Login / Signup
J. Math. Cryptol.
2007
2013
2017
2024
2007
2024
Keyphrases
Publications
volume 18, number 1, 2024
Marco Cianfriglia
,
Elia Onofri
,
Marco Pedicini
mRLWE-CP-ABE: A revocable CP-ABE for post-quantum cryptography.
J. Math. Cryptol.
18 (1) (2024)
Marco Timpanella
On a generalization of the Deligne-Lusztig curve of Suzuki type and application to AG codes.
J. Math. Cryptol.
18 (1) (2024)
Wissam Ghantous
,
Federico Pintore
,
Mattia Veroni
Efficiency of SIDH-based signatures (yes, SIDH).
J. Math. Cryptol.
18 (1) (2024)
Loïc Rouquette
,
Marine Minier
,
Christine Solnon
Automatic boomerang attacks search on Rijndael.
J. Math. Cryptol.
18 (1) (2024)
Kyosuke Yamashita
,
Keisuke Hara
On the Black-Box impossibility of multi-designated verifiers signature schemes from ring signature schemes.
J. Math. Cryptol.
18 (1) (2024)
Massimiliano Sala
,
Daniele Taufer
Group structure of elliptic curves over ℤ/Nℤ.
J. Math. Cryptol.
18 (1) (2024)
Marco Calderini
,
Riccardo Longo
,
Massimiliano Sala
,
Irene Villa
Searchable encryption with randomized ciphertext and randomized keyword search.
J. Math. Cryptol.
18 (1) (2024)
Márton Erdélyi
,
Pál Hegedüs
,
Sándor Z. Kiss
,
Gábor Péter Nagy
On linear codes with random multiplier vectors and the maximum trace dimension property.
J. Math. Cryptol.
18 (1) (2024)
Marco Calderini
,
Roberto Civino
,
Riccardo Invernizzi
Differential experiments using parallel alternative operations.
J. Math. Cryptol.
18 (1) (2024)
volume 17, number 1, 2023
Daniel R. L. Brown
Plactic key agreement (insecure?).
J. Math. Cryptol.
17 (1) (2023)
volume 16, number 1, 2022
Javad Sharafi
,
Hassan Daghigh
A Ring-LWE-based digital signature inspired by Lindner-Peikert scheme.
J. Math. Cryptol.
16 (1) (2022)
Matthew J. Craven
,
John R. Woodward
Evolution of group-theoretic cryptology attacks using hyper-heuristics.
J. Math. Cryptol.
16 (1) (2022)
Daniel R. L. Brown
,
Neal Koblitz
,
Jason T. LeGrow
Cryptanalysis of "MAKE".
J. Math. Cryptol.
16 (1) (2022)
Carolina Mejía
,
Juan Andrés Montoya
Abelian sharing, common informations, and linear rank inequalities.
J. Math. Cryptol.
16 (1) (2022)
Srinivas Vivek
,
Shyam Murthy
,
Deepak Kumaraswamy
Integer polynomial recovery from outputs and its application to cryptanalysis of a protocol for secure sorting.
J. Math. Cryptol.
16 (1) (2022)
Andrea Basso
,
Fabien Pazuki
On the supersingular GPST attack.
J. Math. Cryptol.
16 (1) (2022)
Mikhail Anokhin
Pseudo-free families and cryptographic primitives.
J. Math. Cryptol.
16 (1) (2022)
Paolo Santini
,
Edoardo Persichetti
,
Marco Baldi
Reproducible families of codes and cryptographic applications.
J. Math. Cryptol.
16 (1) (2022)
Liljana Babinkostova
,
Ariana Chin
,
Aaron Kirtland
,
Vladyslav Nazarchuk
,
Esther Plotnick
The polynomial learning with errors problem and the smearing condition.
J. Math. Cryptol.
16 (1) (2022)
Prasanna Raghaw Mishra
,
Shashi Kant Pandey
On the algebraic immunity of multiplexer Boolean functions.
J. Math. Cryptol.
16 (1) (2022)
Bishwajit Chakraborty
,
Mridul Nandi
The mF mode of authenticated encryption with associated data.
J. Math. Cryptol.
16 (1) (2022)
Simran Tinani
,
Joachim Rosenthal
A deterministic algorithm for the discrete logarithm problem in a semigroup.
J. Math. Cryptol.
16 (1) (2022)
Nael Rahman
,
Vladimir Shpilrain
MAKE: A matrix action key exchange.
J. Math. Cryptol.
16 (1) (2022)
Samed Düzlü
,
Juliane Krämer
Application of automorphic forms to lattice problems.
J. Math. Cryptol.
16 (1) (2022)
Madhu Dadhwal
,
Pankaj
Group codes over binary tetrahedral group.
J. Math. Cryptol.
16 (1) (2022)
Dmitrii Koshelev
-invariant 1728.
