Search dblp for Publications

export results for "stream:journals/jmc:"

 download as .bib file

@article{DBLP:journals/jmc/CalderiniCI24,
  author       = {Marco Calderini and
                  Roberto Civino and
                  Riccardo Invernizzi},
  title        = {Differential experiments using parallel alternative operations},
  journal      = {J. Math. Cryptol.},
  volume       = {18},
  number       = {1},
  year         = {2024},
  url          = {https://doi.org/10.1515/jmc-2023-0030},
  doi          = {10.1515/JMC-2023-0030},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/CalderiniCI24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/CalderiniLSV24,
  author       = {Marco Calderini and
                  Riccardo Longo and
                  Massimiliano Sala and
                  Irene Villa},
  title        = {Searchable encryption with randomized ciphertext and randomized keyword
                  search},
  journal      = {J. Math. Cryptol.},
  volume       = {18},
  number       = {1},
  year         = {2024},
  url          = {https://doi.org/10.1515/jmc-2023-0029},
  doi          = {10.1515/JMC-2023-0029},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/CalderiniLSV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/CianfrigliaOP24,
  author       = {Marco Cianfriglia and
                  Elia Onofri and
                  Marco Pedicini},
  title        = {mRLWE-CP-ABE: {A} revocable {CP-ABE} for post-quantum cryptography},
  journal      = {J. Math. Cryptol.},
  volume       = {18},
  number       = {1},
  year         = {2024},
  url          = {https://doi.org/10.1515/jmc-2023-0026},
  doi          = {10.1515/JMC-2023-0026},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/CianfrigliaOP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/ErdelyiHKN24,
  author       = {M{\'{a}}rton Erd{\'{e}}lyi and
                  P{\'{a}}l Heged{\"{u}}s and
                  S{\'{a}}ndor Z. Kiss and
                  G{\'{a}}bor P{\'{e}}ter Nagy},
  title        = {On linear codes with random multiplier vectors and the maximum trace
                  dimension property},
  journal      = {J. Math. Cryptol.},
  volume       = {18},
  number       = {1},
  year         = {2024},
  url          = {https://doi.org/10.1515/jmc-2023-0022},
  doi          = {10.1515/JMC-2023-0022},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/ErdelyiHKN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/GhantousPV24,
  author       = {Wissam Ghantous and
                  Federico Pintore and
                  Mattia Veroni},
  title        = {Efficiency of SIDH-based signatures (yes, {SIDH)}},
  journal      = {J. Math. Cryptol.},
  volume       = {18},
  number       = {1},
  year         = {2024},
  url          = {https://doi.org/10.1515/jmc-2023-0023},
  doi          = {10.1515/JMC-2023-0023},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/GhantousPV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/RouquetteMS24,
  author       = {Lo{\"{\i}}c Rouquette and
                  Marine Minier and
                  Christine Solnon},
  title        = {Automatic boomerang attacks search on Rijndael},
  journal      = {J. Math. Cryptol.},
  volume       = {18},
  number       = {1},
  year         = {2024},
  url          = {https://doi.org/10.1515/jmc-2023-0027},
  doi          = {10.1515/JMC-2023-0027},
  timestamp    = {Wed, 20 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/RouquetteMS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/SalaT24,
  author       = {Massimiliano Sala and
                  Daniele Taufer},
  title        = {Group structure of elliptic curves over {\(\mathbb{Z}\)}/N{\(\mathbb{Z}\)}},
  journal      = {J. Math. Cryptol.},
  volume       = {18},
  number       = {1},
  year         = {2024},
  url          = {https://doi.org/10.1515/jmc-2023-0025},
  doi          = {10.1515/JMC-2023-0025},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/SalaT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Timpanella24,
  author       = {Marco Timpanella},
  title        = {On a generalization of the Deligne-Lusztig curve of Suzuki type and
                  application to {AG} codes},
  journal      = {J. Math. Cryptol.},
  volume       = {18},
  number       = {1},
  year         = {2024},
  url          = {https://doi.org/10.1515/jmc-2023-0024},
  doi          = {10.1515/JMC-2023-0024},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/Timpanella24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/YamashitaH24,
  author       = {Kyosuke Yamashita and
                  Keisuke Hara},
  title        = {On the Black-Box impossibility of multi-designated verifiers signature
                  schemes from ring signature schemes},
  journal      = {J. Math. Cryptol.},
  volume       = {18},
  number       = {1},
  year         = {2024},
  url          = {https://doi.org/10.1515/jmc-2023-0028},
  doi          = {10.1515/JMC-2023-0028},
  timestamp    = {Wed, 20 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/YamashitaH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Brown23,
  author       = {Daniel R. L. Brown},
  title        = {Plactic key agreement (insecure?)},
  journal      = {J. Math. Cryptol.},
  volume       = {17},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.1515/jmc-2022-0010},
  doi          = {10.1515/JMC-2022-0010},
  timestamp    = {Fri, 17 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/Brown23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Anokhin22,
  author       = {Mikhail Anokhin},
  title        = {Pseudo-free families and cryptographic primitives},
  journal      = {J. Math. Cryptol.},
  volume       = {16},
  number       = {1},
  pages        = {114--140},
  year         = {2022},
  url          = {https://doi.org/10.1515/jmc-2020-0055},
  doi          = {10.1515/JMC-2020-0055},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/Anokhin22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/BabinkostovaCKN22,
  author       = {Liljana Babinkostova and
                  Ariana Chin and
                  Aaron Kirtland and
                  Vladyslav Nazarchuk and
                  Esther Plotnick},
  title        = {The polynomial learning with errors problem and the smearing condition},
  journal      = {J. Math. Cryptol.},
  volume       = {16},
  number       = {1},
  pages        = {215--232},
  year         = {2022},
  url          = {https://doi.org/10.1515/jmc-2020-0035},
  doi          = {10.1515/JMC-2020-0035},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/BabinkostovaCKN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/BassoP22,
  author       = {Andrea Basso and
                  Fabien Pazuki},
  title        = {On the supersingular {GPST} attack},
  journal      = {J. Math. Cryptol.},
  volume       = {16},
  number       = {1},
  pages        = {14--19},
  year         = {2022},
  url          = {https://doi.org/10.1515/jmc-2021-0020},
  doi          = {10.1515/JMC-2021-0020},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/BassoP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/BattarbeeKTS22,
  author       = {Christopher Battarbee and
                  Delaram Kahrobaei and
                  Dylan Tailor and
                  Siamak F. Shahandashti},
  title        = {On the efficiency of a general attack against the {MOBS} cryptosystem},
  journal      = {J. Math. Cryptol.},
  volume       = {16},
  number       = {1},
  pages        = {289--297},
  year         = {2022},
  url          = {https://doi.org/10.1515/jmc-2021-0050},
  doi          = {10.1515/JMC-2021-0050},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/BattarbeeKTS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/BrownKL22,
  author       = {Daniel R. L. Brown and
                  Neal Koblitz and
                  Jason T. LeGrow},
  title        = {Cryptanalysis of "MAKE"},
  journal      = {J. Math. Cryptol.},
  volume       = {16},
  number       = {1},
  pages        = {98--102},
  year         = {2022},
  url          = {https://doi.org/10.1515/jmc-2021-0016},
  doi          = {10.1515/JMC-2021-0016},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/BrownKL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/ChakrabortyN22,
  author       = {Bishwajit Chakraborty and
                  Mridul Nandi},
  title        = {The mF mode of authenticated encryption with associated data},
  journal      = {J. Math. Cryptol.},
  volume       = {16},
  number       = {1},
  pages        = {73--97},
  year         = {2022},
  url          = {https://doi.org/10.1515/jmc-2020-0054},
  doi          = {10.1515/JMC-2020-0054},
  timestamp    = {Mon, 26 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/ChakrabortyN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/CravenW22,
  author       = {Matthew J. Craven and
                  John R. Woodward},
  title        = {Evolution of group-theoretic cryptology attacks using hyper-heuristics},
  journal      = {J. Math. Cryptol.},
  volume       = {16},
  number       = {1},
  pages        = {49--63},
  year         = {2022},
  url          = {https://doi.org/10.1515/jmc-2021-0017},
  doi          = {10.1515/JMC-2021-0017},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/CravenW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/DadhwalP22,
  author       = {Madhu Dadhwal and
                  Pankaj},
  title        = {Group codes over binary tetrahedral group},
  journal      = {J. Math. Cryptol.},
  volume       = {16},
  number       = {1},
  pages        = {310--319},
  year         = {2022},
  url          = {https://doi.org/10.1515/jmc-2022-0009},
  doi          = {10.1515/JMC-2022-0009},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/DadhwalP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/DuzluK22,
  author       = {Samed D{\"{u}}zl{\"{u}} and
                  Juliane Kr{\"{a}}mer},
  title        = {Application of automorphic forms to lattice problems},
  journal      = {J. Math. Cryptol.},
  volume       = {16},
  number       = {1},
  pages        = {156--197},
  year         = {2022},
  url          = {https://doi.org/10.1515/jmc-2021-0045},
  doi          = {10.1515/JMC-2021-0045},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/DuzluK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/HanZ22,
  author       = {Jiao Han and
                  Jincheng Zhuang},
  title        = {{DLP} in semigroups: Algorithms and lower bounds},
  journal      = {J. Math. Cryptol.},
  volume       = {16},
  number       = {1},
  pages        = {278--288},
  year         = {2022},
  url          = {https://doi.org/10.1515/jmc-2021-0049},
  doi          = {10.1515/JMC-2021-0049},
  timestamp    = {Sun, 07 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/HanZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Koshelev22,
  author       = {Dmitrii I. Koshelev},
  title        = {The most efficient indifferentiable hashing to elliptic curves of\emph{j}-invariant
                  1728},
  journal      = {J. Math. Cryptol.},
  volume       = {16},
  number       = {1},
  pages        = {298--309},
  year         = {2022},
  url          = {https://doi.org/10.1515/jmc-2021-0051},
  doi          = {10.1515/JMC-2021-0051},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/Koshelev22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/MejiaM22,
  author       = {Carolina Mej{\'{\i}}a and
                  Juan Andr{\'{e}}s Montoya},
  title        = {Abelian sharing, common informations, and linear rank inequalities},
  journal      = {J. Math. Cryptol.},
  volume       = {16},
  number       = {1},
  pages        = {233--250},
  year         = {2022},
  url          = {https://doi.org/10.1515/jmc-2022-0020},
  doi          = {10.1515/JMC-2022-0020},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/MejiaM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/MishraP22,
  author       = {Prasanna Raghaw Mishra and
                  Shashi Kant Pandey},
  title        = {On the algebraic immunity of multiplexer Boolean functions},
  journal      = {J. Math. Cryptol.},
  volume       = {16},
  number       = {1},
  pages        = {198--204},
  year         = {2022},
  url          = {https://doi.org/10.1515/jmc-2021-0027},
  doi          = {10.1515/JMC-2021-0027},
  timestamp    = {Fri, 25 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/MishraP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Qi22,
  author       = {Mingping Qi},
  title        = {An efficient post-quantum {KEM} from {CSIDH}},
  journal      = {J. Math. Cryptol.},
  volume       = {16},
  number       = {1},
  pages        = {103--113},
  year         = {2022},
  url          = {https://doi.org/10.1515/jmc-2022-0007},
  doi          = {10.1515/JMC-2022-0007},
  timestamp    = {Mon, 26 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/Qi22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/RahmanS22,
  author       = {Nael Rahman and
                  Vladimir Shpilrain},
  title        = {{MAKE:} {A} matrix action key exchange},
  journal      = {J. Math. Cryptol.},
  volume       = {16},
  number       = {1},
  pages        = {64--72},
  year         = {2022},
  url          = {https://doi.org/10.1515/jmc-2020-0053},
  doi          = {10.1515/JMC-2020-0053},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/RahmanS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/SantiniPB22,
  author       = {Paolo Santini and
                  Edoardo Persichetti and
                  Marco Baldi},
  title        = {Reproducible families of codes and cryptographic applications},
  journal      = {J. Math. Cryptol.},
  volume       = {16},
  number       = {1},
  pages        = {20--48},
  year         = {2022},
  url          = {https://doi.org/10.1515/jmc-2020-0003},
  doi          = {10.1515/JMC-2020-0003},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/SantiniPB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/SharafiD22,
  author       = {Javad Sharafi and
                  Hassan Daghigh},
  title        = {A Ring-LWE-based digital signature inspired by Lindner-Peikert scheme},
  journal      = {J. Math. Cryptol.},
  volume       = {16},
  number       = {1},
  pages        = {205--214},
  year         = {2022},
  url          = {https://doi.org/10.1515/jmc-2021-0013},
  doi          = {10.1515/JMC-2021-0013},
  timestamp    = {Mon, 26 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/SharafiD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/TinaniR22,
  author       = {Simran Tinani and
                  Joachim Rosenthal},
  title        = {A deterministic algorithm for the discrete logarithm problem in a
                  semigroup},
  journal      = {J. Math. Cryptol.},
  volume       = {16},
  number       = {1},
  pages        = {141--155},
  year         = {2022},
  url          = {https://doi.org/10.1515/jmc-2021-0022},
  doi          = {10.1515/JMC-2021-0022},
  timestamp    = {Mon, 26 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/TinaniR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/VivekMK22,
  author       = {Srinivas Vivek and
                  Shyam Murthy and
                  Deepak Kumaraswamy},
  title        = {Integer polynomial recovery from outputs and its application to cryptanalysis
                  of a protocol for secure sorting},
  journal      = {J. Math. Cryptol.},
  volume       = {16},
  number       = {1},
  pages        = {251--277},
  year         = {2022},
  url          = {https://doi.org/10.1515/jmc-2021-0054},
  doi          = {10.1515/JMC-2021-0054},
  timestamp    = {Mon, 26 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/VivekMK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/ZhouHMHZ21,
  author       = {Yu Zhou and
                  Jianyong Hu and
                  Xudong Miao and
                  Yu Han and
                  Fuzhong Zhang},
  title        = {On the confusion coefficient of Boolean functions},
  journal      = {J. Math. Cryptol.},
  volume       = {16},
  number       = {1},
  pages        = {1--13},
  year         = {2022},
  url          = {https://doi.org/10.1515/jmc-2021-0012},
  doi          = {10.1515/JMC-2021-0012},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/ZhouHMHZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Anokhin20,
  author       = {Mikhail Anokhin},
  title        = {Pseudo-free families of computational universal algebras},
  journal      = {J. Math. Cryptol.},
  volume       = {15},
  number       = {1},
  pages        = {197--222},
  year         = {2021},
  url          = {https://doi.org/10.1515/jmc-2020-0014},
  doi          = {10.1515/JMC-2020-0014},
  timestamp    = {Tue, 24 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/Anokhin20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/AraujoN20,
  author       = {Filipe Ara{\'{u}}jo and
                  Samuel Neves},
  title        = {The circulant hash revisited},
  journal      = {J. Math. Cryptol.},
  volume       = {15},
  number       = {1},
  pages        = {250--257},
  year         = {2021},
  url          = {https://doi.org/10.1515/jmc-2018-0054},
  doi          = {10.1515/JMC-2018-0054},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/AraujoN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/BhattacharjeeLL21,
  author       = {Arghya Bhattacharjee and
                  Cuauhtemoc Mancillas L{\'{o}}pez and
                  Eik List and
                  Mridul Nandi},
  title        = {The Oribatida v1.3 Family of Lightweight Authenticated Encryption
                  Schemes},
  journal      = {J. Math. Cryptol.},
  volume       = {15},
  number       = {1},
  pages        = {305--344},
  year         = {2021},
  url          = {https://doi.org/10.1515/jmc-2020-0018},
  doi          = {10.1515/JMC-2020-0018},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/BhattacharjeeLL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/BiasseBPSY20,
  author       = {Jean{-}Fran{\c{c}}ois Biasse and
                  Xavier Bonnetain and
                  Benjamin Pring and
                  Andr{\'{e}} Schrottenloher and
                  William Youmans},
  title        = {A trade-off between classical and quantum circuit size for an attack
                  against {CSIDH}},
  journal      = {J. Math. Cryptol.},
  volume       = {15},
  number       = {1},
  pages        = {4--17},
  year         = {2021},
  url          = {https://doi.org/10.1515/jmc-2020-0070},
  doi          = {10.1515/JMC-2020-0070},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/BiasseBPSY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/BiasseP20,
  author       = {Jean{-}Fran{\c{c}}ois Biasse and
                  Benjamin Pring},
  title        = {A framework for reducing the overhead of the quantum oracle for use
                  with Grover's algorithm with applications to cryptanalysis of {SIKE}},
  journal      = {J. Math. Cryptol.},
  volume       = {15},
