Sign in
J. Math. Cryptol.
2007
2012
2018
2023
2007
2023
Keyphrases
Publications
volume 17, number 1, 2023
Daniel R. L. Brown
Plactic key agreement (insecure?).
J. Math. Cryptol.
17 (1) (2023)
volume 16, number 1, 2022
Matthew J. Craven
,
John R. Woodward
Evolution of group-theoretic cryptology attacks using hyper-heuristics.
J. Math. Cryptol.
16 (1) (2022)
Andrea Basso
,
Fabien Pazuki
On the supersingular GPST attack.
J. Math. Cryptol.
16 (1) (2022)
Nael Rahman
,
Vladimir Shpilrain
MAKE: A matrix action key exchange.
J. Math. Cryptol.
16 (1) (2022)
Prasanna Raghaw Mishra
,
Shashi Kant Pandey
On the algebraic immunity of multiplexer Boolean functions.
J. Math. Cryptol.
16 (1) (2022)
Madhu Dadhwal
,
Pankaj
Group codes over binary tetrahedral group.
J. Math. Cryptol.
16 (1) (2022)
Javad Sharafi
,
Hassan Daghigh
A Ring-LWE-based digital signature inspired by Lindner-Peikert scheme.
J. Math. Cryptol.
16 (1) (2022)
Carolina Mejía
,
Juan Andrés Montoya
Abelian sharing, common informations, and linear rank inequalities.
J. Math. Cryptol.
16 (1) (2022)
Bishwajit Chakraborty
,
Mridul Nandi
The mF mode of authenticated encryption with associated data.
J. Math. Cryptol.
16 (1) (2022)
Liljana Babinkostova
,
Ariana Chin
,
Aaron Kirtland
,
Vladyslav Nazarchuk
,
Esther Plotnick
The polynomial learning with errors problem and the smearing condition.
J. Math. Cryptol.
16 (1) (2022)
Samed Düzlü
,
Juliane Krämer
Application of automorphic forms to lattice problems.
J. Math. Cryptol.
16 (1) (2022)
Simran Tinani
,
Joachim Rosenthal
A deterministic algorithm for the discrete logarithm problem in a semigroup.
J. Math. Cryptol.
16 (1) (2022)
Jiao Han
,
Jincheng Zhuang
DLP in semigroups: Algorithms and lower bounds.
J. Math. Cryptol.
16 (1) (2022)
Dmitrii Koshelev
-invariant 1728.
J. Math. Cryptol.
16 (1) (2022)
Mikhail Anokhin
Pseudo-free families and cryptographic primitives.
J. Math. Cryptol.
16 (1) (2022)
Daniel R. L. Brown
,
Neal Koblitz
,
Jason T. LeGrow
Cryptanalysis of "MAKE".
J. Math. Cryptol.
16 (1) (2022)
Srinivas Vivek
,
Shyam Murthy
,
Deepak Kumaraswamy
Integer polynomial recovery from outputs and its application to cryptanalysis of a protocol for secure sorting.
J. Math. Cryptol.
16 (1) (2022)
Mingping Qi
An efficient post-quantum KEM from CSIDH.
J. Math. Cryptol.
16 (1) (2022)
Paolo Santini
,
Edoardo Persichetti
,
Marco Baldi
Reproducible families of codes and cryptographic applications.
J. Math. Cryptol.
16 (1) (2022)
Christopher Battarbee
,
Delaram Kahrobaei
,
Dylan Tailor
,
Siamak F. Shahandashti
On the efficiency of a general attack against the MOBS cryptosystem.
J. Math. Cryptol.
16 (1) (2022)
Yu Zhou
,
Jianyong Hu
,
Xudong Miao
,
Yu Han
,
Fuzhong Zhang
On the confusion coefficient of Boolean functions.
J. Math. Cryptol.
16 (1) (2022)
volume 15, number 1, 2021
Ignacio Cascudo
,
Reto Schnyder
A note on secure multiparty computation via higher residue symbols.
J. Math. Cryptol.
15 (1) (2021)
Jean-François Biasse
,
Benjamin Pring
A framework for reducing the overhead of the quantum oracle for use with Grover's algorithm with applications to cryptanalysis of SIKE.
J. Math. Cryptol.
15 (1) (2021)
Sean Murphy
,
Rachel Player
Discretisation and Product Distributions in Ring-LWE.
J. Math. Cryptol.
15 (1) (2021)
Dana Dachman-Soled
,
Huijing Gong
,
Mukul Kulkarni
,
Aria Shahverdi
Towards a Ring Analogue of the Leftover Hash Lemma.
J. Math. Cryptol.
15 (1) (2021)
Yu Zhou
,
Daoguang Mu
,
Xinfeng Dong
On cryptographic properties of (n + 1)-bit S-boxes constructed by known n-bit S-boxes.
