- David Urbanik, David Jao:
New Techniques for SIDH-based NIKE. J. Math. Cryptol. 14(1): 120-128 (2020) - Masaya Yasuda:
Self-dual DeepBKZ for finding short lattice vectors. J. Math. Cryptol. 14(1): 84-94 (2020) - Kazuhiro Yokoyama, Masaya Yasuda, Yasushi Takahashi, Jun Kogure:
Complexity bounds on Semaev's naive index calculus method for ECDLP. J. Math. Cryptol. 14(1): 460-485 (2020) - Liang Feng Zhang, Reihaneh Safavi-Naini:
Privacy-preserving verifiable delegation of polynomial and matrix functions. J. Math. Cryptol. 14(1): 153-171 (2020) - (Withdrawn) An elementary proof of Fermat's last theorem for all even exponents. J. Math. Cryptol. 14(1): 139-142 (2020)
- 2019
- Abdelmalek Azizi, Idriss Jerrari, Abdelkader Zekhnini, Mohammed Talbi:
Capitulation of the 2-ideal classes of type (2, 2, 2) of some quartic cyclic number fields. J. Math. Cryptol. 13(1): 27-46 (2019) - Tarun Kumar Bansal, Xavier Boyen, Josef Pieprzyk:
Signcryption schemes with insider security in an ideal permutation model. J. Math. Cryptol. 13(2): 117-150 (2019) - Jean-François Biasse, Fang Song:
On the quantum attacks against schemes relying on the hardness of finding a short generator of an ideal in. J. Math. Cryptol. 13(3-4): 151-168 (2019) - Nina Bindel, Johannes Buchmann, Florian Göpfert, Markus Schmidt:
Estimation of the hardness of the learning with errors problem with a restricted number of samples. J. Math. Cryptol. 13(1): 47-67 (2019) - Károly Harsányi, Péter Ligeti:
Exact information ratios for secret sharing on small graphs with girth at least 5. J. Math. Cryptol. 13(2): 107-116 (2019) - Shizuo Kaji, Toshiaki Maeno, Koji Nuida, Yasuhide Numata:
Polynomial expressions of p-ary auction functions. J. Math. Cryptol. 13(2): 69-80 (2019) - Stavros Kousidis, Andreas Wiemers:
On the first fall degree of summation polynomials. J. Math. Cryptol. 13(3-4): 229-237 (2019) - Julien Lavauzelle, Françoise Levy-dit-Vehel:
Generic constructions of PoRs from codes and instantiations. J. Math. Cryptol. 13(2): 81-106 (2019) - Mridul Nandi, Tapas Pandit:
Predicate signatures from pair encodings via dual system proof technique. J. Math. Cryptol. 13(3-4): 197-228 (2019) - Arnaud Sipasseuth, Thomas Plantard, Willy Susilo:
Enhancing Goldreich, Goldwasser and Halevi's scheme with intersecting lattices. J. Math. Cryptol. 13(3-4): 169-196 (2019) - Thomas Wunderer:
A detailed analysis of the hybrid lattice-reduction and meet-in-the-middle attack. J. Math. Cryptol. 13(1): 1-26 (2019) - 2018
- Gustavo Banegas, Paulo S. L. M. Barreto, Brice Odilon Boidje, Pierre-Louis Cayrel, Gilbert Ndollane Dione, Kris Gaj, Cheikh Thiécoumba Gueye, Richard Haeussler, Jean Belo Klamti, Ousmane Ndiaye, Duc Tri Nguyen, Edoardo Persichetti, Jefferson E. Ricardini:
DAGS: Key encapsulation using dyadic GS codes. J. Math. Cryptol. 12(4): 221-239 (2018) - Avik Chakraborti, Nilanjan Datta, Mridul Nandi:
On the optimality of non-linear computations for symmetric key primitives. J. Math. Cryptol. 12(4): 241-259 (2018) - Sanjit Chatterjee, M. Prem Laxman Das, R. Kabaleeshwaran:
Converting pairing-based cryptosystems from composite to prime order setting - A comparative analysis. J. Math. Cryptol. 12(3): 159-190 (2018) - Sabyasachi Dey, Santanu Sarkar:
Generalization of Roos bias in RC4 and some results on key-keystream relations. J. Math. Cryptol. 12(1): 43-56 (2018) - Georgios Fotiadis, Elisavet Konstantinou:
Generating pairing-friendly elliptic curve parameters using sparse families. J. Math. Cryptol. 12(2): 83-99 (2018) - Wachirapong Jirakitpuwapat, Parin Chaipunya, Poom Kumam, Sompong Dhompongsa, Phatiphat Thounthong:
New methods of construction of cartesian authentication codes from geometries over finite commutative rings. J. Math. Cryptol. 12(3): 119-136 (2018) - Matvei Kotov, Alexander Ushakov:
Analysis of a key exchange protocol based on tropical matrix algebra. J. Math. Cryptol. 12(3): 137-141 (2018) - Prabhat Kushwaha:
Improved lower bound for Diffie-Hellman problem using multiplicative group of a finite field as auxiliary group. J. Math. Cryptol. 12(2): 101-118 (2018) - Thalia M. Laing, Douglas R. Stinson:
A survey and refinement of repairable threshold schemes. J. Math. Cryptol. 12(1): 57-81 (2018) - Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
A fundamental flaw in the ++AE authenticated encryption mode. J. Math. Cryptol. 12(1): 37-42 (2018) - Juha Partala:
Algebraic generalization of Diffie-Hellman key exchange. J. Math. Cryptol. 12(1): 1-21 (2018) - Maura B. Paterson, Douglas R. Stinson, Jalaj Upadhyay:
Multi-prover proof of retrievability. J. Math. Cryptol. 12(4): 203-220 (2018) - Eduardo Carvalho Pinto, Christophe Petit:
Better path-finding algorithms in LPS Ramanujan graphs. J. Math. Cryptol. 12(4): 191-202 (2018) - Håvard Raddum, Pavol Zajac:
MRHS solver based on linear algebra and exhaustive search. J. Math. Cryptol. 12(3): 143-157 (2018)