  number       = {1},
  pages        = {143--156},
  year         = {2021},
  url          = {https://doi.org/10.1515/jmc-2020-0080},
  doi          = {10.1515/JMC-2020-0080},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/BiasseP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/BroonDFM21,
  author       = {Fouazou Lontouo Perez Broon and
                  Thinh Dang and
                  Emmanuel Fouotsa and
                  Dustin Moody},
  title        = {Isogenies on twisted Hessian curves},
  journal      = {J. Math. Cryptol.},
  volume       = {15},
  number       = {1},
  pages        = {345--358},
  year         = {2021},
  url          = {https://doi.org/10.1515/jmc-2020-0037},
  doi          = {10.1515/JMC-2020-0037},
  timestamp    = {Wed, 25 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/BroonDFM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/CascudoS21,
  author       = {Ignacio Cascudo and
                  Reto Schnyder},
  title        = {A note on secure multiparty computation via higher residue symbols},
  journal      = {J. Math. Cryptol.},
  volume       = {15},
  number       = {1},
  pages        = {284--297},
  year         = {2021},
  url          = {https://doi.org/10.1515/jmc-2020-0013},
  doi          = {10.1515/JMC-2020-0013},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/CascudoS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/CheonLS20,
  author       = {Jung Hee Cheon and
                  Kristin E. Lauter and
                  Yongsoo Song},
  title        = {Editor's Preface for the Second Annual MathCrypt Proceedings Volume},
  journal      = {J. Math. Cryptol.},
  volume       = {15},
  number       = {1},
  pages        = {1--3},
  year         = {2021},
  url          = {https://doi.org/10.1515/jmc-2020-0170},
  doi          = {10.1515/JMC-2020-0170},
  timestamp    = {Tue, 24 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/CheonLS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Csirmaz20,
  author       = {L{\'{a}}szl{\'{o}} Csirmaz},
  title        = {Secret sharing and duality},
  journal      = {J. Math. Cryptol.},
  volume       = {15},
  number       = {1},
  pages        = {157--173},
  year         = {2021},
  url          = {https://doi.org/10.1515/jmc-2019-0045},
  doi          = {10.1515/JMC-2019-0045},
  timestamp    = {Tue, 24 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/Csirmaz20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Dachman-SoledGK20,
  author       = {Dana Dachman{-}Soled and
                  Huijing Gong and
                  Mukul Kulkarni and
                  Aria Shahverdi},
  title        = {(In)Security of Ring-LWE Under Partial Key Exposure},
  journal      = {J. Math. Cryptol.},
  volume       = {15},
  number       = {1},
  pages        = {72--86},
  year         = {2021},
  url          = {https://doi.org/10.1515/jmc-2020-0075},
  doi          = {10.1515/JMC-2020-0075},
  timestamp    = {Tue, 24 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/Dachman-SoledGK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Dachman-SoledGK20a,
  author       = {Dana Dachman{-}Soled and
                  Huijing Gong and
                  Mukul Kulkarni and
                  Aria Shahverdi},
  title        = {Towards a Ring Analogue of the Leftover Hash Lemma},
  journal      = {J. Math. Cryptol.},
  volume       = {15},
  number       = {1},
  pages        = {87--110},
  year         = {2021},
  url          = {https://doi.org/10.1515/jmc-2020-0076},
  doi          = {10.1515/JMC-2020-0076},
  timestamp    = {Tue, 24 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/Dachman-SoledGK20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/DugardinSG21,
  author       = {Margaux Dugardin and
                  Werner Schindler and
                  Sylvain Guilley},
  title        = {Stochastic methods defeat regular {RSA} exponentiation algorithms
                  with combined blinding methods},
  journal      = {J. Math. Cryptol.},
  volume       = {15},
  number       = {1},
  pages        = {408--433},
  year         = {2021},
  url          = {https://doi.org/10.1515/jmc-2020-0010},
  doi          = {10.1515/JMC-2020-0010},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/DugardinSG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Ekera21,
  author       = {Martin Eker{\aa}},
  title        = {Quantum algorithms for computing general discrete logarithms and orders
                  with tradeoffs},
  journal      = {J. Math. Cryptol.},
  volume       = {15},
  number       = {1},
  pages        = {359--407},
  year         = {2021},
  url          = {https://doi.org/10.1515/jmc-2020-0006},
  doi          = {10.1515/JMC-2020-0006},
  timestamp    = {Wed, 25 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/Ekera21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/JoyeLNN20,
  author       = {Marc Joye and
                  Oleksandra Lapiha and
                  Ky Nguyen and
                  David Naccache},
  title        = {The Eleventh Power Residue Symbol},
  journal      = {J. Math. Cryptol.},
  volume       = {15},
  number       = {1},
  pages        = {111--122},
  year         = {2021},
  url          = {https://doi.org/10.1515/jmc-2020-0077},
  doi          = {10.1515/JMC-2020-0077},
  timestamp    = {Tue, 24 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/JoyeLNN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/KotovMU20,
  author       = {Matvei Kotov and
                  Anton Menshov and
                  Alexander Ushakov},
  title        = {Attack on Kayawood protocol: uncloaking private keys},
  journal      = {J. Math. Cryptol.},
  volume       = {15},
  number       = {1},
  pages        = {237--249},
  year         = {2021},
  url          = {https://doi.org/10.1515/jmc-2019-0015},
  doi          = {10.1515/JMC-2019-0015},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/KotovMU20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Laarhoven20,
  author       = {Thijs Laarhoven},
  title        = {Approximate Voronoi cells for lattices, revisited},
  journal      = {J. Math. Cryptol.},
  volume       = {15},
  number       = {1},
  pages        = {60--71},
  year         = {2021},
  url          = {https://doi.org/10.1515/jmc-2020-0074},
  doi          = {10.1515/JMC-2020-0074},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/Laarhoven20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/LuoA21,
  author       = {Fucai Luo and
                  Saif M. Al{-}Kuwari},
  title        = {Revocable attribute-based proxy re-encryption},
  journal      = {J. Math. Cryptol.},
  volume       = {15},
  number       = {1},
  pages        = {465--482},
  year         = {2021},
  url          = {https://doi.org/10.1515/jmc-2020-0039},
  doi          = {10.1515/JMC-2020-0039},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/LuoA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/McGuireR20,
  author       = {Gary McGuire and
                  Ois{\'{\i}}n Robinson},
  title        = {Lattice Sieving in Three Dimensions for Discrete Log in Medium Characteristic},
  journal      = {J. Math. Cryptol.},
  volume       = {15},
  number       = {1},
  pages        = {223--236},
  year         = {2021},
  url          = {https://doi.org/10.1515/jmc-2020-0008},
  doi          = {10.1515/JMC-2020-0008},
  timestamp    = {Tue, 24 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/McGuireR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/MurphyP20,
  author       = {Sean Murphy and
                  Rachel Player},
  title        = {Discretisation and Product Distributions in Ring-LWE},
  journal      = {J. Math. Cryptol.},
  volume       = {15},
  number       = {1},
  pages        = {45--59},
  year         = {2021},
  url          = {https://doi.org/10.1515/jmc-2020-0073},
  doi          = {10.1515/JMC-2020-0073},
  timestamp    = {Tue, 24 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/MurphyP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/PandeyGS20,
  author       = {Atul Pandey and
                  Indivar Gupta and
                  Dhiraj Kumar Singh},
  title        = {Improved cryptanalysis of a ElGamal Cryptosystem Based on Matrices
                  Over Group Rings},
  journal      = {J. Math. Cryptol.},
  volume       = {15},
  number       = {1},
  pages        = {266--279},
  year         = {2021},
  url          = {https://doi.org/10.1515/jmc-2019-0054},
  doi          = {10.1515/JMC-2019-0054},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/PandeyGS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/PatersonS20,
  author       = {Maura B. Paterson and
                  Douglas R. Stinson},
  title        = {On the equivalence of authentication codes and robust (2, 2)-threshold
                  schemes},
  journal      = {J. Math. Cryptol.},
  volume       = {15},
  number       = {1},
  pages        = {179--196},
  year         = {2021},
  url          = {https://doi.org/10.1515/jmc-2019-0048},
  doi          = {10.1515/JMC-2019-0048},
  timestamp    = {Tue, 24 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/PatersonS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Reid21,
  author       = {Elizabeth M. Reid},
  title        = {Using Inclusion / Exclusion to find Bent and Balanced Monomial Rotation
                  Symmetric Functions},
  journal      = {J. Math. Cryptol.},
  volume       = {15},
  number       = {1},
  pages        = {298--304},
  year         = {2021},
  url          = {https://doi.org/10.1515/jmc-2020-0021},
  doi          = {10.1515/JMC-2020-0021},
  timestamp    = {Wed, 25 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/Reid21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/RudyM20,
  author       = {Dylan Rudy and
                  Chris Monico},
  title        = {Remarks on a Tropical Key Exchange System},
  journal      = {J. Math. Cryptol.},
  volume       = {15},
  number       = {1},
  pages        = {280--283},
  year         = {2021},
  url          = {https://doi.org/10.1515/jmc-2019-0061},
  doi          = {10.1515/JMC-2019-0061},
  timestamp    = {Tue, 24 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/RudyM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/ScalaSS20,
  author       = {Antonio J. Di Scala and
                  Carlo Sanna and
                  Edoardo Signorini},
  title        = {On the condition number of the Vandermonde matrix of the nth cyclotomic
                  polynomial},
  journal      = {J. Math. Cryptol.},
  volume       = {15},
  number       = {1},
  pages        = {174--178},
  year         = {2021},
  url          = {https://doi.org/10.1515/jmc-2020-0009},
  doi          = {10.1515/JMC-2020-0009},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/ScalaSS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Sica20,
  author       = {Francesco Sica},
  title        = {Factoring with Hints},
  journal      = {J. Math. Cryptol.},
  volume       = {15},
  number       = {1},
  pages        = {123--130},
  year         = {2021},
  url          = {https://doi.org/10.1515/jmc-2020-0078},
  doi          = {10.1515/JMC-2020-0078},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/Sica20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/TakahashiKFIYY20,
  author       = {Yasushi Takahashi and
                  Momonari Kudo and
                  Ryoya Fukasaku and
                  Yasuhiko Ikematsu and
                  Masaya Yasuda and
                  Kazuhiro Yokoyama},
  title        = {Algebraic approaches for solving isogeny problems of prime power degrees},
  journal      = {J. Math. Cryptol.},
  volume       = {15},
  number       = {1},
  pages        = {31--44},
  year         = {2021},
  url          = {https://doi.org/10.1515/jmc-2020-0072},
  doi          = {10.1515/JMC-2020-0072},
  timestamp    = {Tue, 24 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/TakahashiKFIYY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/TaraskinSJL20,
  author       = {Oleg Taraskin and
                  Vladimir Soukharev and
                  David Jao and
                  Jason T. LeGrow},
  title        = {Towards Isogeny-Based Password-Authenticated Key Establishment},
  journal      = {J. Math. Cryptol.},
  volume       = {15},
  number       = {1},
  pages        = {18--30},
  year         = {2021},
  url          = {https://doi.org/10.1515/jmc-2020-0071},
  doi          = {10.1515/JMC-2020-0071},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/TaraskinSJL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/TibouchiW20,
  author       = {Mehdi Tibouchi and
                  Alexandre Wallet},
  title        = {One Bit is All It Takes: {A} Devastating Timing Attack on BLISS's
                  Non-Constant Time Sign Flips},
  journal      = {J. Math. Cryptol.},
  volume       = {15},
  number       = {1},
  pages        = {131--142},
  year         = {2021},
  url          = {https://doi.org/10.1515/jmc-2020-0079},
  doi          = {10.1515/JMC-2020-0079},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/TibouchiW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/XiaoLD21,
  author       = {Guanju Xiao and
                  Lixia Luo and
                  Yingpu Deng},
  title        = {Constructing Cycles in Isogeny Graphs of Supersingular Elliptic Curves},
  journal      = {J. Math. Cryptol.},
  volume       = {15},
  number       = {1},
  pages        = {454--464},
  year         = {2021},
  url          = {https://doi.org/10.1515/jmc-2020-0029},
  doi          = {10.1515/JMC-2020-0029},
  timestamp    = {Wed, 25 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/XiaoLD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/ZhangLA21,
  author       = {Jing Zhang and
                  Yuan Li and
                  John O. Adeyeye},
  title        = {Sensitivities and block sensitivities of elementary symmetric Boolean
                  functions},
  journal      = {J. Math. Cryptol.},
  volume       = {15},
  number       = {1},
  pages        = {434--453},
  year         = {2021},
  url          = {https://doi.org/10.1515/jmc-2020-0042},
  doi          = {10.1515/JMC-2020-0042},
  timestamp    = {Wed, 25 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/ZhangLA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/ZhouMD20,
  author       = {Yu Zhou and
                  Daoguang Mu and
                  Xinfeng Dong},
  title        = {On cryptographic properties of (n + 1)-bit S-boxes constructed by
                  known n-bit S-boxes},
  journal      = {J. Math. Cryptol.},
  volume       = {15},
  number       = {1},
  pages        = {258--265},
  year         = {2021},
  url          = {https://doi.org/10.1515/jmc-2020-0004},
  doi          = {10.1515/JMC-2020-0004},
  timestamp    = {Wed, 27 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/ZhouMD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/BanegasBPS20,
  author       = {Gustavo Banegas and
                  Paulo S. L. M. Barreto and
                  Edoardo Persichetti and
                  Paolo Santini},
  title        = {Designing Efficient Dyadic Operations for Cryptographic Applications},
  journal      = {J. Math. Cryptol.},
  volume       = {14},
  number       = {1},
  pages        = {95--109},
  year         = {2020},
  url          = {https://doi.org/10.1515/jmc-2015-0054},
  doi          = {10.1515/JMC-2015-0054},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/BanegasBPS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/BonehGKLSSTZ20,
  author       = {Dan Boneh and
                  Darren B. Glass and
                  Daniel Krashen and
                  Kristin E. Lauter and
                  Shahed Sharif and
                  Alice Silverberg and
                  Mehdi Tibouchi and
                  Mark Zhandry},
  title        = {Multiparty Non-Interactive Key Exchange and More From Isogenies on
                  Elliptic Curves},
  journal      = {J. Math. Cryptol.},
  volume       = {14},
  number       = {1},
  pages        = {5--14},
  year         = {2020},
  url          = {https://doi.org/10.1515/jmc-2015-0047},
  doi          = {10.1515/JMC-2015-0047},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/BonehGKLSSTZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/BootlandCIV20,
  author       = {Carl Bootland and
                  Wouter Castryck and
                  Ilia Iliashenko and
                  Frederik Vercauteren},
  title        = {Efficiently Processing Complex-Valued Data in Homomorphic Encryption},
  journal      = {J. Math. Cryptol.},
  volume       = {14},
  number       = {1},
  pages        = {55--65},
  year         = {2020},
  url          = {https://doi.org/10.1515/jmc-2015-0051},
  doi          = {10.1515/JMC-2015-0051},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/BootlandCIV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/BootlandCSV20,
  author       = {Carl Bootland and
                  Wouter Castryck and
                  Alan Szepieniec and
                  Frederik Vercauteren},
  title        = {A framework for cryptographic problems from linear algebra},
  journal      = {J. Math. Cryptol.},
  volume       = {14},
  number       = {1},
  pages        = {202--217},
  year         = {2020},
  url          = {https://doi.org/10.1515/jmc-2019-0032},
  doi          = {10.1515/JMC-2019-0032},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/BootlandCSV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/BouraGGJ20,
  author       = {Christina Boura and
                  Nicolas Gama and
                  Mariya Georgieva and
                  Dimitar Jetchev},
  title        = {{CHIMERA:} Combining Ring-LWE-based Fully Homomorphic Encryption Schemes},
  journal      = {J. Math. Cryptol.},
  volume       = {14},
  number       = {1},
  pages        = {316--338},
  year         = {2020},
  url          = {https://doi.org/10.1515/jmc-2019-0026},
  doi          = {10.1515/JMC-2019-0026},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/BouraGGJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/BrierFJN20,
  author       = {{\'{E}}ric Brier and
                  Houda Ferradi and
                  Marc Joye and
                  David Naccache},
  title        = {New number-theoretic cryptographic primitives},
  journal      = {J. Math. Cryptol.},
  volume       = {14},
  number       = {1},
  pages        = {224--235},
  year         = {2020},
  url          = {https://doi.org/10.1515/jmc-2019-0035},
  doi          = {10.1515/JMC-2019-0035},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/BrierFJN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/CastryckDS20,
  author       = {Wouter Castryck and
                  Thomas Decru and
                  Benjamin Smith},
  title        = {Hash functions from superspecial genus-2 curves using Richelot isogenies},
  journal      = {J. Math. Cryptol.},
  volume       = {14},