J. Math. Cryptol.
16 (1) (2022)
Jiao Han
,
Jincheng Zhuang
DLP in semigroups: Algorithms and lower bounds.
J. Math. Cryptol.
16 (1) (2022)
Mingping Qi
An efficient post-quantum KEM from CSIDH.
J. Math. Cryptol.
16 (1) (2022)
Christopher Battarbee
,
Delaram Kahrobaei
,
Dylan Tailor
,
Siamak F. Shahandashti
On the efficiency of a general attack against the MOBS cryptosystem.
J. Math. Cryptol.
16 (1) (2022)
Yu Zhou
,
Jianyong Hu
,
Xudong Miao
,
Yu Han
,
Fuzhong Zhang
On the confusion coefficient of Boolean functions.
J. Math. Cryptol.
16 (1) (2022)
volume 15, number 1, 2021
Matvei Kotov
,
Anton Menshov
,
Alexander Ushakov
Attack on Kayawood protocol: uncloaking private keys.
J. Math. Cryptol.
15 (1) (2021)
Gary McGuire
,
Oisín Robinson
Lattice Sieving in Three Dimensions for Discrete Log in Medium Characteristic.
J. Math. Cryptol.
15 (1) (2021)
Ignacio Cascudo
,
Reto Schnyder
A note on secure multiparty computation via higher residue symbols.
J. Math. Cryptol.
15 (1) (2021)
Jean-François Biasse
,
Benjamin Pring
A framework for reducing the overhead of the quantum oracle for use with Grover's algorithm with applications to cryptanalysis of SIKE.
J. Math. Cryptol.
15 (1) (2021)
Sean Murphy
,
Rachel Player
Discretisation and Product Distributions in Ring-LWE.
J. Math. Cryptol.
15 (1) (2021)
Dana Dachman-Soled
,
Huijing Gong
,
Mukul Kulkarni
,
Aria Shahverdi
Towards a Ring Analogue of the Leftover Hash Lemma.
J. Math. Cryptol.
15 (1) (2021)
Yu Zhou
,
Daoguang Mu
,
Xinfeng Dong
On cryptographic properties of (n + 1)-bit S-boxes constructed by known n-bit S-boxes.
J. Math. Cryptol.
15 (1) (2021)
Atul Pandey
,
Indivar Gupta
,
Dhiraj Kumar Singh
Improved cryptanalysis of a ElGamal Cryptosystem Based on Matrices Over Group Rings.
J. Math. Cryptol.
15 (1) (2021)
Arghya Bhattacharjee
,
Cuauhtemoc Mancillas López
,
Eik List
,
Mridul Nandi
The Oribatida v1.3 Family of Lightweight Authenticated Encryption Schemes.
J. Math. Cryptol.
15 (1) (2021)
Marc Joye
,
Oleksandra Lapiha
,
Ky Nguyen
,
David Naccache
The Eleventh Power Residue Symbol.
J. Math. Cryptol.
15 (1) (2021)
Jean-François Biasse
,
Xavier Bonnetain
,
Benjamin Pring
,
André Schrottenloher
,
William Youmans
A trade-off between classical and quantum circuit size for an attack against CSIDH.
J. Math. Cryptol.
15 (1) (2021)
Martin Ekerå
Quantum algorithms for computing general discrete logarithms and orders with tradeoffs.
J. Math. Cryptol.
15 (1) (2021)
Fouazou Lontouo Perez Broon
,
Thinh Dang
,
Emmanuel Fouotsa
,
Dustin Moody
Isogenies on twisted Hessian curves.
J. Math. Cryptol.
15 (1) (2021)
Antonio J. Di Scala
,
Carlo Sanna
,
Edoardo Signorini
On the condition number of the Vandermonde matrix of the nth cyclotomic polynomial.
J. Math. Cryptol.
15 (1) (2021)
Dylan Rudy
,
Chris Monico
Remarks on a Tropical Key Exchange System.
J. Math. Cryptol.
15 (1) (2021)
Jing Zhang
,
Yuan Li
,
John O. Adeyeye
Sensitivities and block sensitivities of elementary symmetric Boolean functions.
J. Math. Cryptol.
15 (1) (2021)
Jung Hee Cheon
,
Kristin E. Lauter
,
Yongsoo Song
Editor's Preface for the Second Annual MathCrypt Proceedings Volume.
J. Math. Cryptol.
15 (1) (2021)
Thijs Laarhoven
Approximate Voronoi cells for lattices, revisited.
J. Math. Cryptol.
15 (1) (2021)
Filipe Araújo
,
Samuel Neves
The circulant hash revisited.
J. Math. Cryptol.
15 (1) (2021)
László Csirmaz
Secret sharing and duality.
J. Math. Cryptol.
15 (1) (2021)