-2018-0039}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/ZhangS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Karmakar20, title = {An elementary proof of Fermat's last theorem for all even exponents}, journal = {J. Math. Cryptol.}, volume = {14}, number = {1}, pages = {139--142}, year = {2020}, note = {Withdrawn.}, url = {https://doi.org/10.1515/jmc-2016-0018}, doi = {10.1515/JMC-2016-0018}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/Karmakar20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/AziziJZT19, author = {Abdelmalek Azizi and Idriss Jerrari and Abdelkader Zekhnini and Mohammed Talbi}, title = {Capitulation of the 2-ideal classes of type (2, {\unicode{8239}}2, {\unicode{8239}}2) of some quartic cyclic number fields}, journal = {J. Math. Cryptol.}, volume = {13}, number = {1}, pages = {27--46}, year = {2019}, url = {https://doi.org/10.1515/jmc-2017-0037}, doi = {10.1515/JMC-2017-0037}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/AziziJZT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/BansalBP19, author = {Tarun Kumar Bansal and Xavier Boyen and Josef Pieprzyk}, title = {Signcryption schemes with insider security in an ideal permutation model}, journal = {J. Math. Cryptol.}, volume = {13}, number = {2}, pages = {117--150}, year = {2019}, url = {https://doi.org/10.1515/jmc-2018-0006}, doi = {10.1515/JMC-2018-0006}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/BansalBP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/BiasseS19, author = {Jean{-}Fran{\c{c}}ois Biasse and Fang Song}, title = {On the quantum attacks against schemes relying on the hardness of finding a short generator of an ideal in}, journal = {J. Math. Cryptol.}, volume = {13}, number = {3-4}, pages = {151--168}, year = {2019}, url = {https://doi.org/10.1515/jmc-2015-0046}, doi = {10.1515/JMC-2015-0046}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/BiasseS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/BindelBGS19, author = {Nina Bindel and Johannes Buchmann and Florian G{\"{o}}pfert and Markus Schmidt}, title = {Estimation of the hardness of the learning with errors problem with a restricted number of samples}, journal = {J. Math. Cryptol.}, volume = {13}, number = {1}, pages = {47--67}, year = {2019}, url = {https://doi.org/10.1515/jmc-2017-0040}, doi = {10.1515/JMC-2017-0040}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/BindelBGS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/HarsanyiL19, author = {K{\'{a}}roly Hars{\'{a}}nyi and P{\'{e}}ter Ligeti}, title = {Exact information ratios for secret sharing on small graphs with girth at least 5}, journal = {J. Math. Cryptol.}, volume = {13}, number = {2}, pages = {107--116}, year = {2019}, url = {https://doi.org/10.1515/jmc-2018-0024}, doi = {10.1515/JMC-2018-0024}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/HarsanyiL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/KajiMNN19, author = {Shizuo Kaji and Toshiaki Maeno and Koji Nuida and Yasuhide Numata}, title = {Polynomial expressions of p-ary auction functions}, journal = {J. Math. Cryptol.}, volume = {13}, number = {2}, pages = {69--80}, year = {2019}, url = {https://doi.org/10.1515/jmc-2018-0016}, doi = {10.1515/JMC-2018-0016}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/KajiMNN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/KousidisW19, author = {Stavros Kousidis and Andreas Wiemers}, title = {On the first fall degree of summation polynomials}, journal = {J. Math. Cryptol.}, volume = {13}, number = {3-4}, pages = {229--237}, year = {2019}, url = {https://doi.org/10.1515/jmc-2017-0022}, doi = {10.1515/JMC-2017-0022}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/KousidisW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/LavauzelleL19, author = {Julien Lavauzelle and Fran{\c{c}}oise Levy{-}dit{-}Vehel}, title = {Generic constructions of PoRs from codes and instantiations}, journal = {J. Math. Cryptol.}, volume = {13}, number = {2}, pages = {81--106}, year = {2019}, url = {https://doi.org/10.1515/jmc-2018-0018}, doi = {10.1515/JMC-2018-0018}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/LavauzelleL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/NandiP19, author = {Mridul Nandi and Tapas Pandit}, title = {Predicate signatures from pair encodings via dual system proof technique}, journal = {J. Math. Cryptol.}, volume = {13}, number = {3-4}, pages = {197--228}, year = {2019}, url = {https://doi.org/10.1515/jmc-2017-0007}, doi = {10.1515/JMC-2017-0007}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/NandiP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/SipasseuthPS19, author = {Arnaud Sipasseuth and Thomas Plantard and Willy Susilo}, title = {Enhancing Goldreich, Goldwasser and Halevi's scheme with intersecting lattices}, journal = {J. Math. Cryptol.}, volume = {13}, number = {3-4}, pages = {169--196}, year = {2019}, url = {https://doi.org/10.1515/jmc-2016-0066}, doi = {10.1515/JMC-2016-0066}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/SipasseuthPS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Wunderer19, author = {Thomas Wunderer}, title = {A detailed analysis of the hybrid lattice-reduction and meet-in-the-middle attack}, journal = {J. Math. Cryptol.}, volume = {13}, number = {1}, pages = {1--26}, year = {2019}, url = {https://doi.org/10.1515/jmc-2016-0044}, doi = {10.1515/JMC-2016-0044}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/Wunderer19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/BanegasBBCDGGHK18, author = {Gustavo Banegas and Paulo S. L. M. Barreto and Brice Odilon Boidje and Pierre{-}Louis Cayrel and Gilbert Ndollane Dione and Kris Gaj and Cheikh Thi{\'{e}}coumba Gueye and Richard Haeussler and Jean Belo Klamti and Ousmane Ndiaye and Duc Tri Nguyen and Edoardo Persichetti and Jefferson E. Ricardini}, title = {{DAGS:} Key encapsulation using dyadic {GS} codes}, journal = {J. Math. Cryptol.}, volume = {12}, number = {4}, pages = {221--239}, year = {2018}, url = {https://doi.org/10.1515/jmc-2018-0027}, doi = {10.1515/JMC-2018-0027}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/BanegasBBCDGGHK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/ChakrabortiDN18, author = {Avik Chakraborti and Nilanjan Datta and Mridul Nandi}, title = {On the optimality of non-linear computations for symmetric key primitives}, journal = {J. Math. Cryptol.}, volume = {12}, number = {4}, pages = {241--259}, year = {2018}, url = {https://doi.org/10.1515/jmc-2017-0011}, doi = {10.1515/JMC-2017-0011}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/ChakrabortiDN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/ChatterjeeDK18, author = {Sanjit Chatterjee and M. Prem Laxman Das and R. Kabaleeshwaran}, title = {Converting pairing-based cryptosystems from composite to prime order setting - {A} comparative analysis}, journal = {J. Math. Cryptol.}, volume = {12}, number = {3}, pages = {159--190}, year = {2018}, url = {https://doi.org/10.1515/jmc-2017-0042}, doi = {10.1515/JMC-2017-0042}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/ChatterjeeDK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/DeyS18, author = {Sabyasachi Dey and Santanu Sarkar}, title = {Generalization of Roos bias in {RC4} and some results on key-keystream relations}, journal = {J. Math. Cryptol.}, volume = {12}, number = {1}, pages = {43--56}, year = {2018}, url = {https://doi.org/10.1515/jmc-2016-0061}, doi = {10.1515/JMC-2016-0061}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/DeyS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/FotiadisK18, author = {Georgios Fotiadis and Elisavet Konstantinou}, title = {Generating pairing-friendly elliptic curve parameters using sparse families}, journal = {J. Math. Cryptol.}, volume = {12}, number = {2}, pages = {83--99}, year = {2018}, url = {https://doi.org/10.1515/jmc-2017-0024}, doi = {10.1515/JMC-2017-0024}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/FotiadisK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/JirakitpuwapatC18, author = {Wachirapong Jirakitpuwapat and Parin Chaipunya and Poom Kumam and Sompong Dhompongsa and Phatiphat Thounthong}, title = {New methods of construction of cartesian authentication codes from geometries over finite commutative rings}, journal = {J. Math. Cryptol.}, volume = {12}, number = {3}, pages = {119--136}, year = {2018}, url = {https://doi.org/10.1515/jmc-2017-0057}, doi = {10.1515/JMC-2017-0057}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/JirakitpuwapatC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/KotovU18, author = {Matvei Kotov and Alexander Ushakov}, title = {Analysis of a key exchange protocol based on tropical matrix algebra}, journal = {J. Math. Cryptol.}, volume = {12}, number = {3}, pages = {137--141}, year = {2018}, url = {https://doi.org/10.1515/jmc-2016-0064}, doi = {10.1515/JMC-2016-0064}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/KotovU18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Kushwaha18, author = {Prabhat Kushwaha}, title = {Improved lower bound for Diffie-Hellman problem using multiplicative group of a finite field as auxiliary group}, journal = {J. Math. Cryptol.}, volume = {12}, number = {2}, pages = {101--118}, year = {2018}, url = {https://doi.org/10.1515/jmc-2017-0053}, doi = {10.1515/JMC-2017-0053}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/Kushwaha18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/LaingS18, author = {Thalia M. Laing and Douglas R. Stinson}, title = {A survey and refinement of repairable threshold schemes}, journal = {J. Math. Cryptol.}, volume = {12}, number = {1}, pages = {57--81}, year = {2018}, url = {https://doi.org/10.1515/jmc-2017-0058}, doi = {10.1515/JMC-2017-0058}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/LaingS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/MahriSBDW18, author = {Hassan Qahur Al Mahri and Leonie Simpson and Harry Bartlett and Ed Dawson and Kenneth Koon{-}Ho Wong}, title = {A fundamental flaw in the ++AE authenticated encryption mode}, journal = {J. Math. Cryptol.}, volume = {12}, number = {1}, pages = {37--42}, year = {2018}, url = {https://doi.org/10.1515/jmc-2016-0037}, doi = {10.1515/JMC-2016-0037}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/MahriSBDW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Partala18, author = {Juha Partala}, title = {Algebraic generalization of Diffie-Hellman key exchange}, journal = {J. Math. Cryptol.}, volume = {12}, number = {1}, pages = {1--21}, year = {2018}, url = {https://doi.org/10.1515/jmc-2017-0015}, doi = {10.1515/JMC-2017-0015}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/Partala18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/PatersonSU18, author = {Maura B. Paterson and Douglas R. Stinson and Jalaj Upadhyay}, title = {Multi-prover proof of retrievability}, journal = {J. Math. Cryptol.