  number       = {1},
  pages        = {268--292},
  year         = {2020},
  url          = {https://doi.org/10.1515/jmc-2019-0021},
  doi          = {10.1515/JMC-2019-0021},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/CastryckDS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/ChakrabortyAR20,
  author       = {Suvradip Chakraborty and
                  Janaka Alawatugoda and
                  Chandrasekaran Pandu Rangan},
  title        = {New approach to practical leakage-resilient public-key cryptography},
  journal      = {J. Math. Cryptol.},
  volume       = {14},
  number       = {1},
  pages        = {172--201},
  year         = {2020},
  url          = {https://doi.org/10.1515/jmc-2019-0014},
  doi          = {10.1515/JMC-2019-0014},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/ChakrabortyAR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/CheonCHKL20,
  author       = {Jung Hee Cheon and
                  Wonhee Cho and
                  Minki Hhan and
                  Jiseung Kim and
                  Changmin Lee},
  title        = {Algorithms for CRT-variant of Approximate Greatest Common Divisor
                  Problem},
  journal      = {J. Math. Cryptol.},
  volume       = {14},
  number       = {1},
  pages        = {397--413},
  year         = {2020},
  url          = {https://doi.org/10.1515/jmc-2019-0031},
  doi          = {10.1515/JMC-2019-0031},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/CheonCHKL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/CheonLY20,
  author       = {Jung Hee Cheon and
                  Kristin E. Lauter and
                  Donggeon Yhee},
  title        = {Preface to the First Annual MathCrypt Proceedings Volume},
  journal      = {J. Math. Cryptol.},
  volume       = {14},
  number       = {1},
  pages        = {1--4},
  year         = {2020},
  url          = {https://doi.org/10.1515/jmc-2020-0060},
  doi          = {10.1515/JMC-2020-0060},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/CheonLY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/ColoK20,
  author       = {Leonardo Col{\`{o}} and
                  David Kohel},
  title        = {Orienting supersingular isogeny graphs},
  journal      = {J. Math. Cryptol.},
  volume       = {14},
  number       = {1},
  pages        = {414--437},
  year         = {2020},
  url          = {https://doi.org/10.1515/jmc-2019-0034},
  doi          = {10.1515/JMC-2019-0034},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/ColoK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/CoronG20,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Agnese Gini},
  title        = {Improved cryptanalysis of the {AJPS} Mersenne based cryptosystem},
  journal      = {J. Math. Cryptol.},
  volume       = {14},
  number       = {1},
  pages        = {218--223},
  year         = {2020},
  url          = {https://doi.org/10.1515/jmc-2019-0027},
  doi          = {10.1515/JMC-2019-0027},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/CoronG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/CrescenzoKKS20,
  author       = {Giovanni Di Crescenzo and
                  Matluba Khodjaeva and
                  Delaram Kahrobaei and
                  Vladimir Shpilrain},
  title        = {Delegating a Product of Group Exponentiations with Application to
                  Signature Schemes (Submission to Special NutMiC 2019 Issue of {JMC)}},
  journal      = {J. Math. Cryptol.},
  volume       = {14},
  number       = {1},
  pages        = {438--459},
  year         = {2020},
  url          = {https://doi.org/10.1515/jmc-2019-0036},
  doi          = {10.1515/JMC-2019-0036},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/CrescenzoKKS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/DelaplaceM20,
  author       = {Claire Delaplace and
                  Alexander May},
  title        = {Can we Beat the Square Root Bound for {ECDLP} over {\(\mathbb{F}\)}\({}_{\mbox{p\({}^{\mbox{2}}\)}}\)
                  via Representation?},
  journal      = {J. Math. Cryptol.},
  volume       = {14},
  number       = {1},
  pages        = {293--306},
  year         = {2020},
  url          = {https://doi.org/10.1515/jmc-2019-0025},
  doi          = {10.1515/JMC-2019-0025},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/DelaplaceM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/DorozS20,
  author       = {Yarkin Dor{\"{o}}z and
                  Berk Sunar},
  title        = {Flattening {NTRU} for Evaluation Key Free Homomorphic Encryption},
  journal      = {J. Math. Cryptol.},
  volume       = {14},
  number       = {1},
  pages        = {66--83},
  year         = {2020},
  url          = {https://doi.org/10.1515/jmc-2015-0052},
  doi          = {10.1515/JMC-2015-0052},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/DorozS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/FerradiGGNT20,
  author       = {Houda Ferradi and
                  R{\'{e}}mi G{\'{e}}raud and
                  Sylvain Guilley and
                  David Naccache and
                  Mehdi Tibouchi},
  title        = {Recovering Secrets From Prefix-Dependent Leakage},
  journal      = {J. Math. Cryptol.},
  volume       = {14},
  number       = {1},
  pages        = {15--24},
  year         = {2020},
  url          = {https://doi.org/10.1515/jmc-2015-0048},
  doi          = {10.1515/JMC-2015-0048},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/FerradiGGNT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/GoelGD20,
  author       = {Neha Goel and
                  Indivar Gupta and
                  Bal Kishan Dass},
  title        = {Survey on {SAP} and its application in public-key cryptography},
  journal      = {J. Math. Cryptol.},
  volume       = {14},
  number       = {1},
  pages        = {144--152},
  year         = {2020},
  url          = {https://doi.org/10.1515/jmc-2016-0004},
  doi          = {10.1515/JMC-2016-0004},
  timestamp    = {Tue, 05 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/GoelGD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Grzeskowiak20,
  author       = {Maciej Grzeskowiak},
  title        = {A variant of the large sieve inequality with explicit constants},
  journal      = {J. Math. Cryptol.},
  volume       = {14},
  number       = {1},
  pages        = {307--315},
  year         = {2020},
  url          = {https://doi.org/10.1515/jmc-2019-0022},
  doi          = {10.1515/JMC-2019-0022},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/Grzeskowiak20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/HoffsteinSWZ20,
  author       = {Jeffrey Hoffstein and
                  Joseph H. Silverman and
                  William Whyte and
                  Zhenfei Zhang},
  title        = {A signature scheme from the finite field isomorphism problem},
  journal      = {J. Math. Cryptol.},
  volume       = {14},
  number       = {1},
  pages        = {39--54},
  year         = {2020},
  url          = {https://doi.org/10.1515/jmc-2015-0050},
  doi          = {10.1515/JMC-2015-0050},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/HoffsteinSWZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/HuangKPYY20,
  author       = {Ming{-}Deh A. Huang and
                  Michiel Kosters and
                  Christophe Petit and
                  Sze Ling Yeo and
                  Yang Yun},
  title        = {Quasi-subfield Polynomials and the Elliptic Curve Discrete Logarithm
                  Problem},
  journal      = {J. Math. Cryptol.},
  volume       = {14},
  number       = {1},
  pages        = {25--38},
  year         = {2020},
  url          = {https://doi.org/10.1515/jmc-2015-0049},
  doi          = {10.1515/JMC-2015-0049},
  timestamp    = {Fri, 17 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/HuangKPYY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/JaoLLR20,
  author       = {David Jao and
                  Jason T. LeGrow and
                  Christopher Leonardi and
                  Luis Ruiz{-}Lopez},
  title        = {A subexponential-time, polynomial quantum space algorithm for inverting
                  the {CM} group action},
  journal      = {J. Math. Cryptol.},
  volume       = {14},
  number       = {1},
  pages        = {129--138},
  year         = {2020},
  url          = {https://doi.org/10.1515/jmc-2015-0057},
  doi          = {10.1515/JMC-2015-0057},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/JaoLLR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/JouxP20,
  author       = {Antoine Joux and
                  Jacek Pomykala},
  title        = {Preface for the Number-Theoretic Methods in Cryptology conferences},
  journal      = {J. Math. Cryptol.},
  volume       = {14},
  number       = {1},
  pages        = {393--396},
  year         = {2020},
  url          = {https://doi.org/10.1515/jmc-2019-0111},
  doi          = {10.1515/JMC-2019-0111},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/JouxP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Joye20,
  author       = {Marc Joye},
  title        = {Protecting {ECC} Against Fault Attacks: The Ring Extension Method
                  Revisited},
  journal      = {J. Math. Cryptol.},
  volume       = {14},
  number       = {1},
  pages        = {254--267},
  year         = {2020},
  url          = {https://doi.org/10.1515/jmc-2019-0030},
  doi          = {10.1515/JMC-2019-0030},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/Joye20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Karmakar20a,
  title        = {Retraction of: An elementary proof of Fermat's Last Theorem for all
                  even exponents},
  journal      = {J. Math. Cryptol.},
  volume       = {14},
  number       = {1},
  pages        = {143},
  year         = {2020},
  url          = {https://doi.org/10.1515/jmc-2017-2000},
  doi          = {10.1515/JMC-2017-2000},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/Karmakar20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/KimT20,
  author       = {Taechan Kim and
                  Mehdi Tibouchi},
  title        = {Equidistribution Among Cosets of Elliptic Curve Points in Intervals},
  journal      = {J. Math. Cryptol.},
  volume       = {14},
  number       = {1},
  pages        = {339--345},
  year         = {2020},
  url          = {https://doi.org/10.1515/jmc-2019-0020},
  doi          = {10.1515/JMC-2019-0020},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/KimT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/LesavoureyPS20,
  author       = {Andrea Lesavourey and
                  Thomas Plantard and
                  Willy Susilo},
  title        = {Short Principal Ideal Problem in multicubic fields},
  journal      = {J. Math. Cryptol.},
  volume       = {14},
  number       = {1},
  pages        = {359--392},
  year         = {2020},
  url          = {https://doi.org/10.1515/jmc-2019-0028},
  doi          = {10.1515/JMC-2019-0028},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/LesavoureyPS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/MicheliHS20,
  author       = {Gabrielle De Micheli and
                  Nadia Heninger and
                  Barak Shani},
  title        = {Characterizing overstretched {NTRU} attacks},
  journal      = {J. Math. Cryptol.},
  volume       = {14},
  number       = {1},
  pages        = {110--119},
  year         = {2020},
  url          = {https://doi.org/10.1515/jmc-2015-0055},
  doi          = {10.1515/JMC-2015-0055},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/MicheliHS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/PomykalaR20,
  author       = {Jacek Pomykala and
                  Maciej Radziejewski},
  title        = {Integer factoring and compositeness witnesses},
  journal      = {J. Math. Cryptol.},
  volume       = {14},
  number       = {1},
  pages        = {346--358},
  year         = {2020},
  url          = {https://doi.org/10.1515/jmc-2019-0023},
  doi          = {10.1515/JMC-2019-0023},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/PomykalaR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/TomkinsNS20,
  author       = {Hayley Tomkins and
                  Monica Nevins and
                  Hadi Salmasian},
  title        = {New Z{\'{e}}mor-Tillich Type Hash Functions Over {GL2} ({\(\mathbb{F}\)}\({}_{\mbox{p\({}^{\mbox{n}}\)}}\))},
  journal      = {J. Math. Cryptol.},
  volume       = {14},
  number       = {1},
  pages        = {236--253},
  year         = {2020},
  url          = {https://doi.org/10.1515/jmc-2019-0033},
  doi          = {10.1515/JMC-2019-0033},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/TomkinsNS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/UrbanikJ20,
  author       = {David Urbanik and
                  David Jao},
  title        = {New Techniques for SIDH-based {NIKE}},
  journal      = {J. Math. Cryptol.},
  volume       = {14},
  number       = {1},
  pages        = {120--128},
  year         = {2020},
  url          = {https://doi.org/10.1515/jmc-2015-0056},
  doi          = {10.1515/JMC-2015-0056},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/UrbanikJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Yasuda20,
  author       = {Masaya Yasuda},
  title        = {Self-dual DeepBKZ for finding short lattice vectors},
  journal      = {J. Math. Cryptol.},
  volume       = {14},
  number       = {1},
  pages        = {84--94},
  year         = {2020},
  url          = {https://doi.org/10.1515/jmc-2015-0053},
  doi          = {10.1515/JMC-2015-0053},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/Yasuda20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/YokoyamaYTK20,
  author       = {Kazuhiro Yokoyama and
                  Masaya Yasuda and
                  Yasushi Takahashi and
                  Jun Kogure},
  title        = {Complexity bounds on Semaev's naive index calculus method for {ECDLP}},
  journal      = {J. Math. Cryptol.},
  volume       = {14},
  number       = {1},
  pages        = {460--485},
  year         = {2020},
  url          = {https://doi.org/10.1515/jmc-2019-0029},
  doi          = {10.1515/JMC-2019-0029},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/YokoyamaYTK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/ZhangS20,
  author       = {Liang Feng Zhang and
                  Reihaneh Safavi{-}Naini},
  title        = {Privacy-preserving verifiable delegation of polynomial and matrix
                  functions},
  journal      = {J. Math. Cryptol.},
  volume       = {14},
  number       = {1},
  pages        = {153--171},
  year         = {2020},
  url          = {https://doi.org/10.1515/jmc-2018-0039},
  doi          = {10.1515/JMC-2018-0039},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/ZhangS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Karmakar20,
  title        = {An elementary proof of Fermat's last theorem for all even exponents},
  journal      = {J. Math. Cryptol.},
  volume       = {14},
  number       = {1},
  pages        = {139--142},
  year         = {2020},
  note         = {Withdrawn.},
  url          = {https://doi.org/10.1515/jmc-2016-0018},
  doi          = {10.1515/JMC-2016-0018},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/Karmakar20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/AziziJZT19,
  author       = {Abdelmalek Azizi and
                  Idriss Jerrari and
                  Abdelkader Zekhnini and
                  Mohammed Talbi},
  title        = {Capitulation of the 2-ideal classes of type (2, {\unicode{8239}}2,
                  {\unicode{8239}}2) of some quartic cyclic number fields},
  journal      = {J. Math. Cryptol.},
  volume       = {13},
  number       = {1},
  pages        = {27--46},
  year         = {2019},
  url          = {https://doi.org/10.1515/jmc-2017-0037},
  doi          = {10.1515/JMC-2017-0037},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/AziziJZT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/BansalBP19,
  author       = {Tarun Kumar Bansal and
                  Xavier Boyen and
                  Josef Pieprzyk},
  title        = {Signcryption schemes with insider security in an ideal permutation
                  model},
  journal      = {J. Math. Cryptol.},
  volume       = {13},
  number       = {2},
  pages        = {117--150},
  year         = {2019},
  url          = {https://doi.org/10.1515/jmc-2018-0006},
  doi          = {10.1515/JMC-2018-0006},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/BansalBP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/BiasseS19,
  author       = {Jean{-}Fran{\c{c}}ois Biasse and
                  Fang Song},
  title        = {On the quantum attacks against schemes relying on the hardness of
                  finding a short generator of an ideal in},
  journal      = {J. Math. Cryptol.},
  volume       = {13},
  number       = {3-4},
  pages        = {151--168},
  year         = {2019},
  url          = {https://doi.org/10.1515/jmc-2015-0046},
  doi          = {10.1515/JMC-2015-0046},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/BiasseS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/BindelBGS19,
  author       = {Nina Bindel and
                  Johannes Buchmann and
                  Florian G{\"{o}}pfert and
                  Markus Schmidt},
  title        = {Estimation of the hardness of the learning with errors problem with
                  a restricted number of samples},
  journal      = {J. Math. Cryptol.},
  volume       = {13},
  number       = {1},
  pages        = {47--67},
  year         = {2019},
  url          = {https://doi.org/10.1515/jmc-2017-0040},
  doi          = {10.1515/JMC-2017-0040},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/BindelBGS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/HarsanyiL19,
  author       = {K{\'{a}}roly Hars{\'{a}}nyi and
                  P{\'{e}}ter Ligeti},
  title        = {Exact information ratios for secret sharing on small graphs with girth
                  at least 5},
  journal      = {J. Math. Cryptol.},
  volume       = {13},
  number       = {2},
  pages        = {107--116},
  year         = {2019},
  url          = {https://doi.org/10.1515/jmc-2018-0024},
  doi          = {10.1515/JMC-2018-0024},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/HarsanyiL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/KajiMNN19,
  author       = {Shizuo Kaji and
                  Toshiaki Maeno and
                  Koji Nuida and
                  Yasuhide Numata},
  title        = {Polynomial expressions of p-ary auction functions},
  journal      = {J. Math. Cryptol.},
  volume       = {13},
  number       = {2},
  pages        = {69--80},
  year         = {2019},
  url          = {https://doi.org/10.1515/jmc-2018-0016},
  doi          = {10.1515/JMC-2018-0016},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/KajiMNN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/KousidisW19,
  author       = {Stavros Kousidis and
                  Andreas Wiemers},
