Search dblp for Publications

export results for "toc:db/journals/jmc/jmc16.bht:"

 download as .bib file

@article{DBLP:journals/jmc/Anokhin22,
  author       = {Mikhail Anokhin},
  title        = {Pseudo-free families and cryptographic primitives},
  journal      = {J. Math. Cryptol.},
  volume       = {16},
  number       = {1},
  pages        = {114--140},
  year         = {2022},
  url          = {https://doi.org/10.1515/jmc-2020-0055},
  doi          = {10.1515/JMC-2020-0055},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/Anokhin22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/BabinkostovaCKN22,
  author       = {Liljana Babinkostova and
                  Ariana Chin and
                  Aaron Kirtland and
                  Vladyslav Nazarchuk and
                  Esther Plotnick},
  title        = {The polynomial learning with errors problem and the smearing condition},
  journal      = {J. Math. Cryptol.},
  volume       = {16},
  number       = {1},
  pages        = {215--232},
  year         = {2022},
  url          = {https://doi.org/10.1515/jmc-2020-0035},
  doi          = {10.1515/JMC-2020-0035},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/BabinkostovaCKN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/BassoP22,
  author       = {Andrea Basso and
                  Fabien Pazuki},
  title        = {On the supersingular {GPST} attack},
  journal      = {J. Math. Cryptol.},
  volume       = {16},
  number       = {1},
  pages        = {14--19},
  year         = {2022},
  url          = {https://doi.org/10.1515/jmc-2021-0020},
  doi          = {10.1515/JMC-2021-0020},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/BassoP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/BattarbeeKTS22,
  author       = {Christopher Battarbee and
                  Delaram Kahrobaei and
                  Dylan Tailor and
                  Siamak F. Shahandashti},
  title        = {On the efficiency of a general attack against the {MOBS} cryptosystem},
  journal      = {J. Math. Cryptol.},
  volume       = {16},
  number       = {1},
  pages        = {289--297},
  year         = {2022},
  url          = {https://doi.org/10.1515/jmc-2021-0050},
  doi          = {10.1515/JMC-2021-0050},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/BattarbeeKTS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/BrownKL22,
  author       = {Daniel R. L. Brown and
                  Neal Koblitz and
                  Jason T. LeGrow},
  title        = {Cryptanalysis of "MAKE"},
  journal      = {J. Math. Cryptol.},
  volume       = {16},
  number       = {1},
  pages        = {98--102},
  year         = {2022},
  url          = {https://doi.org/10.1515/jmc-2021-0016},
  doi          = {10.1515/JMC-2021-0016},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/BrownKL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/ChakrabortyN22,
  author       = {Bishwajit Chakraborty and
                  Mridul Nandi},
  title        = {The mF mode of authenticated encryption with associated data},
  journal      = {J. Math. Cryptol.},
  volume       = {16},
  number       = {1},
  pages        = {73--97},
  year         = {2022},
  url          = {https://doi.org/10.1515/jmc-2020-0054},
  doi          = {10.1515/JMC-2020-0054},
  timestamp    = {Mon, 26 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/ChakrabortyN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/CravenW22,
  author       = {Matthew J. Craven and
                  John R. Woodward},
  title        = {Evolution of group-theoretic cryptology attacks using hyper-heuristics},
  journal      = {J. Math. Cryptol.},
  volume       = {16},
  number       = {1},
  pages        = {49--63},
  year         = {2022},
  url          = {https://doi.org/10.1515/jmc-2021-0017},
  doi          = {10.1515/JMC-2021-0017},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/CravenW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/DadhwalP22,
  author       = {Madhu Dadhwal and
                  Pankaj},
  title        = {Group codes over binary tetrahedral group},
  journal      = {J. Math. Cryptol.},
  volume       = {16},
  number       = {1},
  pages        = {310--319},
  year         = {2022},
  url          = {https://doi.org/10.1515/jmc-2022-0009},
  doi          = {10.1515/JMC-2022-0009},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/DadhwalP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/DuzluK22,
  author       = {Samed D{\"{u}}zl{\"{u}} and
                  Juliane Kr{\"{a}}mer},
  title        = {Application of automorphic forms to lattice problems},
  journal      = {J. Math. Cryptol.},
  volume       = {16},
  number       = {1},
  pages        = {156--197},
  year         = {2022},
  url          = {https://doi.org/10.1515/jmc-2021-0045},
  doi          = {10.1515/JMC-2021-0045},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/DuzluK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/HanZ22,
  author       = {Jiao Han and
                  Jincheng Zhuang},
  title        = {{DLP} in semigroups: Algorithms and lower bounds},
  journal      = {J. Math. Cryptol.},
  volume       = {16},
  number       = {1},
  pages        = {278--288},
  year         = {2022},
  url          = {https://doi.org/10.1515/jmc-2021-0049},
  doi          = {10.1515/JMC-2021-0049},
  timestamp    = {Sun, 07 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/HanZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Koshelev22,