J. Math. Cryptol.
15 (1) (2021)
Atul Pandey
,
Indivar Gupta
,
Dhiraj Kumar Singh
Improved cryptanalysis of a ElGamal Cryptosystem Based on Matrices Over Group Rings.
J. Math. Cryptol.
15 (1) (2021)
Matvei Kotov
,
Anton Menshov
,
Alexander Ushakov
Attack on Kayawood protocol: uncloaking private keys.
J. Math. Cryptol.
15 (1) (2021)
Gary McGuire
,
Oisín Robinson
Lattice Sieving in Three Dimensions for Discrete Log in Medium Characteristic.
J. Math. Cryptol.
15 (1) (2021)
Marc Joye
,
Oleksandra Lapiha
,
Ky Nguyen
,
David Naccache
The Eleventh Power Residue Symbol.
J. Math. Cryptol.
15 (1) (2021)
Martin Ekerå
Quantum algorithms for computing general discrete logarithms and orders with tradeoffs.
J. Math. Cryptol.
15 (1) (2021)
Fouazou Lontouo Perez Broon
,
Thinh Dang
,
Emmanuel Fouotsa
,
Dustin Moody
Isogenies on twisted Hessian curves.
J. Math. Cryptol.
15 (1) (2021)
Antonio J. Di Scala
,
Carlo Sanna
,
Edoardo Signorini
On the condition number of the Vandermonde matrix of the nth cyclotomic polynomial.
J. Math. Cryptol.
15 (1) (2021)
Dylan Rudy
,
Chris Monico
Remarks on a Tropical Key Exchange System.
J. Math. Cryptol.
15 (1) (2021)
Jing Zhang
,
Yuan Li
,
John O. Adeyeye
Sensitivities and block sensitivities of elementary symmetric Boolean functions.
J. Math. Cryptol.
15 (1) (2021)
Jung Hee Cheon
,
Kristin E. Lauter
,
Yongsoo Song
Editor's Preface for the Second Annual MathCrypt Proceedings Volume.
J. Math. Cryptol.
15 (1) (2021)
Arghya Bhattacharjee
,
Cuauhtemoc Mancillas López
,
Eik List
,
Mridul Nandi
The Oribatida v1.3 Family of Lightweight Authenticated Encryption Schemes.
J. Math. Cryptol.
15 (1) (2021)
Jean-François Biasse
,
Xavier Bonnetain
,
Benjamin Pring
,
André Schrottenloher
,
William Youmans
A trade-off between classical and quantum circuit size for an attack against CSIDH.
J. Math. Cryptol.
15 (1) (2021)
László Csirmaz
Secret sharing and duality.
J. Math. Cryptol.
15 (1) (2021)
Margaux Dugardin
,
Werner Schindler
,
Sylvain Guilley
Stochastic methods defeat regular RSA exponentiation algorithms with combined blinding methods.
J. Math. Cryptol.
15 (1) (2021)
Elizabeth M. Reid
Using Inclusion / Exclusion to find Bent and Balanced Monomial Rotation Symmetric Functions.
J. Math. Cryptol.
15 (1) (2021)
Mehdi Tibouchi
,
Alexandre Wallet
One Bit is All It Takes: A Devastating Timing Attack on BLISS's Non-Constant Time Sign Flips.
J. Math. Cryptol.
15 (1) (2021)
Guanju Xiao
,
Lixia Luo
,
Yingpu Deng
Constructing Cycles in Isogeny Graphs of Supersingular Elliptic Curves.
J. Math. Cryptol.
15 (1) (2021)
Oleg Taraskin
,
Vladimir Soukharev
,
David Jao
,
Jason T. LeGrow
Towards Isogeny-Based Password-Authenticated Key Establishment.
J. Math. Cryptol.
15 (1) (2021)
Thijs Laarhoven
Approximate Voronoi cells for lattices, revisited.
J. Math. Cryptol.
15 (1) (2021)
Filipe Araújo
,
Samuel Neves
The circulant hash revisited.
J. Math. Cryptol.
15 (1) (2021)
Francesco Sica
Factoring with Hints.
J. Math. Cryptol.
15 (1) (2021)
Fucai Luo
,
Saif Al-Kuwari
Revocable attribute-based proxy re-encryption.
J. Math. Cryptol.
15 (1) (2021)
Mikhail Anokhin
Pseudo-free families of computational universal algebras.
J. Math. Cryptol.
15 (1) (2021)
Maura B. Paterson
,
Douglas R. Stinson
On the equivalence of authentication codes and robust (2, 2)-threshold schemes.
J. Math. Cryptol.
15 (1) (2021)