}, volume = {12}, number = {4}, pages = {203--220}, year = {2018}, url = {https://doi.org/10.1515/jmc-2018-0012}, doi = {10.1515/JMC-2018-0012}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/PatersonSU18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/PintoP18, author = {Eduardo Carvalho Pinto and Christophe Petit}, title = {Better path-finding algorithms in {LPS} Ramanujan graphs}, journal = {J. Math. Cryptol.}, volume = {12}, number = {4}, pages = {191--202}, year = {2018}, url = {https://doi.org/10.1515/jmc-2017-0051}, doi = {10.1515/JMC-2017-0051}, timestamp = {Fri, 17 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/PintoP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/RaddumZ18, author = {H{\aa}vard Raddum and Pavol Zajac}, title = {{MRHS} solver based on linear algebra and exhaustive search}, journal = {J. Math. Cryptol.}, volume = {12}, number = {3}, pages = {143--157}, year = {2018}, url = {https://doi.org/10.1515/jmc-2017-0005}, doi = {10.1515/JMC-2017-0005}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/RaddumZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Trung18, author = {Tran van Trung}, title = {Construction of strongly aperiodic logarithmic signatures}, journal = {J. Math. Cryptol.}, volume = {12}, number = {1}, pages = {23--35}, year = {2018}, url = {https://doi.org/10.1515/jmc-2017-0048}, doi = {10.1515/JMC-2017-0048}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/Trung18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Alawatugoda17, author = {Janaka Alawatugoda}, title = {On the leakage-resilient key exchange}, journal = {J. Math. Cryptol.}, volume = {11}, number = {4}, pages = {215--269}, year = {2017}, url = {https://doi.org/10.1515/jmc-2016-0003}, doi = {10.1515/JMC-2016-0003}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/Alawatugoda17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/AntalGH17, author = {Eugen Antal and Otokar Grosek and Peter Hor{\'{a}}k}, title = {On a mnemonic construction of permutations}, journal = {J. Math. Cryptol.}, volume = {11}, number = {1}, pages = {45--53}, year = {2017}, url = {https://doi.org/10.1515/jmc-2016-0058}, doi = {10.1515/JMC-2016-0058}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/AntalGH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/AsgharK17, author = {Hassan Jameel Asghar and Mohamed Ali K{\^{a}}afar}, title = {When are identification protocols with sparse challenges safe? The case of the Coskun and Herley attack}, journal = {J. Math. Cryptol.}, volume = {11}, number = {3}, pages = {177--194}, year = {2017}, url = {https://doi.org/10.1515/jmc-2015-0059}, doi = {10.1515/JMC-2015-0059}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/AsgharK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/DehkordiS17, author = {Massoud Hadian Dehkordi and Ali Safi}, title = {The complexity of the connected graph access structure on seven participants}, journal = {J. Math. Cryptol.}, volume = {11}, number = {1}, pages = {25--35}, year = {2017}, url = {https://doi.org/10.1515/jmc-2016-0017}, doi = {10.1515/JMC-2016-0017}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/DehkordiS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/DehkordiT17, author = {Massoud Hadian Dehkordi and Roghayeh Taghizadeh}, title = {Multiple differential-zero correlation linear cryptanalysis of reduced-round {CAST-256}}, journal = {J. Math. Cryptol.}, volume = {11}, number = {2}, pages = {55}, year = {2017}, url = {https://doi.org/10.1515/jmc-2016-0054}, doi = {10.1515/JMC-2016-0054}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/DehkordiT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/GuptaPR17, author = {Kishan Chand Gupta and Sumit Kumar Pandey and Indranil Ghosh Ray}, title = {Applications of design theory for the constructions of {MDS} matrices for lightweight cryptography}, journal = {J. Math. Cryptol.}, volume = {11}, number = {2}, pages = {85}, year = {2017}, url = {https://doi.org/10.1515/jmc-2016-0013}, doi = {10.1515/JMC-2016-0013}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/GuptaPR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/LuPS17, author = {Yao Lu and Liqiang Peng and Santanu Sarkar}, title = {Cryptanalysis of an {RSA} variant with moduli N=prql}, journal = {J. Math. Cryptol.}, volume = {11}, number = {2}, pages = {117}, year = {2017}, url = {https://doi.org/10.1515/jmc-2016-0025}, doi = {10.1515/JMC-2016-0025}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/LuPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/MohammedA17, author = {Ahmed Mohammed and Abdulrahman Alkhelaifi}, title = {{RSA:} {A} number of formulas to improve the search for p + q p+q}, journal = {J. Math. Cryptol.}, volume = {11}, number = {4}, pages = {195--203}, year = {2017}, url = {https://doi.org/10.1515/jmc-2016-0046}, doi = {10.1515/JMC-2016-0046}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/MohammedA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Popov17, author = {Serguei Popov}, title = {On a decentralized trustless pseudo-random number generation algorithm}, journal = {J. Math. Cryptol.}, volume = {11}, number = {1}, pages = {37--43}, year = {2017}, url = {https://doi.org/10.1515/jmc-2016-0019}, doi = {10.1515/JMC-2016-0019}, timestamp = {Sat, 26 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/Popov17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Reichl17, author = {Dominik Reichl}, title = {Tame logarithmic signatures of abelian groups}, journal = {J. Math. Cryptol.}, volume = {11}, number = {4}, pages = {205--214}, year = {2017}, url = {https://doi.org/10.1515/jmc-2016-0065}, doi = {10.1515/JMC-2016-0065}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/Reichl17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/SamajderS17, author = {Subhabrata Samajder and Palash Sarkar}, title = {Rigorous upper bounds on data complexities of block cipher cryptanalysis}, journal = {J. Math. Cryptol.}, volume = {11}, number = {3}, pages = {147--175}, year = {2017}, url = {https://doi.org/10.1515/jmc-2016-0026}, doi = {10.1515/JMC-2016-0026}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/SamajderS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/SaraswatSA17, author = {Vishal Saraswat and Rajeev Anand Sahu and Amit K. Awasthi}, title = {A secure anonymous proxy signcryption scheme}, journal = {J. Math. Cryptol.}, volume = {11}, number = {2}, pages = {63}, year = {2017}, url = {https://doi.org/10.1515/jmc-2015-0014}, doi = {10.1515/JMC-2015-0014}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/SaraswatSA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Scholl17, author = {Travis Scholl}, title = {Isolated elliptic curves and the {MOV} attack}, journal = {J. Math. Cryptol.}, volume = {11}, number = {3}, pages = {131--146}, year = {2017}, url = {https://doi.org/10.1515/jmc-2016-0053}, doi = {10.1515/JMC-2016-0053}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/Scholl17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/YasudaYSKK17, author = {Masaya Yasuda and Kazuhiro Yokoyama and Takeshi Shimoyama and Jun Kogure and Takeshi Koshiba}, title = {Analysis of decreasing squared-sum of Gram-Schmidt lengths for short lattice vectors}, journal = {J. Math. Cryptol.}, volume = {11}, number = {1}, pages = {1--24}, year = {2017}, url = {https://doi.org/10.1515/jmc-2016-0008}, doi = {10.1515/JMC-2016-0008}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/YasudaYSKK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/BiancoG16, author = {Giulia Bianco and Elisa Gorla}, title = {Compression for trace zero points on twisted Edwards curves}, journal = {J. Math. Cryptol.}, volume = {10}, number = {1}, pages = {15--34}, year = {2016}, url = {http://www.degruyter.com/view/j/jmc.2016.10.issue-1/jmc-2015-0039/jmc-2015-0039.xml}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/BiancoG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/CarletJST16, author = {Claude Carlet and David Joyner and Pantelimon Stanica and Deng Tang}, title = {Cryptographic properties of monotone Boolean functions}, journal = {J. Math. Cryptol.}, volume = {10}, number = {1}, pages = {1--14}, year = {2016}, url = {http://www.degruyter.com/view/j/jmc.2016.10.issue-1/jmc-2014-0030/jmc-2014-0030.xml}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/CarletJST16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/CusickLS16, author = {Thomas W. Cusick and K. V. Lakshmy and Madathil Sethumadhavan}, title = {Affine equivalence of monomial rotation symmetric Boolean functions: {A} P{\'{o}}lya's theorem approach}, journal = {J. Math. Cryptol.}, volume = {10}, number = {3-4}, pages = {145--156}, year = {2016}, url = {https://doi.org/10.1515/jmc-2016-0042}, doi = {10.1515/JMC-2016-0042}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/CusickLS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/JhaN16, author = {Ashwin Jha and Mridul Nandi}, title = {Revisiting structure graphs: Applications to {CBC-MAC} and {EMAC}}, journal = {J. Math. Cryptol.}, volume = {10}, number = {3-4}, pages = {157--180}, year = {2016}, url = {https://doi.org/10.1515/jmc-2016-0030}, doi = {10.1515/JMC-2016-0030}, timestamp = {Fri, 23 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/JhaN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/MoodyPS16, author = {Dustin Moody and Souradyuti Paul and Daniel Smith{-}Tone}, title = {Indifferentiability security of the fast wide pipe hash: Breaking the birthday barrier}, journal = {J. Math. Cryptol.}, volume = {10}, number = {2}, pages = {101--133}, year = {2016}, url = {https://doi.org/10.1515/jmc-2014-0044}, doi = {10.1515/JMC-2014-0044}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/MoodyPS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/NandiP16, author = {Mridul Nandi and Tapas Pandit}, title = {On the security of joint signature and encryption revisited}, journal = {J. Math. Cryptol.}, volume = {10}, number = {3-4}, pages = {181--221}, year = {2016}, url = {https://doi.org/10.1515/jmc-2015-0060}, doi = {10.1515/JMC-2015-0060}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/NandiP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Poulakis16, author = {Dimitrios Poulakis}, title = {New lattice attacks on {DSA} schemes}, journal = {J. Math. Cryptol.}, volume = {10}, number = {2}, pages = {135--144}, year = {2016}, url = {https://doi.org/10.1515/jmc-2014-0027}, doi = {10.1515/JMC-2014-0027}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/Poulakis16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/SamajderS16, author = {Subhabrata Samajder and Palash Sarkar}, title = {Another look at normal approximations in cryptanalysis}, journal = {J. Math. Cryptol.