default search action
Search dblp for Publications
export results for "toc:db/journals/jmc/jmc16.bht:"
@article{DBLP:journals/jmc/Anokhin22, author = {Mikhail Anokhin}, title = {Pseudo-free families and cryptographic primitives}, journal = {J. Math. Cryptol.}, volume = {16}, number = {1}, pages = {114--140}, year = {2022}, url = {https://doi.org/10.1515/jmc-2020-0055}, doi = {10.1515/JMC-2020-0055}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/Anokhin22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/BabinkostovaCKN22, author = {Liljana Babinkostova and Ariana Chin and Aaron Kirtland and Vladyslav Nazarchuk and Esther Plotnick}, title = {The polynomial learning with errors problem and the smearing condition}, journal = {J. Math. Cryptol.}, volume = {16}, number = {1}, pages = {215--232}, year = {2022}, url = {https://doi.org/10.1515/jmc-2020-0035}, doi = {10.1515/JMC-2020-0035}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/BabinkostovaCKN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/BassoP22, author = {Andrea Basso and Fabien Pazuki}, title = {On the supersingular {GPST} attack}, journal = {J. Math. Cryptol.}, volume = {16}, number = {1}, pages = {14--19}, year = {2022}, url = {https://doi.org/10.1515/jmc-2021-0020}, doi = {10.1515/JMC-2021-0020}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/BassoP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/BattarbeeKTS22, author = {Christopher Battarbee and Delaram Kahrobaei and Dylan Tailor and Siamak F. Shahandashti}, title = {On the efficiency of a general attack against the {MOBS} cryptosystem}, journal = {J. Math. Cryptol.}, volume = {16}, number = {1}, pages = {289--297}, year = {2022}, url = {https://doi.org/10.1515/jmc-2021-0050}, doi = {10.1515/JMC-2021-0050}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/BattarbeeKTS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/BrownKL22, author = {Daniel R. L. Brown and Neal Koblitz and Jason T. LeGrow}, title = {Cryptanalysis of "MAKE"}, journal = {J. Math. Cryptol.}, volume = {16}, number = {1}, pages = {98--102}, year = {2022}, url = {https://doi.org/10.1515/jmc-2021-0016}, doi = {10.1515/JMC-2021-0016}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/BrownKL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/ChakrabortyN22, author = {Bishwajit Chakraborty and Mridul Nandi}, title = {The mF mode of authenticated encryption with associated data}, journal = {J. Math. Cryptol.}, volume = {16}, number = {1}, pages = {73--97}, year = {2022}, url = {https://doi.org/10.1515/jmc-2020-0054}, doi = {10.1515/JMC-2020-0054}, timestamp = {Mon, 26 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/ChakrabortyN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/CravenW22, author = {Matthew J. Craven and John R. Woodward}, title = {Evolution of group-theoretic cryptology attacks using hyper-heuristics}, journal = {J. Math. Cryptol.}, volume = {16}, number = {1}, pages = {49--63}, year = {2022}, url = {https://doi.org/10.1515/jmc-2021-0017}, doi = {10.1515/JMC-2021-0017}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/CravenW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/DadhwalP22, author = {Madhu Dadhwal and Pankaj}, title = {Group codes over binary tetrahedral group}, journal = {J. Math. Cryptol.}, volume = {16}, number = {1}, pages = {310--319}, year = {2022}, url = {https://doi.org/10.1515/jmc-2022-0009}, doi = {10.1515/JMC-2022-0009}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/DadhwalP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/DuzluK22, author = {Samed D{\"{u}}zl{\"{u}} and Juliane Kr{\"{a}}mer}, title = {Application of automorphic forms to lattice problems}, journal = {J. Math. Cryptol.}, volume = {16}, number = {1}, pages = {156--197}, year = {2022}, url = {https://doi.org/10.1515/jmc-2021-0045}, doi = {10.1515/JMC-2021-0045}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/DuzluK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/HanZ22, author = {Jiao Han and Jincheng Zhuang}, title = {{DLP} in semigroups: Algorithms and lower bounds}, journal = {J. Math. Cryptol.}, volume = {16}, number = {1}, pages = {278--288}, year = {2022}, url = {https://doi.org/10.1515/jmc-2021-0049}, doi = {10.1515/JMC-2021-0049}, timestamp = {Sun, 07 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/HanZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Koshelev22, author = {Dmitrii I. Koshelev}, title = {The most efficient indifferentiable hashing to elliptic curves of\emph{j}-invariant 1728}, journal = {J. Math. Cryptol.