  title        = {On the first fall degree of summation polynomials},
  journal      = {J. Math. Cryptol.},
  volume       = {13},
  number       = {3-4},
  pages        = {229--237},
  year         = {2019},
  url          = {https://doi.org/10.1515/jmc-2017-0022},
  doi          = {10.1515/JMC-2017-0022},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/KousidisW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/LavauzelleL19,
  author       = {Julien Lavauzelle and
                  Fran{\c{c}}oise Levy{-}dit{-}Vehel},
  title        = {Generic constructions of PoRs from codes and instantiations},
  journal      = {J. Math. Cryptol.},
  volume       = {13},
  number       = {2},
  pages        = {81--106},
  year         = {2019},
  url          = {https://doi.org/10.1515/jmc-2018-0018},
  doi          = {10.1515/JMC-2018-0018},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/LavauzelleL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/NandiP19,
  author       = {Mridul Nandi and
                  Tapas Pandit},
  title        = {Predicate signatures from pair encodings via dual system proof technique},
  journal      = {J. Math. Cryptol.},
  volume       = {13},
  number       = {3-4},
  pages        = {197--228},
  year         = {2019},
  url          = {https://doi.org/10.1515/jmc-2017-0007},
  doi          = {10.1515/JMC-2017-0007},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/NandiP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/SipasseuthPS19,
  author       = {Arnaud Sipasseuth and
                  Thomas Plantard and
                  Willy Susilo},
  title        = {Enhancing Goldreich, Goldwasser and Halevi's scheme with intersecting
                  lattices},
  journal      = {J. Math. Cryptol.},
  volume       = {13},
  number       = {3-4},
  pages        = {169--196},
  year         = {2019},
  url          = {https://doi.org/10.1515/jmc-2016-0066},
  doi          = {10.1515/JMC-2016-0066},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/SipasseuthPS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Wunderer19,
  author       = {Thomas Wunderer},
  title        = {A detailed analysis of the hybrid lattice-reduction and meet-in-the-middle
                  attack},
  journal      = {J. Math. Cryptol.},
  volume       = {13},
  number       = {1},
  pages        = {1--26},
  year         = {2019},
  url          = {https://doi.org/10.1515/jmc-2016-0044},
  doi          = {10.1515/JMC-2016-0044},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/Wunderer19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/BanegasBBCDGGHK18,
  author       = {Gustavo Banegas and
                  Paulo S. L. M. Barreto and
                  Brice Odilon Boidje and
                  Pierre{-}Louis Cayrel and
                  Gilbert Ndollane Dione and
                  Kris Gaj and
                  Cheikh Thi{\'{e}}coumba Gueye and
                  Richard Haeussler and
                  Jean Belo Klamti and
                  Ousmane Ndiaye and
                  Duc Tri Nguyen and
                  Edoardo Persichetti and
                  Jefferson E. Ricardini},
  title        = {{DAGS:} Key encapsulation using dyadic {GS} codes},
  journal      = {J. Math. Cryptol.},
  volume       = {12},
  number       = {4},
  pages        = {221--239},
  year         = {2018},
  url          = {https://doi.org/10.1515/jmc-2018-0027},
  doi          = {10.1515/JMC-2018-0027},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/BanegasBBCDGGHK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/ChakrabortiDN18,
  author       = {Avik Chakraborti and
                  Nilanjan Datta and
                  Mridul Nandi},
  title        = {On the optimality of non-linear computations for symmetric key primitives},
  journal      = {J. Math. Cryptol.},
  volume       = {12},
  number       = {4},
  pages        = {241--259},
  year         = {2018},
  url          = {https://doi.org/10.1515/jmc-2017-0011},
  doi          = {10.1515/JMC-2017-0011},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/ChakrabortiDN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/ChatterjeeDK18,
  author       = {Sanjit Chatterjee and
                  M. Prem Laxman Das and
                  R. Kabaleeshwaran},
  title        = {Converting pairing-based cryptosystems from composite to prime order
                  setting - {A} comparative analysis},
  journal      = {J. Math. Cryptol.},
  volume       = {12},
  number       = {3},
  pages        = {159--190},
  year         = {2018},
  url          = {https://doi.org/10.1515/jmc-2017-0042},
  doi          = {10.1515/JMC-2017-0042},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/ChatterjeeDK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/DeyS18,
  author       = {Sabyasachi Dey and
                  Santanu Sarkar},
  title        = {Generalization of Roos bias in {RC4} and some results on key-keystream
                  relations},
  journal      = {J. Math. Cryptol.},
  volume       = {12},
  number       = {1},
  pages        = {43--56},
  year         = {2018},
  url          = {https://doi.org/10.1515/jmc-2016-0061},
  doi          = {10.1515/JMC-2016-0061},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/DeyS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/FotiadisK18,
  author       = {Georgios Fotiadis and
                  Elisavet Konstantinou},
  title        = {Generating pairing-friendly elliptic curve parameters using sparse
                  families},
  journal      = {J. Math. Cryptol.},
  volume       = {12},
  number       = {2},
  pages        = {83--99},
  year         = {2018},
  url          = {https://doi.org/10.1515/jmc-2017-0024},
  doi          = {10.1515/JMC-2017-0024},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/FotiadisK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/JirakitpuwapatC18,
  author       = {Wachirapong Jirakitpuwapat and
                  Parin Chaipunya and
                  Poom Kumam and
                  Sompong Dhompongsa and
                  Phatiphat Thounthong},
  title        = {New methods of construction of cartesian authentication codes from
                  geometries over finite commutative rings},
  journal      = {J. Math. Cryptol.},
  volume       = {12},
  number       = {3},
  pages        = {119--136},
  year         = {2018},
  url          = {https://doi.org/10.1515/jmc-2017-0057},
  doi          = {10.1515/JMC-2017-0057},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/JirakitpuwapatC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/KotovU18,
  author       = {Matvei Kotov and
                  Alexander Ushakov},
  title        = {Analysis of a key exchange protocol based on tropical matrix algebra},
  journal      = {J. Math. Cryptol.},
  volume       = {12},
  number       = {3},
  pages        = {137--141},
  year         = {2018},
  url          = {https://doi.org/10.1515/jmc-2016-0064},
  doi          = {10.1515/JMC-2016-0064},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/KotovU18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Kushwaha18,
  author       = {Prabhat Kushwaha},
  title        = {Improved lower bound for Diffie-Hellman problem using multiplicative
                  group of a finite field as auxiliary group},
  journal      = {J. Math. Cryptol.},
  volume       = {12},
  number       = {2},
  pages        = {101--118},
  year         = {2018},
  url          = {https://doi.org/10.1515/jmc-2017-0053},
  doi          = {10.1515/JMC-2017-0053},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/Kushwaha18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/LaingS18,
  author       = {Thalia M. Laing and
                  Douglas R. Stinson},
  title        = {A survey and refinement of repairable threshold schemes},
  journal      = {J. Math. Cryptol.},
  volume       = {12},
  number       = {1},
  pages        = {57--81},
  year         = {2018},
  url          = {https://doi.org/10.1515/jmc-2017-0058},
  doi          = {10.1515/JMC-2017-0058},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/LaingS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/MahriSBDW18,
  author       = {Hassan Qahur Al Mahri and
                  Leonie Simpson and
                  Harry Bartlett and
                  Ed Dawson and
                  Kenneth Koon{-}Ho Wong},
  title        = {A fundamental flaw in the ++AE authenticated encryption mode},
  journal      = {J. Math. Cryptol.},
  volume       = {12},
  number       = {1},
  pages        = {37--42},
  year         = {2018},
  url          = {https://doi.org/10.1515/jmc-2016-0037},
  doi          = {10.1515/JMC-2016-0037},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/MahriSBDW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Partala18,
  author       = {Juha Partala},
  title        = {Algebraic generalization of Diffie-Hellman key exchange},
  journal      = {J. Math. Cryptol.},
  volume       = {12},
  number       = {1},
  pages        = {1--21},
  year         = {2018},
  url          = {https://doi.org/10.1515/jmc-2017-0015},
  doi          = {10.1515/JMC-2017-0015},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/Partala18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/PatersonSU18,
  author       = {Maura B. Paterson and
                  Douglas R. Stinson and
                  Jalaj Upadhyay},
  title        = {Multi-prover proof of retrievability},
  journal      = {J. Math. Cryptol.},
  volume       = {12},
  number       = {4},
  pages        = {203--220},
  year         = {2018},
  url          = {https://doi.org/10.1515/jmc-2018-0012},
  doi          = {10.1515/JMC-2018-0012},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/PatersonSU18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/PintoP18,
  author       = {Eduardo Carvalho Pinto and
                  Christophe Petit},
  title        = {Better path-finding algorithms in {LPS} Ramanujan graphs},
  journal      = {J. Math. Cryptol.},
  volume       = {12},
  number       = {4},
  pages        = {191--202},
  year         = {2018},
  url          = {https://doi.org/10.1515/jmc-2017-0051},
  doi          = {10.1515/JMC-2017-0051},
  timestamp    = {Fri, 17 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/PintoP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/RaddumZ18,
  author       = {H{\aa}vard Raddum and
                  Pavol Zajac},
  title        = {{MRHS} solver based on linear algebra and exhaustive search},
  journal      = {J. Math. Cryptol.},
  volume       = {12},
  number       = {3},
  pages        = {143--157},
  year         = {2018},
  url          = {https://doi.org/10.1515/jmc-2017-0005},
  doi          = {10.1515/JMC-2017-0005},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/RaddumZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Trung18,
  author       = {Tran van Trung},
  title        = {Construction of strongly aperiodic logarithmic signatures},
  journal      = {J. Math. Cryptol.},
  volume       = {12},
  number       = {1},
  pages        = {23--35},
  year         = {2018},
  url          = {https://doi.org/10.1515/jmc-2017-0048},
  doi          = {10.1515/JMC-2017-0048},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/Trung18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Alawatugoda17,
  author       = {Janaka Alawatugoda},
  title        = {On the leakage-resilient key exchange},
  journal      = {J. Math. Cryptol.},
  volume       = {11},
  number       = {4},
  pages        = {215--269},
  year         = {2017},
  url          = {https://doi.org/10.1515/jmc-2016-0003},
  doi          = {10.1515/JMC-2016-0003},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/Alawatugoda17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/AntalGH17,
  author       = {Eugen Antal and
                  Otokar Grosek and
                  Peter Hor{\'{a}}k},
  title        = {On a mnemonic construction of permutations},
  journal      = {J. Math. Cryptol.},
  volume       = {11},
  number       = {1},
  pages        = {45--53},
  year         = {2017},
  url          = {https://doi.org/10.1515/jmc-2016-0058},
  doi          = {10.1515/JMC-2016-0058},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/AntalGH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/AsgharK17,
  author       = {Hassan Jameel Asghar and
                  Mohamed Ali K{\^{a}}afar},
  title        = {When are identification protocols with sparse challenges safe? The
                  case of the Coskun and Herley attack},
  journal      = {J. Math. Cryptol.},
  volume       = {11},
  number       = {3},
  pages        = {177--194},
  year         = {2017},
  url          = {https://doi.org/10.1515/jmc-2015-0059},
  doi          = {10.1515/JMC-2015-0059},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/AsgharK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/DehkordiS17,
  author       = {Massoud Hadian Dehkordi and
                  Ali Safi},
  title        = {The complexity of the connected graph access structure on seven participants},
  journal      = {J. Math. Cryptol.},
  volume       = {11},
  number       = {1},
  pages        = {25--35},
  year         = {2017},
  url          = {https://doi.org/10.1515/jmc-2016-0017},
  doi          = {10.1515/JMC-2016-0017},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/DehkordiS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/DehkordiT17,
  author       = {Massoud Hadian Dehkordi and
                  Roghayeh Taghizadeh},
  title        = {Multiple differential-zero correlation linear cryptanalysis of reduced-round
                  {CAST-256}},
  journal      = {J. Math. Cryptol.},
  volume       = {11},
  number       = {2},
  pages        = {55},
  year         = {2017},
  url          = {https://doi.org/10.1515/jmc-2016-0054},
  doi          = {10.1515/JMC-2016-0054},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/DehkordiT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/GuptaPR17,
  author       = {Kishan Chand Gupta and
                  Sumit Kumar Pandey and
                  Indranil Ghosh Ray},
  title        = {Applications of design theory for the constructions of {MDS} matrices
                  for lightweight cryptography},
  journal      = {J. Math. Cryptol.},
  volume       = {11},
  number       = {2},
  pages        = {85},
  year         = {2017},
  url          = {https://doi.org/10.1515/jmc-2016-0013},
  doi          = {10.1515/JMC-2016-0013},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/GuptaPR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/LuPS17,
  author       = {Yao Lu and
                  Liqiang Peng and
                  Santanu Sarkar},
  title        = {Cryptanalysis of an {RSA} variant with moduli N=prql},
  journal      = {J. Math. Cryptol.},
  volume       = {11},
  number       = {2},
  pages        = {117},
  year         = {2017},
  url          = {https://doi.org/10.1515/jmc-2016-0025},
  doi          = {10.1515/JMC-2016-0025},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/LuPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/MohammedA17,
  author       = {Ahmed Mohammed and
                  Abdulrahman Alkhelaifi},
  title        = {{RSA:} {A} number of formulas to improve the search for p + q p+q},
  journal      = {J. Math. Cryptol.},
  volume       = {11},
  number       = {4},
  pages        = {195--203},
  year         = {2017},
  url          = {https://doi.org/10.1515/jmc-2016-0046},
  doi          = {10.1515/JMC-2016-0046},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/MohammedA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Popov17,
  author       = {Serguei Popov},
  title        = {On a decentralized trustless pseudo-random number generation algorithm},
  journal      = {J. Math. Cryptol.},
  volume       = {11},
  number       = {1},
  pages        = {37--43},
  year         = {2017},
  url          = {https://doi.org/10.1515/jmc-2016-0019},
  doi          = {10.1515/JMC-2016-0019},
  timestamp    = {Sat, 26 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/Popov17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Reichl17,
  author       = {Dominik Reichl},
  title        = {Tame logarithmic signatures of abelian groups},
  journal      = {J. Math. Cryptol.},
  volume       = {11},
  number       = {4},
  pages        = {205--214},
  year         = {2017},
  url          = {https://doi.org/10.1515/jmc-2016-0065},
  doi          = {10.1515/JMC-2016-0065},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/Reichl17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/SamajderS17,
  author       = {Subhabrata Samajder and
                  Palash Sarkar},
  title        = {Rigorous upper bounds on data complexities of block cipher cryptanalysis},
  journal      = {J. Math. Cryptol.},
  volume       = {11},
  number       = {3},
  pages        = {147--175},
  year         = {2017},
  url          = {https://doi.org/10.1515/jmc-2016-0026},
  doi          = {10.1515/JMC-2016-0026},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/SamajderS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/SaraswatSA17,
  author       = {Vishal Saraswat and
                  Rajeev Anand Sahu and
                  Amit K. Awasthi},
  title        = {A secure anonymous proxy signcryption scheme},
  journal      = {J. Math. Cryptol.},
  volume       = {11},
  number       = {2},
  pages        = {63},
  year         = {2017},
  url          = {https://doi.org/10.1515/jmc-2015-0014},
  doi          = {10.1515/JMC-2015-0014},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/SaraswatSA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Scholl17,
  author       = {Travis Scholl},
  title        = {Isolated elliptic curves and the {MOV} attack},
  journal      = {J. Math. Cryptol.},
  volume       = {11},
  number       = {3},
  pages        = {131--146},
  year         = {2017},
  url          = {https://doi.org/10.1515/jmc-2016-0053},
  doi          = {10.1515/JMC-2016-0053},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/Scholl17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/YasudaYSKK17,
  author       = {Masaya Yasuda and
                  Kazuhiro Yokoyama and
                  Takeshi Shimoyama and
                  Jun Kogure and
                  Takeshi Koshiba},
  title        = {Analysis of decreasing squared-sum of Gram-Schmidt lengths for short
                  lattice vectors},
  journal      = {J. Math. Cryptol.},
  volume       = {11},
  number       = {1},
  pages        = {1--24},
  year         = {2017},
  url          = {https://doi.org/10.1515/jmc-2016-0008},
  doi          = {10.1515/JMC-2016-0008},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/YasudaYSKK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/BiancoG16,
  author       = {Giulia Bianco and
                  Elisa Gorla},
  title        = {Compression for trace zero points on twisted Edwards curves},
  journal      = {J. Math. Cryptol.},