}, volume = {10}, number = {2}, pages = {69--99}, year = {2016}, url = {https://doi.org/10.1515/jmc-2016-0006}, doi = {10.1515/JMC-2016-0006}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/SamajderS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/SwansonS16, author = {Colleen M. Swanson and Douglas R. Stinson}, title = {Unconditionally secure signature schemes revisited}, journal = {J. Math. Cryptol.}, volume = {10}, number = {1}, pages = {35--67}, year = {2016}, url = {http://www.degruyter.com/view/j/jmc.2016.10.issue-1/jmc-2016-0002/jmc-2016-0002.xml}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/SwansonS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/AccardiR15, author = {Luigi Accardi and Massimo Regoli}, title = {On a class of strongly asymmetric {PKA} algorithms}, journal = {J. Math. Cryptol.}, volume = {9}, number = {3}, pages = {151--159}, year = {2015}, url = {http://www.degruyter.com/view/j/jmc.2015.9.issue-3/jmc-2015-0019/jmc-2015-0019.xml}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/AccardiR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/AlamOY15, author = {Bilal Alam and Ferruh {\"{O}}zbudak and Oguz Yayla}, title = {Classes of weak Dembowski-Ostrom polynomials for multivariate quadratic cryptosystems}, journal = {J. Math. Cryptol.}, volume = {9}, number = {1}, pages = {11--22}, year = {2015}, url = {https://doi.org/10.1515/jmc-2013-0019}, doi = {10.1515/JMC-2013-0019}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/AlamOY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/AlbrechtPS15, author = {Martin R. Albrecht and Rachel Player and Sam Scott}, title = {On the concrete hardness of Learning with Errors}, journal = {J. Math. Cryptol.}, volume = {9}, number = {3}, pages = {169--203}, year = {2015}, url = {http://www.degruyter.com/view/j/jmc.2015.9.issue-3/jmc-2015-0016/jmc-2015-0016.xml}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/AlbrechtPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/ChenEM15, author = {Jiageng Chen and Keita Emura and Atsuko Miyaji}, title = {{SKENO:} Secret key encryption with non-interactive opening}, journal = {J. Math. Cryptol.}, volume = {9}, number = {2}, pages = {63--74}, year = {2015}, url = {https://doi.org/10.1515/jmc-2014-0010}, doi = {10.1515/JMC-2014-0010}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/ChenEM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/CusickC15, author = {Thomas W. Cusick and Younhwan Cheon}, title = {Theory of 3-rotation symmetric cubic Boolean functions}, journal = {J. Math. Cryptol.}, volume = {9}, number = {1}, pages = {45--62}, year = {2015}, url = {https://doi.org/10.1515/jmc-2014-0017}, doi = {10.1515/JMC-2014-0017}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/CusickC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/DolevGGKY15, author = {Shlomi Dolev and Juan A. Garay and Niv Gilboa and Vladimir Kolesnikov and Yelena Yuditsky}, title = {Towards efficient private distributed computation on unbounded input streams}, journal = {J. Math. Cryptol.}, volume = {9}, number = {2}, pages = {79--94}, year = {2015}, url = {https://doi.org/10.1515/jmc-2013-0039}, doi = {10.1515/JMC-2013-0039}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/DolevGGKY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Dowden15, author = {Chris Dowden}, title = {Secure message transmission in the presence of a fully generalised adversary}, journal = {J. Math. Cryptol.}, volume = {9}, number = {4}, pages = {205--214}, year = {2015}, url = {http://www.degruyter.com/view/j/jmc.2015.9.issue-4/jmc-2013-0046/jmc-2013-0046.xml}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/Dowden15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/GarberKL15, author = {David Garber and Delaram Kahrobaei and Ha T. Lam}, title = {Length-based attacks in polycyclic groups}, journal = {J. Math. Cryptol.}, volume = {9}, number = {1}, pages = {33--43}, year = {2015}, url = {https://doi.org/10.1515/jmc-2014-0003}, doi = {10.1515/JMC-2014-0003}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/GarberKL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/HameedS15, author = {Ali Hameed and Arkadii Slinko}, title = {A characterisation of ideal weighted secret sharing schemes}, journal = {J. Math. Cryptol.}, volume = {9}, number = {4}, pages = {227--244}, year = {2015}, url = {http://www.degruyter.com/view/j/jmc.2015.9.issue-4/jmc-2015-0002/jmc-2015-0002.xml}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/HameedS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/HenryS15, author = {Kevin J. Henry and Douglas R. Stinson}, title = {Linear approaches to resilient aggregation in sensor networks}, journal = {J. Math. Cryptol.}, volume = {9}, number = {4}, pages = {245--272}, year = {2015}, url = {http://www.degruyter.com/view/j/jmc.2015.9.issue-4/jmc-2015-0042/jmc-2015-0042.xml}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/HenryS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Justus15, author = {Benjamin Justus}, title = {The distribution of quadratic residues and non-residues in the Goldwasser-Micali type of cryptosystem. {II}}, journal = {J. Math. Cryptol.}, volume = {9}, number = {2}, pages = {115--137}, year = {2015}, url = {https://doi.org/10.1515/jmc-2014-0004}, doi = {10.1515/JMC-2014-0004}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/Justus15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/KotovU15, author = {Matvei Kotov and Alexander Ushakov}, title = {Analysis of a certain polycyclic-group-based cryptosystem}, journal = {J. Math. Cryptol.}, volume = {9}, number = {3}, pages = {161--167}, year = {2015}, url = {http://www.degruyter.com/view/j/jmc.2015.9.issue-3/jmc-2015-0013/jmc-2015-0013.xml}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/KotovU15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/LaineL15, author = {Kim Laine and Kristin E. Lauter}, title = {Time-memory trade-offs for index calculus in genus 3}, journal = {J. Math. Cryptol.}, volume = {9}, number = {2}, pages = {95--114}, year = {2015}, url = {https://doi.org/10.1515/jmc-2014-0033}, doi = {10.1515/JMC-2014-0033}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/LaineL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/LuykxMPW15, author = {Atul Luykx and Bart Mennink and Bart Preneel and Laura Winnen}, title = {Two-permutation-based hashing with binary mixing}, journal = {J. Math. Cryptol.}, volume = {9}, number = {3}, pages = {139--150}, year = {2015}, url = {http://www.degruyter.com/view/j/jmc.2015.9.issue-3/jmc-2015-0015/jmc-2015-0015.xml}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/LuykxMPW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/PatersonS15, author = {Maura B. Paterson and Douglas R. Stinson}, title = {Optimal constructions for ID-based one-way-function key predistribution schemes realizing specified communication graphs}, journal = {J. Math. Cryptol.}, volume = {9}, number = {4}, pages = {215--225}, year = {2015}, url = {http://www.degruyter.com/view/j/jmc.2015.9.issue-4/jmc-2014-0031/jmc-2014-0031.xml}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/PatersonS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/SparrW15, author = {R{\"{u}}diger Sparr and Ralph Wernsdorf}, title = {The round functions of {KASUMI} generate the alternating group}, journal = {J. Math. Cryptol.}, volume = {9}, number = {1}, pages = {23--32}, year = {2015}, url = {https://doi.org/10.1515/jmc-2013-0028}, doi = {10.1515/JMC-2013-0028}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/SparrW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/TsabanL15, author = {Boaz Tsaban and Noam Lifshitz}, title = {Cryptanalysis of the {MORE} symmetric key fully homomorphic encryption scheme}, journal = {J. Math. Cryptol.}, volume = {9}, number = {2}, pages = {75--78}, year = {2015}, url = {https://doi.org/10.1515/jmc-2014-0013}, doi = {10.1515/JMC-2014-0013}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/TsabanL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Yoon15, author = {Kisoon Yoon}, title = {A new method of choosing primitive elements for Brezing-Weng families of pairing-friendly elliptic curves}, journal = {J. Math. Cryptol.}, volume = {9}, number = {1}, pages = {1--9}, year = {2015}, url = {https://doi.org/10.1515/jmc-2013-0017}, doi = {10.1515/JMC-2013-0017}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/Yoon15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/AsgharDPS14, author = {Hassan Jameel Asghar and Yvo Desmedt and Josef Pieprzyk and Ron Steinfeld}, title = {A subexponential construction of graph coloring for multiparty computation}, journal = {J. Math. Cryptol.}, volume = {8}, number = {4}, pages = {363--403}, year = {2014}, url = {http://www.degruyter.com/view/j/jmc.2014.8.issue-4/jmc-2013-0035/jmc-2013-0035.xml}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/AsgharDPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/BosDJ14, author = {Joppe W. Bos and Alina Dudeanu and Dimitar Jetchev}, title = {Collision bounds for the additive Pollard rho algorithm for solving discrete logarithms}, journal = {J. Math. Cryptol.}, volume = {8}, number = {1}, pages = {71--92}, year = {2014}, url = {https://doi.org/10.1515/jmc-2012-0032}, doi = {10.1515/JMC-2012-0032}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/BosDJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/CarletDGM14, author = {Claude Carlet and Jean{-}Luc Danger and Sylvain Guilley and Houssem Maghrebi}, title = {Leakage squeezing: Optimal implementation and security evaluation}, journal = {J. Math. Cryptol.}, volume = {8}, number = {3}, pages = {249--295}, year = {2014}, url = {https://doi.org/10.1515/jmc-2012-0018}, doi = {10.1515/JMC-2012-0018}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/CarletDGM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/ChildsI14, author = {Andrew M. Childs and G{\'{a}}bor Ivanyos}, title = {Quantum computation of discrete logarithms in semigroups}, journal = {J. Math. Cryptol.}, volume = {8}, number = {4}, pages = {405--416}, year = {2014}, url = {http://www.degruyter.com/view/j/jmc.2014.8.issue-4/jmc-2013-0038/jmc-2013-0038.xml}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/ChildsI14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/ChildsJS14, author = {Andrew M. Childs and David Jao and Vladimir Soukharev}, title = {Constructing elliptic curve isogenies in quantum subexponential time}, journal = {J. Math. Cryptol.}, volume = {8}, number = {1}, pages = {1--29}, year = {2014}, url = {https://doi.org/10.1515/jmc-2012-0016}, doi = {10.1515/JMC-2012-0016}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/ChildsJS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/DibertC14, author = {Alexander Dibert and L{\'{a}}szl{\'{o}} Csirmaz}, title = {Infinite secret sharing - Examples}, journal = {J. Math. Cryptol.