  author       = {Dmitrii I. Koshelev},
  title        = {The most efficient indifferentiable hashing to elliptic curves of\emph{j}-invariant
                  1728},
  journal      = {J. Math. Cryptol.},
  volume       = {16},
  number       = {1},
  pages        = {298--309},
  year         = {2022},
  url          = {https://doi.org/10.1515/jmc-2021-0051},
  doi          = {10.1515/JMC-2021-0051},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/Koshelev22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/MejiaM22,
  author       = {Carolina Mej{\'{\i}}a and
                  Juan Andr{\'{e}}s Montoya},
  title        = {Abelian sharing, common informations, and linear rank inequalities},
  journal      = {J. Math. Cryptol.},
  volume       = {16},
  number       = {1},
  pages        = {233--250},
  year         = {2022},
  url          = {https://doi.org/10.1515/jmc-2022-0020},
  doi          = {10.1515/JMC-2022-0020},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/MejiaM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/MishraP22,
  author       = {Prasanna Raghaw Mishra and
                  Shashi Kant Pandey},
  title        = {On the algebraic immunity of multiplexer Boolean functions},
  journal      = {J. Math. Cryptol.},
  volume       = {16},
  number       = {1},
  pages        = {198--204},
  year         = {2022},
  url          = {https://doi.org/10.1515/jmc-2021-0027},
  doi          = {10.1515/JMC-2021-0027},
  timestamp    = {Fri, 25 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/MishraP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Qi22,
  author       = {Mingping Qi},
  title        = {An efficient post-quantum {KEM} from {CSIDH}},
  journal      = {J. Math. Cryptol.},
  volume       = {16},
  number       = {1},
  pages        = {103--113},
  year         = {2022},
  url          = {https://doi.org/10.1515/jmc-2022-0007},
  doi          = {10.1515/JMC-2022-0007},
  timestamp    = {Mon, 26 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/Qi22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/RahmanS22,
  author       = {Nael Rahman and
                  Vladimir Shpilrain},
  title        = {{MAKE:} {A} matrix action key exchange},
  journal      = {J. Math. Cryptol.},
  volume       = {16},
  number       = {1},
  pages        = {64--72},
  year         = {2022},
  url          = {https://doi.org/10.1515/jmc-2020-0053},
  doi          = {10.1515/JMC-2020-0053},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/RahmanS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/SantiniPB22,
  author       = {Paolo Santini and
                  Edoardo Persichetti and
                  Marco Baldi},
  title        = {Reproducible families of codes and cryptographic applications},
  journal      = {J. Math. Cryptol.},
  volume       = {16},
  number       = {1},
  pages        = {20--48},
  year         = {2022},
  url          = {https://doi.org/10.1515/jmc-2020-0003},
  doi          = {10.1515/JMC-2020-0003},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/SantiniPB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/SharafiD22,
  author       = {Javad Sharafi and
                  Hassan Daghigh},
  title        = {A Ring-LWE-based digital signature inspired by Lindner-Peikert scheme},
  journal      = {J. Math. Cryptol.},
  volume       = {16},
  number       = {1},
  pages        = {205--214},
  year         = {2022},
  url          = {https://doi.org/10.1515/jmc-2021-0013},
  doi          = {10.1515/JMC-2021-0013},
  timestamp    = {Mon, 26 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/SharafiD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/TinaniR22,
  author       = {Simran Tinani and
                  Joachim Rosenthal},
  title        = {A deterministic algorithm for the discrete logarithm problem in a
                  semigroup},
  journal      = {J. Math. Cryptol.},
  volume       = {16},
  number       = {1},
  pages        = {141--155},
  year         = {2022},
  url          = {https://doi.org/10.1515/jmc-2021-0022},
  doi          = {10.1515/JMC-2021-0022},
  timestamp    = {Mon, 26 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/TinaniR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/VivekMK22,
  author       = {Srinivas Vivek and
                  Shyam Murthy and
                  Deepak Kumaraswamy},
  title        = {Integer polynomial recovery from outputs and its application to cryptanalysis
                  of a protocol for secure sorting},
  journal      = {J. Math. Cryptol.},
  volume       = {16},
  number       = {1},
  pages        = {251--277},
  year         = {2022},
  url          = {https://doi.org/10.1515/jmc-2021-0054},
  doi          = {10.1515/JMC-2021-0054},
  timestamp    = {Mon, 26 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/VivekMK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/ZhouHMHZ21,
  author       = {Yu Zhou and
                  Jianyong Hu and
                  Xudong Miao and
                  Yu Han and
                  Fuzhong Zhang},
  title        = {On the confusion coefficient of Boolean functions},
  journal      = {J. Math. Cryptol.},
  volume       = {16},
  number       = {1},
  pages        = {1--13},
  year         = {2022},
  url          = {https://doi.org/10.1515/jmc-2021-0012},
  doi          = {10.1515/JMC-2021-0012},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/ZhouHMHZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}