  volume       = {10},
  number       = {1},
  pages        = {15--34},
  year         = {2016},
  url          = {http://www.degruyter.com/view/j/jmc.2016.10.issue-1/jmc-2015-0039/jmc-2015-0039.xml},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/BiancoG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/CarletJST16,
  author       = {Claude Carlet and
                  David Joyner and
                  Pantelimon Stanica and
                  Deng Tang},
  title        = {Cryptographic properties of monotone Boolean functions},
  journal      = {J. Math. Cryptol.},
  volume       = {10},
  number       = {1},
  pages        = {1--14},
  year         = {2016},
  url          = {http://www.degruyter.com/view/j/jmc.2016.10.issue-1/jmc-2014-0030/jmc-2014-0030.xml},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/CarletJST16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/CusickLS16,
  author       = {Thomas W. Cusick and
                  K. V. Lakshmy and
                  Madathil Sethumadhavan},
  title        = {Affine equivalence of monomial rotation symmetric Boolean functions:
                  {A} P{\'{o}}lya's theorem approach},
  journal      = {J. Math. Cryptol.},
  volume       = {10},
  number       = {3-4},
  pages        = {145--156},
  year         = {2016},
  url          = {https://doi.org/10.1515/jmc-2016-0042},
  doi          = {10.1515/JMC-2016-0042},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/CusickLS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/JhaN16,
  author       = {Ashwin Jha and
                  Mridul Nandi},
  title        = {Revisiting structure graphs: Applications to {CBC-MAC} and {EMAC}},
  journal      = {J. Math. Cryptol.},
  volume       = {10},
  number       = {3-4},
  pages        = {157--180},
  year         = {2016},
  url          = {https://doi.org/10.1515/jmc-2016-0030},
  doi          = {10.1515/JMC-2016-0030},
  timestamp    = {Fri, 23 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/JhaN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/MoodyPS16,
  author       = {Dustin Moody and
                  Souradyuti Paul and
                  Daniel Smith{-}Tone},
  title        = {Indifferentiability security of the fast wide pipe hash: Breaking
                  the birthday barrier},
  journal      = {J. Math. Cryptol.},
  volume       = {10},
  number       = {2},
  pages        = {101--133},
  year         = {2016},
  url          = {https://doi.org/10.1515/jmc-2014-0044},
  doi          = {10.1515/JMC-2014-0044},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/MoodyPS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/NandiP16,
  author       = {Mridul Nandi and
                  Tapas Pandit},
  title        = {On the security of joint signature and encryption revisited},
  journal      = {J. Math. Cryptol.},
  volume       = {10},
  number       = {3-4},
  pages        = {181--221},
  year         = {2016},
  url          = {https://doi.org/10.1515/jmc-2015-0060},
  doi          = {10.1515/JMC-2015-0060},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/NandiP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Poulakis16,
  author       = {Dimitrios Poulakis},
  title        = {New lattice attacks on {DSA} schemes},
  journal      = {J. Math. Cryptol.},
  volume       = {10},
  number       = {2},
  pages        = {135--144},
  year         = {2016},
  url          = {https://doi.org/10.1515/jmc-2014-0027},
  doi          = {10.1515/JMC-2014-0027},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/Poulakis16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/SamajderS16,
  author       = {Subhabrata Samajder and
                  Palash Sarkar},
  title        = {Another look at normal approximations in cryptanalysis},
  journal      = {J. Math. Cryptol.},
  volume       = {10},
  number       = {2},
  pages        = {69--99},
  year         = {2016},
  url          = {https://doi.org/10.1515/jmc-2016-0006},
  doi          = {10.1515/JMC-2016-0006},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/SamajderS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/SwansonS16,
  author       = {Colleen M. Swanson and
                  Douglas R. Stinson},
  title        = {Unconditionally secure signature schemes revisited},
  journal      = {J. Math. Cryptol.},
  volume       = {10},
  number       = {1},
  pages        = {35--67},
  year         = {2016},
  url          = {http://www.degruyter.com/view/j/jmc.2016.10.issue-1/jmc-2016-0002/jmc-2016-0002.xml},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/SwansonS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/AccardiR15,
  author       = {Luigi Accardi and
                  Massimo Regoli},
  title        = {On a class of strongly asymmetric {PKA} algorithms},
  journal      = {J. Math. Cryptol.},
  volume       = {9},
  number       = {3},
  pages        = {151--159},
  year         = {2015},
  url          = {http://www.degruyter.com/view/j/jmc.2015.9.issue-3/jmc-2015-0019/jmc-2015-0019.xml},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/AccardiR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/AlamOY15,
  author       = {Bilal Alam and
                  Ferruh {\"{O}}zbudak and
                  Oguz Yayla},
  title        = {Classes of weak Dembowski-Ostrom polynomials for multivariate quadratic
                  cryptosystems},
  journal      = {J. Math. Cryptol.},
  volume       = {9},
  number       = {1},
  pages        = {11--22},
  year         = {2015},
  url          = {https://doi.org/10.1515/jmc-2013-0019},
  doi          = {10.1515/JMC-2013-0019},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/AlamOY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/AlbrechtPS15,
  author       = {Martin R. Albrecht and
                  Rachel Player and
                  Sam Scott},
  title        = {On the concrete hardness of Learning with Errors},
  journal      = {J. Math. Cryptol.},
  volume       = {9},
  number       = {3},
  pages        = {169--203},
  year         = {2015},
  url          = {http://www.degruyter.com/view/j/jmc.2015.9.issue-3/jmc-2015-0016/jmc-2015-0016.xml},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/AlbrechtPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/ChenEM15,
  author       = {Jiageng Chen and
                  Keita Emura and
                  Atsuko Miyaji},
  title        = {{SKENO:} Secret key encryption with non-interactive opening},
  journal      = {J. Math. Cryptol.},
  volume       = {9},
  number       = {2},
  pages        = {63--74},
  year         = {2015},
  url          = {https://doi.org/10.1515/jmc-2014-0010},
  doi          = {10.1515/JMC-2014-0010},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/ChenEM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/CusickC15,
  author       = {Thomas W. Cusick and
                  Younhwan Cheon},
  title        = {Theory of 3-rotation symmetric cubic Boolean functions},
  journal      = {J. Math. Cryptol.},
  volume       = {9},
  number       = {1},
  pages        = {45--62},
  year         = {2015},
  url          = {https://doi.org/10.1515/jmc-2014-0017},
  doi          = {10.1515/JMC-2014-0017},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/CusickC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/DolevGGKY15,
  author       = {Shlomi Dolev and
                  Juan A. Garay and
                  Niv Gilboa and
                  Vladimir Kolesnikov and
                  Yelena Yuditsky},
  title        = {Towards efficient private distributed computation on unbounded input
                  streams},
  journal      = {J. Math. Cryptol.},
  volume       = {9},
  number       = {2},
  pages        = {79--94},
  year         = {2015},
  url          = {https://doi.org/10.1515/jmc-2013-0039},
  doi          = {10.1515/JMC-2013-0039},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/DolevGGKY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Dowden15,
  author       = {Chris Dowden},
  title        = {Secure message transmission in the presence of a fully generalised
                  adversary},
  journal      = {J. Math. Cryptol.},
  volume       = {9},
  number       = {4},
  pages        = {205--214},
  year         = {2015},
  url          = {http://www.degruyter.com/view/j/jmc.2015.9.issue-4/jmc-2013-0046/jmc-2013-0046.xml},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/Dowden15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/GarberKL15,
  author       = {David Garber and
                  Delaram Kahrobaei and
                  Ha T. Lam},
  title        = {Length-based attacks in polycyclic groups},
  journal      = {J. Math. Cryptol.},
  volume       = {9},
  number       = {1},
  pages        = {33--43},
  year         = {2015},
  url          = {https://doi.org/10.1515/jmc-2014-0003},
  doi          = {10.1515/JMC-2014-0003},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/GarberKL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/HameedS15,
  author       = {Ali Hameed and
                  Arkadii Slinko},
  title        = {A characterisation of ideal weighted secret sharing schemes},
  journal      = {J. Math. Cryptol.},
  volume       = {9},
  number       = {4},
  pages        = {227--244},
  year         = {2015},
  url          = {http://www.degruyter.com/view/j/jmc.2015.9.issue-4/jmc-2015-0002/jmc-2015-0002.xml},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/HameedS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/HenryS15,
  author       = {Kevin J. Henry and
                  Douglas R. Stinson},
  title        = {Linear approaches to resilient aggregation in sensor networks},
  journal      = {J. Math. Cryptol.},
  volume       = {9},
  number       = {4},
  pages        = {245--272},
  year         = {2015},
  url          = {http://www.degruyter.com/view/j/jmc.2015.9.issue-4/jmc-2015-0042/jmc-2015-0042.xml},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/HenryS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Justus15,
  author       = {Benjamin Justus},
  title        = {The distribution of quadratic residues and non-residues in the Goldwasser-Micali
                  type of cryptosystem. {II}},
  journal      = {J. Math. Cryptol.},
  volume       = {9},
  number       = {2},
  pages        = {115--137},
  year         = {2015},
  url          = {https://doi.org/10.1515/jmc-2014-0004},
  doi          = {10.1515/JMC-2014-0004},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/Justus15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/KotovU15,
  author       = {Matvei Kotov and
                  Alexander Ushakov},
  title        = {Analysis of a certain polycyclic-group-based cryptosystem},
  journal      = {J. Math. Cryptol.},
  volume       = {9},
  number       = {3},
  pages        = {161--167},
  year         = {2015},
  url          = {http://www.degruyter.com/view/j/jmc.2015.9.issue-3/jmc-2015-0013/jmc-2015-0013.xml},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/KotovU15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/LaineL15,
  author       = {Kim Laine and
                  Kristin E. Lauter},
  title        = {Time-memory trade-offs for index calculus in genus 3},
  journal      = {J. Math. Cryptol.},
  volume       = {9},
  number       = {2},
  pages        = {95--114},
  year         = {2015},
  url          = {https://doi.org/10.1515/jmc-2014-0033},
  doi          = {10.1515/JMC-2014-0033},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/LaineL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/LuykxMPW15,
  author       = {Atul Luykx and
                  Bart Mennink and
                  Bart Preneel and
                  Laura Winnen},
  title        = {Two-permutation-based hashing with binary mixing},
  journal      = {J. Math. Cryptol.},
  volume       = {9},
  number       = {3},
  pages        = {139--150},
  year         = {2015},
  url          = {http://www.degruyter.com/view/j/jmc.2015.9.issue-3/jmc-2015-0015/jmc-2015-0015.xml},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/LuykxMPW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/PatersonS15,
  author       = {Maura B. Paterson and
                  Douglas R. Stinson},
  title        = {Optimal constructions for ID-based one-way-function key predistribution
                  schemes realizing specified communication graphs},
  journal      = {J. Math. Cryptol.},
  volume       = {9},
  number       = {4},
  pages        = {215--225},
  year         = {2015},
  url          = {http://www.degruyter.com/view/j/jmc.2015.9.issue-4/jmc-2014-0031/jmc-2014-0031.xml},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/PatersonS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/SparrW15,
  author       = {R{\"{u}}diger Sparr and
                  Ralph Wernsdorf},
  title        = {The round functions of {KASUMI} generate the alternating group},
  journal      = {J. Math. Cryptol.},
  volume       = {9},
  number       = {1},
  pages        = {23--32},
  year         = {2015},
  url          = {https://doi.org/10.1515/jmc-2013-0028},
  doi          = {10.1515/JMC-2013-0028},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/SparrW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/TsabanL15,
  author       = {Boaz Tsaban and
                  Noam Lifshitz},
  title        = {Cryptanalysis of the {MORE} symmetric key fully homomorphic encryption
                  scheme},
  journal      = {J. Math. Cryptol.},
  volume       = {9},
  number       = {2},
  pages        = {75--78},
  year         = {2015},
  url          = {https://doi.org/10.1515/jmc-2014-0013},
  doi          = {10.1515/JMC-2014-0013},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/TsabanL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Yoon15,
  author       = {Kisoon Yoon},
  title        = {A new method of choosing primitive elements for Brezing-Weng families
                  of pairing-friendly elliptic curves},
  journal      = {J. Math. Cryptol.},
  volume       = {9},
  number       = {1},
  pages        = {1--9},
  year         = {2015},
  url          = {https://doi.org/10.1515/jmc-2013-0017},
  doi          = {10.1515/JMC-2013-0017},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/Yoon15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/AsgharDPS14,
  author       = {Hassan Jameel Asghar and
                  Yvo Desmedt and
                  Josef Pieprzyk and
                  Ron Steinfeld},
  title        = {A subexponential construction of graph coloring for multiparty computation},
  journal      = {J. Math. Cryptol.},
  volume       = {8},
  number       = {4},
  pages        = {363--403},
  year         = {2014},
  url          = {http://www.degruyter.com/view/j/jmc.2014.8.issue-4/jmc-2013-0035/jmc-2013-0035.xml},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/AsgharDPS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/BosDJ14,
  author       = {Joppe W. Bos and
                  Alina Dudeanu and
                  Dimitar Jetchev},
  title        = {Collision bounds for the additive Pollard rho algorithm for solving
                  discrete logarithms},
  journal      = {J. Math. Cryptol.},
  volume       = {8},
  number       = {1},
  pages        = {71--92},
  year         = {2014},
  url          = {https://doi.org/10.1515/jmc-2012-0032},
  doi          = {10.1515/JMC-2012-0032},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/BosDJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/CarletDGM14,
  author       = {Claude Carlet and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Houssem Maghrebi},
  title        = {Leakage squeezing: Optimal implementation and security evaluation},
  journal      = {J. Math. Cryptol.},
  volume       = {8},
  number       = {3},
  pages        = {249--295},
  year         = {2014},
  url          = {https://doi.org/10.1515/jmc-2012-0018},
  doi          = {10.1515/JMC-2012-0018},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/CarletDGM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/ChildsI14,
  author       = {Andrew M. Childs and
                  G{\'{a}}bor Ivanyos},
  title        = {Quantum computation of discrete logarithms in semigroups},
  journal      = {J. Math. Cryptol.},
  volume       = {8},
  number       = {4},
  pages        = {405--416},
  year         = {2014},
  url          = {http://www.degruyter.com/view/j/jmc.2014.8.issue-4/jmc-2013-0038/jmc-2013-0038.xml},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/ChildsI14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/ChildsJS14,
  author       = {Andrew M. Childs and
                  David Jao and
                  Vladimir Soukharev},
  title        = {Constructing elliptic curve isogenies in quantum subexponential time},
  journal      = {J. Math. Cryptol.},
  volume       = {8},
  number       = {1},
  pages        = {1--29},
  year         = {2014},
  url          = {https://doi.org/10.1515/jmc-2012-0016},
  doi          = {10.1515/JMC-2012-0016},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/ChildsJS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/DibertC14,
  author       = {Alexander Dibert and
                  L{\'{a}}szl{\'{o}} Csirmaz},
  title        = {Infinite secret sharing - Examples},
  journal      = {J. Math. Cryptol.},
  volume       = {8},
  number       = {2},
  pages        = {141--168},
  year         = {2014},
  url          = {https://doi.org/10.1515/jmc-2013-0005},
  doi          = {10.1515/JMC-2013-0005},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/DibertC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/DuquesneMF14,
  author       = {Sylvain Duquesne and
                  Nadia El Mrabet and
                  Emmanuel Fouotsa},
  title        = {Efficient computation of pairings on Jacobi quartic elliptic curves},
  journal      = {J. Math. Cryptol.},
  volume       = {8},
  number       = {4},
  pages        = {331--362},
  year         = {2014},
  url          = {http://www.degruyter.com/view/j/jmc.2014.8.issue-4/jmc-2013-0033/jmc-2013-0033.xml},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/DuquesneMF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/FeoJP14,
  author       = {Luca De Feo and
                  David Jao and
                  J{\'{e}}r{\^{o}}me Pl{\^{u}}t},
  title        = {Towards quantum-resistant cryptosystems from supersingular elliptic
                  curve isogenies},
  journal      = {J. Math. Cryptol.},
  volume       = {8},
  number       = {3},
  pages        = {209--247},
  year         = {2014},
  url          = {https://doi.org/10.1515/jmc-2012-0015},
  doi          = {10.1515/JMC-2012-0015},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/FeoJP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/GalbraithZ14,
  author       = {Steven D. Galbraith and
                  Chang{-}An Zhao},
  title        = {Erratum Self-pairings on hyperelliptic curves {[J.} Math. Cryptol.