}, volume = {8}, number = {2}, pages = {141--168}, year = {2014}, url = {https://doi.org/10.1515/jmc-2013-0005}, doi = {10.1515/JMC-2013-0005}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/DibertC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/DuquesneMF14, author = {Sylvain Duquesne and Nadia El Mrabet and Emmanuel Fouotsa}, title = {Efficient computation of pairings on Jacobi quartic elliptic curves}, journal = {J. Math. Cryptol.}, volume = {8}, number = {4}, pages = {331--362}, year = {2014}, url = {http://www.degruyter.com/view/j/jmc.2014.8.issue-4/jmc-2013-0033/jmc-2013-0033.xml}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/DuquesneMF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/FeoJP14, author = {Luca De Feo and David Jao and J{\'{e}}r{\^{o}}me Pl{\^{u}}t}, title = {Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies}, journal = {J. Math. Cryptol.}, volume = {8}, number = {3}, pages = {209--247}, year = {2014}, url = {https://doi.org/10.1515/jmc-2012-0015}, doi = {10.1515/JMC-2012-0015}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/FeoJP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/GalbraithZ14, author = {Steven D. Galbraith and Chang{-}An Zhao}, title = {Erratum Self-pairings on hyperelliptic curves {[J.} Math. Cryptol. 7(2013), 31-42]}, journal = {J. Math. Cryptol.}, volume = {8}, number = {1}, pages = {93}, year = {2014}, url = {https://doi.org/10.1515/jmc-2013-5010}, doi = {10.1515/JMC-2013-5010}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/GalbraithZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/HaridasVV14, author = {Deepthi Haridas and Sarma Venkataraman and Geeta Varadan}, title = {Security analysis of Modified Rivest Scheme}, journal = {J. Math. Cryptol.}, volume = {8}, number = {3}, pages = {297--303}, year = {2014}, url = {https://doi.org/10.1515/jmc-2013-0018}, doi = {10.1515/JMC-2013-0018}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/HaridasVV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Jiang14, author = {Shaoquan Jiang}, title = {Persistent asymmetric password-based key exchange}, journal = {J. Math. Cryptol.}, volume = {8}, number = {1}, pages = {31--70}, year = {2014}, url = {https://doi.org/10.1515/jmc-2012-0010}, doi = {10.1515/JMC-2012-0010}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/Jiang14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Justus14, author = {Benjamin Justus}, title = {The distribution of quadratic residues and non-residues in the Goldwasser-Micali type of cryptosystem}, journal = {J. Math. Cryptol.}, volume = {8}, number = {2}, pages = {115--140}, year = {2014}, url = {https://doi.org/10.1515/jmc-2013-0001}, doi = {10.1515/JMC-2013-0001}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/Justus14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/MyasnikovU14, author = {Alex D. Myasnikov and Alexander Ushakov}, title = {Cryptanalysis of matrix conjugation schemes}, journal = {J. Math. Cryptol.}, volume = {8}, number = {2}, pages = {95--114}, year = {2014}, url = {https://doi.org/10.1515/jmc-2012-0033}, doi = {10.1515/JMC-2012-0033}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/MyasnikovU14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/OmarS14, author = {Sami Omar and Houssem Sabri}, title = {Fast hash functions and convolution product}, journal = {J. Math. Cryptol.}, volume = {8}, number = {2}, pages = {169--187}, year = {2014}, url = {https://doi.org/10.1515/jmc-2013-0014}, doi = {10.1515/JMC-2013-0014}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/OmarS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Sha14, author = {Min Sha}, title = {On the non-idealness of cyclotomic families of pairing-friendly elliptic curves}, journal = {J. Math. Cryptol.}, volume = {8}, number = {4}, pages = {417--440}, year = {2014}, url = {http://www.degruyter.com/view/j/jmc.2014.8.issue-4/jmc-2013-0042/jmc-2013-0042.xml}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/Sha14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/StinsonU14, author = {Douglas R. Stinson and Jalaj Upadhyay}, title = {Is extracting data the same as possessing data?}, journal = {J. Math. Cryptol.}, volume = {8}, number = {2}, pages = {189--207}, year = {2014}, url = {https://doi.org/10.1515/jmc-2013-0034}, doi = {10.1515/JMC-2013-0034}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/StinsonU14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/YasudaYSKK14, author = {Masaya Yasuda and Kazuhiro Yokoyama and Takeshi Shimoyama and Jun Kogure and Takeshi Koshiba}, title = {On the exact decryption range for Gentry-Halevi's implementation of fully homomorphic encryption}, journal = {J. Math. Cryptol.}, volume = {8}, number = {3}, pages = {305--329}, year = {2014}, url = {https://doi.org/10.1515/jmc-2013-0024}, doi = {10.1515/JMC-2013-0024}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/YasudaYSKK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/ChenGK13, author = {Yanling Chen and Danilo Gligoroski and Svein J. Knapskog}, title = {On a special class of multivariate quadratic quasigroups (MQQs)}, journal = {J. Math. Cryptol.}, volume = {7}, number = {2}, pages = {111--141}, year = {2013}, url = {https://doi.org/10.1515/jmc-2012-0006}, doi = {10.1515/JMC-2012-0006}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/ChenGK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/FieldJ13, author = {Rebecca E. Field and Brant C. Jones}, title = {Using carry-truncated addition to analyze add-rotate-xor hash algorithms}, journal = {J. Math. Cryptol.}, volume = {7}, number = {2}, pages = {97--110}, year = {2013}, url = {https://doi.org/10.1515/jmc-2012-0019}, doi = {10.1515/JMC-2012-0019}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/FieldJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/FloriM13, author = {Jean{-}Pierre Flori and Sihem Mesnager}, title = {An efficient characterization of a family of hyper-bent functions with multiple trace terms}, journal = {J. Math. Cryptol.}, volume = {7}, number = {1}, pages = {43--68}, year = {2013}, url = {https://doi.org/10.1515/jmc-2012-0013}, doi = {10.1515/JMC-2012-0013}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/FloriM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/GalbraithZ13, author = {Steven D. Galbraith and Chang{-}An Zhao}, title = {Self-pairings on hyperelliptic curves}, journal = {J. Math. Cryptol.}, volume = {7}, number = {1}, pages = {31--42}, year = {2013}, url = {https://doi.org/10.1515/jmc-2012-0009}, doi = {10.1515/JMC-2012-0009}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/GalbraithZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/GathenS13, author = {Joachim von zur Gathen and Igor E. Shparlinski}, title = {Generating safe primes}, journal = {J. Math. Cryptol.}, volume = {7}, number = {4}, pages = {333--365}, year = {2013}, url = {https://doi.org/10.1515/jmc-2013-5011}, doi = {10.1515/JMC-2013-5011}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/GathenS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/GharahiD13, author = {Motahhareh Gharahi and Massoud Hadian Dehkordi}, title = {Perfect secret sharing schemes for graph access structures on six participants}, journal = {J. Math. Cryptol.}, volume = {7}, number = {2}, pages = {143--146}, year = {2013}, url = {https://doi.org/10.1515/jmc-2012-0026}, doi = {10.1515/JMC-2012-0026}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/GharahiD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/GrosekP13, author = {Otokar Grosek and Stefan Porubsk{\'{y}}}, title = {Coprime solutions to ax{\(\equiv\)}b (mod n)}, journal = {J. Math. Cryptol.}, volume = {7}, number = {3}, pages = {217--224}, year = {2013}, url = {https://doi.org/10.1515/jmc-2013-5003}, doi = {10.1515/JMC-2013-5003}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/GrosekP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/JhanwarS13, author = {Mahabir Prasad Jhanwar and Reihaneh Safavi{-}Naini}, title = {Unconditionally-secure ideal robust secret sharing schemes for threshold and multilevel access structure}, journal = {J. Math. Cryptol.}, volume = {7}, number = {4}, pages = {279--296}, year = {2013}, url = {https://doi.org/10.1515/jmc-2013-5006}, doi = {10.1515/JMC-2013-5006}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/JhanwarS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/KoblitzM13, author = {Neal Koblitz and Alfred Menezes}, title = {Another look at {HMAC}}, journal = {J. Math. Cryptol.}, volume = {7}, number = {3}, pages = {225--251}, year = {2013}, url = {https://doi.org/10.1515/jmc-2013-5004}, doi = {10.1515/JMC-2013-5004}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/KoblitzM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/KurosawaNP13, author = {Kaoru Kurosawa and Ryo Nojima and Le Trieu Phong}, title = {New leakage-resilient CCA-secure public key encryption}, journal = {J. Math. Cryptol.}, volume = {7}, number = {4}, pages = {297--312}, year = {2013}, url = {https://doi.org/10.1515/jmc-2013-5007}, doi = {10.1515/JMC-2013-5007}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/KurosawaNP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Magliveras13, author = {Spyros S. Magliveras}, title = {Foreword}, journal = {J. Math. Cryptol.}, volume = {7}, number = {3}, pages = {181--182}, year = {2013}, url = {https://doi.org/10.1515/jmc-2013-5001}, doi = {10.1515/JMC-2013-5001}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/Magliveras13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/MashrafiBDSW13, author = {Mufeed Al Mashrafi and Harry Bartlett and Ed Dawson and Leonie Simpson and Kenneth Koon{-}Ho Wong}, title = {Indirect message injection for {MAC} generation}, journal = {J. Math. Cryptol.}, volume = {7}, number = {3}, pages = {253--277}, year = {2013}, url = {https://doi.org/10.1515/jmc-2013-5005}, doi = {10.1515/JMC-2013-5005}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/MashrafiBDSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/OrumiehchihaPSB13, author = {Mohammad Ali Orumiehchiha and Josef Pieprzyk and Ron Steinfeld and Harry Bartlett}, title = {Security analysis of linearly filtered NLFSRs}, journal = {J. Math. Cryptol.}, volume = {7}, number = {4}, pages = {313--332}, year = {2013}, url = {https://doi.org/10.1515/jmc-2013-5009}, doi = {10.1515/JMC-2013-5009}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/OrumiehchihaPSB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/PatersonSU13, author = {Maura B. Paterson and Douglas R. Stinson and Jalaj Upadhyay}, title = {A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage}, journal = {J. Math. Cryptol.