}, volume = {16}, number = {1}, pages = {298--309}, year = {2022}, url = {https://doi.org/10.1515/jmc-2021-0051}, doi = {10.1515/JMC-2021-0051}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/Koshelev22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/MejiaM22, author = {Carolina Mej{\'{\i}}a and Juan Andr{\'{e}}s Montoya}, title = {Abelian sharing, common informations, and linear rank inequalities}, journal = {J. Math. Cryptol.}, volume = {16}, number = {1}, pages = {233--250}, year = {2022}, url = {https://doi.org/10.1515/jmc-2022-0020}, doi = {10.1515/JMC-2022-0020}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/MejiaM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/MishraP22, author = {Prasanna Raghaw Mishra and Shashi Kant Pandey}, title = {On the algebraic immunity of multiplexer Boolean functions}, journal = {J. Math. Cryptol.}, volume = {16}, number = {1}, pages = {198--204}, year = {2022}, url = {https://doi.org/10.1515/jmc-2021-0027}, doi = {10.1515/JMC-2021-0027}, timestamp = {Fri, 25 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/MishraP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Qi22, author = {Mingping Qi}, title = {An efficient post-quantum {KEM} from {CSIDH}}, journal = {J. Math. Cryptol.}, volume = {16}, number = {1}, pages = {103--113}, year = {2022}, url = {https://doi.org/10.1515/jmc-2022-0007}, doi = {10.1515/JMC-2022-0007}, timestamp = {Mon, 26 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/Qi22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/RahmanS22, author = {Nael Rahman and Vladimir Shpilrain}, title = {{MAKE:} {A} matrix action key exchange}, journal = {J. Math. Cryptol.}, volume = {16}, number = {1}, pages = {64--72}, year = {2022}, url = {https://doi.org/10.1515/jmc-2020-0053}, doi = {10.1515/JMC-2020-0053}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/RahmanS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/SantiniPB22, author = {Paolo Santini and Edoardo Persichetti and Marco Baldi}, title = {Reproducible families of codes and cryptographic applications}, journal = {J. Math. Cryptol.}, volume = {16}, number = {1}, pages = {20--48}, year = {2022}, url = {https://doi.org/10.1515/jmc-2020-0003}, doi = {10.1515/JMC-2020-0003}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/SantiniPB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/SharafiD22, author = {Javad Sharafi and Hassan Daghigh}, title = {A Ring-LWE-based digital signature inspired by Lindner-Peikert scheme}, journal = {J. Math. Cryptol.}, volume = {16}, number = {1}, pages = {205--214}, year = {2022}, url = {https://doi.org/10.1515/jmc-2021-0013}, doi = {10.1515/JMC-2021-0013}, timestamp = {Mon, 26 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/SharafiD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/TinaniR22, author = {Simran Tinani and Joachim Rosenthal}, title = {A deterministic algorithm for the discrete logarithm problem in a semigroup}, journal = {J. Math. Cryptol.}, volume = {16}, number = {1}, pages = {141--155}, year = {2022}, url = {https://doi.org/10.1515/jmc-2021-0022}, doi = {10.1515/JMC-2021-0022}, timestamp = {Mon, 26 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/TinaniR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/VivekMK22, author = {Srinivas Vivek and Shyam Murthy and Deepak Kumaraswamy}, title = {Integer polynomial recovery from outputs and its application to cryptanalysis of a protocol for secure sorting}, journal = {J. Math. Cryptol.}, volume = {16}, number = {1}, pages = {251--277}, year = {2022}, url = {https://doi.org/10.1515/jmc-2021-0054}, doi = {10.1515/JMC-2021-0054}, timestamp = {Mon, 26 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/VivekMK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/ZhouHMHZ21, author = {Yu Zhou and Jianyong Hu and Xudong Miao and Yu Han and Fuzhong Zhang}, title = {On the confusion coefficient of Boolean functions}, journal = {J. Math. Cryptol.}, volume = {16}, number = {1}, pages = {1--13}, year = {2022}, url = {https://doi.org/10.1515/jmc-2021-0012}, doi = {10.1515/JMC-2021-0012}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/ZhouHMHZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.