                  7(2013), 31-42]},
  journal      = {J. Math. Cryptol.},
  volume       = {8},
  number       = {1},
  pages        = {93},
  year         = {2014},
  url          = {https://doi.org/10.1515/jmc-2013-5010},
  doi          = {10.1515/JMC-2013-5010},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/GalbraithZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/HaridasVV14,
  author       = {Deepthi Haridas and
                  Sarma Venkataraman and
                  Geeta Varadan},
  title        = {Security analysis of Modified Rivest Scheme},
  journal      = {J. Math. Cryptol.},
  volume       = {8},
  number       = {3},
  pages        = {297--303},
  year         = {2014},
  url          = {https://doi.org/10.1515/jmc-2013-0018},
  doi          = {10.1515/JMC-2013-0018},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/HaridasVV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Jiang14,
  author       = {Shaoquan Jiang},
  title        = {Persistent asymmetric password-based key exchange},
  journal      = {J. Math. Cryptol.},
  volume       = {8},
  number       = {1},
  pages        = {31--70},
  year         = {2014},
  url          = {https://doi.org/10.1515/jmc-2012-0010},
  doi          = {10.1515/JMC-2012-0010},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/Jiang14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Justus14,
  author       = {Benjamin Justus},
  title        = {The distribution of quadratic residues and non-residues in the Goldwasser-Micali
                  type of cryptosystem},
  journal      = {J. Math. Cryptol.},
  volume       = {8},
  number       = {2},
  pages        = {115--140},
  year         = {2014},
  url          = {https://doi.org/10.1515/jmc-2013-0001},
  doi          = {10.1515/JMC-2013-0001},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/Justus14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/MyasnikovU14,
  author       = {Alex D. Myasnikov and
                  Alexander Ushakov},
  title        = {Cryptanalysis of matrix conjugation schemes},
  journal      = {J. Math. Cryptol.},
  volume       = {8},
  number       = {2},
  pages        = {95--114},
  year         = {2014},
  url          = {https://doi.org/10.1515/jmc-2012-0033},
  doi          = {10.1515/JMC-2012-0033},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/MyasnikovU14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/OmarS14,
  author       = {Sami Omar and
                  Houssem Sabri},
  title        = {Fast hash functions and convolution product},
  journal      = {J. Math. Cryptol.},
  volume       = {8},
  number       = {2},
  pages        = {169--187},
  year         = {2014},
  url          = {https://doi.org/10.1515/jmc-2013-0014},
  doi          = {10.1515/JMC-2013-0014},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/OmarS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Sha14,
  author       = {Min Sha},
  title        = {On the non-idealness of cyclotomic families of pairing-friendly elliptic
                  curves},
  journal      = {J. Math. Cryptol.},
  volume       = {8},
  number       = {4},
  pages        = {417--440},
  year         = {2014},
  url          = {http://www.degruyter.com/view/j/jmc.2014.8.issue-4/jmc-2013-0042/jmc-2013-0042.xml},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/Sha14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/StinsonU14,
  author       = {Douglas R. Stinson and
                  Jalaj Upadhyay},
  title        = {Is extracting data the same as possessing data?},
  journal      = {J. Math. Cryptol.},
  volume       = {8},
  number       = {2},
  pages        = {189--207},
  year         = {2014},
  url          = {https://doi.org/10.1515/jmc-2013-0034},
  doi          = {10.1515/JMC-2013-0034},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/StinsonU14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/YasudaYSKK14,
  author       = {Masaya Yasuda and
                  Kazuhiro Yokoyama and
                  Takeshi Shimoyama and
                  Jun Kogure and
                  Takeshi Koshiba},
  title        = {On the exact decryption range for Gentry-Halevi's implementation of
                  fully homomorphic encryption},
  journal      = {J. Math. Cryptol.},
  volume       = {8},
  number       = {3},
  pages        = {305--329},
  year         = {2014},
  url          = {https://doi.org/10.1515/jmc-2013-0024},
  doi          = {10.1515/JMC-2013-0024},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/YasudaYSKK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/ChenGK13,
  author       = {Yanling Chen and
                  Danilo Gligoroski and
                  Svein J. Knapskog},
  title        = {On a special class of multivariate quadratic quasigroups (MQQs)},
  journal      = {J. Math. Cryptol.},
  volume       = {7},
  number       = {2},
  pages        = {111--141},
  year         = {2013},
  url          = {https://doi.org/10.1515/jmc-2012-0006},
  doi          = {10.1515/JMC-2012-0006},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/ChenGK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/FieldJ13,
  author       = {Rebecca E. Field and
                  Brant C. Jones},
  title        = {Using carry-truncated addition to analyze add-rotate-xor hash algorithms},
  journal      = {J. Math. Cryptol.},
  volume       = {7},
  number       = {2},
  pages        = {97--110},
  year         = {2013},
  url          = {https://doi.org/10.1515/jmc-2012-0019},
  doi          = {10.1515/JMC-2012-0019},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/FieldJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/FloriM13,
  author       = {Jean{-}Pierre Flori and
                  Sihem Mesnager},
  title        = {An efficient characterization of a family of hyper-bent functions
                  with multiple trace terms},
  journal      = {J. Math. Cryptol.},
  volume       = {7},
  number       = {1},
  pages        = {43--68},
  year         = {2013},
  url          = {https://doi.org/10.1515/jmc-2012-0013},
  doi          = {10.1515/JMC-2012-0013},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/FloriM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/GalbraithZ13,
  author       = {Steven D. Galbraith and
                  Chang{-}An Zhao},
  title        = {Self-pairings on hyperelliptic curves},
  journal      = {J. Math. Cryptol.},
  volume       = {7},
  number       = {1},
  pages        = {31--42},
  year         = {2013},
  url          = {https://doi.org/10.1515/jmc-2012-0009},
  doi          = {10.1515/JMC-2012-0009},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/GalbraithZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/GathenS13,
  author       = {Joachim von zur Gathen and
                  Igor E. Shparlinski},
  title        = {Generating safe primes},
  journal      = {J. Math. Cryptol.},
  volume       = {7},
  number       = {4},
  pages        = {333--365},
  year         = {2013},
  url          = {https://doi.org/10.1515/jmc-2013-5011},
  doi          = {10.1515/JMC-2013-5011},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/GathenS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/GharahiD13,
  author       = {Motahhareh Gharahi and
                  Massoud Hadian Dehkordi},
  title        = {Perfect secret sharing schemes for graph access structures on six
                  participants},
  journal      = {J. Math. Cryptol.},
  volume       = {7},
  number       = {2},
  pages        = {143--146},
  year         = {2013},
  url          = {https://doi.org/10.1515/jmc-2012-0026},
  doi          = {10.1515/JMC-2012-0026},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/GharahiD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/GrosekP13,
  author       = {Otokar Grosek and
                  Stefan Porubsk{\'{y}}},
  title        = {Coprime solutions to ax{\(\equiv\)}b (mod n)},
  journal      = {J. Math. Cryptol.},
  volume       = {7},
  number       = {3},
  pages        = {217--224},
  year         = {2013},
  url          = {https://doi.org/10.1515/jmc-2013-5003},
  doi          = {10.1515/JMC-2013-5003},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/GrosekP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/JhanwarS13,
  author       = {Mahabir Prasad Jhanwar and
                  Reihaneh Safavi{-}Naini},
  title        = {Unconditionally-secure ideal robust secret sharing schemes for threshold
                  and multilevel access structure},
  journal      = {J. Math. Cryptol.},
  volume       = {7},
  number       = {4},
  pages        = {279--296},
  year         = {2013},
  url          = {https://doi.org/10.1515/jmc-2013-5006},
  doi          = {10.1515/JMC-2013-5006},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/JhanwarS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/KoblitzM13,
  author       = {Neal Koblitz and
                  Alfred Menezes},
  title        = {Another look at {HMAC}},
  journal      = {J. Math. Cryptol.},
  volume       = {7},
  number       = {3},
  pages        = {225--251},
  year         = {2013},
  url          = {https://doi.org/10.1515/jmc-2013-5004},
  doi          = {10.1515/JMC-2013-5004},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/KoblitzM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/KurosawaNP13,
  author       = {Kaoru Kurosawa and
                  Ryo Nojima and
                  Le Trieu Phong},
  title        = {New leakage-resilient CCA-secure public key encryption},
  journal      = {J. Math. Cryptol.},
  volume       = {7},
  number       = {4},
  pages        = {297--312},
  year         = {2013},
  url          = {https://doi.org/10.1515/jmc-2013-5007},
  doi          = {10.1515/JMC-2013-5007},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/KurosawaNP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Magliveras13,
  author       = {Spyros S. Magliveras},
  title        = {Foreword},
  journal      = {J. Math. Cryptol.},
  volume       = {7},
  number       = {3},
  pages        = {181--182},
  year         = {2013},
  url          = {https://doi.org/10.1515/jmc-2013-5001},
  doi          = {10.1515/JMC-2013-5001},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/Magliveras13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/MashrafiBDSW13,
  author       = {Mufeed Al Mashrafi and
                  Harry Bartlett and
                  Ed Dawson and
                  Leonie Simpson and
                  Kenneth Koon{-}Ho Wong},
  title        = {Indirect message injection for {MAC} generation},
  journal      = {J. Math. Cryptol.},
  volume       = {7},
  number       = {3},
  pages        = {253--277},
  year         = {2013},
  url          = {https://doi.org/10.1515/jmc-2013-5005},
  doi          = {10.1515/JMC-2013-5005},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/MashrafiBDSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/OrumiehchihaPSB13,
  author       = {Mohammad Ali Orumiehchiha and
                  Josef Pieprzyk and
                  Ron Steinfeld and
                  Harry Bartlett},
  title        = {Security analysis of linearly filtered NLFSRs},
  journal      = {J. Math. Cryptol.},
  volume       = {7},
  number       = {4},
  pages        = {313--332},
  year         = {2013},
  url          = {https://doi.org/10.1515/jmc-2013-5009},
  doi          = {10.1515/JMC-2013-5009},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/OrumiehchihaPSB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/PatersonSU13,
  author       = {Maura B. Paterson and
                  Douglas R. Stinson and
                  Jalaj Upadhyay},
  title        = {A coding theory foundation for the analysis of general unconditionally
                  secure proof-of-retrievability schemes for cloud storage},
  journal      = {J. Math. Cryptol.},
  volume       = {7},
  number       = {3},
  pages        = {183--216},
  year         = {2013},
  url          = {https://doi.org/10.1515/jmc-2013-5002},
  doi          = {10.1515/JMC-2013-5002},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/PatersonSU13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/StaszewskiT13,
  author       = {Reiner Staszewski and
                  Tran van Trung},
  title        = {Strongly aperiodic logarithmic signatures},
  journal      = {J. Math. Cryptol.},
  volume       = {7},
  number       = {2},
  pages        = {147--179},
  year         = {2013},
  url          = {https://doi.org/10.1515/jmc-2013-5000},
  doi          = {10.1515/JMC-2013-5000},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/StaszewskiT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/TassaJB13,
  author       = {Tamir Tassa and
                  Ayman Jarrous and
                  Yonatan Ben{-}Ya'akov},
  title        = {Oblivious evaluation of multivariate polynomials},
  journal      = {J. Math. Cryptol.},
  volume       = {7},
  number       = {1},
  pages        = {1--29},
  year         = {2013},
  url          = {https://doi.org/10.1515/jmc-2012-0007},
  doi          = {10.1515/JMC-2012-0007},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/TassaJB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/WangL13,
  author       = {Tianze Wang and
                  Dongdai Lin},
  title        = {A method for counting the number of polynomial equivalence classes},
  journal      = {J. Math. Cryptol.},
  volume       = {7},
  number       = {1},
  pages        = {69--95},
  year         = {2013},
  url          = {https://doi.org/10.1515/jmc-2012-0017},
  doi          = {10.1515/JMC-2012-0017},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/WangL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Zajac13,
  author       = {Pavol Zajac},
  title        = {A new method to solve {MRHS} equation systems and its connection to
                  group factorization},
  journal      = {J. Math. Cryptol.},
  volume       = {7},
  number       = {4},
  pages        = {367--381},
  year         = {2013},
  url          = {https://doi.org/10.1515/jmc-2013-5012},
  doi          = {10.1515/JMC-2013-5012},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/Zajac13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/AttrapadungL12,
  author       = {Nuttapong Attrapadung and
                  Beno{\^{\i}}t Libert},
  title        = {Functional encryption for public-attribute inner products: Achieving
                  constant-size ciphertexts with adaptive security or support for negation},
  journal      = {J. Math. Cryptol.},
  volume       = {5},
  number       = {2},
  pages        = {115--158},
  year         = {2012},
  url          = {https://doi.org/10.1515/jmc.2011.009},
  doi          = {10.1515/JMC.2011.009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/AttrapadungL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/BaninT12,
  author       = {Matan Banin and
                  Boaz Tsaban},
  title        = {The discrete logarithm problem in Bergman's non-representable ring},
  journal      = {J. Math. Cryptol.},
  volume       = {6},
  number       = {2},
  pages        = {171--182},
  year         = {2012},
  url          = {https://doi.org/10.1515/jmc-2012-0014},
  doi          = {10.1515/JMC-2012-0014},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/BaninT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/BaumeisterW12,
  author       = {Barbara Baumeister and
                  Jan de Wiljes},
  title        = {Aperiodic logarithmic signatures},
  journal      = {J. Math. Cryptol.},
  volume       = {6},
  number       = {1},
  pages        = {21--37},
  year         = {2012},
  url          = {https://doi.org/10.1515/jmc-2012-0003},
  doi          = {10.1515/JMC-2012-0003},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/BaumeisterW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Bisson12,
  author       = {Gaetan Bisson},
  title        = {Computing endomorphism rings of elliptic curves under the {GRH}},
  journal      = {J. Math. Cryptol.},
  volume       = {5},
  number       = {2},
  pages        = {101--114},
  year         = {2012},
  url          = {https://doi.org/10.1515/jmc.2011.008},
  doi          = {10.1515/JMC.2011.008},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/Bisson12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/BlackburnCM12,
  author       = {Simon R. Blackburn and
                  Carlos Cid and
                  Ciaran Mullan},
  title        = {Cryptanalysis of three matrix-based key establishment protocols},
  journal      = {J. Math. Cryptol.},
  volume       = {5},
  number       = {2},
  pages        = {159--168},
  year         = {2012},
  url          = {https://doi.org/10.1515/jmc.2011.010},
  doi          = {10.1515/JMC.2011.010},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/BlackburnCM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/BouillaguetFJT12,
  author       = {Charles Bouillaguet and
                  Pierre{-}Alain Fouque and
                  Antoine Joux and
                  Joana Treger},
  title        = {A family of weak keys in {HFE} and the corresponding practical key-recovery},
  journal      = {J. Math. Cryptol.},
  volume       = {5},
  number       = {3-4},
  pages        = {247--275},
  year         = {2012},
  url          = {https://doi.org/10.1515/jmc.2011.012},
  doi          = {10.1515/JMC.2011.012},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/BouillaguetFJT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Boxall12,
  author       = {John Boxall},
  title        = {Heuristics on pairing-friendly elliptic curves},
  journal      = {J. Math. Cryptol.},
  volume       = {6},
  number       = {2},
  pages        = {81--104},
  year         = {2012},
  url          = {https://doi.org/10.1515/jmc-2011-0004},
  doi          = {10.1515/JMC-2011-0004},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/Boxall12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/BrownC12,
  author       = {Alyssa Brown and
                  Thomas W. Cusick},
  title        = {Recursive weights for some Boolean functions},
  journal      = {J. Math. Cryptol.},
  volume       = {6},
  number       = {2},
  pages        = {105--135},
  year         = {2012},
  url          = {https://doi.org/10.1515/jmc-2011-0020},
  doi          = {10.1515/JMC-2011-0020},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/BrownC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/CheeWZ12,
  author       = {Yeow Meng Chee and
                  Huaxiong Wang and
                  Liang Feng Zhang},
  title        = {On the Bringer-Chabanne {EPIR} protocol for polynomial evaluation},
  journal      = {J. Math. Cryptol.},
  volume       = {5},
  number       = {3-4},
  pages        = {277--301},
  year         = {2012},
  url          = {https://doi.org/10.1515/jmc-2012-0001},
  doi          = {10.1515/JMC-2012-0001},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/CheeWZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/FischlinS12,
  author       = {Marc Fischlin and
                  Dominique Schr{\"{o}}der},
  title        = {Security of blind signatures under aborts and applications to adaptive
                  oblivious transfer},
  journal      = {J. Math. Cryptol.},
  volume       = {5},
  number       = {2},
  pages        = {169--204},
  year         = {2012},
  url          = {https://doi.org/10.1515/jmc.2011.011},
  doi          = {10.1515/JMC.2011.011},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/FischlinS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Gallant12,
  author       = {Robert P. Gallant},
  title        = {Finding discrete logarithms with a set orbit distinguisher},
  journal      = {J. Math. Cryptol.},
  volume       = {6},
  number       = {1},
  pages        = {1--20},
  year         = {2012},
  url          = {https://doi.org/10.1515/jmc-2012-0002},
  doi          = {10.1515/JMC-2012-0002},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/Gallant12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Koblitz12,
  author       = {Neal Koblitz},
  title        = {Another look at automated theorem-proving {II}},
  journal      = {J. Math. Cryptol.},
  volume       = {5},
  number       = {3-4},
  pages        = {205--224},
  year         = {2012},
  url          = {https://doi.org/10.1515/jmc-2011-0014},
  doi          = {10.1515/JMC-2011-0014},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/Koblitz12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Maze12,
  author       = {G{\'{e}}rard Maze},
  title        = {Analysis of a key distribution scheme in secure multicasting},
  journal      = {J. Math. Cryptol.},
  volume       = {6},
  number       = {1},
  pages        = {69--80},
  year         = {2012},
  url          = {https://doi.org/10.1515/jmc-2012-0005},
  doi          = {10.1515/JMC-2012-0005},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/Maze12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/MoodyW12,
  author       = {Dustin Moody and
                  Hongfeng Wu},
  title        = {Families of elliptic curves with rational 3-torsion},
  journal      = {J. Math. Cryptol.},
  volume       = {5},
  number       = {3-4},
  pages        = {225--246},
  year         = {2012},
  url          = {https://doi.org/10.1515/jmc-2011-0013},
  doi          = {10.1515/JMC-2011-0013},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/MoodyW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/MouhaSP12,
  author       = {Nicky Mouha and
                  Gautham Sekar and
                  Bart Preneel},
  title        = {Challenging the increased resistance of regular hash functions against
                  birthday attacks},
  journal      = {J. Math. Cryptol.},
  volume       = {6},
  number       = {3-4},
  pages        = {229--248},
  year         = {2012},
  url          = {https://doi.org/10.1515/jmc-2011-0010},
  doi          = {10.1515/JMC-2011-0010},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/MouhaSP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Murphy12,