}, volume = {7}, number = {3}, pages = {183--216}, year = {2013}, url = {https://doi.org/10.1515/jmc-2013-5002}, doi = {10.1515/JMC-2013-5002}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/PatersonSU13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/StaszewskiT13, author = {Reiner Staszewski and Tran van Trung}, title = {Strongly aperiodic logarithmic signatures}, journal = {J. Math. Cryptol.}, volume = {7}, number = {2}, pages = {147--179}, year = {2013}, url = {https://doi.org/10.1515/jmc-2013-5000}, doi = {10.1515/JMC-2013-5000}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/StaszewskiT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/TassaJB13, author = {Tamir Tassa and Ayman Jarrous and Yonatan Ben{-}Ya'akov}, title = {Oblivious evaluation of multivariate polynomials}, journal = {J. Math. Cryptol.}, volume = {7}, number = {1}, pages = {1--29}, year = {2013}, url = {https://doi.org/10.1515/jmc-2012-0007}, doi = {10.1515/JMC-2012-0007}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/TassaJB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/WangL13, author = {Tianze Wang and Dongdai Lin}, title = {A method for counting the number of polynomial equivalence classes}, journal = {J. Math. Cryptol.}, volume = {7}, number = {1}, pages = {69--95}, year = {2013}, url = {https://doi.org/10.1515/jmc-2012-0017}, doi = {10.1515/JMC-2012-0017}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/WangL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Zajac13, author = {Pavol Zajac}, title = {A new method to solve {MRHS} equation systems and its connection to group factorization}, journal = {J. Math. Cryptol.}, volume = {7}, number = {4}, pages = {367--381}, year = {2013}, url = {https://doi.org/10.1515/jmc-2013-5012}, doi = {10.1515/JMC-2013-5012}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/Zajac13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/AttrapadungL12, author = {Nuttapong Attrapadung and Beno{\^{\i}}t Libert}, title = {Functional encryption for public-attribute inner products: Achieving constant-size ciphertexts with adaptive security or support for negation}, journal = {J. Math. Cryptol.}, volume = {5}, number = {2}, pages = {115--158}, year = {2012}, url = {https://doi.org/10.1515/jmc.2011.009}, doi = {10.1515/JMC.2011.009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/AttrapadungL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/BaninT12, author = {Matan Banin and Boaz Tsaban}, title = {The discrete logarithm problem in Bergman's non-representable ring}, journal = {J. Math. Cryptol.}, volume = {6}, number = {2}, pages = {171--182}, year = {2012}, url = {https://doi.org/10.1515/jmc-2012-0014}, doi = {10.1515/JMC-2012-0014}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/BaninT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/BaumeisterW12, author = {Barbara Baumeister and Jan de Wiljes}, title = {Aperiodic logarithmic signatures}, journal = {J. Math. Cryptol.}, volume = {6}, number = {1}, pages = {21--37}, year = {2012}, url = {https://doi.org/10.1515/jmc-2012-0003}, doi = {10.1515/JMC-2012-0003}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/BaumeisterW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Bisson12, author = {Gaetan Bisson}, title = {Computing endomorphism rings of elliptic curves under the {GRH}}, journal = {J. Math. Cryptol.}, volume = {5}, number = {2}, pages = {101--114}, year = {2012}, url = {https://doi.org/10.1515/jmc.2011.008}, doi = {10.1515/JMC.2011.008}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/Bisson12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/BlackburnCM12, author = {Simon R. Blackburn and Carlos Cid and Ciaran Mullan}, title = {Cryptanalysis of three matrix-based key establishment protocols}, journal = {J. Math. Cryptol.}, volume = {5}, number = {2}, pages = {159--168}, year = {2012}, url = {https://doi.org/10.1515/jmc.2011.010}, doi = {10.1515/JMC.2011.010}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/BlackburnCM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/BouillaguetFJT12, author = {Charles Bouillaguet and Pierre{-}Alain Fouque and Antoine Joux and Joana Treger}, title = {A family of weak keys in {HFE} and the corresponding practical key-recovery}, journal = {J. Math. Cryptol.}, volume = {5}, number = {3-4}, pages = {247--275}, year = {2012}, url = {https://doi.org/10.1515/jmc.2011.012}, doi = {10.1515/JMC.2011.012}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/BouillaguetFJT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Boxall12, author = {John Boxall}, title = {Heuristics on pairing-friendly elliptic curves}, journal = {J. Math. Cryptol.}, volume = {6}, number = {2}, pages = {81--104}, year = {2012}, url = {https://doi.org/10.1515/jmc-2011-0004}, doi = {10.1515/JMC-2011-0004}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/Boxall12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/BrownC12, author = {Alyssa Brown and Thomas W. Cusick}, title = {Recursive weights for some Boolean functions}, journal = {J. Math. Cryptol.}, volume = {6}, number = {2}, pages = {105--135}, year = {2012}, url = {https://doi.org/10.1515/jmc-2011-0020}, doi = {10.1515/JMC-2011-0020}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/BrownC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/CheeWZ12, author = {Yeow Meng Chee and Huaxiong Wang and Liang Feng Zhang}, title = {On the Bringer-Chabanne {EPIR} protocol for polynomial evaluation}, journal = {J. Math. Cryptol.}, volume = {5}, number = {3-4}, pages = {277--301}, year = {2012}, url = {https://doi.org/10.1515/jmc-2012-0001}, doi = {10.1515/JMC-2012-0001}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/CheeWZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/FischlinS12, author = {Marc Fischlin and Dominique Schr{\"{o}}der}, title = {Security of blind signatures under aborts and applications to adaptive oblivious transfer}, journal = {J. Math. Cryptol.}, volume = {5}, number = {2}, pages = {169--204}, year = {2012}, url = {https://doi.org/10.1515/jmc.2011.011}, doi = {10.1515/JMC.2011.011}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/FischlinS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Gallant12, author = {Robert P. Gallant}, title = {Finding discrete logarithms with a set orbit distinguisher}, journal = {J. Math. Cryptol.}, volume = {6}, number = {1}, pages = {1--20}, year = {2012}, url = {https://doi.org/10.1515/jmc-2012-0002}, doi = {10.1515/JMC-2012-0002}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/Gallant12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Koblitz12, author = {Neal Koblitz}, title = {Another look at automated theorem-proving {II}}, journal = {J. Math. Cryptol.}, volume = {5}, number = {3-4}, pages = {205--224}, year = {2012}, url = {https://doi.org/10.1515/jmc-2011-0014}, doi = {10.1515/JMC-2011-0014}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/Koblitz12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Maze12, author = {G{\'{e}}rard Maze}, title = {Analysis of a key distribution scheme in secure multicasting}, journal = {J. Math. Cryptol.}, volume = {6}, number = {1}, pages = {69--80}, year = {2012}, url = {https://doi.org/10.1515/jmc-2012-0005}, doi = {10.1515/JMC-2012-0005}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/Maze12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/MoodyW12, author = {Dustin Moody and Hongfeng Wu}, title = {Families of elliptic curves with rational 3-torsion}, journal = {J. Math. Cryptol.}, volume = {5}, number = {3-4}, pages = {225--246}, year = {2012}, url = {https://doi.org/10.1515/jmc-2011-0013}, doi = {10.1515/JMC-2011-0013}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/MoodyW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/MouhaSP12, author = {Nicky Mouha and Gautham Sekar and Bart Preneel}, title = {Challenging the increased resistance of regular hash functions against birthday attacks}, journal = {J. Math. Cryptol.}, volume = {6}, number = {3-4}, pages = {229--248}, year = {2012}, url = {https://doi.org/10.1515/jmc-2011-0010}, doi = {10.1515/JMC-2011-0010}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/MouhaSP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Murphy12, author = {Sean Murphy}, title = {The effectiveness of the linear hull effect}, journal = {J. Math. Cryptol.}, volume = {6}, number = {2}, pages = {137--147}, year = {2012}, url = {https://doi.org/10.1515/jmc-2011-0025}, doi = {10.1515/JMC-2011-0025}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/Murphy12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Okano12, author = {Keiji Okano}, title = {On the {\(\rho\)}-values of complete families of pairing-friendly elliptic curves}, journal = {J. Math. Cryptol.}, volume = {6}, number = {3-4}, pages = {249--268}, year = {2012}, url = {https://doi.org/10.1515/jmc-2012-0011}, doi = {10.1515/JMC-2012-0011}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/Okano12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Persichetti12, author = {Edoardo Persichetti}, title = {Compact McEliece keys based on quasi-dyadic Srivastava codes}, journal = {J. Math. Cryptol.}, volume = {6}, number = {2}, pages = {149--169}, year = {2012}, url = {https://doi.org/10.1515/jmc-2011-0099}, doi = {10.1515/JMC-2011-0099}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/Persichetti12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/SepahiPSS12, author = {Reza Sepahi and Josef Pieprzyk and Siamak Fayyaz Shahandashti and Berry Schoenmakers}, title = {New security notions and relations for public-key encryption}, journal = {J. Math. Cryptol.}, volume = {6}, number = {3-4}, pages = {183--227}, year = {2012}, url = {https://doi.org/10.1515/jmc-2010-0099}, doi = {10.1515/JMC-2010-0099}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/SepahiPSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/WeiW12, author = {Tzer{-}jen Wei and Lih{-}Chung Wang}, title = {A fast mental poker protocol}, journal = {J. Math. Cryptol.}, volume = {6}, number = {1}, pages = {39--68}, year = {2012}, url = {https://doi.org/10.1515/jmc-2012-0004}, doi = {10.1515/JMC-2012-0004}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/WeiW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/CietQS11, author = {Mathieu Ciet and Jean{-}Jacques Quisquater and Francesco Sica}, title = {Compact elliptic curve representations}, journal = {J. Math. Cryptol.}, volume = {5}, number = {1}, pages = {89--100}, year = {2011}, url = {https://doi.org/10.1515/jmc.2011.007}, doi = {10.1515/JMC.2011.007}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/CietQS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Duquesne11, author = {Sylvain Duquesne}, title = {{RNS} arithmetic in pk and application to fast pairing computation}, journal = {J. Math. Cryptol.