- 2021
- Mikhail Anokhin:
Pseudo-free families of computational universal algebras. J. Math. Cryptol. 15(1): 197-222 (2021) - Filipe Araújo, Samuel Neves:
The circulant hash revisited. J. Math. Cryptol. 15(1): 250-257 (2021) - Arghya Bhattacharjee, Cuauhtemoc Mancillas López, Eik List, Mridul Nandi:
The Oribatida v1.3 Family of Lightweight Authenticated Encryption Schemes. J. Math. Cryptol. 15(1): 305-344 (2021) - Jean-François Biasse, Xavier Bonnetain, Benjamin Pring, André Schrottenloher, William Youmans:
A trade-off between classical and quantum circuit size for an attack against CSIDH. J. Math. Cryptol. 15(1): 4-17 (2021) - Jean-François Biasse, Benjamin Pring:
A framework for reducing the overhead of the quantum oracle for use with Grover's algorithm with applications to cryptanalysis of SIKE. J. Math. Cryptol. 15(1): 143-156 (2021) - Fouazou Lontouo Perez Broon, Thinh Dang, Emmanuel Fouotsa, Dustin Moody:
Isogenies on twisted Hessian curves. J. Math. Cryptol. 15(1): 345-358 (2021) - Ignacio Cascudo, Reto Schnyder:
A note on secure multiparty computation via higher residue symbols. J. Math. Cryptol. 15(1): 284-297 (2021) - Jung Hee Cheon, Kristin E. Lauter, Yongsoo Song:
Editor's Preface for the Second Annual MathCrypt Proceedings Volume. J. Math. Cryptol. 15(1): 1-3 (2021) - László Csirmaz:
Secret sharing and duality. J. Math. Cryptol. 15(1): 157-173 (2021) - Dana Dachman-Soled, Huijing Gong, Mukul Kulkarni, Aria Shahverdi:
(In)Security of Ring-LWE Under Partial Key Exposure. J. Math. Cryptol. 15(1): 72-86 (2021) - Dana Dachman-Soled, Huijing Gong, Mukul Kulkarni, Aria Shahverdi:
Towards a Ring Analogue of the Leftover Hash Lemma. J. Math. Cryptol. 15(1): 87-110 (2021) - Margaux Dugardin, Werner Schindler, Sylvain Guilley:
Stochastic methods defeat regular RSA exponentiation algorithms with combined blinding methods. J. Math. Cryptol. 15(1): 408-433 (2021) - Martin Ekerå:
Quantum algorithms for computing general discrete logarithms and orders with tradeoffs. J. Math. Cryptol. 15(1): 359-407 (2021) - Marc Joye, Oleksandra Lapiha, Ky Nguyen, David Naccache:
The Eleventh Power Residue Symbol. J. Math. Cryptol. 15(1): 111-122 (2021) - Matvei Kotov, Anton Menshov, Alexander Ushakov:
Attack on Kayawood protocol: uncloaking private keys. J. Math. Cryptol. 15(1): 237-249 (2021) - Thijs Laarhoven:
Approximate Voronoi cells for lattices, revisited. J. Math. Cryptol. 15(1): 60-71 (2021) - Fucai Luo, Saif M. Al-Kuwari:
Revocable attribute-based proxy re-encryption. J. Math. Cryptol. 15(1): 465-482 (2021) - Gary McGuire, Oisín Robinson:
Lattice Sieving in Three Dimensions for Discrete Log in Medium Characteristic. J. Math. Cryptol. 15(1): 223-236 (2021) - Sean Murphy, Rachel Player:
Discretisation and Product Distributions in Ring-LWE. J. Math. Cryptol. 15(1): 45-59 (2021) - Atul Pandey, Indivar Gupta, Dhiraj Kumar Singh:
Improved cryptanalysis of a ElGamal Cryptosystem Based on Matrices Over Group Rings. J. Math. Cryptol. 15(1): 266-279 (2021) - Maura B. Paterson, Douglas R. Stinson:
On the equivalence of authentication codes and robust (2, 2)-threshold schemes. J. Math. Cryptol. 15(1): 179-196 (2021) - Elizabeth M. Reid:
Using Inclusion / Exclusion to find Bent and Balanced Monomial Rotation Symmetric Functions. J. Math. Cryptol. 15(1): 298-304 (2021) - Dylan Rudy, Chris Monico:
Remarks on a Tropical Key Exchange System. J. Math. Cryptol. 15(1): 280-283 (2021) - Antonio J. Di Scala, Carlo Sanna, Edoardo Signorini:
On the condition number of the Vandermonde matrix of the nth cyclotomic polynomial. J. Math. Cryptol. 15(1): 174-178 (2021) - Francesco Sica:
Factoring with Hints. J. Math. Cryptol. 15(1): 123-130 (2021) - Yasushi Takahashi, Momonari Kudo, Ryoya Fukasaku, Yasuhiko Ikematsu, Masaya Yasuda, Kazuhiro Yokoyama:
Algebraic approaches for solving isogeny problems of prime power degrees. J. Math. Cryptol. 15(1): 31-44 (2021) - Oleg Taraskin, Vladimir Soukharev, David Jao, Jason T. LeGrow:
Towards Isogeny-Based Password-Authenticated Key Establishment. J. Math. Cryptol. 15(1): 18-30 (2021) - Mehdi Tibouchi, Alexandre Wallet:
One Bit is All It Takes: A Devastating Timing Attack on BLISS's Non-Constant Time Sign Flips. J. Math. Cryptol. 15(1): 131-142 (2021) - Guanju Xiao, Lixia Luo, Yingpu Deng:
Constructing Cycles in Isogeny Graphs of Supersingular Elliptic Curves. J. Math. Cryptol. 15(1): 454-464 (2021) - Jing Zhang, Yuan Li, John O. Adeyeye:
Sensitivities and block sensitivities of elementary symmetric Boolean functions. J. Math. Cryptol. 15(1): 434-453 (2021)