  author       = {Sean Murphy},
  title        = {The effectiveness of the linear hull effect},
  journal      = {J. Math. Cryptol.},
  volume       = {6},
  number       = {2},
  pages        = {137--147},
  year         = {2012},
  url          = {https://doi.org/10.1515/jmc-2011-0025},
  doi          = {10.1515/JMC-2011-0025},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/Murphy12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Okano12,
  author       = {Keiji Okano},
  title        = {On the {\(\rho\)}-values of complete families of pairing-friendly
                  elliptic curves},
  journal      = {J. Math. Cryptol.},
  volume       = {6},
  number       = {3-4},
  pages        = {249--268},
  year         = {2012},
  url          = {https://doi.org/10.1515/jmc-2012-0011},
  doi          = {10.1515/JMC-2012-0011},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/Okano12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Persichetti12,
  author       = {Edoardo Persichetti},
  title        = {Compact McEliece keys based on quasi-dyadic Srivastava codes},
  journal      = {J. Math. Cryptol.},
  volume       = {6},
  number       = {2},
  pages        = {149--169},
  year         = {2012},
  url          = {https://doi.org/10.1515/jmc-2011-0099},
  doi          = {10.1515/JMC-2011-0099},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/Persichetti12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/SepahiPSS12,
  author       = {Reza Sepahi and
                  Josef Pieprzyk and
                  Siamak Fayyaz Shahandashti and
                  Berry Schoenmakers},
  title        = {New security notions and relations for public-key encryption},
  journal      = {J. Math. Cryptol.},
  volume       = {6},
  number       = {3-4},
  pages        = {183--227},
  year         = {2012},
  url          = {https://doi.org/10.1515/jmc-2010-0099},
  doi          = {10.1515/JMC-2010-0099},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/SepahiPSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/WeiW12,
  author       = {Tzer{-}jen Wei and
                  Lih{-}Chung Wang},
  title        = {A fast mental poker protocol},
  journal      = {J. Math. Cryptol.},
  volume       = {6},
  number       = {1},
  pages        = {39--68},
  year         = {2012},
  url          = {https://doi.org/10.1515/jmc-2012-0004},
  doi          = {10.1515/JMC-2012-0004},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/WeiW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/CietQS11,
  author       = {Mathieu Ciet and
                  Jean{-}Jacques Quisquater and
                  Francesco Sica},
  title        = {Compact elliptic curve representations},
  journal      = {J. Math. Cryptol.},
  volume       = {5},
  number       = {1},
  pages        = {89--100},
  year         = {2011},
  url          = {https://doi.org/10.1515/jmc.2011.007},
  doi          = {10.1515/JMC.2011.007},
  timestamp    = {Thu, 07 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/CietQS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Duquesne11,
  author       = {Sylvain Duquesne},
  title        = {{RNS} arithmetic in pk and application to fast pairing computation},
  journal      = {J. Math. Cryptol.},
  volume       = {5},
  number       = {1},
  pages        = {51--88},
  year         = {2011},
  url          = {https://doi.org/10.1515/jmc.2011.006},
  doi          = {10.1515/JMC.2011.006},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/Duquesne11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/HisilWCD11,
  author       = {H{\"{u}}seyin Hisil and
                  Kenneth Koon{-}Ho Wong and
                  Gary Carter and
                  Ed Dawson},
  title        = {An exploration of affine group laws for elliptic curves},
  journal      = {J. Math. Cryptol.},
  volume       = {5},
  number       = {1},
  pages        = {1--50},
  year         = {2011},
  url          = {https://doi.org/10.1515/jmc.2011.005},
  doi          = {10.1515/JMC.2011.005},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/HisilWCD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Mullan11,
  author       = {Ciaran Mullan},
  title        = {Cryptanalysing variants of Stickel's key agreement scheme},
  journal      = {J. Math. Cryptol.},
  volume       = {4},
  number       = {4},
  pages        = {365--373},
  year         = {2011},
  url          = {https://doi.org/10.1515/jmc.2011.003},
  doi          = {10.1515/JMC.2011.003},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/Mullan11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/SinghSS11,
  author       = {Rajesh P. Singh and
                  Anupam Saikia and
                  B. K. Sarma},
  title        = {Poly-Dragon: an efficient multivariate public key cryptosystem},
  journal      = {J. Math. Cryptol.},
  volume       = {4},
  number       = {4},
  pages        = {349--364},
  year         = {2011},
  url          = {https://doi.org/10.1515/jmc.2011.002},
  doi          = {10.1515/JMC.2011.002},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/SinghSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Tischhauser11,
  author       = {Elmar Tischhauser},
  title        = {Nonsmooth cryptanalysis, with an application to the stream cipher
                  {MICKEY}},
  journal      = {J. Math. Cryptol.},
  volume       = {4},
  number       = {4},
  pages        = {317--348},
  year         = {2011},
  url          = {https://doi.org/10.1515/jmc.2011.001},
  doi          = {10.1515/JMC.2011.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/Tischhauser11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/WolfP11,
  author       = {Christopher Wolf and
                  Bart Preneel},
  title        = {Equivalent keys in {\(\mathscr{M}\)}ultivariate uadratic public key
                  systems},
  journal      = {J. Math. Cryptol.},
  volume       = {4},
  number       = {4},
  pages        = {375--415},
  year         = {2011},
  url          = {https://doi.org/10.1515/jmc.2011.004},
  doi          = {10.1515/JMC.2011.004},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/WolfP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/AlomairCP10,
  author       = {Basel Alomair and
                  Andrew Clark and
                  Radha Poovendran},
  title        = {The power of primes: security of authentication based on a universal
                  hash-function family},
  journal      = {J. Math. Cryptol.},
  volume       = {4},
  number       = {2},
  pages        = {121--148},
  year         = {2010},
  url          = {https://doi.org/10.1515/jmc.2010.005},
  doi          = {10.1515/JMC.2010.005},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/AlomairCP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Blackburn10,
  author       = {Simon R. Blackburn},
  title        = {The discrete logarithm problem modulo one: cryptanalysing the Ariffin-Abu
                  cryptosystem},
  journal      = {J. Math. Cryptol.},
  volume       = {4},
  number       = {2},
  pages        = {193--198},
  year         = {2010},
  url          = {https://doi.org/10.1515/jmc.2010.008},
  doi          = {10.1515/JMC.2010.008},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/Blackburn10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/HakutaST10,
  author       = {Keisuke Hakuta and
                  Hisayoshi Sato and
                  Tsuyoshi Takagi},
  title        = {Efficient arithmetic on subfield elliptic curves over small finite
                  fields of odd characteristic},
  journal      = {J. Math. Cryptol.},
  volume       = {4},
  number       = {3},
  pages        = {199--238},
  year         = {2010},
  url          = {https://doi.org/10.1515/jmc.2010.009},
  doi          = {10.1515/JMC.2010.009},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/HakutaST10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/HinekL10,
  author       = {M. Jason Hinek and
                  Charles C. Y. Lam},
  title        = {Common modulus attacks on small private exponent {RSA} and some fast
                  variants (in practice)},
  journal      = {J. Math. Cryptol.},
  volume       = {4},
  number       = {1},
  pages        = {58--93},
  year         = {2010},
  url          = {https://doi.org/10.1515/jmc.2010.003},
  doi          = {10.1515/JMC.2010.003},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/HinekL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Karabina10,
  author       = {Koray Karabina},
  title        = {Factor-4 and 6 compression of cyclotomic subgroups of and},
  journal      = {J. Math. Cryptol.},
  volume       = {4},
  number       = {1},
  pages        = {1--42},
  year         = {2010},
  url          = {https://doi.org/10.1515/jmc.2010.001},
  doi          = {10.1515/JMC.2010.001},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/Karabina10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/KarabinaMPS10,
  author       = {Koray Karabina and
                  Alfred Menezes and
                  Carl Pomerance and
                  Igor E. Shparlinski},
  title        = {On the asymptotic effectiveness of Weil descent attacks},
  journal      = {J. Math. Cryptol.},
  volume       = {4},
  number       = {2},
  pages        = {175--191},
  year         = {2010},
  url          = {https://doi.org/10.1515/jmc.2010.007},
  doi          = {10.1515/JMC.2010.007},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/KarabinaMPS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/KortelainenHK10,
  author       = {Juha Kortelainen and
                  Kimmo Halunen and
                  Tuomas Kortelainen},
  title        = {Multicollision attacks and generalized iterated hash functions},
  journal      = {J. Math. Cryptol.},
  volume       = {4},
  number       = {3},
  pages        = {239--270},
  year         = {2010},
  url          = {https://doi.org/10.1515/jmc.2010.010},
  doi          = {10.1515/JMC.2010.010},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/KortelainenHK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Marti-FarreP10,
  author       = {Jaume Mart{\'{\i}}{-}Farr{\'{e}} and
                  Carles Padr{\'{o}}},
  title        = {On secret sharing schemes, matroids and polymatroids},
  journal      = {J. Math. Cryptol.},
  volume       = {4},
  number       = {2},
  pages        = {95--120},
  year         = {2010},
  url          = {https://doi.org/10.1515/jmc.2010.004},
  doi          = {10.1515/JMC.2010.004},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/Marti-FarreP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/MosinaU10,
  author       = {Natalia Mosina and
                  Alexander Ushakov},
  title        = {Mean-set attack: cryptanalysis of Sibert et al. authentication protocol},
  journal      = {J. Math. Cryptol.},
  volume       = {4},
  number       = {2},
  pages        = {149--174},
  year         = {2010},
  url          = {https://doi.org/10.1515/jmc.2010.006},
  doi          = {10.1515/JMC.2010.006},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/MosinaU10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Shokrieh10,
  author       = {Farbod Shokrieh},
  title        = {The monodromy pairing and discrete logarithm on the Jacobian of finite
                  graphs},
  journal      = {J. Math. Cryptol.},
  volume       = {4},
  number       = {1},
  pages        = {43--56},
  year         = {2010},
  url          = {https://doi.org/10.1515/jmc.2010.002},
  doi          = {10.1515/JMC.2010.002},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/Shokrieh10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/SvabaT10,
  author       = {Pavol Svaba and
                  Tran van Trung},
  title        = {Public key cryptosystem {MST3:} cryptanalysis and realization},
  journal      = {J. Math. Cryptol.},
  volume       = {4},
  number       = {3},
  pages        = {271--315},
  year         = {2010},
  url          = {https://doi.org/10.1515/jmc.2010.011},
  doi          = {10.1515/JMC.2010.011},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/SvabaT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/0002MS09,
  author       = {Simon Fischer and
                  Willi Meier and
                  Dirk Stegemann},
  title        = {Some remarks on FCSRs and implications for stream ciphers},
  journal      = {J. Math. Cryptol.},
  volume       = {3},
  number       = {3},
  pages        = {227--236},
  year         = {2009},
  url          = {https://doi.org/10.1515/JMC.2009.013},
  doi          = {10.1515/JMC.2009.013},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/0002MS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/BettaleFP09,
  author       = {Luk Bettale and
                  Jean{-}Charles Faug{\`{e}}re and
                  Ludovic Perret},
  title        = {Hybrid approach for solving multivariate systems over finite fields},
  journal      = {J. Math. Cryptol.},
  volume       = {3},
  number       = {3},
  pages        = {177--197},
  year         = {2009},
  url          = {https://doi.org/10.1515/JMC.2009.009},
  doi          = {10.1515/JMC.2009.009},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/BettaleFP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Blackburn09,
  author       = {Simon R. Blackburn},
  title        = {Cryptanalysing the critical group: efficiently solving Biggs's discrete
                  logarithm problem},
  journal      = {J. Math. Cryptol.},
  volume       = {3},
  number       = {3},
  pages        = {199--203},
  year         = {2009},
  url          = {https://doi.org/10.1515/JMC.2009.010},
  doi          = {10.1515/JMC.2009.010},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/Blackburn09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/BlackburnCM09,
  author       = {Simon R. Blackburn and
                  Carlos Cid and
                  Ciaran Mullan},
  title        = {Cryptanalysis of the {MST} 3 public key cryptosystem},
  journal      = {J. Math. Cryptol.},
  volume       = {3},
  number       = {4},
  pages        = {321--338},
  year         = {2009},
  url          = {https://doi.org/10.1515/JMC.2009.020},
  doi          = {10.1515/JMC.2009.020},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/BlackburnCM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/BlakeK09,
  author       = {Ian F. Blake and
                  Vladimir Kolesnikov},
  title        = {One-round secure comparison of integers},
  journal      = {J. Math. Cryptol.},
  volume       = {3},
  number       = {1},
  pages        = {37--68},
  year         = {2009},
  url          = {https://doi.org/10.1515/JMC.2009.003},
  doi          = {10.1515/JMC.2009.003},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/BlakeK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Bockle09,
  author       = {Gebhard B{\"{o}}ckle},
  title        = {The Miller-Rabin test with randomized exponents},
  journal      = {J. Math. Cryptol.},
  volume       = {3},
  number       = {4},
  pages        = {307--319},
  year         = {2009},
  url          = {https://doi.org/10.1515/JMC.2009.019},
  doi          = {10.1515/JMC.2009.019},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/Bockle09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/BourgeoisF09,
  author       = {Gerald Bourgeois and
                  Jean{-}Charles Faug{\`{e}}re},
  title        = {Algebraic attack on {NTRU} using Witt vectors and Gr{\"{o}}bner
                  bases},
  journal      = {J. Math. Cryptol.},
  volume       = {3},
  number       = {3},
  pages        = {205--214},
  year         = {2009},
  url          = {https://doi.org/10.1515/JMC.2009.011},
  doi          = {10.1515/JMC.2009.011},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/BourgeoisF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/BrandstatterW09,
  author       = {Nina Brandst{\"{a}}tter and
                  Arne Winterhof},
  title        = {-error linear complexity over p of subsequences of Sidelnikov sequences
                  of period (pr - 1)/3},
  journal      = {J. Math. Cryptol.},
  volume       = {3},
  number       = {3},
  pages        = {215--225},
  year         = {2009},
  url          = {https://doi.org/10.1515/JMC.2009.012},
  doi          = {10.1515/JMC.2009.012},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/BrandstatterW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/ColbournL09,
  author       = {Charles J. Colbourn and
                  Alan C. H. Ling},
  title        = {A recursive construction for perfect hash families},
  journal      = {J. Math. Cryptol.},
  volume       = {3},
  number       = {4},
  pages        = {291--306},
  year         = {2009},
  url          = {https://doi.org/10.1515/JMC.2009.018},
  doi          = {10.1515/JMC.2009.018},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/ColbournL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/CusickLS09,
  author       = {Thomas W. Cusick and
                  Yuan Li and
                  Pantelimon Stanica},
  title        = {On a conjecture for balanced symmetric Boolean functions},
  journal      = {J. Math. Cryptol.},
  volume       = {3},
  number       = {4},
  pages        = {273--290},
  year         = {2009},
  url          = {https://doi.org/10.1515/JMC.2009.017},
  doi          = {10.1515/JMC.2009.017},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/CusickLS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/FarashahiSV09,
  author       = {Reza Rezaeian Farashahi and
                  Igor E. Shparlinski and
                  Jos{\'{e}} Felipe Voloch},
  title        = {On hashing into elliptic curves},
  journal      = {J. Math. Cryptol.},
  volume       = {3},
  number       = {4},
  pages        = {353--360},
  year         = {2009},
  url          = {https://doi.org/10.1515/JMC.2009.022},
  doi          = {10.1515/JMC.2009.022},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/FarashahiSV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/FriedlanderS09,
  author       = {John B. Friedlander and
                  Igor E. Shparlinski},
  title        = {On the density of some special primes},
  journal      = {J. Math. Cryptol.},
  volume       = {3},
  number       = {3},
  pages        = {265--271},
  year         = {2009},
  url          = {https://doi.org/10.1515/JMC.2009.016},
  doi          = {10.1515/JMC.2009.016},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/FriedlanderS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/GaalP09,
  author       = {Istv{\'{a}}n Ga{\'{a}}l and
                  Michael E. Pohst},
  title        = {On solving norm equations in global function fields},
  journal      = {J. Math. Cryptol.},
  volume       = {3},
  number       = {3},
  pages        = {237--248},
  year         = {2009},
  url          = {https://doi.org/10.1515/JMC.2009.014},
  doi          = {10.1515/JMC.2009.014},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/GaalP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/GalbraithPRS09,
  author       = {Steven D. Galbraith and
                  Jordi Pujol{\`{a}}s and
                  Christophe Ritzenthaler and
                  Benjamin A. Smith},
  title        = {Distortion maps for supersingular genus two curves},
  journal      = {J. Math. Cryptol.},
  volume       = {3},
  number       = {1},
  pages        = {1--18},
  year         = {2009},
  url          = {https://doi.org/10.1515/JMC.2009.001},
  doi          = {10.1515/JMC.2009.001},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/GalbraithPRS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/GathenS09,
  author       = {Joachim von zur Gathen and
                  Igor E. Shparlinski},
  title        = {Subset sum pseudorandom numbers: fast generation and distribution},
  journal      = {J. Math. Cryptol.},
  volume       = {3},
  number       = {2},
  pages        = {149--163},
  year         = {2009},
  url          = {https://doi.org/10.1515/JMC.2009.007},
  doi          = {10.1515/JMC.2009.007},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/GathenS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Gutierrez09,
  author       = {Jaime Gutierrez},
  title        = {Foreword. Second Workshop on Mathematical Cryptology},
  journal      = {J. Math. Cryptol.},
  volume       = {3},
  number       = {3},
  pages        = {175--176},
  year         = {2009},
  url          = {https://doi.org/10.1515/JMC.2009.008a},
  doi          = {10.1515/JMC.2009.008A},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/Gutierrez09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/HinekL09,
  author       = {M. Jason Hinek and
                  Charles C. Y. Lam},
  title        = {Another look at some fast modular arithmetic methods},
  journal      = {J. Math. Cryptol.},
  volume       = {3},
  number       = {2},
  pages        = {165--174},
  year         = {2009},
  url          = {https://doi.org/10.1515/JMC.2009.008},
  doi          = {10.1515/JMC.2009.008},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/HinekL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Hitt09,
  author       = {Laura Hitt},
  title        = {Families of genus 2 curves with small embedding degree},
  journal      = {J. Math. Cryptol.},
  volume       = {3},
  number       = {1},
  pages        = {19--36},
  year         = {2009},
  url          = {https://doi.org/10.1515/JMC.2009.002},
  doi          = {10.1515/JMC.2009.002},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/Hitt09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/LambergerNR09,
  author       = {Mario Lamberger and
                  Tomislav Nad and
                  Vincent Rijmen},
  title        = {Numerical solvers and cryptanalysis},
  journal      = {J. Math. Cryptol.},
  volume       = {3},
  number       = {3},
  pages        = {249--263},
  year         = {2009},
  url          = {https://doi.org/10.1515/JMC.2009.015},