}, volume = {5}, number = {1}, pages = {51--88}, year = {2011}, url = {https://doi.org/10.1515/jmc.2011.006}, doi = {10.1515/JMC.2011.006}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/Duquesne11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/HisilWCD11, author = {H{\"{u}}seyin Hisil and Kenneth Koon{-}Ho Wong and Gary Carter and Ed Dawson}, title = {An exploration of affine group laws for elliptic curves}, journal = {J. Math. Cryptol.}, volume = {5}, number = {1}, pages = {1--50}, year = {2011}, url = {https://doi.org/10.1515/jmc.2011.005}, doi = {10.1515/JMC.2011.005}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/HisilWCD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Mullan11, author = {Ciaran Mullan}, title = {Cryptanalysing variants of Stickel's key agreement scheme}, journal = {J. Math. Cryptol.}, volume = {4}, number = {4}, pages = {365--373}, year = {2011}, url = {https://doi.org/10.1515/jmc.2011.003}, doi = {10.1515/JMC.2011.003}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/Mullan11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/SinghSS11, author = {Rajesh P. Singh and Anupam Saikia and B. K. Sarma}, title = {Poly-Dragon: an efficient multivariate public key cryptosystem}, journal = {J. Math. Cryptol.}, volume = {4}, number = {4}, pages = {349--364}, year = {2011}, url = {https://doi.org/10.1515/jmc.2011.002}, doi = {10.1515/JMC.2011.002}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/SinghSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Tischhauser11, author = {Elmar Tischhauser}, title = {Nonsmooth cryptanalysis, with an application to the stream cipher {MICKEY}}, journal = {J. Math. Cryptol.}, volume = {4}, number = {4}, pages = {317--348}, year = {2011}, url = {https://doi.org/10.1515/jmc.2011.001}, doi = {10.1515/JMC.2011.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/Tischhauser11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/WolfP11, author = {Christopher Wolf and Bart Preneel}, title = {Equivalent keys in {\(\mathscr{M}\)}ultivariate uadratic public key systems}, journal = {J. Math. Cryptol.}, volume = {4}, number = {4}, pages = {375--415}, year = {2011}, url = {https://doi.org/10.1515/jmc.2011.004}, doi = {10.1515/JMC.2011.004}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/WolfP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/AlomairCP10, author = {Basel Alomair and Andrew Clark and Radha Poovendran}, title = {The power of primes: security of authentication based on a universal hash-function family}, journal = {J. Math. Cryptol.}, volume = {4}, number = {2}, pages = {121--148}, year = {2010}, url = {https://doi.org/10.1515/jmc.2010.005}, doi = {10.1515/JMC.2010.005}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/AlomairCP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Blackburn10, author = {Simon R. Blackburn}, title = {The discrete logarithm problem modulo one: cryptanalysing the Ariffin-Abu cryptosystem}, journal = {J. Math. Cryptol.}, volume = {4}, number = {2}, pages = {193--198}, year = {2010}, url = {https://doi.org/10.1515/jmc.2010.008}, doi = {10.1515/JMC.2010.008}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/Blackburn10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/HakutaST10, author = {Keisuke Hakuta and Hisayoshi Sato and Tsuyoshi Takagi}, title = {Efficient arithmetic on subfield elliptic curves over small finite fields of odd characteristic}, journal = {J. Math. Cryptol.}, volume = {4}, number = {3}, pages = {199--238}, year = {2010}, url = {https://doi.org/10.1515/jmc.2010.009}, doi = {10.1515/JMC.2010.009}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/HakutaST10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/HinekL10, author = {M. Jason Hinek and Charles C. Y. Lam}, title = {Common modulus attacks on small private exponent {RSA} and some fast variants (in practice)}, journal = {J. Math. Cryptol.}, volume = {4}, number = {1}, pages = {58--93}, year = {2010}, url = {https://doi.org/10.1515/jmc.2010.003}, doi = {10.1515/JMC.2010.003}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/HinekL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Karabina10, author = {Koray Karabina}, title = {Factor-4 and 6 compression of cyclotomic subgroups of and}, journal = {J. Math. Cryptol.}, volume = {4}, number = {1}, pages = {1--42}, year = {2010}, url = {https://doi.org/10.1515/jmc.2010.001}, doi = {10.1515/JMC.2010.001}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/Karabina10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/KarabinaMPS10, author = {Koray Karabina and Alfred Menezes and Carl Pomerance and Igor E. Shparlinski}, title = {On the asymptotic effectiveness of Weil descent attacks}, journal = {J. Math. Cryptol.}, volume = {4}, number = {2}, pages = {175--191}, year = {2010}, url = {https://doi.org/10.1515/jmc.2010.007}, doi = {10.1515/JMC.2010.007}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/KarabinaMPS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/KortelainenHK10, author = {Juha Kortelainen and Kimmo Halunen and Tuomas Kortelainen}, title = {Multicollision attacks and generalized iterated hash functions}, journal = {J. Math. Cryptol.}, volume = {4}, number = {3}, pages = {239--270}, year = {2010}, url = {https://doi.org/10.1515/jmc.2010.010}, doi = {10.1515/JMC.2010.010}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/KortelainenHK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Marti-FarreP10, author = {Jaume Mart{\'{\i}}{-}Farr{\'{e}} and Carles Padr{\'{o}}}, title = {On secret sharing schemes, matroids and polymatroids}, journal = {J. Math. Cryptol.}, volume = {4}, number = {2}, pages = {95--120}, year = {2010}, url = {https://doi.org/10.1515/jmc.2010.004}, doi = {10.1515/JMC.2010.004}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/Marti-FarreP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/MosinaU10, author = {Natalia Mosina and Alexander Ushakov}, title = {Mean-set attack: cryptanalysis of Sibert et al. authentication protocol}, journal = {J. Math. Cryptol.}, volume = {4}, number = {2}, pages = {149--174}, year = {2010}, url = {https://doi.org/10.1515/jmc.2010.006}, doi = {10.1515/JMC.2010.006}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/MosinaU10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Shokrieh10, author = {Farbod Shokrieh}, title = {The monodromy pairing and discrete logarithm on the Jacobian of finite graphs}, journal = {J. Math. Cryptol.}, volume = {4}, number = {1}, pages = {43--56}, year = {2010}, url = {https://doi.org/10.1515/jmc.2010.002}, doi = {10.1515/JMC.2010.002}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/Shokrieh10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/SvabaT10, author = {Pavol Svaba and Tran van Trung}, title = {Public key cryptosystem {MST3:} cryptanalysis and realization}, journal = {J. Math. Cryptol.}, volume = {4}, number = {3}, pages = {271--315}, year = {2010}, url = {https://doi.org/10.1515/jmc.2010.011}, doi = {10.1515/JMC.2010.011}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/SvabaT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/0002MS09, author = {Simon Fischer and Willi Meier and Dirk Stegemann}, title = {Some remarks on FCSRs and implications for stream ciphers}, journal = {J. Math. Cryptol.}, volume = {3}, number = {3}, pages = {227--236}, year = {2009}, url = {https://doi.org/10.1515/JMC.2009.013}, doi = {10.1515/JMC.2009.013}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/0002MS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/BettaleFP09, author = {Luk Bettale and Jean{-}Charles Faug{\`{e}}re and Ludovic Perret}, title = {Hybrid approach for solving multivariate systems over finite fields}, journal = {J. Math. Cryptol.}, volume = {3}, number = {3}, pages = {177--197}, year = {2009}, url = {https://doi.org/10.1515/JMC.2009.009}, doi = {10.1515/JMC.2009.009}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/BettaleFP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Blackburn09, author = {Simon R. Blackburn}, title = {Cryptanalysing the critical group: efficiently solving Biggs's discrete logarithm problem}, journal = {J. Math. Cryptol.}, volume = {3}, number = {3}, pages = {199--203}, year = {2009}, url = {https://doi.org/10.1515/JMC.2009.010}, doi = {10.1515/JMC.2009.010}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/Blackburn09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/BlackburnCM09, author = {Simon R. Blackburn and Carlos Cid and Ciaran Mullan}, title = {Cryptanalysis of the {MST} 3 public key cryptosystem}, journal = {J. Math. Cryptol.}, volume = {3}, number = {4}, pages = {321--338}, year = {2009}, url = {https://doi.org/10.1515/JMC.2009.020}, doi = {10.1515/JMC.2009.020}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/BlackburnCM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/BlakeK09, author = {Ian F. Blake and Vladimir Kolesnikov}, title = {One-round secure comparison of integers}, journal = {J. Math. Cryptol.}, volume = {3}, number = {1}, pages = {37--68}, year = {2009}, url = {https://doi.org/10.1515/JMC.2009.003}, doi = {10.1515/JMC.2009.003}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/BlakeK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Bockle09, author = {Gebhard B{\"{o}}ckle}, title = {The Miller-Rabin test with randomized exponents}, journal = {J. Math. Cryptol.}, volume = {3}, number = {4}, pages = {307--319}, year = {2009}, url = {https://doi.org/10.1515/JMC.2009.019}, doi = {10.1515/JMC.2009.019}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/Bockle09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/BourgeoisF09, author = {Gerald Bourgeois and Jean{-}Charles Faug{\`{e}}re}, title = {Algebraic attack on {NTRU} using Witt vectors and Gr{\"{o}}bner bases}, journal = {J. Math. Cryptol.}, volume = {3}, number = {3}, pages = {205--214}, year = {2009}, url = {https://doi.org/10.1515/JMC.2009.011}, doi = {10.1515/JMC.2009.011}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/BourgeoisF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/BrandstatterW09, author = {Nina Brandst{\"{a}}tter and Arne Winterhof}, title = {-error linear complexity over p of subsequences of Sidelnikov sequences of period (pr - 1)/3}, journal = {J. Math. Cryptol.}, volume = {3}, number = {3}, pages = {215--225}, year = {2009}, url = {https://doi.org/10.1515/JMC.2009.012}, doi = {10.1515/JMC.2009.012}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/BrandstatterW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/ColbournL09, author = {Charles J. Colbourn and Alan C. H. Ling}, title = {A recursive construction for perfect hash families}, journal = {J. Math. Cryptol.}, volume = {3}, number = {4}, pages = {291--306}, year = {2009}, url = {https://doi.org/10.1515/JMC.2009.018}, doi = {10.1515/JMC.2009.018}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/ColbournL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/CusickLS09, author = {Thomas W. Cusick and Yuan Li and Pantelimon Stanica}, title = {On a conjecture for balanced symmetric Boolean functions}, journal = {J. Math. Cryptol.