  doi          = {10.1515/JMC.2009.015},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/LambergerNR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Nandi09,
  author       = {Mridul Nandi},
  title        = {Improved security analysis for {OMAC} as a pseudorandom function},
  journal      = {J. Math. Cryptol.},
  volume       = {3},
  number       = {2},
  pages        = {133--148},
  year         = {2009},
  url          = {https://doi.org/10.1515/JMC.2009.006},
  doi          = {10.1515/JMC.2009.006},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/Nandi09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/NevenSW09,
  author       = {Gregory Neven and
                  Nigel P. Smart and
                  Bogdan Warinschi},
  title        = {Hash function requirements for Schnorr signatures},
  journal      = {J. Math. Cryptol.},
  volume       = {3},
  number       = {1},
  pages        = {69--87},
  year         = {2009},
  url          = {https://doi.org/10.1515/JMC.2009.004},
  doi          = {10.1515/JMC.2009.004},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/NevenSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/SaxenaS09,
  author       = {Amitabh Saxena and
                  Ben Soh},
  title        = {A cryptographic primitive based on hidden-order groups},
  journal      = {J. Math. Cryptol.},
  volume       = {3},
  number       = {2},
  pages        = {89--132},
  year         = {2009},
  url          = {https://doi.org/10.1515/JMC.2009.005},
  doi          = {10.1515/JMC.2009.005},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/SaxenaS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/WuS09,
  author       = {Jiang Wu and
                  Douglas R. Stinson},
  title        = {An efficient identification protocol secure against concurrent-reset
                  attacks},
  journal      = {J. Math. Cryptol.},
  volume       = {3},
  number       = {4},
  pages        = {339--352},
  year         = {2009},
  url          = {https://doi.org/10.1515/JMC.2009.021},
  doi          = {10.1515/JMC.2009.021},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/WuS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/AvanziTW08,
  author       = {Roberto Avanzi and
                  Nicolas Th{\'{e}}riault and
                  Zheng Wang},
  title        = {Rethinking low genus hyperelliptic Jacobian arithmetic over binary
                  fields: interplay of field arithmetic and explicit formul{\ae}},
  journal      = {J. Math. Cryptol.},
  volume       = {2},
  number       = {3},
  pages        = {227--255},
  year         = {2008},
  url          = {https://doi.org/10.1515/JMC.2008.011},
  doi          = {10.1515/JMC.2008.011},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/AvanziTW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/BasuGMP08,
  author       = {Riddhipratim Basu and
                  Shirshendu Ganguly and
                  Subhamoy Maitra and
                  Goutam Paul},
  title        = {A complete characterization of the evolution of {RC4} pseudo random
                  generation algorithm},
  journal      = {J. Math. Cryptol.},
  volume       = {2},
  number       = {3},
  pages        = {257--289},
  year         = {2008},
  url          = {https://doi.org/10.1515/JMC.2008.012},
  doi          = {10.1515/JMC.2008.012},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/BasuGMP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/DemirkiranN08,
  author       = {Cevahir Demirkiran and
                  Enric Nart},
  title        = {Counting hyperelliptic curves that admit a Koblitz model},
  journal      = {J. Math. Cryptol.},
  volume       = {2},
  number       = {2},
  pages        = {163--179},
  year         = {2008},
  url          = {https://doi.org/10.1515/JMC.2008.008},
  doi          = {10.1515/JMC.2008.008},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/DemirkiranN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/FancsaliL08,
  author       = {Szabolcs L. Fancsali and
                  P{\'{e}}ter Ligeti},
  title        = {Some applications of finite geometry for secure network coding},
  journal      = {J. Math. Cryptol.},
  volume       = {2},
  number       = {3},
  pages        = {209--225},
  year         = {2008},
  url          = {https://doi.org/10.1515/JMC.2008.010},
  doi          = {10.1515/JMC.2008.010},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/FancsaliL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/FrougnyS08,
  author       = {Christiane Frougny and
                  Wolfgang Steiner},
  title        = {Minimal weight expansions in Pisot bases},
  journal      = {J. Math. Cryptol.},
  volume       = {2},
  number       = {4},
  pages        = {365--392},
  year         = {2008},
  url          = {https://doi.org/10.1515/JMC.2008.017},
  doi          = {10.1515/JMC.2008.017},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/FrougnyS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Fuji-HaraLMW08,
  author       = {Ryoh Fuji{-}Hara and
                  Xiyang Li and
                  Ying Miao and
                  Dianhua Wu},
  title        = {A {TWOOA} construction for multi-receiver multi-message authentication
                  codes},
  journal      = {J. Math. Cryptol.},
  volume       = {2},
  number       = {1},
  pages        = {9--28},
  year         = {2008},
  url          = {https://doi.org/10.1515/JMC.2008.002},
  doi          = {10.1515/JMC.2008.002},
  timestamp    = {Tue, 29 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/Fuji-HaraLMW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/HartungS08,
  author       = {Rupert J. Hartung and
                  Claus{-}Peter Schnorr},
  title        = {Identification and signatures based on NP-hard problems of indefinite
                  quadratic forms},
  journal      = {J. Math. Cryptol.},
  volume       = {2},
  number       = {4},
  pages        = {327--341},
  year         = {2008},
  url          = {https://doi.org/10.1515/JMC.2008.015},
  doi          = {10.1515/JMC.2008.015},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/HartungS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Hinek08,
  author       = {M. Jason Hinek},
  title        = {On the security of multi-prime {RSA}},
  journal      = {J. Math. Cryptol.},
  volume       = {2},
  number       = {2},
  pages        = {117--147},
  year         = {2008},
  url          = {https://doi.org/10.1515/JMC.2008.006},
  doi          = {10.1515/JMC.2008.006},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/Hinek08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/KoblitzM08,
  author       = {Neal Koblitz and
                  Alfred Menezes},
  title        = {Another look at non-standard discrete log and Diffie-Hellman problems},
  journal      = {J. Math. Cryptol.},
  volume       = {2},
  number       = {4},
  pages        = {311--326},
  year         = {2008},
  url          = {https://doi.org/10.1515/JMC.2008.014},
  doi          = {10.1515/JMC.2008.014},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/KoblitzM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/LongriggU08,
  author       = {Jonathan Longrigg and
                  Alexander Ushakov},
  title        = {Cryptanalysis of the shifted conjugacy authentication protocol},
  journal      = {J. Math. Cryptol.},
  volume       = {2},
  number       = {2},
  pages        = {109--116},
  year         = {2008},
  url          = {https://doi.org/10.1515/JMC.2008.005},
  doi          = {10.1515/JMC.2008.005},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/LongriggU08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Mie08,
  author       = {Thilo Mie},
  title        = {Polylogarithmic two-round argument systems},
  journal      = {J. Math. Cryptol.},
  volume       = {2},
  number       = {4},
  pages        = {343--363},
  year         = {2008},
  url          = {https://doi.org/10.1515/JMC.2008.016},
  doi          = {10.1515/JMC.2008.016},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/Mie08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Morales08,
  author       = {David J. Mireles Morales},
  title        = {An attack on disguised elliptic curves},
  journal      = {J. Math. Cryptol.},
  volume       = {2},
  number       = {1},
  pages        = {1--8},
  year         = {2008},
  url          = {https://doi.org/10.1515/JMC.2008.001},
  doi          = {10.1515/JMC.2008.001},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/Morales08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/MurphyP08,
  author       = {Sean Murphy and
                  Maura B. Paterson},
  title        = {A geometric view of cryptographic equation solving},
  journal      = {J. Math. Cryptol.},
  volume       = {2},
  number       = {1},
  pages        = {63--107},
  year         = {2008},
  url          = {https://doi.org/10.1515/JMC.2008.004},
  doi          = {10.1515/JMC.2008.004},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/MurphyP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/MyasnikovU08,
  author       = {Alexei G. Myasnikov and
                  Alexander Ushakov},
  title        = {Random subgroups and analysis of the length-based and quotient attacks},
  journal      = {J. Math. Cryptol.},
  volume       = {2},
  number       = {1},
  pages        = {29--61},
  year         = {2008},
  url          = {https://doi.org/10.1515/JMC.2008.003},
  doi          = {10.1515/JMC.2008.003},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/MyasnikovU08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/NandiM08,
  author       = {Mridul Nandi and
                  Avradip Mandal},
  title        = {Improved security analysis of {PMAC}},
  journal      = {J. Math. Cryptol.},
  volume       = {2},
  number       = {2},
  pages        = {149--162},
  year         = {2008},
  url          = {https://doi.org/10.1515/JMC.2008.007},
  doi          = {10.1515/JMC.2008.007},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/NandiM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/NguyenV08,
  author       = {Phong Q. Nguyen and
                  Thomas Vidick},
  title        = {Sieve algorithms for the shortest vector problem are practical},
  journal      = {J. Math. Cryptol.},
  volume       = {2},
  number       = {2},
  pages        = {181--207},
  year         = {2008},
  url          = {https://doi.org/10.1515/JMC.2008.009},
  doi          = {10.1515/JMC.2008.009},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/NguyenV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/PatersonS08,
  author       = {Maura B. Paterson and
                  Douglas R. Stinson},
  title        = {Two attacks on a sensor network key distribution scheme of Cheng and
                  Agrawal},
  journal      = {J. Math. Cryptol.},
  volume       = {2},
  number       = {4},
  pages        = {393--403},
  year         = {2008},
  url          = {https://doi.org/10.1515/JMC.2008.018},
  doi          = {10.1515/JMC.2008.018},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/PatersonS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Schindler08,
  author       = {Werner Schindler},
  title        = {Advanced stochastic methods in side channel analysis on block ciphers
                  in the presence of masking},
  journal      = {J. Math. Cryptol.},
  volume       = {2},
  number       = {3},
  pages        = {291--310},
  year         = {2008},
  url          = {https://doi.org/10.1515/JMC.2008.013},
  doi          = {10.1515/JMC.2008.013},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/Schindler08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/AlyMW07,
  author       = {Hassan Aly and
                  Wilfried Meidl and
                  Arne Winterhof},
  title        = {On the k-error linear complexity of cyclotomic sequences},
  journal      = {J. Math. Cryptol.},
  volume       = {1},
  number       = {3},
  pages        = {283--296},
  year         = {2007},
  url          = {https://doi.org/10.1515/JMC.2007.014},
  doi          = {10.1515/JMC.2007.014},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/AlyMW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/AravamuthanL07,
  author       = {Sarang Aravamuthan and
                  Sachin Lodha},
  title        = {The average transmission overhead for broadcast encryption},
  journal      = {J. Math. Cryptol.},
  volume       = {1},
  number       = {4},
  pages        = {373},
  year         = {2007},
  url          = {http://www.degruyter.com/view/j/jmc.2007.1.issue-4/jmc.2007.019/jmc.2007.019.xml},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/AravamuthanL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/BlakeS07,
  author       = {Ian F. Blake and
                  Igor E. Shparlinski},
  title        = {Statistical distribution and collisions of {VSH}},
  journal      = {J. Math. Cryptol.},
  volume       = {1},
  number       = {4},
  pages        = {329--349},
  year         = {2007},
  url          = {https://doi.org/10.1515/jmc.2007.016},
  doi          = {10.1515/JMC.2007.016},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/BlakeS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/ChoiBW07,
  author       = {Su{-}Jeong Choi and
                  Simon R. Blackburn and
                  Peter R. Wild},
  title        = {Cryptanalysis of a homomorphic public-key cryptosystem over a finite
                  group},
  journal      = {J. Math. Cryptol.},
  volume       = {1},
  number       = {4},
  pages        = {351--358},
  year         = {2007},
  url          = {https://doi.org/10.1515/jmc.2007.017},
  doi          = {10.1515/JMC.2007.017},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/ChoiBW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/DaemenR07,
  author       = {Joan Daemen and
                  Vincent Rijmen},
  title        = {Probability distributions of correlation and differentials in block
                  ciphers},
  journal      = {J. Math. Cryptol.},
  volume       = {1},
  number       = {3},
  pages        = {221--242},
  year         = {2007},
  url          = {https://doi.org/10.1515/JMC.2007.011},
  doi          = {10.1515/JMC.2007.011},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/DaemenR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/EngelbertOS07,
  author       = {Daniela Engelbert and
                  Raphael Overbeck and
                  Arthur Schmidt},
  title        = {A Summary of McEliece-Type Cryptosystems and their Security},
  journal      = {J. Math. Cryptol.},
  volume       = {1},
  number       = {2},
  pages        = {151--199},
  year         = {2007},
  url          = {https://doi.org/10.1515/JMC.2007.009},
  doi          = {10.1515/JMC.2007.009},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/EngelbertOS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/GalbraithhS07,
  author       = {Steven D. Galbraith and
                  Colm O'hEigeartaigh and
                  Caroline Sheedy},
  title        = {Simplified pairing computation and security implications},
  journal      = {J. Math. Cryptol.},
  volume       = {1},
  number       = {3},
  pages        = {267--281},
  year         = {2007},
  url          = {https://doi.org/10.1515/JMC.2007.013},
  doi          = {10.1515/JMC.2007.013},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/GalbraithhS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Gaudry07,
  author       = {Pierrick Gaudry},
  title        = {Fast genus 2 arithmetic based on Theta functions},
  journal      = {J. Math. Cryptol.},
  volume       = {1},
  number       = {3},
  pages        = {243--265},
  year         = {2007},
  url          = {https://doi.org/10.1515/JMC.2007.012},
  doi          = {10.1515/JMC.2007.012},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/Gaudry07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/HarayamaF07,
  author       = {Tomohiro Harayama and
                  Donald K. Friesen},
  title        = {Weil sum for birthday attack in multivariate quadratic cryptosystem},
  journal      = {J. Math. Cryptol.},
  volume       = {1},
  number       = {1},
  pages        = {79--104},
  year         = {2007},
  url          = {https://doi.org/10.1515/JMC.2007.006},
  doi          = {10.1515/JMC.2007.006},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/HarayamaF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/HeubergerM07,
  author       = {Clemens Heuberger and
                  James A. Muir},
  title        = {Minimal weight and colexicographically minimal integer representations},
  journal      = {J. Math. Cryptol.},
  volume       = {1},
  number       = {4},
  pages        = {297--328},
  year         = {2007},
  url          = {https://doi.org/10.1515/jmc.2007.015},
  doi          = {10.1515/JMC.2007.015},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/HeubergerM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Koblitz07,
  author       = {Neal Koblitz},
  title        = {Another look at automated theorem-proving},
  journal      = {J. Math. Cryptol.},
  volume       = {1},
  number       = {4},
  pages        = {385--403},
  year         = {2007},
  url          = {https://doi.org/10.1515/jmc.2007.020},
  doi          = {10.1515/JMC.2007.020},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/Koblitz07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/LangeS07,
  author       = {Tanja Lange and
                  Igor E. Shparlinski},
  title        = {Distribution of some sequences of points on elliptic curves},
  journal      = {J. Math. Cryptol.},
  volume       = {1},
  number       = {1},
  pages        = {1--11},
  year         = {2007},
  url          = {https://doi.org/10.1515/JMC.2007.001},
  doi          = {10.1515/JMC.2007.001},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/LangeS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/LiC07,
  author       = {Yuan Li and
                  Thomas W. Cusick},
  title        = {Strict avalanche criterion over finite fields},
  journal      = {J. Math. Cryptol.},
  volume       = {1},
  number       = {1},
  pages        = {65--78},
  year         = {2007},
  url          = {https://doi.org/10.1515/JMC.2007.005},
  doi          = {10.1515/JMC.2007.005},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/LiC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/MartinN07,
  author       = {Keith M. Martin and
                  Siaw{-}Lynn Ng},
  title        = {The combinatorics of generalised cumulative arrays},
  journal      = {J. Math. Cryptol.},
  volume       = {1},
  number       = {1},
  pages        = {13--32},
  year         = {2007},
  url          = {https://doi.org/10.1515/JMC.2007.002},
  doi          = {10.1515/JMC.2007.002},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/MartinN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Menezes07,
  author       = {Alfred Menezes},
  title        = {Another look at {HMQV}},
  journal      = {J. Math. Cryptol.},
  volume       = {1},
  number       = {1},
  pages        = {47--64},
  year         = {2007},
  url          = {https://doi.org/10.1515/JMC.2007.004},
  doi          = {10.1515/JMC.2007.004},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/Menezes07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/RuinskiyST07,
  author       = {Dima Ruinskiy and
                  Adi Shamir and
                  Boaz Tsaban},
  title        = {Length-based cryptanalysis: the case of Thompson's group},
  journal      = {J. Math. Cryptol.},
  volume       = {1},
  number       = {4},
  pages        = {359--372},
  year         = {2007},
  url          = {https://doi.org/10.1515/jmc.2007.018},
  doi          = {10.1515/JMC.2007.018},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/RuinskiyST07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Silverman07,
  author       = {Robert D. Silverman},
  title        = {Optimal Parameterization of {SNFS}},
  journal      = {J. Math. Cryptol.},
  volume       = {1},
  number       = {2},
  pages        = {105--124},
  year         = {2007},
  url          = {https://doi.org/10.1515/JMC.2007.007},
  doi          = {10.1515/JMC.2007.007},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/Silverman07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/StinsonW07,
  author       = {Douglas R. Stinson and
                  Ruizhong Wei},
  title        = {Some results on query processes and reconstruction functions for unconditionally
                  secure 2-server 1-round binary private information retrieval protocols},
  journal      = {J. Math. Cryptol.},
  volume       = {1},
  number       = {1},
  pages        = {33--46},
  year         = {2007},
  url          = {https://doi.org/10.1515/JMC.2007.003},
  doi          = {10.1515/JMC.2007.003},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/StinsonW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/StinsonW07a,
  author       = {Douglas R. Stinson and
                  Jiang Wu},
  title        = {An efficient and secure two-flow zero-knowledge identification protocol},
  journal      = {J. Math. Cryptol.},
  volume       = {1},
  number       = {3},
  pages        = {201--220},
  year         = {2007},
  url          = {https://doi.org/10.1515/JMC.2007.010},
  doi          = {10.1515/JMC.2007.010},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/StinsonW07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/WalkerC07,
  author       = {Robert A. Walker and
                  Charles J. Colbourn},
  title        = {Perfect Hash Families: Constructions and Existence},
  journal      = {J. Math. Cryptol.},
  volume       = {1},
  number       = {2},
  pages        = {125--150},
  year         = {2007},
  url          = {https://doi.org/10.1515/JMC.2007.008},
  doi          = {10.1515/JMC.2007.008},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/WalkerC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}