}, volume = {3}, number = {4}, pages = {273--290}, year = {2009}, url = {https://doi.org/10.1515/JMC.2009.017}, doi = {10.1515/JMC.2009.017}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/CusickLS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/FarashahiSV09, author = {Reza Rezaeian Farashahi and Igor E. Shparlinski and Jos{\'{e}} Felipe Voloch}, title = {On hashing into elliptic curves}, journal = {J. Math. Cryptol.}, volume = {3}, number = {4}, pages = {353--360}, year = {2009}, url = {https://doi.org/10.1515/JMC.2009.022}, doi = {10.1515/JMC.2009.022}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/FarashahiSV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/FriedlanderS09, author = {John B. Friedlander and Igor E. Shparlinski}, title = {On the density of some special primes}, journal = {J. Math. Cryptol.}, volume = {3}, number = {3}, pages = {265--271}, year = {2009}, url = {https://doi.org/10.1515/JMC.2009.016}, doi = {10.1515/JMC.2009.016}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/FriedlanderS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/GaalP09, author = {Istv{\'{a}}n Ga{\'{a}}l and Michael E. Pohst}, title = {On solving norm equations in global function fields}, journal = {J. Math. Cryptol.}, volume = {3}, number = {3}, pages = {237--248}, year = {2009}, url = {https://doi.org/10.1515/JMC.2009.014}, doi = {10.1515/JMC.2009.014}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/GaalP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/GalbraithPRS09, author = {Steven D. Galbraith and Jordi Pujol{\`{a}}s and Christophe Ritzenthaler and Benjamin A. Smith}, title = {Distortion maps for supersingular genus two curves}, journal = {J. Math. Cryptol.}, volume = {3}, number = {1}, pages = {1--18}, year = {2009}, url = {https://doi.org/10.1515/JMC.2009.001}, doi = {10.1515/JMC.2009.001}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/GalbraithPRS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/GathenS09, author = {Joachim von zur Gathen and Igor E. Shparlinski}, title = {Subset sum pseudorandom numbers: fast generation and distribution}, journal = {J. Math. Cryptol.}, volume = {3}, number = {2}, pages = {149--163}, year = {2009}, url = {https://doi.org/10.1515/JMC.2009.007}, doi = {10.1515/JMC.2009.007}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/GathenS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Gutierrez09, author = {Jaime Gutierrez}, title = {Foreword. Second Workshop on Mathematical Cryptology}, journal = {J. Math. Cryptol.}, volume = {3}, number = {3}, pages = {175--176}, year = {2009}, url = {https://doi.org/10.1515/JMC.2009.008a}, doi = {10.1515/JMC.2009.008A}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/Gutierrez09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/HinekL09, author = {M. Jason Hinek and Charles C. Y. Lam}, title = {Another look at some fast modular arithmetic methods}, journal = {J. Math. Cryptol.}, volume = {3}, number = {2}, pages = {165--174}, year = {2009}, url = {https://doi.org/10.1515/JMC.2009.008}, doi = {10.1515/JMC.2009.008}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/HinekL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Hitt09, author = {Laura Hitt}, title = {Families of genus 2 curves with small embedding degree}, journal = {J. Math. Cryptol.}, volume = {3}, number = {1}, pages = {19--36}, year = {2009}, url = {https://doi.org/10.1515/JMC.2009.002}, doi = {10.1515/JMC.2009.002}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/Hitt09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/LambergerNR09, author = {Mario Lamberger and Tomislav Nad and Vincent Rijmen}, title = {Numerical solvers and cryptanalysis}, journal = {J. Math. Cryptol.}, volume = {3}, number = {3}, pages = {249--263}, year = {2009}, url = {https://doi.org/10.1515/JMC.2009.015}, doi = {10.1515/JMC.2009.015}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/LambergerNR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Nandi09, author = {Mridul Nandi}, title = {Improved security analysis for {OMAC} as a pseudorandom function}, journal = {J. Math. Cryptol.}, volume = {3}, number = {2}, pages = {133--148}, year = {2009}, url = {https://doi.org/10.1515/JMC.2009.006}, doi = {10.1515/JMC.2009.006}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/Nandi09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/NevenSW09, author = {Gregory Neven and Nigel P. Smart and Bogdan Warinschi}, title = {Hash function requirements for Schnorr signatures}, journal = {J. Math. Cryptol.}, volume = {3}, number = {1}, pages = {69--87}, year = {2009}, url = {https://doi.org/10.1515/JMC.2009.004}, doi = {10.1515/JMC.2009.004}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/NevenSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/SaxenaS09, author = {Amitabh Saxena and Ben Soh}, title = {A cryptographic primitive based on hidden-order groups}, journal = {J. Math. Cryptol.}, volume = {3}, number = {2}, pages = {89--132}, year = {2009}, url = {https://doi.org/10.1515/JMC.2009.005}, doi = {10.1515/JMC.2009.005}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/SaxenaS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/WuS09, author = {Jiang Wu and Douglas R. Stinson}, title = {An efficient identification protocol secure against concurrent-reset attacks}, journal = {J. Math. Cryptol.}, volume = {3}, number = {4}, pages = {339--352}, year = {2009}, url = {https://doi.org/10.1515/JMC.2009.021}, doi = {10.1515/JMC.2009.021}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/WuS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/AvanziTW08, author = {Roberto Avanzi and Nicolas Th{\'{e}}riault and Zheng Wang}, title = {Rethinking low genus hyperelliptic Jacobian arithmetic over binary fields: interplay of field arithmetic and explicit formul{\ae}}, journal = {J. Math. Cryptol.}, volume = {2}, number = {3}, pages = {227--255}, year = {2008}, url = {https://doi.org/10.1515/JMC.2008.011}, doi = {10.1515/JMC.2008.011}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/AvanziTW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/BasuGMP08, author = {Riddhipratim Basu and Shirshendu Ganguly and Subhamoy Maitra and Goutam Paul}, title = {A complete characterization of the evolution of {RC4} pseudo random generation algorithm}, journal = {J. Math. Cryptol.}, volume = {2}, number = {3}, pages = {257--289}, year = {2008}, url = {https://doi.org/10.1515/JMC.2008.012}, doi = {10.1515/JMC.2008.012}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/BasuGMP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/DemirkiranN08, author = {Cevahir Demirkiran and Enric Nart}, title = {Counting hyperelliptic curves that admit a Koblitz model}, journal = {J. Math. Cryptol.}, volume = {2}, number = {2}, pages = {163--179}, year = {2008}, url = {https://doi.org/10.1515/JMC.2008.008}, doi = {10.1515/JMC.2008.008}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/DemirkiranN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/FancsaliL08, author = {Szabolcs L. Fancsali and P{\'{e}}ter Ligeti}, title = {Some applications of finite geometry for secure network coding}, journal = {J. Math. Cryptol.}, volume = {2}, number = {3}, pages = {209--225}, year = {2008}, url = {https://doi.org/10.1515/JMC.2008.010}, doi = {10.1515/JMC.2008.010}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/FancsaliL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/FrougnyS08, author = {Christiane Frougny and Wolfgang Steiner}, title = {Minimal weight expansions in Pisot bases}, journal = {J. Math. Cryptol.}, volume = {2}, number = {4}, pages = {365--392}, year = {2008}, url = {https://doi.org/10.1515/JMC.2008.017}, doi = {10.1515/JMC.2008.017}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/FrougnyS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Fuji-HaraLMW08, author = {Ryoh Fuji{-}Hara and Xiyang Li and Ying Miao and Dianhua Wu}, title = {A {TWOOA} construction for multi-receiver multi-message authentication codes}, journal = {J. Math. Cryptol.}, volume = {2}, number = {1}, pages = {9--28}, year = {2008}, url = {https://doi.org/10.1515/JMC.2008.002}, doi = {10.1515/JMC.2008.002}, timestamp = {Tue, 29 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/Fuji-HaraLMW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/HartungS08, author = {Rupert J. Hartung and Claus{-}Peter Schnorr}, title = {Identification and signatures based on NP-hard problems of indefinite quadratic forms}, journal = {J. Math. Cryptol.}, volume = {2}, number = {4}, pages = {327--341}, year = {2008}, url = {https://doi.org/10.1515/JMC.2008.015}, doi = {10.1515/JMC.2008.015}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/HartungS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Hinek08, author = {M. Jason Hinek}, title = {On the security of multi-prime {RSA}}, journal = {J. Math. Cryptol.}, volume = {2}, number = {2}, pages = {117--147}, year = {2008}, url = {https://doi.org/10.1515/JMC.2008.006}, doi = {10.1515/JMC.2008.006}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/Hinek08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/KoblitzM08, author = {Neal Koblitz and Alfred Menezes}, title = {Another look at non-standard discrete log and Diffie-Hellman problems}, journal = {J. Math. Cryptol.}, volume = {2}, number = {4}, pages = {311--326}, year = {2008}, url = {https://doi.org/10.1515/JMC.2008.014}, doi = {10.1515/JMC.2008.014}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/KoblitzM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/LongriggU08, author = {Jonathan Longrigg and Alexander Ushakov}, title = {Cryptanalysis of the shifted conjugacy authentication protocol}, journal = {J. Math. Cryptol.}, volume = {2}, number = {2}, pages = {109--116}, year = {2008}, url = {https://doi.org/10.1515/JMC.2008.005}, doi = {10.1515/JMC.2008.005}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/LongriggU08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Mie08, author = {Thilo Mie}, title = {Polylogarithmic two-round argument systems}, journal = {J. Math. Cryptol.}, volume = {2}, number = {4}, pages = {343--363}, year = {2008}, url = {https://doi.org/10.1515/JMC.2008.016}, doi = {10.1515/JMC.2008.016}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/Mie08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Morales08, author = {David J. Mireles Morales}, title = {An attack on disguised elliptic curves}, journal = {J. Math. Cryptol.}, volume = {2}, number = {1}, pages = {1--8}, year = {2008}, url = {https://doi.org/10.1515/JMC.2008.001}, doi = {10.1515/JMC.2008.001}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/Morales08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/MurphyP08, author = {Sean Murphy and Maura B. Paterson}, title = {A geometric view of cryptographic equation solving}, journal = {J. Math. Cryptol.}, volume = {2}, number = {1}, pages = {63--107}, year = {2008}, url = {https://doi.org/10.1515/JMC.2008.004}, doi = {10.1515/JMC.2008.004}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/MurphyP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/MyasnikovU08, author = {Alexei G. Myasnikov and Alexander Ushakov}, title = {Random subgroups and analysis of the length-based and quotient attacks}, journal = {J. Math. Cryptol.}, volume = {2}, number = {1}, pages = {29--61}, year = {2008}, url = {https://doi.org/10.1515/JMC.2008.003}, doi = {10.1515/JMC.2008.003}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/MyasnikovU08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/NandiM08, author = {Mridul Nandi and Avradip Mandal}, title = {Improved security analysis of {PMAC}}, journal = {J. Math. Cryptol.}, volume = {2}, number = {2}, pages = {149--162}, year = {2008}, url = {https://doi.org/10.1515/JMC.2008.007}, doi = {10.1515/JMC.2008.007}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/NandiM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/NguyenV08, author = {Phong Q. Nguyen and Thomas Vidick}, title = {Sieve algorithms for the shortest vector problem are practical}, journal = {J. Math. Cryptol.}, volume = {2}, number = {2}, pages = {181--207}, year = {2008}, url = {https://doi.org/10.1515/JMC.2008.009}, doi = {10.1515/JMC.2008.009}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/NguyenV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/PatersonS08, author = {Maura B. Paterson and Douglas R. Stinson}, title = {Two attacks on a sensor network key distribution scheme of Cheng and Agrawal}, journal = {J. Math. Cryptol.}, volume = {2}, number = {4}, pages = {393--403}, year = {2008}, url = {https://doi.org/10.1515/JMC.2008.018}, doi = {10.1515/JMC.2008.018}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/PatersonS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Schindler08, author = {Werner Schindler}, title = {Advanced stochastic methods in side channel analysis on block ciphers in the presence of masking}, journal = {J. Math. Cryptol.}, volume = {2}, number = {3}, pages = {291--310}, year = {2008}, url = {https://doi.org/10.1515/JMC.2008.013}, doi = {10.1515/JMC.2008.013}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/Schindler08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/AlyMW07, author = {Hassan Aly and Wilfried Meidl and Arne Winterhof}, title = {On the k-error linear complexity of cyclotomic sequences}, journal = {J. Math. Cryptol.}, volume = {1}, number = {3}, pages = {283--296}, year = {2007}, url = {https://doi.org/10.1515/JMC.2007.014}, doi = {10.1515/JMC.2007.014}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/AlyMW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/AravamuthanL07, author = {Sarang Aravamuthan and Sachin Lodha}, title = {The average transmission overhead for broadcast encryption}, journal = {J. Math. Cryptol.}, volume = {1}, number = {4}, pages = {373}, year = {2007}, url = {http://www.degruyter.com/view/j/jmc.2007.1.issue-4/jmc.2007.019/jmc.2007.019.xml}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/AravamuthanL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/BlakeS07, author = {Ian F. Blake and Igor E. Shparlinski}, title = {Statistical distribution and collisions of {VSH}}, journal = {J. Math. Cryptol.}, volume = {1}, number = {4}, pages = {329--349}, year = {2007}, url = {https://doi.org/10.1515/jmc.2007.016}, doi = {10.1515/JMC.2007.016}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/BlakeS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/ChoiBW07, author = {Su{-}Jeong Choi and Simon R. Blackburn and Peter R. Wild}, title = {Cryptanalysis of a homomorphic public-key cryptosystem over a finite group}, journal = {J. Math. Cryptol.}, volume = {1}, number = {4}, pages = {351--358}, year = {2007}, url = {https://doi.org/10.1515/jmc.2007.017}, doi = {10.1515/JMC.2007.017}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/ChoiBW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/DaemenR07, author = {Joan Daemen and Vincent Rijmen}, title = {Probability distributions of correlation and differentials in block ciphers}, journal = {J. Math. Cryptol.}, volume = {1}, number = {3}, pages = {221--242}, year = {2007}, url = {https://doi.org/10.1515/JMC.2007.011}, doi = {10.1515/JMC.2007.011}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/DaemenR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/EngelbertOS07, author = {Daniela Engelbert and Raphael Overbeck and Arthur Schmidt}, title = {A Summary of McEliece-Type Cryptosystems and their Security}, journal = {J. Math. Cryptol.}, volume = {1}, number = {2}, pages = {151--199}, year = {2007}, url = {https://doi.org/10.1515/JMC.2007.009}, doi = {10.1515/JMC.2007.009}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/EngelbertOS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/GalbraithhS07, author = {Steven D. Galbraith and Colm O'hEigeartaigh and Caroline Sheedy}, title = {Simplified pairing computation and security implications}, journal = {J. Math. Cryptol.}, volume = {1}, number = {3}, pages = {267--281}, year = {2007}, url = {https://doi.org/10.1515/JMC.2007.013}, doi = {10.1515/JMC.2007.013}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/GalbraithhS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Gaudry07, author = {Pierrick Gaudry}, title = {Fast genus 2 arithmetic based on Theta functions}, journal = {J. Math. Cryptol.}, volume = {1}, number = {3}, pages = {243--265}, year = {2007}, url = {https://doi.org/10.1515/JMC.2007.012}, doi = {10.1515/JMC.2007.012}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/Gaudry07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/HarayamaF07, author = {Tomohiro Harayama and Donald K. Friesen}, title = {Weil sum for birthday attack in multivariate quadratic cryptosystem}, journal = {J. Math. Cryptol.}, volume = {1}, number = {1}, pages = {79--104}, year = {2007}, url = {https://doi.org/10.1515/JMC.2007.006}, doi = {10.1515/JMC.2007.006}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/HarayamaF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/HeubergerM07, author = {Clemens Heuberger and James A. Muir}, title = {Minimal weight and colexicographically minimal integer representations}, journal = {J. Math. Cryptol.}, volume = {1}, number = {4}, pages = {297--328}, year = {2007}, url = {https://doi.org/10.1515/jmc.2007.015}, doi = {10.1515/JMC.2007.015}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/HeubergerM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Koblitz07, author = {Neal Koblitz}, title = {Another look at automated theorem-proving}, journal = {J. Math. Cryptol.}, volume = {1}, number = {4}, pages = {385--403}, year = {2007}, url = {https://doi.org/10.1515/jmc.2007.020}, doi = {10.1515/JMC.2007.020}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/Koblitz07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/LangeS07, author = {Tanja Lange and Igor E. Shparlinski}, title = {Distribution of some sequences of points on elliptic curves}, journal = {J. Math. Cryptol.}, volume = {1}, number = {1}, pages = {1--11}, year = {2007}, url = {https://doi.org/10.1515/JMC.2007.001}, doi = {10.1515/JMC.2007.001}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/LangeS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/LiC07, author = {Yuan Li and Thomas W. Cusick}, title = {Strict avalanche criterion over finite fields}, journal = {J. Math. Cryptol.}, volume = {1}, number = {1}, pages = {65--78}, year = {2007}, url = {https://doi.org/10.1515/JMC.2007.005}, doi = {10.1515/JMC.2007.005}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/LiC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/MartinN07, author = {Keith M. Martin and Siaw{-}Lynn Ng}, title = {The combinatorics of generalised cumulative arrays}, journal = {J. Math. Cryptol.}, volume = {1}, number = {1}, pages = {13--32}, year = {2007}, url = {https://doi.org/10.1515/JMC.2007.002}, doi = {10.1515/JMC.2007.002}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/MartinN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Menezes07, author = {Alfred Menezes}, title = {Another look at {HMQV}}, journal = {J. Math. Cryptol.}, volume = {1}, number = {1}, pages = {47--64}, year = {2007}, url = {https://doi.org/10.1515/JMC.2007.004}, doi = {10.1515/JMC.2007.004}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/Menezes07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/RuinskiyST07, author = {Dima Ruinskiy and Adi Shamir and Boaz Tsaban}, title = {Length-based cryptanalysis: the case of Thompson's group}, journal = {J. Math. Cryptol.}, volume = {1}, number = {4}, pages = {359--372}, year = {2007}, url = {https://doi.org/10.1515/jmc.2007.018}, doi = {10.1515/JMC.2007.018}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/RuinskiyST07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Silverman07, author = {Robert D. Silverman}, title = {Optimal Parameterization of {SNFS}}, journal = {J. Math. Cryptol.}, volume = {1}, number = {2}, pages = {105--124}, year = {2007}, url = {https://doi.org/10.1515/JMC.2007.007}, doi = {10.1515/JMC.2007.007}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/Silverman07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/StinsonW07, author = {Douglas R. Stinson and Ruizhong Wei}, title = {Some results on query processes and reconstruction functions for unconditionally secure 2-server 1-round binary private information retrieval protocols}, journal = {J. Math. Cryptol.}, volume = {1}, number = {1}, pages = {33--46}, year = {2007}, url = {https://doi.org/10.1515/JMC.2007.003}, doi = {10.1515/JMC.2007.003}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/StinsonW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/StinsonW07a, author = {Douglas R. Stinson and Jiang Wu}, title = {An efficient and secure two-flow zero-knowledge identification protocol}, journal = {J. Math. Cryptol.}, volume = {1}, number = {3}, pages = {201--220}, year = {2007}, url = {https://doi.org/10.1515/JMC.2007.010}, doi = {10.1515/JMC.2007.010}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/StinsonW07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/WalkerC07, author = {Robert A. Walker and Charles J. Colbourn}, title = {Perfect Hash Families: Constructions and Existence}, journal = {J. Math. Cryptol.}, volume = {1}, number = {2}, pages = {125--150}, year = {2007}, url = {https://doi.org/10.1515/JMC.2007.008}, doi = {10.1515/JMC.2007.008}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/WalkerC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.